Linux Privacy - Page 58
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
In the first article in this series, we looked at security concerns related to clickwrap and shrinkwrap agreements, used by vendors for mass-market licenses and service agreements. In these cases, no negotiations are involved. If you want what the vendor is . . .
Federal copyright regulators are opening the door for new exceptions to a controversial copyright law that has landed one publisher in court and a Russian programmer in jail. . .
Digital Rights Management Passport (DRMP) technology (TCPA from Intel and Palladium from Microsoft and similar) is intended to make it hard to copy downloaded music or pirated software. Preventing teenagers from making copies of Eminem songs may seem harmless, but Internet . . .
In a letter the groups plan to send Tuesday to consumer protection regulators in 14 states, the District of Columbia and at the Federal Trade Commission, Junkbusters and the Electronic Privacy Information Center (EPIC) praise state regulators for discussing privacy issues . . .
Users of SpamNet, a popular peer-to-peer unsolicited e-mail filtering service, had grown accustomed to virtually junk-free inboxes. So when spam suddenly started pouring in last week, SpamNet users weren't very happy. . .
As the laws governing the use of employee and customer data become ever more complex, IT directors are having to spend more time creating legally watertight privacy policies. But there is much evidence to suggest that many aren't fully aware . . .
Fast Search and Transfer's AlltheWeb.com bowed to pressure from a consumer advocate this week by adding a first-ever privacy policy disclosing its data-sharing practices. . .
The largest U.S. intelligence agency will spend millions to upgrade the technology it uses to sift through the huge volume of telephone conversations, e-mail and other worldwide communications chatter it monitors, under a new contract. The National Security Agency has signed . . .
A group of American companies is attempting this week to persuade the European Union to relax its rules governing data protection, claiming they are bad for business. The 10 companies, who dub themselves the Global Privacy Alliance (GPA) and whose members include IBM, Oracle and VeriSign, believe that the EU has put too much emphasis on the protection of individuals' privacy, and not enough on ensuring the free flow of information between companies. . . .
Two years after it angered privacy advocates by altering its privacy policy, Amazon.com has told a group of state attorneys general that it will change the guidelines again to make them more consumer-friendly. . .
In Shakespeare's Othello, Iago laments that "he that filches from me my good name/Robs me of that which not enriches him/And makes me poor indeed." In the modern world, by contrast, filching someone else's good name through identity theft can significantly . . .
According to operators of spam-filtering lists, an alarming number of people are unwittingly helping junk mailers shuttle spam, or unsolicited bulk e-mail. Those unassuming victims are running software meant to allow multiple connections over a LAN (local area network) to the . . .
Free Web-based e-mail services have long used customers as marketing mules, adding an unobtrusive tag line at the end of each message to tout their products. Now, an anti-spam company is drawing fire for using the same tactic. . .
In Shakespeare's Othello, Iago laments that "he that filches from me my good name/Robs me of that which not enriches him/And makes me poor indeed." In the modern world, by contrast, filching someone else's good name through identity theft can significantly . . .
A "serious" privacy leak in Mozilla and other browsers based on the open-source technology, such as Netscape and Galeon, discloses users' Web surfing information, according to a recent report.. . .
One year after September 11, personal privacy is an international casualty in the war on terror. It has now been one year since the horrific events of September 11th, 2001. It is often said that "everything has changed." That includes privacy, . . .
E-mail management company Lyris Technologies on Wednesday said it is investigating spam complaints that may involve hundreds of thousands of compromised customer e-mail addresses. At least three current and former Lyris customers this week complained that recipients of their e-mail . . .
Everyone with an e-mail account receives the entreaties: A deposed prince needs a reliable bank account in which to stash his loot; a marketing genius wants to share his method for securing easy riches; and, of course, an amateur cameraman has . . .
Governments have made it easier for authorities to plumb databases and eavesdrop on telephone and online conversations, a survey of privacy regulations released this week found. The report, from the Electronic Privacy Information Center and Privacy International, shows that many countries . . .
Over the summer, the Bush Administration revealed plans to appoint the first-ever U.S. chief privacy officer as part of the proposed Department of Homeland Security. This is significant because our government has generally resisted appointing a privacy officer. . .