Privacy

69dafe8b58066478aea48f3d0f384820

Five Communications Channels Feds May Soon Wiretap

March 07, 2011 Added by:Headlines

A central issue is the inability of new communications platforms to collect and store the kind of data law enforcement needs to pursue indictments, and current laws do not require the service providers to store the information. That may all change soon...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Privacy Enforcement Storm: HHS, FTC and FINRA Act

March 03, 2011 Added by:David Navetta

If your organization does not have a privacy program in place, now is the time to act. Legal compliance function, vendor management and appropriate security provisions in vendor and customer agreements are just a few of the hallmarks of a program that could help avoid enforcement actions...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Are Internet Cookies Good or Bad?

February 25, 2011 Added by:Robert Siciliano

Several companies use cookies as well as other technologies, such as tokens, along with sophisticated and unique pattern matching that can only be derived from extensive and unique experiences with a shared reputation database, to identify and re-identify devices...

Comments  (1)

53692ae1a8e713373b8a487ce89ee3e2

Dispelling The Myths Of Facebook Privacy And Security

February 24, 2011 Added by:Tom Eston

One common misconception is that applications “look and feel” like they are part of Facebook so the applications can be trusted. This is not true. The Facebook API (Application Programming Interface) is designed to allow seamless integration so it provides users with a more integrated Facebook experience...

Comments  (3)

A7290c5bd7bc2aaa7ea2b6c957ef639b

California Supreme Court Says Zip Codes are PII

February 24, 2011 Added by:David Navetta

Thinking hard about how business and consumer interests can be harmonized by effective and privacy/security-friendly policies and practices? We thought so. Worried that zip codes might be treated as personal information in this country? Probably not. All that may be changing...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

What Ever Happened to Privacy on the Internet? Part 2

February 23, 2011 Added by:Rafal Los

It’s a matter of balance. And right now the marketers and business leaders who see value in using personal information are much louder and more actively pursuing their exploitation of personal information than those who are trying to ensure privacy is addressed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Seeks Better Social Network Wire Tapping

February 21, 2011 Added by:Headlines

The advent of new media like social networks, new communications channels like IM, IRC, VoIP, and new devices like smartphones, have rendered current laws governing wire tapping outdated, and officials want lawmakers to narrow the gap by addressing the issue with new legislation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Offers Two-Factor Authentication Option

February 10, 2011 Added by:Headlines

"Starting Thursday all Google users can choose to turn on a so-called 'two-factor authentication' feature, which will require them to type in a special, short-lived second password in addition to their normal password to get into their account..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Warned of MPAA Copyright Infringements

February 09, 2011 Added by:Headlines

The MPAA has apparently issued more than 100 warnings to Google regarding copyright infringement over the last few months. The MPAA warnings are usually directed at P2P file sharing users who trade movies online, but sending them to Google is enforcement on a whole new level...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

What Ever Happened to Privacy on the Internet?

February 09, 2011 Added by:Rafal Los

Recently, I had the opportunity to exchange thoughts with Rebecca Herold, and talk about the erosion of privacy on the Internet, and specifically in social media. The topic is fascinating, as there appears to be an artificial adversarial relationship between anonymity and privacy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Can Pinpoint Identity by Analyzing Usernames

February 08, 2011 Added by:Headlines

The researchers produced a tool that uses statistical analysis to calculate the relative uniqueness of any given username. The team can now distinguish a single user about half of the time by analyzing multiple usernames without using other key data such as location or date of birth...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Posted Photos are Not Privacy Protected

February 05, 2011 Added by:Theresa Payton

Judge rules photos posted online are not privacy protected. If this ruling becomes precedent, you may have problems with bringing forward complaints or lawsuits on ANY future photos of you or loved ones, that are posted without your permission...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Data Theft Vulnerability Resolved by Facebook

February 04, 2011 Added by:Headlines

Facebook has reconciled a major privacy vulnerability that left members susceptible to social engineering exploits and data theft. The flaw may have allowed users to unwittingly spread malware to their contacts and provided malicious websites access to private account information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Security: Setting Up Account Login Alerts

February 03, 2011 Added by:Headlines

Facebook has made steady progress in their efforts to offer better security, but it remains the responsibility of account holders to make sure they are utilizing all of the security features. One allows members to monitor their profile for any unauthorized access to their Facebook account...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Privacy Legal Risk Environment Shifts Again

February 01, 2011 Added by:David Navetta

Companies that handle personal information, especially those that provide online behavioral advertising services, and those that purchase or participate in such services, should consider a risk assessment of their policies, processes and activities in order to reduce legal risks...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Feeling Like Somebody Is Watching You?

January 29, 2011 Added by:Theresa Payton

If you went to the airport, bank, or a store today, you probably expected to be watched. But those are the old school ways of being watched. Now, the smartphone in your pocket could watch you or your laptop webcam can watch you. Having an emotional reaction? There's a wristband monitor for that...

Comments  (1)

Page « < 14 - 15 - 16 - 17 - 18 > »