Human privacy error strikes again
I don\’t watch the Today show, but there was a great example of a self-inflicted privacy breach on the air on Friday.
Human privacy error strikes again Read More »
I don\’t watch the Today show, but there was a great example of a self-inflicted privacy breach on the air on Friday.
Human privacy error strikes again Read More »
When I look through corporate handbooks I often find prohibitions on the use of cameras or recording devices while on a company’s premises. It’s not something that gets brought up in new hire orientation nor something that gets brought up very often at all. Let’s face it, there is a certain amount of convenience to
Wearable technology is coming, but will anyone notice? Read More »
Yesterday the Washington Post published an article based on an audit dated May 2012 describing violations of privacy rules by the NSA. As I read the article three thoughts occurred to me that a business can take away for their own privacy program.
Three thoughts for business from the NSA privacy incidents Read More »
I am sure you have heard this several times since Scott McNealy, Sun\’s CEO, first said it back in 1999, \”You have zero privacy anyway. Get over it\”. After 14 years it seems Americans haven\’t gotten over it. A Pew Research study shows more people are concerned about the government\’s surveillance than terrorism (Few See
\”There is no privacy, get over it\” Read More »
Recently my wife and I have begun finding new doctors and dentists. While filling out the paperwork at each office we are being asked for our driver\’s license numbers and I was not sure why. Also, being a privacy person, I read the privacy policies at these offices and sometimes had questions. So, much to
A visit to a new doctor raises privacy questions Read More »
Facebook, Ubisoft, and Morningstar are all recent examples of data breaches that involved the unauthorized release of email addresses. In one of several conversations I have had about these events some people could not understand why others were upset about the release; after all, they are only email addresses. Here is how I explained it.
\”It\’s only an email address!\” Read More »
We all have seen those police dramas where a forensics specialist finds a hair at a crime scene, the DNA is extracted, and a suspect confirmed. Heather Dewey-Hagborg has taken this a bit further with her project Stranger Visions providing an insight into how that simple hair may compromise privacy.
Leave a hair, lose some privacy Read More »
Father\’s Day weekend has come and gone. Being with friends and family the discussion turned to memories, the future, and privacy (thanks NSA). I wanted to share three of the more entertaining and interesting discussions with you. To quote Jack Webb, \”Only the names have been changed to protect the innocent.\”
Three Random Privacy Stories…after Father\’s Day Read More »
Cloud computing provides an opportunity for businesses to lower costs and increase their computing infrastructure\’s flexibility. When utilizing a cloud service provider for additional storage, computing power, or a full application you should look into the privacy implications as these are multidimensional.
Privacy and the Cloud Read More »
Last Friday it was revealed that reporters from Bloomberg News could retrieve information from the profiles of subscribers to Bloomberg\’s data terminals as well as the subscribers\’ system usage (NYT article here). While I agree with the characterization of this incident as a \”mistake\”, wasn\’t this really a violation of basic privacy principles?
Valuable functionality can cause a privacy breach Read More »