Linux Privacy - Page 69
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Privacy efforts are intended to project an image of trust to consumers worried about the loss of their privacy, to dissuade lawmakers from tightening regulations, to prevent costly courtroom battles, and to avoid public relations nightmares while encouraging online transactions. IT . . .
Employers' bodies are more optimistic about the workability of the government's workplace e-mail privacy code, but deep misgivings remain. The Privacy at Work conference hosted by the information commissioner last week brought employers and employee representatives together in a bid to . . .
Scores of online companies could find themselves in violation of new financial privacy rules that took effect on Sunday amid widespread uncertainties over their scope, legal experts say. Growing fears over ambiguities in the Gramm-Leach-Bliley Act have drawn a belated flurry . . .
A group of hackers has delayed introducing its planned Web software that is meant to allow users to evade government censorship of the Internet. The delayed project, code-named "Peekabooty," was originally scheduled for launch next month at the hackers' convention Def Con, the group Cult of the Dead Cow (CDC) said in an e-mail message to journalists.. . .
When it comes to regulating online privacy protection, there seems to be only one thing that everyone here on Capitol Hill can agree on: Consumers need to be better informed. The Senate Republican High Tech Task Force hosted a talk titled . . .
An ambitious attempt by an international coalition of hackers to create a file-sharing program that can defeat censorship has gone back to the drawing board, the project's leader said Wednesday. Known as "Peekabooty"--and previously as Project X--the program could allow dissidents in authoritarian countries to speak out online by hiding the identity of its users.. . .
Kind of a pithy article, but good fodder for convincing your boss it's a good idea to install ssh and using crypto. " Then he started opening his e-mail. The first was from our boss, about Joel's next column. I liked being a snoop in the loop. Another was from Joel's girlfriend's brother asking Joel to score free concert tickets. Then a chain e-mail from a few of our co-workers, with snarky comments about someone else on our floor they evidently don't like. Ah, isn't this what computer spying is all about? . . .
A plethora of bills aimed at regulating privacy on the Internet are pending in Congress. Though it's tough to predict if and when any of the legislation would become law, IT solution providers say they stand to gain if safeguarding customer data becomes a legal requirement.. . .
The little lock icon that appears in your Web browser's window is supposed to prove you are engaging in a safe transaction. But it may be nothing more than a visual placebo. The icon is intended to indicate that information is . . .
The Privacy Foundation released free software Thursday that helps consumers detect when a site or e-mail contains a Web bug--a barely visible tracking tag, also known as clear GIFs, used mainly by marketers to monitor consumer habits online. Consumers can download . . .
Regarding Microsoft and Windows XP, "Microsoft says that the data it collects will be protected and that there is no ongoing secret pilfering of data from your machine. It's said to be a one-time process to connect you, your software and your computer as a legal entity. . . .
At least 23 agency sites still have more than 300 cookies, one year after the Office of Management and Budget restricted the use of tracking technologies on public government sites. Those are the findings of a study compiled from the reports . . .
Interview with Michael Jacobs, information assurance director at the NSA. " ... to make sure commercial tools pass muster in terms of security, the NSA runs them through new software-testing programs. These programs, the Common Criteria Evaluation and Validation Scheme and the Cryptographic Module Validation Program, are part of the agency's National Information Assurance Partnership, a joint effort with the National Institute of Standards and Technology (www.niap.nist.gov), IT product vendors and users. . . .
The government is not fully complying with its own Internet privacy rules, a congressional report claimed Friday. The study, culled from reports of 51 inspectors general, found 300 "cookies" on the Web sites of 23 agencies. Cookies are Internet tracking devices . . .
Lawyers have warned that companies using AltaVista's new search engine technology are at risk of breaching data protection laws. Launched last week, AltaVista's new software lets people search entire corporate networks allowing employees to access all network folders, personal computers and . . .
We give out personal information every day. Between our birth and death records, we dispense an avalanche of information to the government, businesses and other organizations in return for employment or services. For example, we provide detailed information to schools, banks, . . .
Cops may someday be searching private medical records in search of criminals, according to some medical privacy experts who cite increasing automation of medical records combined with broad exemptions for law enforcement in new medical privacy regulations. "I'm very concerned about . . .
A panel concludes that customers can choose to do business with companies that they trust and avoid ones that they don't. As the debate over how to regulate online privacy continues, some experts say consumers ultimately will have the most control . . .
More and more Web-enabled gadgets collect data on customers. That makes privacy advocates mad, but the resulting furor doesn't last long. During the annual Computers Freedom and Privacy 2001 conference last March, privacy activist Richard Smith held up the SportBrain exercise . . .
Scott McNealy, once vexed privacy activists by claiming that "you have zero privacy anyway -- get over it."Now the Sun Microsystems CEO is saying that "absolute privacy is a disaster waiting to happen."In an opinionated article published in The Washington . . .