Blog Posts Tagged with "Privacy"

5e402abc3fedaf8927900f014ccc031f

How Do You Protect Your Online Identity?

March 04, 2013 Added by:Allan Pratt, MBA

How often do you think about protecting your online identity? Unless you live and breathe in the infosecurity arena, the reality is, you probably don’t spend a lot of time thinking about your online privacy, let alone worrying about it.

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Industry Experts to Congress: We Can Remove Personally Identifiable Information Before Reporting Cybersecurity Threats

February 20, 2013 Added by:Electronic Frontier Foundation

Companies say redacting personally identifiable information of users is possible, but it wouldn’t be required under CISPA.

Comments  (0)

959779642e6e758563e80b5d83150a9f

Celebrity Privacy Breaches and High School Physics

February 01, 2013 Added by:Danny Lieberman

In our previous post on patient privacy, we noted that patient data loss is a lot like planes disappearing in the Bermuda Triangle – no one really knows where the planes disappeared to, since the people on the planes never return to tell the story...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Congress Will Battle Over Internet Privacy in 2013

February 01, 2013 Added by:Electronic Frontier Foundation

In 2013, Congress will tackle several bills—both good and bad—that could shape Internet privacy for the next decade. Some were introduced last year, and some will be completely new. For now, here's what's ahead in the upcoming Congress...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Privacy Crusaders – Their Own Worst Enemies

January 28, 2013 Added by:Danny Lieberman

It is no accident that the largest healthcare organizations have the highest rate of patient-privacy breaches. The old saying – “the bigger they are, the harder they fall” is true, but more than that is happening when it comes to patient-privacy breaches in America as a whole...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Five Ways to Recognize Data Privacy Day

January 23, 2013 Added by:Allan Pratt, MBA

It is our responsibility, each and every one of us, to protect our data and our digital footprints, so here are five easy ways to recognize this annual event. But in order to be safe online on a regular basis, practice these activities on a monthly as opposed to annual basis...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

How to Protect Your Privacy from Facebook's Graph Search

January 20, 2013 Added by:Electronic Frontier Foundation

Since Facebook removed the ability to remove yourself from search results altogether, we've put together a quick how-to guide to help you take control over what is featured on your Facebook profile and on Graph Search results...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Privacy Scares from the Ghosts of Job Applicants Past

January 17, 2013 Added by:Rebecca Herold

There is a topic that has been coming up, over and over and over again over the past 12 years, that I’ve never seen addressed in other publications. What does your organization do with all the personal information you collect from job applicants? Consider a real situation I encountered around ten years ago...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Stylometric analysis to track anonymous users in the underground

January 15, 2013 Added by:Pierluigi Paganini

The researchers adopted technique for authorship attribution such the stylometric analysis also used in forensic linguistics verifying the capability of method of tracking also against automated framework like Jstylo used to protect user’s privacy and anonymity...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Are You Faking It?

January 06, 2013 Added by:Rebecca Herold

A few weeks ago I got a text message from a phone number I didn’t recognize, with a rather odd message. I sent a text back asking, “Who do U think U sent ur txt 2?” The response, “Myrtle!” I’m not Myrtle. Turns out they were using a phone number they had found online that was associated for the Myrtle they knew.

Comments  (0)

959779642e6e758563e80b5d83150a9f

The #1 Bermuda Triangle of Patient Privacy – debunking patient data loss

January 05, 2013 Added by:Danny Lieberman

Patient data loss is a lot like planes disappearing in the Bermuda Triangle – no one really knows where the planes disappeared to, since the people on the planes never came back to tell the story. The same way we talk about patient data loss and never really consider how you can “lose” patient data and whether it can be “returned”.

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

Privacy in Ubuntu 12.10: Full Disk Encryption

November 12, 2012 Added by:Electronic Frontier Foundation

Full Disk Encryption (FDE) is one of the best ways you can ensure all of the private information on your laptop stays private in case it's lost, seized, stolen, or if you choose to sell or give away your computer in the future. This feature has been built-in to many GNU/Linux distributions, including Ubuntu...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

New technologies raise serious doubts on privacy and security

November 12, 2012 Added by:Pierluigi Paganini

The major concerns are related to the use of cameras of video devices such as PC, mobile devices and TVs to identify the user and verify its rights for vision and of course to determine his habits with the purpose to pack it for the best offer in terms of contents...

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

A Deep Dive into Facebook and Datalogix

November 06, 2012 Added by:Electronic Frontier Foundation

Facebook is partnering up with marketing company Datalogix to assess whether users go to stores in the physical world and buy the products they saw in Facebook advertisements. A lot of the reports aren’t getting into the nitty gritty of what data is actually shared between Facebook and Datalogix...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Please Don’t Tell Me You’re Still Using SSNs as IDs!

November 05, 2012 Added by:Rebecca Herold

I’ve been occasionally revisiting the topic of laws and regulations prohibiting the use of SSNs, most recently in 2008 when I identified over 45 U.S. federal and state laws regulating and often prohibiting, the use of SSNs as identifiers. I provide pointers at the end of this post to some other reports...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Companies Must Consider Travel Providers’ Data Practices or Risk Being Harmed

November 04, 2012 Added by:David Navetta

A company responsible for handling billing and settlement for the International Air Transport Association (IATA) has been selling flight booking information about corporate travelers — on a travel agency level — to airlines, hotels and others...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »