Blog Posts Tagged with "Data Collection"


Data Security: Spokeo in the News

June 23, 2012 Added by:Allan Pratt, MBA

“Spokeo, which compiles dossiers on consumers, agreed to pay $800,000 to settle allegations by the Federal Trade Commission that it sold personal information in violation of the law. From 2008 to 2010, Spokeo sold millions of consumer profiles to human resources departments and recruiters..."

Comments  (1)


How to Activate 'Do Not Track' in Your Browsers

June 21, 2012 Added by:Electronic Frontier Foundation

Do Not Track combines both technology (a signal transmitted from a user) as well as a policy framework for how companies that receive the signal should respond. The following tutorial walks you through the enabling Do Not Track in the four most popular browsers: Safari, Internet Explorer 9, Firefox, and Chrome...

Comments  (0)


Cybersecurity Act Threatens Online Rights: a Handout for Your Senator

June 11, 2012 Added by:Electronic Frontier Foundation

The Cybersecurity Act (S. 2105), sponsored by Sen. Lieberman and Sen. Collins, compromises core American civil liberties in the name of thwarting network attacks. While Internet security is of the utmost importance, safeguarding our networks need not come at the expense of our online freedoms...

Comments  (0)


How Mobile Apps are Invading Your Privacy: An Infographic

June 08, 2012 Added by:Fergal Glynn

With millions of mobile apps receiving billions of downloads, it is important that users are aware of the risks they face when downloading and using apps. This infographic uses real world cases to outline the threat to user privacy posed by mobile apps...

Comments  (0)


Twitter's New Tailored Suggestion Service Raises Questions

June 06, 2012 Added by:David Navetta

Congress seeks clarification on how Twitter purports to honor a user’s choice to opt-out of targeted advertising and data collection using the Do Not Track browser option, while simultaneously collecting user information from third party websites under the tailored suggestions program...

Comments  (0)


Big Brother Likes Big Data: Balancing Privacy with Innovation

June 05, 2012 Added by:Rebecca Herold

Big Data and associated analytics can be used to improve business and customer experiences and bring innovation and medical breakthroughs. However, organizations must make sure they don’t cross that line of customization and business improvements into creepiness and full-blown privacy invasion...

Comments  (0)


ICS-CERT: Preserving Forensic Data

June 01, 2012 Added by:Infosec Island Admin

Preserving forensic data is an essential aspect of incident response. The data acquired during the process is critical to containing the intrusion and improving security to defend against the next attack. Network defenders should make note of the following recommendations for retention of essential forensic data...

Comments  (0)


Cookies: Should We Really Like Them?

June 01, 2012 Added by:Ahmed Saleh

You should acknowledge that Cookies are widely used and can't really be avoided. If you wish to enjoy your internet surfing experience by navigating to “cookie creating websites” you should have a clear understanding of how cookies operate, and how to protect them from being abused...

Comments  (0)


Facebook "Like" Button = Privacy Violation + Security Risk

May 21, 2012 Added by:Matthijs R. Koot

If you walk into a store, would you appreciate it if the owner phoned a random stranger to tell them? Probably not. Yet every time I visit a website that has a Facebook `Like'-button, my browser discloses that visit to Facebook, despite the fact that I do not have a Facebook profile...

Comments  (3)


Have You Read the New Facebook Privacy Rules… Again??

May 18, 2012 Added by:Theresa Payton

They know your location, and they confirm what they grab whenever you connect to Facebook: “We receive data from the computer, mobile phone or other device you use to access Facebook. This may include your IP address, location, the type of browser you use, or the pages you visit”...

Comments  (2)


I Hope Edo is Worth the Privacy Risk

May 16, 2012 Added by:Keith Mendoza

About a week ago, I read about this new daily deal service called edo that ties to your bank account, and the first thing that came to my mind is “uh oh, another attack vector into my bank info”. Here are a list of features that are those potential attack vectors...

Comments  (2)


Six Good Reasons to De-Identify Data

May 08, 2012 Added by:Rebecca Herold

Even though it sounds complicated there are many good methods you can use to accomplish de-identification. The great thing is, under many legal constructs de-identification is an acceptable way to use personal information for purposes beyond which the personal data was collected...

Comments  (2)


FTC Final Report Provides Meaningful Protection Online

April 21, 2012 Added by:Electronic Frontier Foundation

Recently, the FT) released a final report on digital consumer privacy after more than 450 companies, advocacy groups and individuals commented on the December 2010 draft. The final report creates strong guidelines for protecting consumer privacy choices in the online world...

Comments  (0)


Counter Terrorism Guidelines Give Authorities Vast Access to Info

April 17, 2012 Added by:Electronic Frontier Foundation

Attorney General Holder recently signed expansive guidelines for terrorism analysts, allowing the NCTC to mirror federal databases containing personal information and hold onto the it for an extended period even if the person is not suspected of involvement in terrorism...

Comments  (0)


FTC Commission Report on Protecting Consumers

April 16, 2012 Added by:David Navetta

The FTC has a front and center role in data privacy and enforcement. We have written extensively about the FTC’s actions and recommendations. How is the final Framework different from the draft Framework and what should your privacy professionals be taking away from the Framework?

Comments  (0)


On Location-Based Services Security

April 09, 2012 Added by:Robert Siciliano

Social networking sites are incorporating location-based services that allow users to broadcast their locations. Carnegie Mellon University has identified more than 80 services that either lack privacy policies or collect and save user data for an indefinite period...

Comments  (0)

Page « < 1 - 2 - 3 > »