Items Tagged with "Privacy"
April 24, 2013 Added by:Allan Pratt, MBA
Does your company use those out-of-date applications where the applicant must provide his or her Social Security number and driver’s license number? If so, throw them out immediately. You could be setting your business up for a potential lawsuit.
New California "Right to Know" Act Would Let Consumers Find Out Who Has Their Personal Data -- And Get a Copy of It
April 03, 2013 Added by:Electronic Frontier Foundation
A new proposal in California, supported by a diverse coalition including EFF and the ACLU of Northern California, is fighting to bring transparency and access to the seedy underbelly of digital data exchanges.
March 21, 2013 Added by:Electronic Frontier Foundation
Under CISPA, companies can collect your information in order to "protect the rights and property" of the company, and then share that information with third parties, including the government, so long as it is for "cybersecurity purposes."
March 21, 2013 Added by:Tom Eston
The Facebook Graph has evolved over the years in order to correlate as much information as possible, making it very easy to search. The issue is that anything you’ve ever posted publically, “Liked,” or were ever tagged in can be quickly searched. Here is how you can protect your privacy...
The Fight Against Secret Surveillance Law Continues: EFF Asks D.C. Circuit to Order Release of Secret Legal Opinion
March 19, 2013 Added by:Electronic Frontier Foundation
In a brief filed on Friday, EFF continued its fight against secret surveillance law, asking the D.C. Circuit Court of Appeals to order the release of a secret opinion of the Office of Legal Counsel (OLC).
March 08, 2013 Added by:Rohit Sethi
The HTC settlement is not based on high-profile breaches. Instead, it points out: “HTC America failed to employ reasonable and appropriate security practices in the design and customization of the software on its mobile devices”.
March 04, 2013 Added by:Allan Pratt, MBA
How often do you think about protecting your online identity? Unless you live and breathe in the infosecurity arena, the reality is, you probably don’t spend a lot of time thinking about your online privacy, let alone worrying about it.
Industry Experts to Congress: We Can Remove Personally Identifiable Information Before Reporting Cybersecurity Threats
February 20, 2013 Added by:Electronic Frontier Foundation
Companies say redacting personally identifiable information of users is possible, but it wouldn’t be required under CISPA.
February 01, 2013 Added by:Danny Lieberman
In our previous post on patient privacy, we noted that patient data loss is a lot like planes disappearing in the Bermuda Triangle – no one really knows where the planes disappeared to, since the people on the planes never return to tell the story...
February 01, 2013 Added by:Electronic Frontier Foundation
In 2013, Congress will tackle several bills—both good and bad—that could shape Internet privacy for the next decade. Some were introduced last year, and some will be completely new. For now, here's what's ahead in the upcoming Congress...
January 28, 2013 Added by:Danny Lieberman
It is no accident that the largest healthcare organizations have the highest rate of patient-privacy breaches. The old saying – “the bigger they are, the harder they fall” is true, but more than that is happening when it comes to patient-privacy breaches in America as a whole...
January 23, 2013 Added by:Allan Pratt, MBA
It is our responsibility, each and every one of us, to protect our data and our digital footprints, so here are five easy ways to recognize this annual event. But in order to be safe online on a regular basis, practice these activities on a monthly as opposed to annual basis...
January 20, 2013 Added by:Electronic Frontier Foundation
Since Facebook removed the ability to remove yourself from search results altogether, we've put together a quick how-to guide to help you take control over what is featured on your Facebook profile and on Graph Search results...
January 17, 2013 Added by:Rebecca Herold
There is a topic that has been coming up, over and over and over again over the past 12 years, that I’ve never seen addressed in other publications. What does your organization do with all the personal information you collect from job applicants? Consider a real situation I encountered around ten years ago...
January 15, 2013 Added by:Pierluigi Paganini
The researchers adopted technique for authorship attribution such the stylometric analysis also used in forensic linguistics verifying the capability of method of tracking also against automated framework like Jstylo used to protect user’s privacy and anonymity...
January 06, 2013 Added by:Rebecca Herold
A few weeks ago I got a text message from a phone number I didn’t recognize, with a rather odd message. I sent a text back asking, “Who do U think U sent ur txt 2?” The response, “Myrtle!” I’m not Myrtle. Turns out they were using a phone number they had found online that was associated for the Myrtle they knew.