Linux Privacy - Page 51
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Like it or not, cameras are a fact of life. Security expert Rich Maurer estimates that in a 10-mile stretch in any major city, your image will be captured on 30 to 40 private security cameras. That doesn't include cameras in . . .
With the Health Insurance Portability and Accountability Act (HIPAA) privacy deadline recently passed, most health care providers and plan companies are preparing to implement the final rule for security. While many of these organizations are focused on the lack of budgetary . . .
So far, dozens of consumer and privacy advocates, economists, and corporate executives have testified in the House and Senate. But because it's complex stuff, you probably haven't read much about it in the papers. I've been keeping an eye on the . . .
If enterprises are having problems protecting their customers' privacy, it's because of the same nagging issues facing IT security in general -- a lot of technology solutions attack only part of the problem, and few IT vendors build products with privacy . . .
How many clever or not-too-clever phrases have been written about people's feelings concerning spam, that is, unwanted commercial e-mail? We'd like to can it, kill it, squash it, fry it and shred it. Yet it still keeps popping up in the . . .
Verizon Internet Services has released the names of four alleged music downloaders to the Recording Industry Association of America, but the music label group--which sued to get the names--isn't sure what it will do with them. Verizon turned over the . . .
DRM: Digital Rights Management. Or, as some prefer to call it, Digital Restrictions Management. Basically, the idea is that the creators, and/or owners, of digital content - a song, a video, a document, even an email - should be able to . . .
Law students at Chicago's John Marshall Law School are getting a new dose of spam--on their course schedule. The spam serving comes courtesy of John Marshall associate professor David Sorkin, who's offering what he and his peers say may be . . .
Bruce Sterling calls himself an author, a journalist and an editor--and all that is true. But Sterling, who wrote "The Hacker Crackdown," is also a contrarian and a leading cultural critic of modern technology. From his home in Austin, Texas, . . .
When the public's right to know runs into an individual's right to privacy, a statewide public records audit conducted in March shows that most Shoals law enforcement agencies choose privacy even when the law calls for openness. An average citizen . . .
On July 1, 2003, Senate bill 1386 becomes Civil Code 1798.82. In a nutshell, the law states that any person or company doing business in the state of California is responsible for notifying California residents of security breaches to their non-encrypted . . .
A discussion about whether to install security cameras at a Park City park led to a debate about residents' rights to privacy Tuesday. The Park City City Council was considering the installation of security cameras at McLean Park due to . . .
An industrial dispute is brewing at the top secret Pine Gap surveillance facility over a security upgrade at the Northern Territory base. An Australian electrician has refused to undergo a high-level security check at the joint United States-Australian facility, in . . .
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is putting a financial strain on most hospitals these days. It's forcing them to measure and account for data in ways they never had to before. At Baptist Health Care Corp., . . .
With spam a four-letter word among computer users, Eric Obeck, chief operating officer of SendTec Inc., is understandably careful when describing the online marketing campaigns that are the mainstay of his company's business. "We're way above the bar when it . . .
Here's an unhappy prediction: The explosion of spam-blocking technology could herald the death of much legitimate e-mail. I wrote about patents relating to this technology, known as challenge-response technology, last week. Basically, when your mailbox is protected by a challenge-response . . .
A controversial Defense Department program that would comb computer records to identify potential terrorists will have safeguards to ensure that it does not violate individual rights, the Pentagon said Tuesday. . .
The Flint Hills School, a prep academy in Oakton, Va., might seem an unlikely place to find an Internet spammer. But late last year, technicians at America Online were able to trace the origin of a new torrent of spam, or unsolicited e-mail advertisements, to the school's computer network. . .
It's a memory aid! A robotic assistant! An epidemic detector! An all-seeing, ultra-intrusive spying program! The Pentagon is about to embark on a stunningly ambitious research project designed to gather every conceivable bit of information about a person's life, index . . .
Trust must be earned. This hard lesson is being learned by the five tech giants behind "trusted-computing" initiatives aimed at securing user privacy. Depending on whom you believe, the companies developing trusted-computing technology are either Santa or Satan. . .