Security Experts:

Connect with us

Hi, what are you looking for?



Firefox 72 Will Let Users Delete Telemetry Data

Set to be released next week, Firefox 72 will provide users with an option to delete the telemetry data that the browser collects from them, Mozilla says.

Set to be released next week, Firefox 72 will provide users with an option to delete the telemetry data that the browser collects from them, Mozilla says.

The new feature was included in the popular browser as a reaction to the California Consumer Privacy Act (CCPA), which went into effect on January 1, 2020, and which aims to provide Californians more control over their data.

Specifically, the CCPA enables people to learn more about the personal information that is being collected on them, to access the data and correct or delete it, to be informed on the third parties the data is being shared with, and to opt out of the sale of the data.

According to Mozilla, Firefox already operates and handles data in line with these requirements, given the browser maker’s focus on user privacy, but it is now taking this approach a step further by allowing users to delete even the small amount of telemetry data collected by the browser.

The telemetry data includes general information such as the number of tabs opened or how long a browsing session was, but does not include details on the accessed sites, Mozilla notes. Such data is not collected in private browsing mode and users can always disable telemetry in Firefox.

Telemetry data hasn’t been generally considered personal data, and Mozilla already had in place policies regarding how long such data is kept, but now it’s taking it one step further by allowing users to delete such data from its servers.

“[T]he deletion control will be built into Firefox and will begin rolling out in the next version of the browser on January 7. This setting will provide users a way to request deletion for desktop telemetry directly from Firefox – and a way for us, at Mozilla, to perform that deletion,” Mozilla says.

What’s more, even if CCPA applies to users in California, Mozilla is making the feature available to all of its users, just as it did when the privacy requirements of Europe’s General Data Protection Regulation (GDPR) went into effect in 2018.

“For Firefox, privacy is not optional. We don’t think people should have to choose between the technology they love and their privacy. We think you should have both. That’s why we are taking these steps to bring additional protection to all our users under CCPA,” Mozilla concludes.

Related: California Attorney General Outlines How State Will Enforce Upcoming Privacy Law

Related: New Cybersecurity Bills Promote CISOs and Privacy

Related: Facebook Says Ready for New California Privacy Law

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...


The EU's digital policy chief warned TikTok’s boss that the social media app must fall in line with tough new rules for online platforms...


Meta was fined an additional $5.9 million for violating EU data protection regulations with WhatsApp messaging app.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Google’s Threat Analysis Group (TAG) has shared technical details on an Internet Explorer zero-day vulnerability exploited in attacks by North Korean hacking group APT37.