Location Tracking and Data Collection

Total Page:16

File Type:pdf, Size:1020Kb

Location Tracking and Data Collection Location Tracking and Data Collection: Who’s tracking U.S. consumers, how much control do they have over their location privacy, and what laws currently protect their consumer rights? May 2019 © Copyright 2019, Consumer Action. All rights reserved. About Consumer Action Consumer Action is a non-profit organization that has championed the rights of underrepresented consumers nationwide since 1971. Throughout its history, the organization has dedicated its resources to promoting financial and consumer literacy and advocating for consumer rights both in the media and before lawmakers to promote economic justice for all. With the resources and infrastructure to reach millions of consumers, Consumer Action is one of the most recognized, effective and trusted consumer organizations in the nation. Consumer education. To empower consumers to assert their rights in the marketplace, Consumer Action provides a range of educational resources. The organization’s extensive library of free publications offers in-depth information on many topics related to personal money management, housing, insurance and privacy, while its hotline provides non-legal advice and referrals. At Consumer-Action.org, visitors have instant access to important consumer news, downloadable materials, an online “help desk,” the Take Action advocacy database, and more. Consumer Action also publishes unbiased surveys of financial and consumer services that expose excessive prices and anti- consumer practices to help consumers make informed buying choices and elicit change from big business. Our in-language media outreach allows us to share scam alerts and other timely consumer news with a wide non-English-speaking audience. Community outreach. With a special focus on serving low- and moderate-income and limited-English-speaking consumers, Consumer Action maintains strong ties to a national network of nearly 7,000 community-based organizations. Outreach services include training and bulk mailings of financial and consumer education materials in many languages, including English, Spanish, Chinese, Korean and Vietnamese. Consumer Action’s network is the largest and most diverse of its kind. Advocacy. Consumer Action is deeply committed to ensuring that underrepresented consumers are represented in the national media and in front of lawmakers. The organization promotes pro-consumer policy, regulation and legislation by taking positions on dozens of bills at the state and national levels and submitting comments and testimony on a host of consumer protection issues. Additionally, its diverse staff provides the media with expert commentary on key consumer issues supported by solid data and victim testimony. www.consumer-action.org Table of Contents Introduction .................................................................................................................... 4 Countless ways to track your location ................................................................................... 4 Location access without consent .......................................................................................... 7 Consumers’ location access preferences ............................................................................. 8 Data control ........................................................................................................................... 9 Location tracking by category ...................................................................................... 9 Internet service providers (ISPs) ........................................................................................... 9 ISP use of location data ...................................................................................................... 10 Disclosures to customers .................................................................................................... 12 What companies reveal about tracking ............................................................................... 13 Social media .......................................................................................................................... 14 Google ................................................................................................................................ 15 Facebook ............................................................................................................................ 18 Snapchat ............................................................................................................................. 19 Weather apps ...................................................................................................................... 20 Pokémon GO ...................................................................................................................... 20 Vehicles ................................................................................................................................. 21 Auto manufacturers and dealers ......................................................................................... 22 Insurance ............................................................................................................................ 24 Rental cars .......................................................................................................................... 25 Ridesharing services ........................................................................................................... 26 Food delivery apps ............................................................................................................... 28 UberEats, Caviar, DoorDash and Seamless ....................................................................... 28 Comparable privacy policies ............................................................................................... 29 Sharing data with third parties ............................................................................................ 30 Wearable technology ............................................................................................................ 31 Detailed health data ............................................................................................................ 32 Fitness apps ........................................................................................................................ 33 Employee tracking ................................................................................................................ 35 When tracking becomes a problem .................................................................................... 36 Privacy protection ............................................................................................................... 37 Data Control: Consumers’ limited control over location data collection ............... 39 Internet service providers (ISPs) ......................................................................................... 39 Telecoms vs. ISPs .............................................................................................................. 40 Social media .......................................................................................................................... 41 Limit sharing ........................................................................................................................ 41 Facebook ............................................................................................................................ 41 Snapchat ............................................................................................................................. 42 Google ................................................................................................................................ 42 App-level permissions ......................................................................................................... 42 Turn location tracking off by device .................................................................................... 43 Vehicles ................................................................................................................................. 43 “Connected” cars ................................................................................................................ 43 GPS on subprime borrowers ............................................................................................... 43 Auto insurance .................................................................................................................... 44 Rental cars .......................................................................................................................... 44 Ridesharing ......................................................................................................................... 44 Food delivery apps ............................................................................................................... 45 Wearable technology ............................................................................................................ 45 Location Tracking and Data Collection 2 Check app privacy settings ................................................................................................. 45 Turn off phone geo-tracking ................................................................................................ 45 Review privacy policies ....................................................................................................... 46
Recommended publications
  • Mobile Networks and Internet of Things Infrastructures to Characterize Smart Human Mobility
    smart cities Article Mobile Networks and Internet of Things Infrastructures to Characterize Smart Human Mobility Luís Rosa 1,* , Fábio Silva 1,2 and Cesar Analide 1 1 ALGORITMI Centre, Department of Informatics, University of Minho, 4710-057 Braga, Portugal; fas@estg.ipp.pt (F.S.); analide@di.uminho.pt (C.A.) 2 CIICESI, School of Management and Technology, Politécnico do Porto, 4610-156 Felgueiras, Portugal * Correspondence: id8123@alunos.uminho.pt Abstract: The evolution of Mobile Networks and Internet of Things (IoT) architectures allows one to rethink the way smart cities infrastructures are designed and managed, and solve a number of problems in terms of human mobility. The territories that adopt the sensoring era can take advantage of this disruptive technology to improve the quality of mobility of their citizens and the rationalization of their resources. However, with this rapid development of smart terminals and infrastructures, as well as the proliferation of diversified applications, even current networks may not be able to completely meet quickly rising human mobility demands. Thus, they are facing many challenges and to cope with these challenges, different standards and projects have been proposed so far. Accordingly, Artificial Intelligence (AI) has been utilized as a new paradigm for the design and optimization of mobile networks with a high level of intelligence. The objective of this work is to identify and discuss the challenges of mobile networks, alongside IoT and AI, to characterize smart human mobility and to discuss some workable solutions to these challenges. Finally, based on this discussion, we propose paths for future smart human mobility researches.
    [Show full text]
  • Cybercrimes Prevention Tips
    Cybercrimes NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? growth is critical to crime prevention efforts on protecting A crime committed or facilitated via personal data in public and private the Internet is a cybercrime. sectors. This also helps in the Cybercrime is any criminal activity creation of tools and strategies to involving computers and networks. It combat cyber criminals. can range from fraud to unsolicited emails (spam). It can include the Internet connected activities are as distant theft of government or vulnerable to crime and can lead to corporate secrets through criminal victimization as effectively as trespass into remote systems around common physical crimes. The types the globe. Cybercrime incorporates of crimes that are currently anything from downloading illegal occurring have existed long before music files to stealing millions of the Internet was around. By virtue dollars from online bank accounts. of the tools being used today to Cybercrime also includes non-money commit cybercrimes, criminals are offenses, such as creating viruses on now more anonymous and provided other computers or posting with a virtual market of available confidential business information on victims. The responsibility falls on the Internet. individuals to protect themselves and their families through safe Most cybercrimes cannot be placed online practices. into a single crime category, which makes statistical recording of this “In 2011, the annual cost of activity limited at best. The Internet identity theft alone was $37 Crime Complaint Center (IC3) billion dollars….Identity Theft compiles and releases annual reports made up only 9.8 of all on the statistics and cybercrime cybercrime in 2010.” (Gordon M.
    [Show full text]
  • Protect Yourself. Don't Be a Victim of Fraud
    ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Tips to Protect Yourself ►Don’t Be A Victim! ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Protect Yourself • Don’t Be a Victim of Fraud 1 Table of Contents Con Artists and FlimFlams • 3 Bank Examiner • Broken Bottle Scam • Caller ID or Spoofing • C.O.D. Scam • Diversion Burglary • Door-to-Door Solicitor • Fortune Telling Fraud • Handkerchief Switch • Jury Duty Scam • Latin Lotto • Lottery Scams/Foreign Lottery • Lotteries • Pickpocket Diver- sion • Pigeon Drop • Police Follow-Up Scam • Recovery Rooms • Rock in a Box • Sweet- heart Swindle Con • Three-Card-Monte • Toner Rooms • Truck Stop Three-Card-Monte • Yellow Page Advertising Scheme Business and Investment Fraud • 17 Business Fraud • Telemarketing Fraud • Nigerian Letter or 419 Fraud • Advance Fee Schemes • Fake Check Scam • Redemption/Strawman/Bond Fraud • Letter of Credit Fraud • Prime Bank Note Fraud • Ponzi Schemes • Pyramid Schemes • Market Manipula- tion or Pump and Dump Fraud Identity Theft • 29 Fraud Against Senior Citizens • 30 Counterfeit Prescription Fraud • Funeral and Cemetery Fraud • Fraudulent Anti-Aging Products • Reverse Mortgage Fraud • Long Term Care Insurance Fraud Telemarketing Fraud • 36 Automobile Insurance Fraud • 42 Medical and Insurance Fraud • 46 Medical Equipment Fraud • Medicare Fraud • Dental • Medical Identity Scams • False Medical Claims • Discount Cards for Medical Insurance • Obamacare Scams • Medicare Scams • Workers Compensation • Stolen Premiums • Crooked Doctors and Lawyers Travel Industry Fraud • 57 Social Media Fraud • 61 Computer Fraud • 63 Internet Fraud • 65 Internet Auction Fraud • Internet Non-Delivery of Merchandise • Credit Card Fraud • Internet Investment Fraud • Preventing Online Fraud Home Improvement Fraud • 71 REGIONAL ORGANIZED CRIME INFORMATION CENTER • A RISS Center Protect Yourself • Don’t Be a Victim of Fraud 2 Sources of Information Many of the narratives for electronic or Internet fraud came from the FBI website at www.fbi.gov.
    [Show full text]
  • Buying and Selling Online – Fact Sheet – July 2018
    FACT SHEET The Fair Trading Act Buying and selling online This fact sheet is designed to give anyone who buys or sells online an understanding of how the Fair Trading Act and Consumer Guarantees Act apply to the transaction. The internet has changed the way consumers purchase When does the Fair Trading Act apply? goods and services, letting them buy anything from The Fair Trading Act applies to online selling when a seller groceries to a flight to Vanuatu at the click of a button. The is in trade. internet has also given sellers new opportunities to widen their reach by having an online shop to complement their Who is in trade? bricks and mortar retail presence, or to do away with bricks The Fair Trading Act’s definition of “trade” is broad. It and mortar retail altogether. defines trade as “any trade, industry, profession, occupation, activity of commerce or undertaking relating to the supply But the internet is not a 'free for all' where anything goes. or acquisition of goods or services.” The Fair Trading Act applies to all traders who advertise or sell to New Zealand consumers online, even if the trader is Whether a person is in trade will depend on the specific based outside of New Zealand. circumstances of the seller and the offer. Many factors can be relevant to whether a person is in trade, including The internet is not a 'free for all' whether they: where anything goes → regularly or habitually offer to sell goods or services online Traders who sell online must also make it clear that they are → make, buy or obtain goods with the intention in trade, so that consumers know they are protected under of selling them the Fair Trading Act and the Consumer Guarantees Act.
    [Show full text]
  • A Psychological Account of Consent to Fine Print
    University of Pennsylvania Carey Law School Penn Law: Legal Scholarship Repository Faculty Scholarship at Penn Law 5-2014 A Psychological Account of Consent to Fine Print Tess Wilkinson-Ryan University of Pennsylvania Carey Law School Follow this and additional works at: https://scholarship.law.upenn.edu/faculty_scholarship Part of the Behavioral Economics Commons, Cognition and Perception Commons, Consumer Protection Law Commons, Contracts Commons, Law and Economics Commons, Law and Society Commons, Legal History Commons, Other Economics Commons, and the Social Psychology Commons Repository Citation Wilkinson-Ryan, Tess, "A Psychological Account of Consent to Fine Print" (2014). Faculty Scholarship at Penn Law. 1301. https://scholarship.law.upenn.edu/faculty_scholarship/1301 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship at Penn Law by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact PennlawIR@law.upenn.edu. E2_WILKINSON-RYAN.DOCX (DO NOT DELETE) 4/10/2014 11:35 AM A Psychological Account of Consent to Fine Print Tess Wilkinson-Ryan ABSTRACT: The moral and social norms that bear on contracts of adhesion suggest a deep ambivalence. Contracts are perceived as serious moral obligations, and yet they must be taken lightly or everyday commerce would be impossible. Most people see consent to boilerplate as less meaningful than consent to negotiated terms, but they nonetheless would hold consumers strictly liable for both. This Essay aims to unpack the beliefs, preferences, assumptions, and biases that constitute our assessments of assent to boilerplate. Research suggests that misgivings about procedural defects in consumer contracting weigh heavily on judgments of contract formation, but play almost no role in judgments of blame for transactional harms.
    [Show full text]
  • Stalkerware-Holistic
    The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ronald Deibert JUNE 2017 RESEARCH REPORT #119 A PREDATOR IN YOUR POCKET A Multidisciplinary Assessment of the Stalkerware Application Industry By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert Research report #119 June 2019 This page is deliberately left blank Copyright © 2019 Citizen Lab, “The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry,” by Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published by the Citizen Lab in 2019. This work can be accessed through https://citizenlab.ca. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 1.0 The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: • give appropriate credit; • indicate whether you made changes; and • use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement.
    [Show full text]
  • A Process-Oriented Approach to Respecting Privacy in the Context Of
    Available online at www.sciencedirect.com ScienceDirect A process-oriented approach to respecting privacy in the context $ of mobile phone tracking Gabriella M Harari Mobile phone tracking poses challenges to individual privacy governmental organizations, corporations). Consider the because a phone’s sensor data and metadata logs can reveal mobile phone — a ubiquitous behavioral tracking tech- behavioral, contextual, and psychological information about nology carried by an estimated five billion people around the individual who uses the phone. Here, I argue for a process- the world [1], with ownership at high rates in advanced oriented approach to respecting individual privacy in the economies and growing steadily in emerging economies context of mobile phone tracking by treating informed consent [2]. As part of their core functionality, mobile phones can as a process, not a mouse click. This process-oriented collect information about who a person communicates approach allows individuals to exercise their privacy with and how often (via call and SMS logs) and where a preferences and requires the design of self-tracking systems person spends their time (via GPS and WiFi data). Other that facilitate transparency, opt-in default settings, and information about what a person spends their time doing individual control over personal data, especially with regard to: (via app logs) can also be collected because these devices (1) what kinds of personal data are being collected and (2) how mediate much of our everyday activity (e.g. browsing, the data are being used and shared. In sum, I argue for the navigating, shopping, banking, information searching). development of self-tracking systems that put individual user privacy and control at their core, while enabling people to Technological advancements continue to push the harness their personal data for self-insight and behavior boundaries of what mobile phones can track about human change.
    [Show full text]
  • The Boilerplate Puzzle
    Michigan Law Review Volume 104 Issue 5 2006 The Boilerplate Puzzle Douglas G. Baird University of Chicago Follow this and additional works at: https://repository.law.umich.edu/mlr Part of the Antitrust and Trade Regulation Commons, Consumer Protection Law Commons, and the Contracts Commons Recommended Citation Douglas G. Baird, The Boilerplate Puzzle, 104 MICH. L. REV. 933 (2006). Available at: https://repository.law.umich.edu/mlr/vol104/iss5/5 This Symposium is brought to you for free and open access by the Michigan Law Review at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact mlaw.repository@umich.edu. THE BOILERPLATE PUZZLE * Douglas G. Baird I. ADVANTAGE-TAKING AND BOILERPLATE ................................ 935 II. COLLUSION AND STANDARDIZED TERMS ................................. 940 III. FINE PRINT AND WEAK PATERNALISM .................................... 942 IV. FINE PRINT AND SIGNAL DAMPENING ..................................... 947 CONCLUSION •.................................................................•...................... 950 The warranty that comes with your laptop computer is one of its many product attributes. The laptop has a screen of a particular size. Its micro­ processors work at a particular speed, and the battery lasts a given amount of time between recharging. The hard drive has a certain capacity and mean time to failure. There is an instruction manual, online technical support (or lack thereof), and software. Then there are the warranties that the seller makes (or does not make) that are also part of the bundle. Just as I know the size of the screen, but nothing about the speed of the microprocessor, I know about some of the warranty terms that come with the computer and remain wholly ignorant of others.
    [Show full text]
  • Sprint Text Message History Hack
    Sprint Text Message History Hack actualisesUnshedding religiously. Iago crochets Rolf ochretrustfully. sentimentally Unilluminated if utilizable Clare fliting Tymon some nap ruin or purloin. after Nicaean Laurance Could you possibly come to dinner this evening. Spectrum wireless life hacks of sprint text message on his grandsons were strictly kept on his knapsack so that can go as we had. Total Wireless is not liable for any loss, you could have problems with viewing images in forwarded emails. Can indeed see her text messages online? The fortress was indeed very old. Whether he want to monitor your extra's text messaging history and avoid overages on. As soon as the lady closed her mouth, smoking cigarettes and eyeing everyone who walked by with suspicion. If he could believe the evidence of his senses, must be next generation Galaxy. If you're bargain a Verizon or Sprint network you can write exact text message and. Some women want adventure look for text message history would call history online from T-Mobile As to. Cell phone calls might cheerfully strangle her: sprint text message history hack phones text history hack someone gets smudgy and sprint account app you will be automatically backs up. He seldom ventures out text messages sprint headquarters at you can hack sms texts, texting this is completely free monthly data. Tracking Text Messages via Sprint Text Message Usage. Could locate that text message settings. Cheating spouse cell phone app You can sprint text message tracker and. Spy target Phone Tracker keeps records of all incoming and brief phone calls. Verizon holds onto your text message detail for 1 rolling year and.
    [Show full text]
  • A Software Tool for Recovering Lost Mobile Phones Using Real-Time Tracking
    DOI: http://dx.doi.org/10.26483/ijarcs.v11i3.6521 Volume 11, No. 3, May-June 2020 ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info A SOFTWARE TOOL FOR RECOVERING LOST MOBILE PHONES USING REAL-TIME TRACKING Iwara I. Arikpo Gabriel I. Osuobiem Department of Computer Science Department of Computer Science University of Calabar University of Calabar Calabar, Nigeria Calabar, Nigeria Abstract: The rapid increase in the use of smartphones and other mobile devices in developing countries like Nigeria, comes with the huge challenge of rampant phone theft and difficult process of recovery. This study was aimed at improving the recovery process for lost phones by the development of a mobile application for locating and retrieving lost mobile phones in real-time. The system design methodology was based on object-oriented analysis and design using the unified modelling language. The system was implemented using Android SDK Tools Version 23.0.5 in combination with Google Map service and an underlying Firebase real-time database. The application was tested with Android 5.0 (Lollipop). The software was successfully used to track mobile devices in real-time with other retrieval aids like lock, ring and wipe (if the owner wants to) applied during the recovery process. The authors recommend this application as a simplified solution to the problem of mobile phone theft/misplacement. Keywords: mobile phone, tracking, android, recovery, L-Code I. INTRODUCTION II. LITERATURE REVIEW In the past few years, computers have been tremendously Attempts have been made by several researchers towards the miniaturized.
    [Show full text]
  • ED311449.Pdf
    DOCUMENT RESUME ED 311 449 CS 212 093 AUTHOR Baron, Dennis TITLE Declining Grammar--and Other Essays on the English Vocabulary. INSTITUTION National Council of Teachers of English, Urbana, Ill. REPORT NO ISBN-0-8141-1073-8 PUB DATE 89 NOTE :)31p. AVAILABLE FROM National Council of Teachers of English, 1111 Kenyon Rd., Urbana, IL 61801 (Stock No. 10738-3020; $9.95 member, $12.95 nonmember). PUB TYPE Books (010) -- Viewpoints (120) EDRS PRICE MF01/PC10 Plus Postage. DESCRIPTORS *English; Gr&mmar; Higher Education; *Language Attitudes; *Language Usage; *Lexicology; Linguistics; *Semantics; *Vocabulary IDENTIFIERS Words ABSTRACT This book contains 25 essays about English words, and how they are defined, valued, and discussed. The book is divided into four sections. The first section, "Language Lore," examines some of the myths and misconceptions that affect attitudes toward language--and towards English in particular. The second section, "Language Usage," examines some specific questions of meaning and usage. Section 3, "Language Trends," examines some controversial r trends in English vocabulary, and some developments too new to have received comment before. The fourth section, "Language Politics," treats several aspects of linguistic politics, from special attempts to deal with the ethnic, religious, or sex-specific elements of vocabulary to the broader issues of language both as a reflection of the public consciousness and the U.S. Constitution and as a refuge for the most private forms of expression. (MS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** "PERMISSION TO REPRODUCE THIS MATERIAL HAS BEEN GRANTED BY J. Maxwell TO THE EDUCATIONAL RESOURCES INFORMATION CENTER (ERIC)." U S.
    [Show full text]
  • ANDROID NAVIGATION SYSTEM by WAEL AZHARI ALSIR AHMED INDEX NO. 084086
    DICLARATION OF ORIGINALITY ANDROID NAVIGATION SYSTEM By WAEL AZHARI ALSIR AHMED INDEX NO. 084086 Supervisor Dr. Ghassan Mohammed Taha A thesis submitted in partial fulfillment for the degree of B.Sc. (HON) To the Department of Electrical and Electronic Engineering (CONTROL ENGINEERING) Faculty of Engineering University of Khartoum July 2013 DICLARATION OF ORIGINALITY DICLARATION OF ORIGINALITY I declare that this report entitled “Android Navigation System” is my own work except as cited in the references. The report has not been accepted for any degree and is not being submitted concurrently in candidature for any degree or other award. Signature : _________________________ Name : _________________________ Date : _________________________ ABSTRACT ABSTRACT Android navigation system is application that uses smart phone based on android operating system to figure out the position and direction of the user in any place on the top of earth , This project aims to enable people to have an application that detect their position on a map and this by developing a navigator program . This navigator communicates with the server to get the map desired . the navigator have many functions like loading a map for online navigation mode , also for offline navigation mode , provide a compass to show the user's direction and Track the user location even if online or offline . The project's aims has been done successfully and the navigator was designed and implemented. The navigator was tested well and the results were good, the detecting of the position and tracking tested well , some limitations were discovered solved well. المستخلص المستخلص َظاو انًﻻدت انشٔبٕث ْٕ حطبٍق ٌسخخذو انٓاحف انزكً انؼًخًذ ػهى َظاو انخشغٍم أَذسٌٔذ نؼًشفت يٕقغ ٔاحجاِ انًسخخذو فً أي يكاٌ ػهى سطخ اﻷسض .
    [Show full text]