Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Irish Regulator Probes Google, Tinder Over Data Processing

Irish regulators have launched separate inquiries into Google and dating app Tinder over how they process user data, in a new round of regulatory scrutiny aimed at tech companies.

Irish regulators have launched separate inquiries into Google and dating app Tinder over how they process user data, in a new round of regulatory scrutiny aimed at tech companies.

Ireland’s Data Protection Commission said Tuesday that it decided to look into how Google handles location data after a number of consumer groups across the European Union filed complaints.

The commission opened an investigation into Google’s Irish subsidiary to determine whether the U.S. search giant “has a legal basis for processing the location data of its users” and whether it meets transparency obligations under the EU’s strict General Data Protection Regulation, or GDPR.

Google “will cooperate fully with the office of the Data Protection Commission in its inquiry, and continue to work closely with regulators and consumer associations across Europe,” the company said in a statement. “In the last year, we have made a number of product changes to improve the level of user transparency and control over location data.”

The regulator is also investigating Tinder after people in Ireland and elsewhere in the EU raised concerns about issues surrounding U.S. parent company Match Group’s “ongoing processing of users’ personal data” related to Tinder, transparency and compliance with GDPR.

“Transparency and protecting our users’ personal data is of utmost importance to us,” Match Group said. “We are fully cooperating with the Data Protection Commission, and will continue to abide by GDPR and all applicable laws.”

Ireland’s Data Privacy Commission is the lead EU regulator for both companies because their European headquarters are based in Dublin. Under GDPR, regulators can fine companies up to 20 million euros, or 4% of global turnover, whichever is higher, for any breaches as well as require changes to follow the law.

The commission now has a total of 23 inquiries into big U.S. tech companies, which also include Facebook and Twitter. It launched a separate investigation of Google last year over personalized online advertising.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.