Google Agrees to Wi-Fi Opt Out

March 2012
Information Management Journal;Mar/Apr2012, Vol. 46 Issue 2, p6
The article reports that on pressure from the Netherlands, Google Inc. has agreed to allow people worldwide to keep the names and locations of their home or business Wi-Fi routers out of its database. Google was found to have illegally collected information from 3.6 million routers in the Netherlands during March 2008-May 2010 as it compiled its Street View mapping service. The Dutch Data Protection Agency has threatened Google with a 1.4 million dollars fine for its illegal data collection.


Related Articles

  • DrayTek Vigor2600G.  // Australian Personal Computer;Jan2005, Vol. 25 Issue 1, p53 

    This article presents information on several routers. One of the most feature-rich ADSL modem routers on the market, the Vigor2600G is primed for business. The device supports up to 16 simultaneous PPTP, IPSec and L2TP VPN connections using DES, 3DES or AES encryption schemes, making it...

  • Paranoia Strikes Deep: Even Dial-Up Users Need Firewalls. Crawford, Walt // Online;Mar/Apr2004, Vol. 28 Issue 2, p59 

    This article reflects on matters concerning computer security and antivirus software. Here are some suggestions beyond antivirus software. First is to keep up-to-date with operating system patches. Second, do not write-enable shared directories that contain executables or anything crucial....

  • Self-defending Networks. Jain, Sanjeev // Siliconindia;Feb2005, Vol. 9 Issue 1, p35 

    The article presents information about Network Admission Control (NAC), Cisco System Inc.'s self-defending network initiative. NAC encompasses integrated security, industry collaboration and system level solution to meet security threats. NAC is an industry collaborative initiative. Cisco is...

  • Small business security guide. Taylor, Nathan // Australian PC User;Sep2004, Vol. 16 Issue 9, p106 

    Focuses on the use of security appliances for small business networks. Features of security appliances; Advantages over a basic router of software firewall; Capabilities of security appliances. INSET: TECH TERMS.

  • Security flaws occupy router vendors, ISPs. Duffy, Jim; Messmer, Ellen; Hochmuth, Phil // Network World;4/26/2004, Vol. 21 Issue 17, p12 

    Two security holes that could enable denial-of-service attacks and knock out Internet service to enterprise users have made router vendors and Internet service providers busy in April 2004. According to the British National Infrastructure Security Co-ordination Center, the first vulnerability in...

  • Wireless connections of one in four households are insecure.  // New Media Age;4/12/2007, p11 

    The article discusses the findings of a study on wireless security in Great Britain. Moneysupermarket conducted the study to find out how seriously British homes are taking wireless security. According to the study, around 25% of Internet users had not enabled the security in their wireless...

  • Comms hole warning. Savvas, Antony // Computer Weekly;4/19/2005, p10 

    The article reports that the British National Infrastructure Security Co-ordination Centre (NISCC) has advised users to update their Internet communications infrastructure to plug a denial-of-service vulnerability in major suppliers' equipment. The threat involves network routers failing to...

  • Program Updates.  // Certification Magazine;Aug2007, Vol. 9 Issue 8, p9 

    The article presents an update on the computer security certification programs of the Computing Technology Industry Association (CompTIA) and Cisco. The Convergence+ certification program was released by CompTIA, which validates knowledge and skills in areas of communications technologies in...

  • Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation. Almomani, Iman; Saadeh, Maha // KSII Transactions on Internet & Information Systems;Apr2012, Vol. 6 Issue 4, p1223 

    The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics