Top 8 Things You Shouldn't Give Social Networking Sites


While websites like Facebook and MySpace make it easy to share vacation photos with old classmates, the personal information on social networks is also attracting people besides friends and family members.  Scam artists, identity thieves, debt collectors, stalkers, hiring managers, and companies looking for a marketing advantage are turning to social networking sites to gather valuable information. Before you publish your next status update, take care that you aren’t risking your identity, security or reputation.

Below are eight things you shouldn’t give to a social network – when signing up for an account, posting content or interacting with your contacts through the network.

The Proliferation of Online Information Brokers and Reports of Abuses of Consumer Privacy


The Privacy Rights Clearinghouse (PRC) appreciates the opportunity to submit the following comments on the online information broker industry to the Federal Trade Commission (FTC) as part of the agency’s deliberations for the Privacy Roundtables series.

The online information broker industry has come to the forefront of consumer privacy issues in recent years. Information brokers are companies that compile information on individuals via public, semi-public and private records and offer this information via online “lookup” services, often with no questions asked. Some charge a fee while others provide their services at no charge. Consumers who are attempting to limit the availability of their personal information, due to concerns about privacy, safety or identity theft, have lodged numerous complaints against this industry with the PRC over the years.

10 Rules for Creating a Hacker-Resistant Password


Password-protected web sites are becoming more vulnerable because often people use the same passwords on numerous sites.  One study by Sophos, a security firm, found that more than 30% of users recycle the same password for every site that they access. A strong password can help individuals protect themselves against hackers, identity theft and other privacy invasions.

Want to develop tough-to-crack passwords that resist infiltration? Follow these 10 rules.

Comments to the Los Angeles City Council: Public Policy Ramifications of Cloud Computing


I am writing to express concern about the proposal for the City of LA to implement Google Apps for its e-mail and office systems.

I am concerned about the propriety of a government entity using services that are “in the cloud,” so to speak, as repositories for sensitive personal and organizational information.

I question if enough is yet known about the privacy, security and confidentiality of personal information in a cloud environment.

The Proliferation of Online Information Brokers: Noncompliance with Their Own Privacy Policies and Other Problems


There are dozens of information brokers in the marketplace today that make information about individuals widely available, often with no questions asked, some of them at no charge and others for a fee.

Valentine e-Cards May Deliver More Than Just Love!


With Valentine's Day upon us, you may be receiving so-called "e-cards" in your email inbox. Some may come from anonymous senders or secret admirers. They might appeal to your curiosity and cause you to click on a link, claiming that the e-card is from a family member, friend, or other unnamed person.

The Privacy Implications of Cloud Computing


When users store their data with programs hosted on someone else's hardware, they lose a degree of control over their sensitive information. The responsibility for protecting that information from hackers and internal data breaches then falls into the hands of the hosting company rather than the individual user. Government investigators trying to subpoena information could approach that company without informing the data's owners. Some companies could even willingly share sensitive data with marketing firms. So there is a privacy risk in putting your data in someone else's hands. Obviously, the safest approach is to maintain your data under your own control.

Spam E-mails Using PRC's Address


It has come to our attention that spammers have been using the @privacyrights.org email address to send fake emails (spam). These emails do NOT come from PRC. They are forgeries. They will show the sender as a fake person that is NOT affiliated with PRC. The address will appear as FakeUser@privacyrights.org.

What Is HealthVault? Things to Think About Before You Participate


HealthVault is Microsoft's new service for storing, managing, and accessing a patient's medical information. www.healthvault.com  It operates as an online encrypted service.  The service offers a voluntary opportunity for medical records to be collected by aggregating information from various sources including health-care providers, insurance companies, and compatible medical devices (such as blood pressure monitoring devices).

My Space Isn't Your Space: Updating Federal Law to Address Employers' Use of Social Networking Sites for Hiring Decisions (Davis)


 

My Space Isn't Your Space:
Updating Federal Law to Address Employers' Use of
Social Networking Sites for Hiring Decisions
(Davis,16 Kan. J. L. & Pub. Pol'y 237, 2007)

Showing 21-30 of 58 results
Syndicate content


X

Sign In!

Loading