Amazon took data from its own sellers to develop competing products

Amazon.com Inc.  employees have used data about independent sellers on the company’s platform to develop competing products, a practice at odds with the company’s stated policies.

The online retailing giant has long asserted, including to Congress, that when it makes and sells its own products, it doesn’t use information it collects from the site’s individual third-party sellers—data those sellers view as proprietary.

Yet interviews with more than 20 former employees of Amazon’s private-label business and documents reviewed by The Wall Street Journal reveal that employees did just that. Such information can help Amazon decide how to price an item, which features to copy or whether to enter a product segment based on its earning potential, according to people familiar with the practice, including a current employee and some former employees who participated in it.

In one instance, Amazon employees accessed documents and data about a bestselling car-trunk organizer sold by a third-party vendor. The information included total sales, how much the vendor paid Amazon for marketing and shipping, and how much Amazon made on each sale. Amazon’s private-label arm later introduced its own car-trunk organizers.

An expanded version of this report appears on WSJ.com

Hot this week

The Hidden Risk in Your Cloud Security Strategy

Cloud security fails when it fights human behavior instead of working with it. Learn how to build protection that accommodates real-world work patterns.

The Cloud Security Gap You Cannot Ignore

Cloud security failures stem from misunderstood responsibility models, not technology gaps. Learn practical steps to gain visibility and control without buying new tools.

The Truth About Patching You Never Hear

Patching is not about speed or compliance—it is about understanding which vulnerabilities actually matter for your specific environment and focusing your efforts there.

The Hidden Costs of Overengineering Security

Complex security systems often create more vulnerabilities than they prevent by overwhelming teams with noise and maintenance demands while missing actual threats.

The True Cost of Chasing Compliance Over Security

Compliance frameworks create a false sense of security while modern threats evolve beyond regulatory requirements. Learn how to build actual protection rather than just checking boxes.

Topics

The Hidden Risk in Your Cloud Security Strategy

Cloud security fails when it fights human behavior instead of working with it. Learn how to build protection that accommodates real-world work patterns.

The Cloud Security Gap You Cannot Ignore

Cloud security failures stem from misunderstood responsibility models, not technology gaps. Learn practical steps to gain visibility and control without buying new tools.

The Truth About Patching You Never Hear

Patching is not about speed or compliance—it is about understanding which vulnerabilities actually matter for your specific environment and focusing your efforts there.

The Hidden Costs of Overengineering Security

Complex security systems often create more vulnerabilities than they prevent by overwhelming teams with noise and maintenance demands while missing actual threats.

The True Cost of Chasing Compliance Over Security

Compliance frameworks create a false sense of security while modern threats evolve beyond regulatory requirements. Learn how to build actual protection rather than just checking boxes.

The Hidden Risk of Over Reliance on AI Security Tools

Over reliance on AI security tools creates dangerous blind spots by weakening human analytical skills. True resilience comes from balancing technology with continuous team training and critical thinking.

The Quiet Dangers of Overlooking Basic Security Hygiene

Basic security hygiene prevents more breaches than advanced tools, yet most teams overlook fundamentals while chasing sophisticated threats.

Your Password Strategy Is Wrong and Making You Less Secure

The decades-old advice on password complexity is forcing users into insecure behaviors. Modern security requires a shift to passphrases, eliminating mandatory rotation, and embracing passwordless authentication.
spot_img

Related Articles

Popular Categories