Phishing Emails Can Lead to Domain Registration for Scam Web Sites

"Phishing" emails are sent by scam artists and are disguised to look like they come for a legitimate financial institution or other online vendor such as eBay or PayPal. The PRC has received reports from those who have replied to phishing emails with their name, address and phone number who later learned that their personal information was used by the phisher to register web site domains. At times, if they also provided a legitimate credit card number, it may be used to pay for the web site registration, too.

Radio Frequency Identification: Applications and Implications for Consumers

Industry representatives have described the numerous benefits of RFID in today's workshop. But RFID is a classic information technology in that there is a potential downside as well. If the technology is implemented irresponsibly, we as a society could experience it not as a wonderful convenience with many social benefits, but as a tool for consumer profiling and tracking -- in other words, as one part of a larger surveillance infrastructure.

Google's Email Service 'Gmail' Sacrifices Privacy for Extra Storage Space

Consumers attracted by the extra server storage space that other free email services like Yahoo and Hotmail just can't offer, may not know that those benefits come at a high cost to their privacy. 

For instance: "Residual copies of email may remain on our systems, even after you have deleted them from your mailbox or after the termination of your account."

    RFID Position Statement of Consumer Privacy and Civil Liberties Organizations

    RFID tags are tiny computer chips connected to miniature antennae that can be affixed to physical objects. In the most commonly touted applications of RFID, the microchip contains an Electronic Product Code (EPC) with sufficient capacity to provide unique identifiers for all items produced worldwide. When an RFID reader emits a radio signal, tags in the vicinity respond by transmitting their stored data to the reader. While there are beneficial uses of RFID, some attributes of the technology could be deployed in ways that threaten privacy and civil liberties.

    Privacy Groups Urge Gov. Schwarzenegger to Veto Spyware Bill

    The California-based Privacy Rights Clearinghouse and the World Privacy Forum urge you to veto SB 1436, a bill dealing with spyware, authored by Senator Kevin Murray.  While this bill is well-intentioned, it would establish provisions that are virtually unenforceable, could well undermine existing law, and further, would set a bad precedent nationwide for other spyware bills that are likely to be considered in other states and in Congress.

    Bogus E-Mail Message Impersonates Social Security Administration

    The Agency has received several reports of an email message being circulated with the subject “Cost-of-Living for 2007 update” and purporting to be from the Social Security Administration. The message provides information about the 3.3 percent benefit increase for 2007 and contains the following “NOTE: We now need you to update your personal information. If this is not completed by November 11, 2006, we will be forced to suspend your account indefinitely.” The reader is then directed to a website designed to look like Social Security’s Internet website.

    Public Records on the Internet: The Privacy Dilemma

    One of the most challenging public policy issues of our time is the balancing act between access to public records and personal privacy - the difficulty of accommodating both personal privacy interests and the public interest of transparent government. I will discuss the privacy implications of making public records containing personal information available on the Internet. I list nine negative consequences of the availability of public records online. I conclude by offering 11 recommendations for safeguarding personal privacy while upholding the public policy reason for providing access, that being to promote government accountability.

    Watch Out for "Phishing" Emails Attempting to Capture Your Personal Information

    Email users are being bombarded with authentic-looking messages that instruct them to provide sensitive personal information. It's called "phising." Individuals who "bite" are exposed to identity theft.

    Phishing occurs when a consumer receives a deceptively-legitimate looking email from what appears to be a reputable company. The email asks recipients to update their credit card information or their account will be promptly terminated. Or the message offers a service to protect their credit cards from possible fraud.

    Issues of Privacy and Access

    Advances in technology give rise to the classic double edged sword. There are obvious benefits, such as locating and garnishing the wages of deadbeat parents. But there is also the downside, the development of a cradle to grave electronic dossier which can pose threats to personal privacy and which can be used for purposes of social control.

    My presentation will focus on the privacy implications of advances in technology and the importance of crafting policies to enable the benefits to proceed while minimizing the negative consequences.

    Public Records in a Computerized Network Environment: Privacy Implications

    The burgeoning information industry is acquiring data from both public and private sector sources, merging and repackaging them and then selling them on the marketplace. CDB Infotek is one of those companies, headquartered in Santa Ana -- another is Information Resources in Fullerton. Look in the Yellow Pages under 'investigators' and you'll see dozens of small companies that subscribe to the information services provided by these larger information clearinghouses.

     

    Pages

    Showing 61-70 of 86 results
    Subscribe to Online Privacy & Technology