<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d26072374\x26blogName\x3dPr!v4cy+6109\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://g2rma.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://g2rma.blogspot.com/\x26vt\x3d4286504594958660652', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

Pr!v4cy 6109

Girma Nigusse

FTC Releases Survey of Identity Theft in the U.S. Study Shows 8.3 Million Victims in 2005

Tuesday, November 27, 2007

FTC Releases Survey of Identity Theft in the U.S. Study Shows 8.3 Million Victims in 2005

Source: ftc

U.K data breach could cost banks $500M, says Gartner

U.K data breach could cost banks $500M, says Gartner: "Banks in the U.K. could end up spending upwards of $500 million to deal with the aftermath from the recent loss of computer disks containing bank account and other personal data belonging to about 25 million people, according to analyst firm Gartner Inc. "

Source: computerworld

Privacy: Erase Your Hard Drive

Privacy: Erase Your Hard Drive: "One of these drives was most likely used in an ATM machine in Illinois, and that no effort was made to remove any of the drive’s financial information. The log contained account numbers, dates of access, and account balances. In addition, the hard drive had all of the ATM machine software. Another drive contained 3,722 credit card numbers "

Source: net-security

Cellphone Tracking Powers on Request - washingtonpost.com

Monday, November 26, 2007

Cellphone Tracking Powers on Request - washingtonpost.com

Source: washingtonpost

IBLS | INTERNET LAW

Friday, November 23, 2007

IBLS | INTERNET LAW: "regarding the collection and use of personal identifying information, including: • What information is collected • Its intended uses; • Third parties to whom it will be disclosed; • Consumer's ability to access the information; • Consumer's ability to remove information from GeoCities' databases"

Source: ibls

Privacy Rule Slows Scientific Discovery And Adds Cost To Research, Scientists Say

Privacy Rule Slows Scientific Discovery And Adds Cost To Research, Scientists Say: "Implementation of the health care privacy law widely known as HIPAA, or the U.S. Health Insurance Portability and Accountability Act, has severely eroded the process of scientific research, delaying some clinical studies and curtailing others before they even begin, reports Roberta B. Ness, M.D., M.P.H., in the Journal of the American Medical Association. "

Source: sciencedaily

Atu XVIII - UK Politics and Civil Liberties Blog

Monday, November 19, 2007

Atu XVIII - UK Politics and Civil Liberties Blog: "So Donald Kerr, Principal Deputy Director of National Intelligence, suggests Americans should redefine privacy. According to AP Kerr says that 'Privacy can no longer mean anonymity'."

Source: trevor-mendham

Privacy redefined in post-9/11 world « The Column, reloaded

Privacy redefined in post-9/11 world « The Column, reloaded: "“Too often, privacy has been equated with anonymity,” Kerr said. “It’s an idea that is deeply rooted in American culture. The Lone Ranger wore a mask but Tonto didn’t seem to need one even though he did the dirty work for free. You’d think he’d need one more. But in our interconnected and wireless world, anonymity — or the appearance of anonymity — is quickly becoming a thing of the past.”"

Source: ericsomething

License Plate Scanners Raise Privacy Concerns - Local News Story - KNSD | San Diego

License Plate Scanners Raise Privacy Concerns - Local News Story - KNSD | San Diego: "Law enforcement said the scanners are a great new tool for getting stolen cars back. But some people say they're an invasion of privacy."

Source: nbcsandiego

5-Point Checklist for Info Sec and Privacy Pros to Use for Data Protection and Privacy Law Compliance - Realtime IT Compliance

Wednesday, November 14, 2007

5-Point Checklist for Info Sec and Privacy Pros to Use for Data Protection and Privacy Law Compliance - Realtime IT Compliance: "However, most businesses continue to do what they have been doing for the past several decades, often at the urging of the marketing areas; collect as much PII as possible when the opportunity persents itself. "

Source: realtime-itcompliance

Privacy groups push 'Do Not Track' list for online marketers

Privacy groups push 'Do Not Track' list for online marketers: "A group of nine privacy advocacy organizations today submitted a proposal to the Federal Trade Commission asking it to consider implementing a Do Not Track list to protect people from having their online activities unknowingly tracked and used by marketers. The group also wants the formal definition of the term 'personally identifiable information' updated, and it said Internet advertisers should be forced to provide more robust disclosures on any behavioral tracking they are doing."

Source: computerworld

AlterNet: Rights and Liberties: Your Privacy Is Someone Else's Profit

AlterNet: Rights and Liberties: Your Privacy Is Someone Else's Profit: "Private companies have more control over our personal information than we do, as the new book, iSpy: Surveillance and Power in the Interactive Era, explains."

Source: alternet

5-Point Checklist for Info Sec and Privacy Pros to Use for Data Protection and Privacy Law Compliance - Realtime IT Compliance

5-Point Checklist for Info Sec and Privacy Pros to Use for Data Protection and Privacy Law Compliance - Realtime IT Compliance: "One of the basic privacy principles is to limit the collection of personally identifiable information (PII) to only that which is necessary for the business purpose for which it is being collected. "

Source: realtime-itcompliance

Privacy - Keeping your information confidential

Privacy - Keeping your information confidential: "The more communication and data are encrypted the more difficult it becomes to read the transmitted data. Remember that anything that can be created digitally can be recorded and duplicated."

Source: windowsecurity