Moves, contradicting previous statement, may share user data with Facebook under new privacy policy

When Facebook acquired fitness tracking app Moves, the two said user data would not be commingled. But Moves’ new privacy policy reverses course.

First, when fitness tracking app Moves was acquired by Facebook in April, it said:

For those of you that use the Moves app – the Moves experience will continue to operate as a standalone app, and there are no plans to change that or commingle data with Facebook.

CNET reported almost identical language from Facebook:

A spokesperson for Facebook confirmed the plans to keep the Moves app standalone and not commingle its data

Today, in an updated privacy policy, Moves said:

We may share information, including personally identifying information, with our Affiliates (companies that are part of our corporate groups of companies, including but not limited to Facebook) to help provide, understand, and improve our Services.

I suppose the updated policy doesn’t technically contradict the statements by Moves and Facebook because it’s feasible there were no plans at that time to commingle data with Facebook. But my initial reaction was incredulity.

After all, the Wall Street Journal reported Moves had been downloaded 4 million times. Surely Mark Zuckerberg acquired Moves primarily for its ever-growing trove of user activity data. Why else?

But none of the coverage questioned the initial statements, and I figured the companies wouldn’t say it so plainly if it wasn’t true. So I decided to wait and see.

Well, I’ve waited and seen. The lesson here is that it is wiser to pay attention only to what a company does, not what it says. If it looks like a data grab and smells like a data grab, it’s probably a data grab. Even if, especially if, someone tells you it isn’t a data grab.

Facebook deals in data, whether its hundreds of millions of users know it or care about it or not. And Moves would be stupid not to take the money and, more importantly, the resources Facebook can bring to bear on improving the app. So a data grab isn’t a surprise. Perhaps the “no commingling” language was an elegant public relations play meant to minimize privacy concerns in the press. That would seem to have worked: as of this article’s publication I couldn’t find a single story on the change.

Zuckerberg’s recently stated intent to grow via the acquisition and development of discreet apps and services raises another interesting issue. To quit Facebook, it may not be enough anymore to, well, quit Facebook. If I closed my Facebook account today, the company could still gather data about me for as long as I use Moves. Facebook has a growing list of acquisitions under its belt, so that concern is likely to increase with time.

This example of corporate self-contradiction is a good reminder: Always assume your data is a valuable and transferable commodity in the eyes and on the servers of the apps and services you use. Some people are deterred by that fact, while others are not. There is no right or wrong answer, just a continuum of personal comfort and preference.

While I wish the companies had been more forthright from the beginning, I won’t stop using Moves. I have personally always been relatively open in sharing data in exchange for convenience and utility. But that doesn’t mean I’m not alarmed by the increasing difficulty of using the internet and related apps and services for those who disagree with my position on openness.

<

p>Share your perspective via email at joe@joeross.me, on Twitter or in the comments.

Heartbleed: When no encryption is better than bad encryption

Heartbleed: When no encryption is better than bad encryption

DHS wants to track license plates

DHS wants to track license plates

Facebook scans messages for ad targeting

Facebook scans messages for ad targeting

Judges are, and aren't, competent to rule on intelligence issues

Judges are, and aren’t, competent to rule on intelligence issues

NSA responds to “erroneous” data collection reports (full text)

The National Security Agency, in a mass email to press Oct. 31, presumably responding to a recent Washington Post report on the agency’s direct data monitoring of company’s like Google and Yahoo, goes all third-person self-referential on us:

What NSA does is collect the communications of targets of foreign intelligence value, irrespective of the provider that carries them. U.S. service provider communications make use of the same information super highways as a variety of other commercial service providers. NSA must understand and take that into account in order to eliminate information that is not related to foreign intelligence.

Read the rest of the statement:

STATEMENT

Oct. 31, 2013

Recent press articles on NSA’s collection operations conducted under Executive Order 12333 have misstated facts, mischaracterized NSA’s activities, and drawn erroneous inferences about those operations. NSA conducts all of its activities in accordance with applicable laws, regulations, and policies – and assertions to the contrary do a grave disservice to the nation, its allies and partners, and the men and women who make up the National Security Agency.

All NSA intelligence activities start with a validated foreign intelligence requirement, initiated by one or more Executive Branch intelligence consumers, and are run through a process managed by the Office of the Director of National Intelligence. When those requirements are received by NSA, analysts look at the Information Need and determine the best way to satisfy it. That process involves identifying the foreign entities that have the information, researching how they communicate, and determining how best to access those communications in order to get the foreign intelligence information. The analysts identify selectors – e-mail addresses and phone numbers are examples – that help isolate the communications of the foreign entity and task those to collection systems. In those cases where there are not specific selectors available, the analysts will use metadata, similar to the address on the outside of an envelope, to attempt to develop selectors for their targets. Once they have them, they task the selectors to the collection systems in order to get access to the content, similar to the letter inside the envelope.

The collection systems target communications links that contain the selectors, or are to and from areas likely to contain the selectors, of foreign intelligence interest. Seventy years ago, the communications links were shortwave radio transmissions between two points on the globe. Today’s communications flow over technologies like satellite links, microwave towers, and fiber optic cables. Terrorists, weapons proliferators, and other valid foreign intelligence targets make use of commercial infrastructure and services. When a validated foreign intelligence target uses one of those means to send or receive their communications, we work to find, collect, and report on the communication. Our focus is on targeting the communications of those targets, not on collecting and exploiting a class of communications or services that would sweep up communications that are not of bona fide foreign intelligence interest to us.

What NSA does is collect the communications of targets of foreign intelligence value, irrespective of the provider that carries them. U.S. service provider communications make use of the same information super highways as a variety of other commercial service providers. NSA must understand and take that into account in order to eliminate information that is not related to foreign intelligence.

NSA works with a number of partners and allies in meeting its foreign-intelligence mission goals, and in every case those operations comply with U.S. law and with the applicable laws under which those partners and allies operate. A key part of the protections that are provided to both U.S. persons and citizens of other countries is the requirement that information be in support of a valid foreign intelligence requirement, and the Attorney General-approved minimization procedures. These limitations protect the privacy of all people and, in particular, to any incidentally acquired communications of U.S. persons. The protections are applied when selectors are tasked to the collection system; when the collection itself occurs; when the collected data are being processed, evaluated, analyzed, and put into a database; and when any reporting of the foreign intelligence is being done. In addition, NSA is very motivated and actively works to remove as much extraneous data as early in the process as possible – to include data of innocent foreign citizens.

—NSA Public Affairs Office

States cite lack of federal progress in pursuit of privacy reform

States cite lack of federal progress in pursuit of privacy reform

Google "zealously" private about mystery barge

Google “zealously” private about mystery barge

One Google, two different privacy rulings

One Google, two different privacy rulings

Welcome to Google Island

Welcome to Google Island

U.S. directs agents to cover up program used to investigate Americans

U.S. directs agents to cover up program used to investigate Americans

German railroad mulling anti-graffiti drones

German railroad mulling anti-graffiti drones

Obama May Back F.B.I. Plan to Wiretap Web Users

Obama May Back F.B.I. Plan to Wiretap Web Users

China is very serious about cyberespionage

China is very serious about cyberespionage

Actually, it's not our data at all

Actually, it’s not our data at all

Harvard snooped on faculty email

Harvard snooped on faculty email

ECPA amendment would require warrant even for email older than 6 months

ECPA amendment would require warrant even for email older than 6 months

Facebook is buying your loyalty card history

Facebook is buying your loyalty card history

At Google, Constitution trumps statute

At Google, Constitution trumps statute

Keycard: A neat little Mac app that secures your computer by detecting the proximity of your mobile device - The Next Web

Keycard: A neat little Mac app that secures your computer by detecting the proximity of your mobile device - The Next Web

Government can still warrantlessly read older emails

Government can still warrantlessly read older emails

Tor: An Anonymous, And Controversial, Way to Web-Surf

Federal Trade Commission to data brokers: Show us your data

Federal Trade Commission to data brokers: Show us your data

Facebook Makes A Huge Data Grab By Aggressively Promoting Photo Sync

Facebook Makes A Huge Data Grab By Aggressively Promoting Photo Sync

NYPD subpoenas call logs of stolen cell phones

NYPD subpoenas call logs of stolen cell phones