AI criteria: Non-invasiveness

Privacy is often considering whether or not a use of information is appropriate. What is or isn’t appropriate is based on regulations and rules, but as I had written elsewhere, your own feelings might play into that as well (Empathic Privacy). Being non-invasive is a matter of considering if the ...

The terrible, horrible, no good, very bad phishing email

I recently received an email that I knew was a fishing email after five seconds of inspection.  It wasn’t anything flashy that gave it away, just a slew of telltale signs that it wasn’t an authentic message, but some malicious correspondence meant to take advantage of a less informed individ...

My first wearable technology adventures

Over the past few weeks I have started to wear my Google Glass in public. The experiences have been invaluable to my understanding of the privacy implications of wearable technology. My evolving perspective on wearable technology has been somewhat unexpected.

A Privacy Pro and Wearable Technology

Privacy professionals, including myself, have been warning of the dangers to privacy from wearable technology. The concerns I have been expressing have been based on reported product capabilities, anecdotal evidence, and published reports. So when I had the opportunity to join the Google Glass Ex...

Wearable technology is coming, but will anyone notice?

When I look through corporate handbooks I often find prohibitions on the use of cameras or recording devices while on a company’s premises. It’s not something that gets brought up in new hire orientation nor something that gets brought up very often at all. Let’s face it, there is a certain amoun...

Three thoughts for business from the NSA privacy incidents

Yesterday the Washington Post published an article  based on an audit dated May 2012 describing violations of privacy rules by the NSA. As I read the article three thoughts occurred to me that a business can take away for their own privacy program.

Leave a hair, lose some privacy

We all have seen those police dramas where a forensics specialist finds a hair at a crime scene, the DNA is extracted, and a suspect confirmed. Heather Dewey-Hagborg has taken this a bit further with her project Stranger Visions providing an insight into how that simple hair may compromise privacy.

Three Random Privacy Stories…after Father’s Day

Father’s Day weekend has come and gone. Being with friends and family the discussion turned to memories, the future, and privacy (thanks NSA). I wanted to share three of the more entertaining and interesting discussions with you. To quote Jack Webb, “Only the names have been changed t...

Valuable functionality can cause a privacy breach

Last Friday it was revealed that reporters from Bloomberg News could retrieve information from the profiles of subscribers to Bloomberg’s data terminals as well as the subscribers’ system usage (NYT article here). While I agree with the characterization of this incident as a “mi...