Wireless Communications: Voice and Data Privacy


Fact Sheet 2Wireless Communications:
Voice and Data Privacy

Online Privacy: Using the Internet Safely


Fact Sheet 18Online Privacy:
Using the Internet Safely

This fact sheet explains how your online activities may compromise your privacy and the steps you can take to protect youself. As consumers increasingly go online in so many aspects of their daily lives, the challenge is enjoy the conveniences of online activities while limiting the privacy sacrifices. As the focus of online activity migrates from desktop and laptop computers to smartphones and other mobile devices, the mechanisms for protecting your privacy continue to evolve.

The Privacy Implications of Cloud Computing


When users store their data with programs hosted on someone else's hardware, they lose a degree of control over their sensitive information. The responsibility for protecting that information from hackers and internal data breaches then falls into the hands of the hosting company rather than the individual user. Government investigators trying to subpoena information could approach that company without informing the data's owners. Some companies could even willingly share sensitive data with marketing firms. So there is a privacy risk in putting your data in someone else's hands. Obviously, the safest approach is to maintain your data under your own control.

Radio Frequency Identification: Applications and Implications for Consumers


Industry representatives have described the numerous benefits of RFID in today's workshop. But RFID is a classic information technology in that there is a potential downside as well. If the technology is implemented irresponsibly, we as a society could experience it not as a wonderful convenience with many social benefits, but as a tool for consumer profiling and tracking -- in other words, as one part of a larger surveillance infrastructure.

Privacy Today: A Review of Current Issues


The purpose of this report is to highlight and summarize key privacy issues affecting consumers today and tomorrow. Readers who want to explore issues in depth should visit the Web sites of government agencies, public interest groups, industry associations, and companies. A list of public interest groups that are working on these issues is provided at the end of the report.

Eight Reasons to be Skeptical of a "Technology Fix" for Protecting Privacy


I'm going to begin by listing just a few of the many technology-based services that are available now or are soon to be launched. I will then list eight reasons why I am not convinced that these services are the entire answer to safeguarding consumer privacy.

Then, to close, I will discuss approaches that I believe are more likely to provide meaningful protection of our personal privacy.

Privacy Implications of Privatization of the County's Information Technology Systems


A great deal has been said and written about the management of technology under a privatized system. But little about the information itself.

The County holds a tremendous amount of personal information about its citizens. Property tax records, voting files, library records, the extensive data files of our social services including health and welfare data, birth, death, and marriage certificates, court documents, and so on.

Issues of Privacy and Access


Advances in technology give rise to the classic double edged sword. There are obvious benefits, such as locating and garnishing the wages of deadbeat parents. But there is also the downside, the development of a cradle to grave electronic dossier which can pose threats to personal privacy and which can be used for purposes of social control.

My presentation will focus on the privacy implications of advances in technology and the importance of crafting policies to enable the benefits to proceed while minimizing the negative consequences.

How to Secure Windows and Your Privacy with Free Software (Fosdick) (.pdf file)


Did you know that Windows secretly records all the web sites you've ever visited? And after you delete your Outlook emails and empty the Waste Basket, someone could still read your email?
And that Microsoft Word and Excel documents contain secret keys that uniquely identify you?

This guide explains these – and many other -- threats to your security and privacy when you use Windows computers. It describes these concerns in simple, non-technical terms. The goal is to provide information anyone can understand.


This guide also offers solutions: safe practices you can follow, and free programs you can install. Download links appear for the free programs as they are cited.

Showing 10 results
Syndicate content


X

Sign In!

Loading