Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsCybersecurity News

IBM settles lawsuit over data privacy of Weather Channel app

cyber5-900px.jpg
August 21, 2020

IBM, the owner of the Weather Channel mobile app, has reached a settlement with the Los Angeles city attorney’s office after a 2019 lawsuit alleged that the app was deceiving its users in how it was using their geolocation data.

According to AP News, City Attorney Mike Feuer alleged that app users were misled when they agreed to share their location information in exchange for personalized forecasts and alerts. Instead, the lawsuit claimed users were unaware they had surrendered personal privacy when the company sold their data to third parties.

“Users will now clearly know that they have the choice to provide access to their locations,” Feuer said at a news conference, adding he hopes other companies will follow the app’s model for transparency. “It shows that we don’t have to sacrifice our privacy for things of value.”

Generally, end users "trust" their phones as well as the apps on their phones, says Setu Kulkarni, Vice President, Strategy & Business Development at WhiteHat Security, a San Jose, Calif.-based provider of application security. He adds, “ However, these apps have unprecedented access to explicit, and more importantly, implicit user info such as location. I mean who thinks about their own location when using the app? But that implicit and implied insight is gold for apps who serve up paid content and paid features based on your location whether you want it or not, and whether you like it or not. The average end user of mobile apps need not, and should not, know how a particular mobile app works under the hood. It’s time that end users are simply informed in a easy to understand way what the app does and does not do. Not through 10s of pages of EULAs and T&Cs. Moving forward, we must make confirmation of apps less technical and more user friendly - today the average use just accepts the default settings, without knowing any better.”

Stephen Banda, Senior Manager, Security Solutions at Lookout, a San Francisco, Calif.-based provider of mobile phishing solutions, notes there is always a balance to strike between respecting user privacy and providing valuable functionality to end users. He adds, "Location is a delicate matter and consumers need to understand how their location is being used and to what extent their data is being shared. A quick look at an app’s permissions on the Google Play store will show if exact or precise location is used. Regrettably, beyond this information, the responsibility is on the end-user to further validate the privacy policy details and how their data is being used before accepting the usage terms 

"Fortunately, in recent years, regulations such as CCPA and GDPR have raised the bar for organizations to safeguard the personal data of their employees and customers," notes Banda. "These privacy regulations are definitely raising public awareness and will continue to drive progress in how businesses safeguard user privacy and communicate their privacy practices. In fact, a recent update to CCPA now requires companies that sell personal information to include a ‘Do not sell my personal information’ link on their website home page and related mobile apps. So it's encouraging to see that progress is steadily being made in the area of respecting user privacy."

Ali Golshan, CTO and co-founder at StackRox, a Mountain View, Calif.-based leader in security for containers and Kubernetes, says, “Considering the volume and range of data being collected from services and users, targeting and reaching the user has become a very personal experience. Due to development timelines, developers often have to delay building granular privacy permissions into their applications. Such permissions enable individual customers to define how their data can be used, or the right to be forgotten. One key feature for data privacy is ensuring up-to-date controls and configurations around access. To ensure data is protected from unauthorized access, systems need controls such as identity and authentication of users. Limits to access must also extend to developers of platforms as well.”

According to Steve Durbin, managing director of the Information Security Forum, a London-based authority on cyber, information security and risk management, the requirement for maintaining data privacy has increased as privacy regulations have been adopted by many more jurisdictions since they were first announced. "Fines for breaching data privacy regulations have multiplied, and penalties can be more severe than fines. Increased public awareness and media interest have led to commercial and reputational consequences for non-compliance. The risk of private data being compromised has amplified as systems are ever more accessible via connected devices and vulnerable to cyber-attacks," says Durbin. "With a focus on breaches and the loss of personal data, it is reasonable that the main attention for businesses today has shifted to data privacy. We are seeing progress in legislative requirements to protect personal information along with the related fines and sanctions for non-compliance.”

 

 

KEYWORDS: cyber security data concerns IBM privacy issues

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • dunkin' donuts

    Dunkin' Donuts settles data breach lawsuit

    See More
  • video conference

    Zoom Settles with NY AG over Privacy and Security Concerns

    See More
  • STEM

    University of Chicago Implicated in Lawsuit Over Data Breach

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • 9780367667887.jpg

    Surveillance, Privacy and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing