Google maps, Google search, Google mail, and next it seems will be Google storage, although the company has yet to announce official details. Increasingly, when Google sneezes, entire industries catch cold, and if the report in this week’s Wall Street Journal is correct, the nascent remote storage business may soon feel the chill.
EMC enterprise content management software helps organizations create, capture, manage, and archive digital content or unstructured information (text documents, e-mail, reports, XML, pictures/images, audio and video files, and transactional data) that exists across the enterprise. Learn more.
In the wake of this week’s buzz about Google’s plans for a new online service for file storage, Internet privacy specialists are raising concerns about the potential vulnerability of such data to government investigations. Such fears have been heightened by a variety of high-profile attempts by federal investigators to retrieve user information from online companies, including Amazon, Yahoo, MSN, and Google itself.The buzz this week seems to have started from a report in yesterday’s Wall Street Journal, saying that Google is developing an integrated service that would allow users to store and organize their own information on Google’s servers. According to the WSJ story, users of the service could store any and all of their files — from business letters to family photos — on Google’s servers, and then access or share those from any computer or mobile device.Although Google has declined to comment on the report, privacy watchdogs as well as competitors in the data storage industry have some concerns.
More Vulnerable Data “Whenever information is in the hands of third-parties, it changes the protections available for that information in a qualitative way,” said Lauren Weinstein, an Internet privacy expert and co-founder of the People for Internet Responsibility. “E-mail, for instance, that is in the hands of an ISP typically has less protection than the same e-mail on your home computer.”When consumers store data on devices in their home, Weinstein noted, law enforcement is generally required to obtain a search warrant, which requires presenting sufficient facts to a judge or magistrate to demonstrate probable cause for the issuance of the warrant. But data in the hands of a third party can be disclosed under a variety of other theories, some of them with lower standards of protection.”Remotely stored information might be subject to a national security letter, for instance,” he argued. “NSLs are a mechanism to extract information from third parties who have acess to information that the government is interested in. Not only can government officials get the information more easily,” he said but they can also “often get access to data without the knowledge of the target of investigation, which is obviously harder to do with a search warrant.”Weinstein said that a critical feature in making remote storage secure is for the hosting company to encrypt it in such a way that only the owner of the data can get access to it. |