Linux Privacy - Page 51

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Do No Harm: HIPAA's Role In Preventing ID Theft

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With the Health Insurance Portability and Accountability Act (HIPAA) privacy deadline recently passed, most health care providers and plan companies are preparing to implement the final rule for security. While many of these organizations are focused on the lack of budgetary . . .

Give States the Right to Protect Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

So far, dozens of consumer and privacy advocates, economists, and corporate executives have testified in the House and Senate. But because it's complex stuff, you probably haven't read much about it in the papers. I've been keeping an eye on the . . .

No one easy way to protect privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If enterprises are having problems protecting their customers' privacy, it's because of the same nagging issues facing IT security in general -- a lot of technology solutions attack only part of the problem, and few IT vendors build products with privacy . . .

Cutting Spam Down To Size

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How many clever or not-too-clever phrases have been written about people's feelings concerning spam, that is, unwanted commercial e-mail? We'd like to can it, kill it, squash it, fry it and shred it. Yet it still keeps popping up in the . . .

Verizon Divulges Customer Names

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Verizon Internet Services has released the names of four alleged music downloaders to the Recording Industry Association of America, but the music label group--which sued to get the names--isn't sure what it will do with them. Verizon turned over the . . .

Learning to Love Big Brother

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

DRM: Digital Rights Management. Or, as some prefer to call it, Digital Restrictions Management. Basically, the idea is that the creators, and/or owners, of digital content - a song, a video, a document, even an email - should be able to . . .

Law School Serves Course on Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Law students at Chicago's John Marshall Law School are getting a new dose of spam--on their course schedule. The spam serving comes courtesy of John Marshall associate professor David Sorkin, who's offering what he and his peers say may be . . .

Big Brother and The Next 50 Years

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Bruce Sterling calls himself an author, a journalist and an editor--and all that is true. But Sterling, who wrote "The Hacker Crackdown," is also a contrarian and a leading cultural critic of modern technology. From his home in Austin, Texas, . . .

Top Secret Case Tests Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An industrial dispute is brewing at the top secret Pine Gap surveillance facility over a security upgrade at the Northern Territory base. An Australian electrician has refused to undergo a high-level security check at the joint United States-Australian facility, in . . .

HIPAA One Step at a Time

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is putting a financial strain on most hospitals these days. It's forcing them to measure and account for data in ways they never had to before. At Baptist Health Care Corp., . . .

E-Marketer Rises Above Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With spam a four-letter word among computer users, Eric Obeck, chief operating officer of SendTec Inc., is understandably careful when describing the online marketing campaigns that are the mainstay of his company's business. "We're way above the bar when it . . .

Spam Blockers May Wreak E-mail Havoc

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's an unhappy prediction: The explosion of spam-blocking technology could herald the death of much legitimate e-mail. I wrote about patents relating to this technology, known as challenge-response technology, last week. Basically, when your mailbox is protected by a challenge-response . . .

A Spy Machine of Darpa's Dreams

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's a memory aid! A robotic assistant! An epidemic detector! An all-seeing, ultra-intrusive spying program! The Pentagon is about to embark on a stunningly ambitious research project designed to gather every conceivable bit of information about a person's life, index . . .

In Matters of Privacy, Whom Can You Trust?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Trust must be earned. This hard lesson is being learned by the five tech giants behind "trusted-computing" initiatives aimed at securing user privacy. Depending on whom you believe, the companies developing trusted-computing technology are either Santa or Satan. . .