Blog Posts Tagged with "Data Collection"


Think GDPR Won’t Affect Your U.S. Company? Guess Again

February 07, 2018 Added by:Ken Spinner

Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.

Comments  (0)


Service Agreements Kill Privacy, But Can They Create It Too?

October 03, 2012 Added by:Electronic Frontier Foundation

The Fourth Amendment has not kept up with technology. And a recent case decided by the Ninth Circuit Court of Appeals highlights the increasing way rights are adjudicated when it comes to data stored by other companies: through the service agreement a user enters into with a company...

Comments  (0)


CleanIT Project: concerns for a Global Surveillance Project

September 23, 2012 Added by:Plagiarist Paganini

I just returned from the Cyber Threat Summit in Dublin, The event revealed an alarming scenario on cyber threats, no matter if it is cybercrime, hacktivism, cyber terrorism or cyber warfare, all those share a worrying growth of attacks that are influencing our digital lives...

Comments  (1)


Creating a Surveillance-Free Internet

September 20, 2012 Added by:Electronic Frontier Foundation

Since its origins in 2008, Freedom Not Fear has developed the general message: fundamental rights like privacy, free expression, due process, and democratic participation are jeopardized when reactionary, fear-driven surveillance systems penetrate our societies...

Comments  (0)


Don’t Wait for UK Snoopers’ Charter: Encrypt Wikipedia Now

September 17, 2012 Added by:Electronic Frontier Foundation

Rather than waiting for bad legislation, Wikipedians should take this opportunity to make one relatively small technical change that could serve as a bulwark against all kinds of government surveillance, filtering and data retention laws...

Comments  (0)


Digital Vertigo: Today's Online Social Revolution is Disorienting Us

September 16, 2012 Added by:Ben Rothke

In the new world of social media and Web 3.0, which is claiming to revolutionize communication and interactions, history is repeating itself. Web 3.0 is turning into an Orwellian infrastructure where the ruling party wields total power over the inhabitants...

Comments  (3)


The Fine Print of Smartphone Privacy

September 14, 2012 Added by:Allan Pratt, MBA

How often do you think about your cell phone or smartphone privacy? Sure, you think about its physical security, but how often do you think about the security of your data? Your contacts, your email addresses, your location data, your apps, etc. You probably don’t think about this enough...

Comments  (0)


Maine Supreme Court Affirms Smart Meter Opt-Out Program

September 09, 2012 Added by:David Navetta

Maine has been one of the most aggressive states to pursue widespread implementation of smart utility meters for customers throughout the state, but not all utility customers have embraced smart meters despite consumers concerns over privacy issues...

Comments  (0)


Are Your Mobile Apps Up To No Good?

September 06, 2012 Added by:Robert Siciliano

Why would an app to monitor your battery need to know your location via your GPS? How come gaming apps ask users for their phone numbers? Mobile applications, especially free ones, require your personal data to supplement development costs. This means “free” isn’t exactly free...

Comments  (0)


California Location Privacy Bill Passes Assembly

August 26, 2012 Added by:Electronic Frontier Foundation

The bill requires law enforcement to obtain a search warrant anytime it requests location information from an electronic device. It codifies the Supreme Court's decision from earlier this year that the installation of a GPS device for purposes of an investigation requires a search warrant...

Comments  (0)


EFF Challenges National Security Letter Statute

July 22, 2012 Added by:Electronic Frontier Foundation

Under the national security letter statute, the FBI can issue demands for records and gag provisions without court authorization, and recipient telecommunications and financial companies have no way to determine whether and how the government might be overreaching or otherwise abusing its authority...

Comments  (0)


Honeypots Can Help Safeguard Your Information Systems

July 10, 2012 Added by:Brent Huston

Honeypots are simple technology intended to be compromised. There is little or no production traffic going to or from the device, so any time a connection is sent it is most likely a probe, scan, or an attack. Any time a connection is initiated from the honeypot, this most likely means it was compromised...

Comments  (0)


Obama Administration Won't Discuss NSA Email Surveillance

July 10, 2012 Added by:Electronic Frontier Foundation

A few members of Congress have been trying to get the Obama administration to answer a question: How many Americans’ phone calls or emails have been and are being collected without a warrant under the FISA Amendments Act of 2008? Unfortunately, no one else in the government seems to want that question answered...

Comments  (0)


Should Businesses Be Able to Google Customers?

July 08, 2012 Added by:Allan Pratt, MBA

It should come as no surprise that businesses are taking advantage of the public’s fascination of placing their day-to-day activities on social networking sites. This may seem inappropriate and offensive, and it might be – but for the moment, it’s not illegal. We have only ourselves to blame...

Comments  (0)


I Know What You Tweeted Last Summer...

July 04, 2012 Added by:Theresa Payton

We have mentioned before that Twitter will send every tweet to the National Archives and the Library of Congress, so watch what you tweet. Now new tools unleash a trove of data in moments. For the 140 million and growing user base that tweets over 400 million tweets per day, this might be a little more than alarming...

Comments  (0)


The Right to Internet Anonymity and Legal Implications

June 28, 2012 Added by:Plagiarist Paganini

Anonymizing services are based on the concept of distribution of routing information during a transmission. It is not known prior the path between a source and destination, and every node of the network manages minimal information to route the packets to the next hop without preserving history of the path...

Comments  (0)

Page « < 1 - 2 - 3 > »