Brendon Lynch, Chief Privacy Officer, Microsoft writes on the Trustworthy Computing Blog: Yesterday morning I read an article in The New York Times that described “How to Muddy Your Tracks on the Internet.” The article gives consumers some suggestions for addressing the complicated problem of managing the information left by one’s activities online. This information…
Today, I’m happy to announce we are releasing Building Global Trust Online Volume 2: Policymaker Guide to Privacy, Safety, and Security at the International Association of Privacy Professionals (IAPP) Global Privacy Summit in Washington, D.C. Complimentary copies are available for conference attendees at the Microsoft booth, and a digital version is available online. The guide…
This year’s State of the Net Conference in Washington, D.C. on January 17th featured a number of lively sessions I attended that addressed issues of online privacy. The day began with a keynote by Cameron Kerry, General Counsel, U.S. Department of Commerce. Kerry discussed a number of technology policy issues, including the recent announcement…
The company says it may now collect, use, transfer, and disclose our iPhone, iPad or computer identifier and location for any purpose if we opt into iTunes.
Tiny RFID tags used to track movements of bees
There is a difference between understanding something theoretically and right in the gut.
Google knew about the collection of MAC addresses, and has never said otherwise or stated that their collection of these addresses was done accidently.
Gartner: Identity management projects rank first in the top five priorities for IT’s security spending.
The report indicates Google has been purposely collecting a lot of information its defenders couldn’t have imagined.
All the brooms have started dancing. I wonder if Mickey will get out of this one?