Blog Posts Tagged with "Data Collection"

7ddc1f3000a13e4dfec28074e9e7b658

Service Agreements Kill Privacy, But Can They Create It Too?

October 03, 2012 Added by:Electronic Frontier Foundation

The Fourth Amendment has not kept up with technology. And a recent case decided by the Ninth Circuit Court of Appeals highlights the increasing way rights are adjudicated when it comes to data stored by other companies: through the service agreement a user enters into with a company...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

CleanIT Project: concerns for a Global Surveillance Project

September 23, 2012 Added by:Pierluigi Paganini

I just returned from the Cyber Threat Summit in Dublin, The event revealed an alarming scenario on cyber threats, no matter if it is cybercrime, hacktivism, cyber terrorism or cyber warfare, all those share a worrying growth of attacks that are influencing our digital lives...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Creating a Surveillance-Free Internet

September 20, 2012 Added by:Electronic Frontier Foundation

Since its origins in 2008, Freedom Not Fear has developed the general message: fundamental rights like privacy, free expression, due process, and democratic participation are jeopardized when reactionary, fear-driven surveillance systems penetrate our societies...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Don’t Wait for UK Snoopers’ Charter: Encrypt Wikipedia Now

September 17, 2012 Added by:Electronic Frontier Foundation

Rather than waiting for bad legislation, Wikipedians should take this opportunity to make one relatively small technical change that could serve as a bulwark against all kinds of government surveillance, filtering and data retention laws...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Digital Vertigo: Today's Online Social Revolution is Disorienting Us

September 16, 2012 Added by:Ben Rothke

In the new world of social media and Web 3.0, which is claiming to revolutionize communication and interactions, history is repeating itself. Web 3.0 is turning into an Orwellian infrastructure where the ruling party wields total power over the inhabitants...

Comments  (3)

5e402abc3fedaf8927900f014ccc031f

The Fine Print of Smartphone Privacy

September 14, 2012 Added by:Allan Pratt, MBA

How often do you think about your cell phone or smartphone privacy? Sure, you think about its physical security, but how often do you think about the security of your data? Your contacts, your email addresses, your location data, your apps, etc. You probably don’t think about this enough...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Maine Supreme Court Affirms Smart Meter Opt-Out Program

September 09, 2012 Added by:David Navetta

Maine has been one of the most aggressive states to pursue widespread implementation of smart utility meters for customers throughout the state, but not all utility customers have embraced smart meters despite consumers concerns over privacy issues...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Are Your Mobile Apps Up To No Good?

September 06, 2012 Added by:Robert Siciliano

Why would an app to monitor your battery need to know your location via your GPS? How come gaming apps ask users for their phone numbers? Mobile applications, especially free ones, require your personal data to supplement development costs. This means “free” isn’t exactly free...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

California Location Privacy Bill Passes Assembly

August 26, 2012 Added by:Electronic Frontier Foundation

The bill requires law enforcement to obtain a search warrant anytime it requests location information from an electronic device. It codifies the Supreme Court's decision from earlier this year that the installation of a GPS device for purposes of an investigation requires a search warrant...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Challenges National Security Letter Statute

July 22, 2012 Added by:Electronic Frontier Foundation

Under the national security letter statute, the FBI can issue demands for records and gag provisions without court authorization, and recipient telecommunications and financial companies have no way to determine whether and how the government might be overreaching or otherwise abusing its authority...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Honeypots Can Help Safeguard Your Information Systems

July 10, 2012 Added by:Brent Huston

Honeypots are simple technology intended to be compromised. There is little or no production traffic going to or from the device, so any time a connection is sent it is most likely a probe, scan, or an attack. Any time a connection is initiated from the honeypot, this most likely means it was compromised...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Obama Administration Won't Discuss NSA Email Surveillance

July 10, 2012 Added by:Electronic Frontier Foundation

A few members of Congress have been trying to get the Obama administration to answer a question: How many Americans’ phone calls or emails have been and are being collected without a warrant under the FISA Amendments Act of 2008? Unfortunately, no one else in the government seems to want that question answered...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Should Businesses Be Able to Google Customers?

July 08, 2012 Added by:Allan Pratt, MBA

It should come as no surprise that businesses are taking advantage of the public’s fascination of placing their day-to-day activities on social networking sites. This may seem inappropriate and offensive, and it might be – but for the moment, it’s not illegal. We have only ourselves to blame...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

I Know What You Tweeted Last Summer...

July 04, 2012 Added by:Theresa Payton

We have mentioned before that Twitter will send every tweet to the National Archives and the Library of Congress, so watch what you tweet. Now new tools unleash a trove of data in moments. For the 140 million and growing user base that tweets over 400 million tweets per day, this might be a little more than alarming...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Right to Internet Anonymity and Legal Implications

June 28, 2012 Added by:Pierluigi Paganini

Anonymizing services are based on the concept of distribution of routing information during a transmission. It is not known prior the path between a source and destination, and every node of the network manages minimal information to route the packets to the next hop without preserving history of the path...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Data Security: Spokeo in the News

June 23, 2012 Added by:Allan Pratt, MBA

“Spokeo, which compiles dossiers on consumers, agreed to pay $800,000 to settle allegations by the Federal Trade Commission that it sold personal information in violation of the law. From 2008 to 2010, Spokeo sold millions of consumer profiles to human resources departments and recruiters..."

Comments  (1)

Page « < 1 - 2 - 3 > »