Linux Privacy - Page 51
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Your company is negotiating a big deal with a partner, making you a bit nervous about the security of exchanging documents via email. There is a non-disclosure agreement in place, but you'd like to be absolutely certain that only the recipients can see the plans for your company's new product initiative.. . .
By late summer, the Office of Management and Budget plans to issue privacy regulations that most likely will affect only new systems. The E-Government Act of 2002 requires OMB to update its existing regulations and codify how the executive branch . . .
The key to this shift is the technology that protects information from unauthorized or illegal use. It's called digital-rights-management software, or DRM. Like it or not, rights management is increasingly going to be a fact of your life. Not only will . . .
Like it or not, cameras are a fact of life. Security expert Rich Maurer estimates that in a 10-mile stretch in any major city, your image will be captured on 30 to 40 private security cameras. That doesn't include cameras in . . .
With the Health Insurance Portability and Accountability Act (HIPAA) privacy deadline recently passed, most health care providers and plan companies are preparing to implement the final rule for security. While many of these organizations are focused on the lack of budgetary . . .
So far, dozens of consumer and privacy advocates, economists, and corporate executives have testified in the House and Senate. But because it's complex stuff, you probably haven't read much about it in the papers. I've been keeping an eye on the . . .
If enterprises are having problems protecting their customers' privacy, it's because of the same nagging issues facing IT security in general -- a lot of technology solutions attack only part of the problem, and few IT vendors build products with privacy . . .
How many clever or not-too-clever phrases have been written about people's feelings concerning spam, that is, unwanted commercial e-mail? We'd like to can it, kill it, squash it, fry it and shred it. Yet it still keeps popping up in the . . .
Verizon Internet Services has released the names of four alleged music downloaders to the Recording Industry Association of America, but the music label group--which sued to get the names--isn't sure what it will do with them. Verizon turned over the . . .
DRM: Digital Rights Management. Or, as some prefer to call it, Digital Restrictions Management. Basically, the idea is that the creators, and/or owners, of digital content - a song, a video, a document, even an email - should be able to . . .
Law students at Chicago's John Marshall Law School are getting a new dose of spam--on their course schedule. The spam serving comes courtesy of John Marshall associate professor David Sorkin, who's offering what he and his peers say may be . . .
Bruce Sterling calls himself an author, a journalist and an editor--and all that is true. But Sterling, who wrote "The Hacker Crackdown," is also a contrarian and a leading cultural critic of modern technology. From his home in Austin, Texas, . . .
When the public's right to know runs into an individual's right to privacy, a statewide public records audit conducted in March shows that most Shoals law enforcement agencies choose privacy even when the law calls for openness. An average citizen . . .
On July 1, 2003, Senate bill 1386 becomes Civil Code 1798.82. In a nutshell, the law states that any person or company doing business in the state of California is responsible for notifying California residents of security breaches to their non-encrypted . . .
A discussion about whether to install security cameras at a Park City park led to a debate about residents' rights to privacy Tuesday. The Park City City Council was considering the installation of security cameras at McLean Park due to . . .
An industrial dispute is brewing at the top secret Pine Gap surveillance facility over a security upgrade at the Northern Territory base. An Australian electrician has refused to undergo a high-level security check at the joint United States-Australian facility, in . . .
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is putting a financial strain on most hospitals these days. It's forcing them to measure and account for data in ways they never had to before. At Baptist Health Care Corp., . . .
With spam a four-letter word among computer users, Eric Obeck, chief operating officer of SendTec Inc., is understandably careful when describing the online marketing campaigns that are the mainstay of his company's business. "We're way above the bar when it . . .
Here's an unhappy prediction: The explosion of spam-blocking technology could herald the death of much legitimate e-mail. I wrote about patents relating to this technology, known as challenge-response technology, last week. Basically, when your mailbox is protected by a challenge-response . . .
A controversial Defense Department program that would comb computer records to identify potential terrorists will have safeguards to ensure that it does not violate individual rights, the Pentagon said Tuesday. . .