Tags: privacy*

44 bookmark(s) - Sort by: Date ↓ / Title /

  1. Browser privacy tester from EFF
    https://panopticlick.eff.org
    Tags: , , by dnorman (2016-02-02)
  2. -
    http://www.cio.gov.bc.ca/cio/priv_leg/foippa/guides_forms/guide_index.page
    Tags: , , , by dnorman (2016-01-26)
  3. We believe in telling you up front exactly what’s going to happen to your personal information and asking for your permission before you share it with us. And if you change your mind later, we make it easy to stop sharing with us. Every Apple product is designed around those principles. When we do ask to use your data, it’s to provide you with a better user experience
    http://www.apple.com/privacy
    Tags: , , by dnorman (2015-09-29)
  4. While the benefits of lecture capture and the flipped classroom model have caught widespread attention in higher ed, it is crucial to note its risks—particularly in the area of privacy and copyright violations.

    FERPA noncompliance can result in the loss of federal funding, while copyright infringement could lead to costly civil or even criminal penalties. Recorded lectures released to the public could bring unwanted attention to a school—as in the February case of a guest speaker at the University of Wisconsin-Whitewater, whose lecture was picked up by conservative media and called “anti-Republican.”
    http://www.universitybusiness.com/article/lecture-capture-privacy-please
    Tags: , , by dnorman (2014-06-11)
  5. -
    https://citizenlab.org/2014/05/respon...ng-crisis-canadian-telecommunications
    Tags: by dnorman (2014-05-08)
  6. no thanks, bell.
    http://www.cbc.ca/news/canada/montrea...l-but-is-it-ethical-1.2158593?cmp=rss
    Tags: , by dnorman (2013-10-22)
  7. We do nothing wrong when we make love or go to the bathroom. We are not deliberately hiding anything when we seek out private places for reflection or conversation. We keep private journals, sing in the privacy of the shower, and write letters to secret lovers and then burn them. Privacy is a basic human need.
    http://www.schneier.com/essay-114.html
    Tags: , by dnorman (2013-04-04)
  8. Individual, institutional, market-based, security and intelligence forms of surveillance therefore co-exist with each other on the same site. Not only are they drawing from the same interface and information, but these practices also augment each other
    http://firstmonday.org/htbin/cgiwrap/...s/index.php/fm/article/view/4651/3651
  9. In operation just three months, the database already holds files on millions of children identified by name, address and sometimes social security number. Learning disabilities are documented, test scores recorded, attendance noted. In some cases, the database tracks student hobbies, career goals, attitudes toward school - even homework completion.

    Local education officials retain legal control over their students' information. But federal law allows them to share files in their portion of the database with private companies selling educational products and services.

    Entrepreneurs can't wait.

    "This is going to be a huge win for us," said Jeffrey Olen, a product manager at CompassLearning, which sells education software.

    CompassLearning will join two dozen technology companies at this week's SXSWedu conference in demonstrating how they might mine the database to create custom products - educational games for students, lesson plans for teachers, progress reports for principals.

    The database is a joint project of the Bill & Melinda Gates Foundation, which provided most of the funding, the Carnegie Corporation of New York and school officials from several states. Amplify Education, a division of Rupert Murdoch's News Corp, built the infrastructure over the past 18 months. When it was ready, the Gates Foundation turned the database over to a newly created nonprofit, inBloom Inc, which will run it.
    http://www.reuters.com/article/2013/0...cation-database-idUSBRE92204W20130303
  10. # Use this file to prevent your computer from connecting to selected
    # internet hosts. This is an easy and effective way to protect you from
    # many types of spyware, reduces bandwidth use, blocks certain pop-up
    # traps, prevents user tracking by way of "web bugs" embedded in spam,
    # provides partial protection to IE from certain web-based exploits and
    # blocks most advertising you would otherwise be subjected to on the
    # internet.
    http://someonewhocares.org/hosts
    Tags: , , by dnorman (2013-02-22)

Top of the page

First / Previous / Next / Last / Page 1 of 5 Linky linky...: tagged with "privacy"

About - Propulsed by SemanticScuttle