W3C Work Group Releases “Do Not Track” Draft Documents
[…] Mozilla, Opera, Stanford University, The Center of Democracy and Technology, The Nielsen Company, TRUSTe, W3C, and Yahoo!. Also participating as invited experts, are representatives from the Electronic Frontier Foundation, the US Federal Trade Commission (FTC), Consumer Watchdog, the German Independent Center for Privacy Protection (ULD), and Leiden University. “We are confident that this multi-stakeholder […]
FPF Advisory Board Members Take the Stage at Computers, Freedom, and Privacy Conference to discuss: “Frontiers in Privacy"
Wednesday, June 15 at Computers Freedom and Privacy (CFP), three Future of Privacy Forum (FPF) Advisory Board members took the stage during a discussion about “ Frontiers in Privacy.” Advisory Board member Professor Annie Anton moderated a discussion between Professors Peter Swire and Daniel Solove. The discussion was fast-paced and covered six topics–each getting […]
FPF Advisory Board Members Take the Stage at Computers, Freedom, and Privacy Conference to discuss: “Frontiers in Privacy"
Wednesday, June 15 at Computers Freedom and Privacy (CFP), three Future of Privacy Forum (FPF) Advisory Board members took the stage during a discussion about “ Frontiers in Privacy.” Advisory Board member Professor Annie Anton moderated a discussion between Professors Peter Swire and Daniel Solove. The discussion was fast-paced and covered six topics–each getting […]
Future of Privacy Summary of California Public Utilities Commission Proposed Decision on Smart Grid Privacy and Security
[…] Auditing. The PUC’s proposed rules draw heavily from suggested rules presented to the PUC last year by the Center for Democracy and Technology (CDT) and the Electronic Frontier Foundation (EFF), with some modifications. 1. Definitions There are 5 primary defined terms used throughout the proposed rules whose meaning is important to the rules’ […]
Age Verification for Our Children: A Report on Tools and Resources Available for Safegaurding the First Generation of Digital Natives
[…] rn, generating a unique encrypted biometric template that is matched agains t the pre-registered candidate’s palm vein pattern, thus ensuring the te st taker is that candidate. It offers a highly reliable form of auth entication because it utilizes no trace technology, no image is ever stor ed, and the data cannot be read by other devices. The CNIL noted in its app roval, ‘It is not likely to be captured without the knowledge of the person con cerned and therefore presents very little risk for the civil liberties a nd fundamental rights of the individuals.’” 20 Age Verification on the Mobile Internet A. As mobile broadband proliferates and becomes inc reasingly similar in speed and capability to what one’s desktop computer can do at home, new cha llenges will arise regarding age verification for inappropriate content. Mobiles rep resent a new frontier in the incorporation of the digital world into our everyday lives. However, they also present new risks concerning the protection of personally identifiable information, especially for children. A number of measures have shown promise in allaying these concerns. a. European Mobile Providers have adopted a set of self-regulatory principles regarding age verification and access control on mobile netwo rks, referred to as the “Framework.” 21 i. The Framework outlines a five-point plan to cont rol access to inappropriate content on mobile phones with Internet capabilities . The points are: 1. Access Control Mechanisms 2. Raising Awareness and Education 3. Classification of Commercial Content 4. Fighting Illegal Content on Mobile Community Pro […]
Age Verification for Children: A Survey of Resources and Tools
[…] age of 13, and does not need to obtain any personal ly identifiable information to determine a user’s age. Age Verification on Mobiles Mobiles represent a new frontier in the incorporation of the digital world into our everyday lives, and also present new issues concern ing the protection of personally identifiable information, for children […]
Online Age Verification For Our Children
[…] rn, generating a unique encrypted biometric template that is matched agains t the pre-registered candidate’s palm vein pattern, thus ensuring the te st taker is that candidate. It offers a highly reliable form of auth entication because it utilizes no trace technology, no image is ever stor ed, and the data cannot be read by other devices. The CNIL noted in its app roval, ‘It is not likely to be captured without the knowledge of the person con cerned and therefore presents very little risk for the civil liberties a nd fundamental rights of the individuals.’” 20 Age Verification on the Mobile Internet A. As mobile broadband proliferates and becomes inc reasingly similar in speed and capability to what one’s desktop computer can do at home, new cha llenges will arise regarding age verification for inappropriate content. Mobiles rep resent a new frontier in the incorporation of the digital world into our everyday lives. However, they also present new risks concerning the protection of personally identifiable information, especially for children. A number of measures have shown promise in allaying these concerns. a. European Mobile Providers have adopted a set of self-regulatory principles regarding age verification and access control on mobile netwo rks, referred to as the “Framework.” 21 i. The Framework outlines a five-point plan to cont rol access to inappropriate content on mobile phones with Internet capabilities . The points are: 1. Access Control Mechanisms 2. Raising Awareness and Education 3. Classification of Commercial Content 4. Fighting Illegal Content on Mobile Community Pro […]
Age Verification for Children: A Survey of Tools and Resources
[…] age of 13, and does not need to obtain any personal ly identifiable information to determine a user’s age. Age Verification on Mobiles Mobiles represent a new frontier in the incorporation of the digital world into our everyday lives, and also present new issues concern ing the protection of personally identifiable information, for children […]
microsoft-powerpoint-smart-grid-privacy-madrid-powerpoint-jp-final1
Privacy and the Smart Grid: New Frontiers, New Challenges
microsoft-powerpoint-smart-grid-privacy-madrid-powerpoint-jp-final
Privacy and the Smart Grid: New Frontiers, New Challenges