Showing results for toptout xped xped theft
FPF Comments to FTC on CGHD
[…] consumer harm in the Internet of Things. Without adequate security, bad actors may take control of connected devices, pry into intimate spaces, or perpetrate fraud or identity theft. Because inadequate security presents such a tangible risk of causing actual consumer harm, companies must ensure that they devote adequate resources to security before and after […]
FPF Testimony for CA Leg._5.14.14
[…] (Dec. 3, 2013), http://www.edweek.org/ew/articles/2013/12/03/14alec.h33.html . 10 Future of Privacy Forum 919 18 th Street, NW, Suite 901 Washington, DC 20006 www.futureofprivacy.org selling children’s data to downright identity theft. 40 Yet, entrenchi ng behind a “no vendor” model is no panacea, as schools are unlikely to have the capabilities to carry the technological load. In […]
Big Data and Privacy Paper Collection
[…] gushes into the Gulf for weeks. This too must be included in the analogy. Data spills occur with the regularity of oil spills. The victim of identity theft, bogged down in unwanted credit cards and bills, is just as trapped and unable to fly as the bird caught in the oil sl ick, its […]
Additional Comments to the FTC about the Internet of Things
[…] With it, bad actors will have access to all manner of connected devices, and will be able to pry into intimate spaces or perpetrate fraud or identity theft. Company must devote adequate resources to security before and after their products reach the market. Fortunately, companies large and small are aware of this concern and […]
FPF IoT Comments_January 2014
[…] consumer harm in the Internet of Things. Without adequate security, bad actors may take control of connected devices, pry into intimate spaces, or perpetrate fraud or identity theft. Because inadequate security presents such a tangible risk of causing actual consumer harm, companies must ensure that they devote adequate resources to security before and after […]
Hirsch – Glass House Effect
[…] into the Gulf for weeks. This too must be included in the analogy. Data spills occur with the regularity of oil spills . The victim of identity theft, bogged down in unwanted credit cards and bills, is just as trapped and unable to fly as the b ird caught in the oil slick, its […]
LEGAL – Hoofnagle – How FCRA Regulates Big Data
[…] participants had errors that once correct ed, improved their credit score such that they could obtain credit at a lower price . D. The Externality of Identity Theft The sine qua non of identity theft is the release of a consumer ‘s report, through the trickery of an impostor. While most identity t heft […]
LEGAL – Hirsch – The Glass House Effect
[…] into the Gulf for weeks. This too must be included in the analogy. Data spills occur with the regularity of oil spills . The victim of identity theft, bogged down in unwanted credit cards and bills, is just as trapped and unable to fly as the b ird caught in the oil slick, its […]
FRAMEWORK – Richards & King – Three Paradoxes of Big Data
[…] ful Big Data anal ytics will unleash upon society. The utopian ideal of cyberspace needed to yield to human reality, especially when it revealed problems like identity theft, spam, and cyber – bullying . Regulation of the Internet’s excesses was (and is) necessary in order to gain the benefits of its substantial breakthroughs. Something […]
Richards – Three Paradoxes of Big Data
[…] ful Big Data anal ytics will unleash upon society. The utopian ideal of cyberspace needed to yield to human reality, especially when it revealed problems like identity theft, spam, and cyber – bullying . Regulation of the Internet’s excesses was (and is) necessary in order to gain the benefits of its substantial breakthroughs. Something […]