Is there any public documentation on how this kind of company deals with audit and access review on a technical point of view? I'm interested to learn more on that
« To make its predictions, Google is combining the bus route details with the data it’s collecting from users who have consented to anonymized data sharing. This is the same data collection mechanism it uses to predict the crowds at local businesses today »