July 16, 2018
The European Consumer Organization (BEUC) utilized man-made brain to check the secrecy policies of 14 big tech firms, including those from Facebook, Google, Amazon, and Apple and found that many of these are not completely conforming with the EU’s General Data Protection Regulation (GDPR).
Using technology known as Claudette, BEUC studied the secrecy policies and, with the help of scientists, found which language was difficult or perplexing. The technology is a web crawler that checks secrecy policies and those policies are then handled using controlled machine learning technology. The technology emphasized sentences and classified them as follows: inadequate information, vague language, and difficult processing.
The report stated that secrecy plans “are the key point of reference for civil society and separate consumers when it comes to managing how private data is being handled by the data managers. None of the 14 explored secrecy plans gets near to meeting the criteria proposed by the GDPR,” the report continued. “Unacceptable treatment of the information requirements; big amounts of sentences using unclear language; and a terrifying number of ‘problematic’ sections can’t be considered satisfactory,” the report said.
A difficult section, for the purposes of the report, is described as a section is one that is probably illegal. Eleven percent of the sentences, among all of the secrecy plans studied, contained perplexing terminology, as per the verdict circulated.
For example, the report indicates that Facebook’s secrecy policy indicates an awareness of the GDPR rules “but gives rather the imprint of the firm using…legal words and slogans and catch-phrases, [instead of trying to build] a really user-centric, GDPR conforming plan.”
The report stated that “expectantly, they would begin taking a more user-centric tactic to these documents, rather than treating them just as a box to be tested,” the report said. “Additionally, if this study is considered as a motivation to others, civil society might be quickly equipped with man-made intelligence tools for the automatic analysis of secrecy plans. When this is the case, they will leave no stone unturned, no policy unread, no breach overlooked.”