{"id":422,"date":"2006-12-27T16:46:19","date_gmt":"2006-12-27T20:46:19","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/shlep\/2006\/12\/27\/search-engine-privacy-strategies\/"},"modified":"2007-04-12T14:30:59","modified_gmt":"2007-04-12T18:30:59","slug":"search-engine-privacy-strategies","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/shlep\/2006\/12\/27\/search-engine-privacy-strategies\/","title":{"rendered":"search engine privacy strategies"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" height=\"50\" alt=\"GoogleSign\" src=\"http:\/\/blogs.law.harvard.edu\/shlep\/files\/2006\/12\/GoogleSign.gif\" width=\"50\" \/>\u00a0\u00a0Yesterday, Greg Beck asked &#8220;<a href=\"http:\/\/pubcit.typepad.com\/clpblog\/2006\/12\/can_everything_.html\">Can Everything You Search Be Used Against You?<\/a>&#8220;, in a posting at the <em>Consumer Law &amp; Policy Blog<\/em> (Dec. 26, 2006).\u00a0\u00a0 Worries over the data collected and\u00a0retained by search engines about their users &#8212; <a href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\">Personally Identifiable Information<\/a> (PII) &#8212; made a lot of news in 2006, when the\u00a0Justice Department\u00a0obtained data from AOL, Yahoo, and MSN on millions of search queries in support of the government&#8217;s defense of the Child Online Protection Act.\u00a0 At that time, Google resisted the broad data request.<\/p>\n<p>Beck&#8217;s posting at <em>CLPB<\/em> describes a recent criminal case in federal court, where evidence was used about Google Searches made by the defendant on topics related to the crime (which involved breaking into a wireless network service and interfering with other users). The conviction was upheld by the 7th Circuit court of appeals, in <a href=\"http:\/\/pub.bna.com\/eclr\/054244.pdf\">United States v. Schuster<\/a>. \u00a0(see\u00a0Declan McCullagh&#8217;s <em>CNET<\/em> article &#8220;<a href=\"http:\/\/news.com.com\/Police+blotter+Google+searches+nab+wireless+hacker\/2100-1030_3-6144962.html?tag=cd.top\">Google searches nab wireless hacker<\/a>,&#8221; Dec. 20, 2006, for more details)<\/p>\n<p>We can&#8217;t offer you any legal strategies for quashing subpoenas aimed at search engines, or striking the fruits of such discovery in your trial.\u00a0 We can remind you, nonetheless, as Greg Beck notes: &#8220;Google has acknowledged that it can trace searches back to a particular computer or, in some cases, to a particular user.&#8221;\u00a0 The information\u00a0would allow Google, prosecutors, or opponents in a civil suit to reconstruct your searches and to know which search result links you clicked. \u00a0 As the <a href=\"http:\/\/www.worldprivacyforum.org\/searchengineprivacytips.html\">World Privacy Forum explains<\/a> (&#8220;Search Engine Privacy Tips,&#8221; Aug. 17, 2006):<\/p>\n<blockquote><p>&#8220;People often view search engines as benign blank boxes to which they can pose any question they want and not suffer the consequences. Unfortunately, this is not the case. Search engines large and small typically keep logs of users&#8217; search terms, with some search engines going further and matching those terms to your computer address, your name, and other items, depending on how much information you have shared with the search engine.<\/p>\n<p>&#8220;Before you type your search terms into a search engine box or register for extra services at a search engine, please be aware of the potential consequences. Searches can come back to haunt you, especially if they are problematic and can be tied directly to you in some way.&#8221;<\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" height=\"20\" alt=\"magglass\" src=\"http:\/\/blogs.law.harvard.edu\/shlep\/files\/2006\/12\/magglass.gif\" width=\"66\" \/>\u00a0 You can help yourself avoid difficultues by watching what you search for, cleaning up your cookies,\u00a0and\u00a0perhaps using an anonymizing tool. \u00a0If you click to see the rest of this posting, you will find a list of webpages and articles offering strategies\u00a0to use in keeping your search engine activities private or anonymous (whether from\u00a0housemates, government investigators,\u00a0or\u00a0litigation opponents):<\/p>\n<p><!--more-->\u00a0Here are some useful resources:<\/p>\n<ul>\n<li>EFF <em>Deep Link<\/em>, &#8220;<a href=\"http:\/\/www.eff.org\/deeplinks\/archives\/004868.php\">How to Keep Your Search History Private<\/a>&#8221; (Aug. 15, 2006)<\/li>\n<li>World Privacy Forum: <a href=\"http:\/\/www.worldprivacyforum.org\/searchengineprivacytips.html\">Search Engine Privacy Tips<\/a> (Aug. 17, 2006)<\/li>\n<li>CNET &#8220;<a href=\"http:\/\/news.com.com\/2102-1025_3-6103486.html?tag=st.util.print\">FAQ: Protecting Yourself from Search Engines<\/a>&#8221;\u00a0 <img loading=\"lazy\" decoding=\"async\" height=\"20\" alt=\"magglass\" src=\"http:\/\/blogs.law.harvard.edu\/shlep\/files\/2006\/12\/magglass.gif\" width=\"66\" \/><\/li>\n<li><em>Information Week<\/em>: <a href=\"http:\/\/www.informationweek.com\/shared\/printableArticle.jhtml?articleID=178600222\">Five Ways to Keep Your Google Searches Private<\/a><\/li>\n<li>Robert Ambrogi&#8217;s <em>Lawsites<\/em>: Follow-up: <a href=\"http:\/\/www.legaline.com\/2006\/02\/follow-up-anonymous-searching.html\">Anonymous Searching<\/a>\u00a0(Feb. 1, 2006)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u00a0Yesterday, Greg Beck asked &#8220;Can Everything You Search Be Used Against You?&#8220;, in a posting at the Consumer Law &amp; Policy Blog (Dec. 26, 2006).\u00a0\u00a0 Worries over the data collected and\u00a0retained by search engines about their users &#8212; Personally Identifiable Information (PII) &#8212; made a lot of news in 2006, when the\u00a0Justice Department\u00a0obtained data from [&hellip;]<\/p>\n","protected":false},"author":437,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[896],"tags":[],"class_list":["post-422","post","type-post","status-publish","format-standard","hentry","category-resources-consumer"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/posts\/422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/comments?post=422"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/posts\/422\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/media?parent=422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/categories?post=422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/shlep\/wp-json\/wp\/v2\/tags?post=422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}