Showing results for toptout xped xped theft
The Perils of Social Reading – Neil Richards
[…] the law and stop them from speeding or engaging in robbery. We have teachers proctor exams to prevent cheating, and we have neighborhood watch programs to deter theft. Surveillance can deter unpopular bad behavior as well as unpopular good behavior. As sociologist David Lyons puts it , “surveillance is not unambig uously good or […]
Special Guest Post by Robert Ellis Smith
[…] businesses in employment and insurance decisions. This list covers only the variety of federal laws with nationwide coverage. In addition, so many states have laws on identity theft, library confidentiality, and the right to breast-feed in public that is safe to say that a vast majority of the nation’s public is protected in these […]
Chris Wolf's Guest Post: A call for shared responsibility for preserving individual privacy
On October 4, The Last Watchdog featured Chris’ guest blogger piece, A call for shared responsibility for preserving individual privacy, where he comments on the data theft and spam increase, and examines the question of who should be responsible for preserving an individual’s privacy. A call for shared responsibility for preserving individual privacy.
future-of-privacy-forum-response-to-doc-noi-6-14
[…] addition to the civil authority vested in administrative and independent agencies, the Department of Justice has authority to proceed against criminals involved in spam, spyware, phishing, identity theft, malware, and “malvertising,” though enforcement against these crimes has not been as robust as it can be. 47 For example, malvertising occurs when criminal groups purchase […]
Ubiquitous Biometrics
[…] fingerprint collected. It only retains an encrypted string of numbers, the “template.” This eliminates the risk of someone else misusing the image for other purposes, from identity theft, to a government agency trying to apply their own algorithms to match my fingerprint one-to-many against others in their databases. It’s different in the United States. […]
Comments to the FCC on Open Internet and Broadband
[…] personal information occurs at many places on the Internet and often involves numerous parties in the broadband ecosystem. These activities create risks to consumers such as identity theft, and they raise concerns about the unwanted distribution of personal information to unintended recipients. … Consumers only will expand their adoption and usage of broadband services […]
smartprivacy-for-the-smart-grid
[…] information in the Smart Grid context, such as by a utility provider in the provision of service, price notification, connecting and disconnecting power remotely, and detecting the theft of devices. In addition, the use of personal information may be used to offer beneficial services to consumers, such as energy efficiency analysis and monitoring, and […]
smartprivacypapernov20091
[…] information in the Smart Grid context, such as by a utility provider in the provision of service, price notification, connecting and disconnecting power remotely, and detecting the theft of devices. In addition, the use of personal information may be used to offer beneficial services to consumers, such as energy efficiency analysis and monitoring, and […]
smartprivacypapernov2009
[…] information in the Smart Grid context, such as by a utility provider in the provision of service, price notification, connecting and disconnecting power remotely, and detecting the theft of devices. In addition, the use of personal information may be used to offer beneficial services to consumers, such as energy efficiency analysis and monitoring, and […]
SmartPrivacy for the Smart Grid
[…] information in the Smart Grid context, such as by a utility provider in the provision of service, price notification, connecting and disconnecting power remotely, and detecting the theft of devices. In addition, the use of personal information may be used to offer beneficial services to consumers, such as energy efficiency analysis and monitoring, and […]