Showing posts with label Privacy Advocates. Show all posts
Showing posts with label Privacy Advocates. Show all posts

Wednesday, May 8, 2013

Are Our Privacy Rules Changing?



Do you realize how much information is gathered from your smartphone?  This is something most people use every day, but not just to make calls.  It is also used to surf the Internet, send e-mails and update social networking.  Many people even use their smartphones as a GPS.  Because of its many functions, your smartphone holds information on your location, your e-mail contacts and your favorite Internet sites.   In other words, your smartphone is yet another way you can be tracked on-line. 

It seems like every month new apps are being developed for smartphones and tablets.  In fact, the smartphone is probably used less to make calls than to surf the Internet.  You can use Google Maps to find any location in the world, you can keep up with your office e-mail and you can even use GasBuddy to find the least expensive gas in the area.  When you’re ready for a break, you can play your favorite on-line games!  All this can be done with one device.  You can be traveling, yet you’ll never be far from your office or home.  You can even access sites that can help you out with a solution if you don’t know how to handle your two-year-old’s tantrums or medical sites that can tell you what that strange rash on your leg is.

Yes, these apps are a fantastic convenience, but they also leave us open for tracking.  Many people find that the convenience far out-weighs the risk of being tracked.  After all, isn’t it better to have access to all of these great sites if it means all you have to do is enter your zip code and your birth date?  There are thousands of people in that zip code with the same birth date, so what could be the harm?  Well, thousands of people aren’t using YOUR smartphone!

With this information, you are opening yourself up to being tracked by advertisers.  This can happen because many sites share the gathered information with others. They know your location from your GPS, so with your zip code, birth date and the knowledge of what sites you visit on-line added in with your e-mail address, you are going to get a whole lot of targeted advertisements in your inbox.  You could also be given suggestions for even more apps to either purchase or download for free.

These app developers claim that in order to get the full benefits, some personal information is needed.  Congress has discussed the issue of these apps as a privacy risk.  It has also been discussed that consumers should be allowed to opt out of being tracked, but so far, not much has been done to remedy this.

Friday, April 27, 2012

Bullying VS Cyberbullying

Cyberbullying should not be equated to bullying. In the past, the schoolyards or the streets were the most common venues of bullying. It was there that they become either victims or act as bullies, depending on some characteristics.

Today, cyberbullying is becoming more common among them. What this means is that the venues are not just the schoolyards or the streets, but cyberspace as well!

What raises some privacy concerns are the results of researches conducted on “real life” bullying and cyberbullying among the youth. It started when it was observed that some schools were under the assumption that existing anti-bullying programs can also deal with cyberbullying. Contrary to this, students aged 10 to 18 that were involved in the research do not share that same belief. They say that aggressions that happen online cannot be dealt with by existing anti-bullying rules.

Studies on bullying in schools showed three characteristics. These characteristics are: power differential between the bully and the victim, a planned targeting of a victim, and ongoing aggression. These characteristics are not necessarily involved in cyberbullying. In fact, some of the findings suggest that these kids play multiple roles in cyberbullying. They can be the bullies, the victims, or the witnesses. At any time, a teenager can take the role of any one or two of these online.  In school, the above three characteristics will give an individual his or her enduring role in the bullying circle.

Another disturbing finding is that 95% of the kids asked about this issue say that cyberbullying, since only done online, is just a joke. They do not realize the level of harm that is associated with these actions. Cyberbullying can be damaging to the victim’s mental health and developmental well-being. If the victim is a student, his or her academic achievements can be negatively affected. The worst case scenario can be a suicide attempt, which can end up in an unjustifiable death. It is high time that specific laws on cyberbullying should be crafted and implemented.

Image: Grant Cochrane / FreeDigitalPhotos.net

Thursday, December 29, 2011

Securing Patient Data

There are new privacy concerns that were triggered by the continuous increase in data breaches at health care providers. There were some studies conducted to pinpoint the main cause of this exasperating situation. There were some that put the blame on insufficient funding for security, while others said that the sudden surge in data breaches is due to devices that were either lost or stolen. The first reason could be explained by the government’s priorities in distributing funds, but it is not good to hear that there is human error, or that health care professionals are not well informed about securing patient data.

Almost all private and public organizations are now using mobile technology in their daily operations. People in these organizations use smartphones or tablets to conveniently manage data because doctors and other health care professionals discovered the convenience of using these gadgets for electronic health records. These tools, however, do not possess the much needed, necessary security. Because they do not have enough background, some doctors are using these gadgets without taking advantage of the use of encryption technology, or even passwords.

A spokesperson from the American Health Information Management Association saw the need for education and awareness. He said that training sessions on the use of mobile technology in relation to data management are already being implemented. But he also added that these are not as effective as education and awareness. There must be better involvement if health professionals are to have the sufficient awareness of patient data security.

It is surprising to note that at present, 4 out of 10 health care professionals surveyed believe that patient data accessed by mobile devices is secured. An added surprise comes from knowing that 81% of them are using these devices to collect, store and transmit patient records. But the shocking detail is that almost one-half of the participants surveyed revealed that their organizations do not have any data security mechanism at all.

Image: winnond / FreeDigitalPhotos.net

Tuesday, December 13, 2011

Cookies No More

The Federal Trade Commission (or FTC) is in the process of improving internet privacy protection. If the plan goes through, this time it will be brought to a new level. This will be done without prejudice to innovation on the internet, but with enhanced consumer protection. Among other things, the proposal by the FTC includes innovative functions such as “do not track” and several others.

When internet technology was significantly developed, online activities of consumers started to be tracked by the use of “cookies”. To do this, websites send cookies to the consumer’s computer, making it easy for data miners to easily know consumer behavior online. Having gathered enough information, companies can then target specific products and services to online consumers. It is not easy for consumers to guard themselves against this because only very few of them know how to turn off cookies. They have to painstakingly find out the browser’s privacy settings so that they can opt out of cookies. However, this is easier said than done, even for the experienced user.

Some consumers might find data mining beneficial to them since they can get special offers and discounts if they continually buy the same product. But this is only true to some, because most consumers consider targeted advertisements annoying and threatening to their privacy. That is why authorities never give up in finding ways to protect consumers from these types of unwelcome ads.

The FTC wanted to make things easier for the “opt out” issue through the issued proposal. Once approved, consumers can opt out of cookies at anytime they like and, if they wish, turn it off permanently. Users are already fed up with being presented with very long privacy policies. Aside from this, the terms used are hard to understand except for users who have some knowledge of legal jargon. In the FTC’s scheme, consumers would be allowed to know who is following their online activities. More significantly, they will be given the power to permanently decline cookies.

Consumer watchdogs and companies that maintain websites can use this proposal to come together and plan concrete steps that need to be taken. Then they could zero in on some guidelines for consumer protection without hindering innovation on the web.

Image: piyato / FreeDigitalPhotos.net

Tuesday, November 29, 2011

When Buying Gadgets for Children

Parents, in this age of technology, have to always keep themselves ahead of their kids. This is necessary in order to see to it that their children stay safe and protected in their online activities. Children at school have discovered how to use phones and web enabled devices to cheat during tests. Teachers do not find it easy to stop this combined effort among children who avoid, and even break, school rules and regulations. There are some children who teach other kids how to get around filters on school computers. Teachers get themselves updated with technology along with their students so that this behavior will not remain unnoticed and unchecked.

Parents who really don’t care about being involved with their children’s online activities are in danger. Children nowadays own gadgets that allow them to get connected online anytime and anywhere. If they are not properly guided, these tech gadgets will lead them to become victims of cyber bullying, cyber sex, identity theft, and other risks. Parents, especially mothers, must try to understand what kind of technology their kids bring home.

When a child asks for a new device, game, or phone, parents should not buy it right away. They have to discuss the matter before finally giving in to their child’s request. They can start by asking their child specific questions about the device. For sure, by asking the right questions, they can get an impression about the gadget and have a “feel” for it. From here, they can come to a decision whether it would be safe to let their child have it. Parents can also do their own research about the gadget either online or at a store.

Some parents will find this to be time consuming, but it is worth the effort. The cyber world offers tremendous benefits to the lives of children, but without proper guidance and control, it could compromise their safety and security. Parents should take on this responsibility, which cannot be taken for granted. Parental control is the key in kids’ internet safety. Parents should be comfortable with technology so that their children do not become slaves to it.

Image: Salvatore Vuono / FreeDigitalPhotos.net

Sunday, July 24, 2011

The Balancing Quest is Still Ongoing


Striking a balance between consumer privacy protection and government control is very difficult and the battle is ongoing. Some say a solution is long overdue and online consumers have been hoping that this will end soon. Both privacy advocates and legislators are working hard, but they seem to be heading in opposite directions. Will the addition of regulations lead to the assurance of internet privacy, or could it be a question of self-regulation that is just not working?

Today, technology grows so fast that collecting consumer information can be done in many ways. Data collection becomes increasingly sophisticated and such data is very useful at some times, but at other times, it is not. There is an increase in privacy breaches, which indicates abuse of collected information. Therefore, laws concerning consumer data protection must be put into place.

A government official has recently called on representatives of some government agencies to stand as witnesses. They testified about the situation regarding information collection by some private companies. The representatives admitted that collection and compilation of personal profiles by these companies has been heightened. Some do it as part of their marketing and advertising campaigns, while others do it for other purposes. A lot of concerns have been raised regarding this, many of which remain unresolved.

The government has laid down the details of each step that it is taking to promote internet privacy. One of these is the enforcement of current laws that oblige companies to improve data protection strategies. Companies have agreed to sell personal information only in cases that are considered acceptable. It was admitted by some of the witnesses that the safeguards are not enough. They said that there is a need to pass legislation for the creation of a new set of rules. These rules would drive private industry to guarantee better safety for those consumers who use the internet.

If self-regulation among users and data gathering companies is maintained, there is no need to implement additional laws. On one hand, consumers should be conscientious about the information that they share online because when users are more careful, there will be less privacy issues. On the other hand, data gathering companies should treat private information with value. Users entrust their private information to them without any hesitation and with no thought that it could be used against them. Self-regulation should work both ways so that maximum consumer protection can be achieved.

Image courtesy of:

Image: twobee / FreeDigitalPhotos.net

Friday, April 29, 2011

How to Avoid Weight Loss Spam

Do not be a victim of spam just because you want to lose weight fast. Do not join the group of users who lost money in those bogus offers. The spam trap is there, and it has been intended for you. Be smart enough not to say “yes” to the products that claim instant weight loss. Find a legitimate site offering legitimate products. Be wary of con artists who have mastered their craft and make their claims appear legitimate. Protect your privacy before they take it away from you.

Spam may be either of two types. First, there are those that are claiming that products such as pills, creams, patches, or others will guarantee weight loss even without diet or exercise. Second, those that claim to block fat absorption, calories or carbohydrates so you don’t gain weight.

The results of a New York-based research study have given additional light as to why overweight individuals are easily victimized by spam. For every five overweight people, one has been a victim of spam. Another result shows that 88% of overweight people say that they received spam. As to the opening of spam, 42% of overweight individuals say they have opened the emails, and a good 18% of people with weight problems say they bought the products offered in the mails.

Experts give an explanation to why more overweight people get spammed than other groups. According to them, these people visit more weight loss sites than others so they end up in the databases of these sites. With the hope of getting the easiest way out, they easily give in to the offers. It is easier for them to become targets of spammers than other groups. This is especially so when they provide their personal information to these websites, which then makes them become victims.

Spam will not work if users will not give the information that spammers need. Basic among all these is personal information, especially an email address that is uploaded online. Some seemingly simple posts such as “I want to lose weight” placed in social networking sites can trigger spam. Keep in mind the 42% open rate and 18% conversion rate of weight loss spam. Let us look at a “worst case” spam scenario. For example, a spammer will send email offering a bogus weight loss product to 1,000 targeted individuals. Count how many emails equals 1% of these. It is 10. If ten spam recipients finally decide to buy the “product” being offered, how much money would the spammer have? Assuming that the unit cost of the product is $50, the spammer gets $500.

Haste makes waste. Don’t get spammed! It will be a waste of money trying to lose weight instantly through bogus offers. Always hold tight to your personal information unless the site is trusted. Use the privacy settings of social networking sites to control your personal information. It would still be best to hold on to the experts’ advice on losing weight. There is no better way than increasing physical activity to burn more energy and eating fewer calories.

Image courtesy of:
Image: Patchareeya99 / FreeDigitalPhotos.net

does weight Watchers Work
ganar dinero facil

Tuesday, March 15, 2011

Full-Body Scan Or Pat-Down?


Some airports in the U.S. are now using Automated Imaging Technology or AIT. Also called full-body scanner, it is here where passengers have to go through before boarding. In addition to the usual pat-down, the use of this device spares passengers from “body contact” with the airport security officer. Some argue that AIT is “better” compared with the pat-down, but privacy advocate groups think otherwise.

An advocacy group approached the Washington Court of Appeals judges. They object to how the technology invades the privacy of passengers. They called the use of full-body scanners as “unreasonable search” and in violation of a passenger’s civil rights. These machines are now being used as first line of defense at some airport security checkpoints.

A passenger’s naked image is shown as he or she passes through the machine. This is the main point of objection of the group. They imply that while passengers are spared from body contact, they are subjected to a more invasive technology. The EPIC considers the policy “in violation of the Fourth Amendment to the Constitution”. Aside from the foregoing, it also violates “laws protecting privacy and religious freedom”.

The government in defense of the use of this new technology responded that systems are in place to protect the privacy of passengers. It explained that passengers’ identity is never shown to the “viewers” who are generally agents at airports. Government says this makes the search reasonable and “minimally invasive”. However, the truth to this contention is yet to be ascertained.

EPIC has also advised the Transportation Security Administration (TSA) to postpone the use of such technology. According to TSA, almost 98 percent of passengers go through full-body scanning without any problem. Only about 2 percent of passengers would choose pat-down instead. Atty. Marc Rotenberg of EPIC said it is likely that passengers do not know that they still have the pat-down as their option.

Even the judges themselves also expressed apprehension on the way TSA has been given the power to use the technology. One is the effect of the body scanner on individual passengers. It is possible that it is too late to discover its damaging effects on passengers. There should have been public consultation for inputs before it went into primary use. Its use should only be selective especially when the level of security threat is too low to warrant.

Image courtesy of:

Image: luigi diamanti / FreeDigitalPhotos.net

Friday, March 11, 2011

How Private Should Privacy Be?


There is an odd connection between missing children cases and tax returns. This was found by Washington Federal treasury officials. Out of the more than 1,700 cases they examined, more than 1/3 of the children had been declared on tax returns. They were declared by relatives that are suspects for their abduction. Many domestic cases of child abduction remain unsolved and children are yet to be found.

The partners Sen. Amy Klobuchar and missing children’s advocate Patty Wetterling knock at law enforcement groups. They said tax returns of suspected abductors hold data that might lead to the solution of the cases. They suggest that, law enforcement agencies should be permitted to gain access at the tax return data of these “suspects”. Granting this flexibility might help in locating missing children across the country.

Klobuchar argued that the state should give a leeway on the privacy of those tax return records. They contain data that could potentially lead to the solution of these cases. These should be made available. Klobuchar is a former Hennepin County attorney who describes that there is no sense in overprotecting tax information data. The state would protect privacy as it should also exhaust all possible means in trying to find out where the kids are.

Divulging tax information to law enforcers would create more problems. Of the many privacy laws, those that revolve around taxes are one of the strongest in the US. Breaking the privacy of tax information data would also invite other compelling interests. Those of health care information and other government services are good examples.

Wetterling has lost a son an 11-year old son named Jacob. He was abducted neat their St. Joseph home in 1989. He is still one of the missing children. The missing child supporter said that they don’t “care about jurisdictional boundaries”. As parents they are only interested in getting their child back. In support to Klobuchar’s bill, Wetterling said this in a statement during the congressional panel hearing.

The senator noted that IRS allows disclosure of tax information data in some situations such as overdue student loans. This is part of a list of exceptions in the tax involving privacy. She further added that missing children shouldn’t be excluded from the list. It is clear that there should be a balance between protecting privacy rights and finding missing children. This is the real case.

Image courtesy of:

Image: photostock / FreeDigitalPhotos.net

Friday, March 4, 2011

The "Privacy Policy" Race


You might have tried to read the “Privacy Policy” of a popular networking site like Facebook. In case that you were able to read the small fonts and the thousands of words, were you able to comprehend? Here’s the hard truth: Privacy policies are never easy to understand. Facebook admitted this truth and now has a “better” way of disclosing its privacy policy to its customers. This is done with the hope of making its privacy policy easier to understand.

For several years, Facebook and Google have been rivals in presenting “better” versions of privacy policies. Up to now, no winner has been declared. Particularly, these two companies want to make privacy policies easier to use. This means “easy to understand, more visual and interactive, and more relevant to users’ concerns”.

What does Facebook actually mean by “presenting something different”? Facebook has opened the result for user’s comments. Instead of the term “Privacy Policy” it used “Data Use Policy”. This shift might have been the result of the protests by privacy advocates. They said that the term “Privacy Policy” is ambiguous because this generally illustrates how and when data is shared.

The new design places Facebook at a higher level in terms of visual appeal. Instead of a litany of texts, the “Data Use Policy” is presented into several pages. This improves the page’s readability compared with the older version. However, with the sections and subsections in the page, navigation is sacrificed. A reader has to come across linked pages that make spontaneous reading difficult.

This difficulty will not be addressed by just deleting some words per page. Comprehension is another key aspect to think about. Facebook admits that in essence the “Data Use Policy” is still the “Privacy Policy”. There is not really new about individual privacy policy contents. Critics assert that privacy in Facebook should not be less than unidentified use.

Google at present allows three modes of use: unidentified, pseudonymous, and identified. Facebook allows only one - identified. It requires the user to provide correct personal information. A user could become unidentified, which is also doubtful, if he or she would turn off all Platform applications. However, this would limit his or her usage without the games, applications or Websites.

Image courtesy of:

Image: nuttakit / FreeDigitalPhotos.net

Monday, June 8, 2009

Mind the Fine Print

One never really pays attention to the “Terms of Service”. Most just check “I agree”, and get on with their business. The Electronic Frontier Foundation has just launched a new program that can automatically (by the hour) scan for changes in the Terms of Service agreements in 44 big name websites; Myspace, Facebook, Google, Ebay, Amazon, etc.

The program is located on TOSBack.org, and works in conjunction with the WayBack Machine. The WayBack machine pulls out old drafts of the Terms of Service agreements, and the TOSBack compares them with new versions, even highlighting certain sections that have been changed, deleted, or added.

Tim Jones, the company’s technology manager, attests to the confusion most feel when reading the Terms of Service. “Most skip it because it is boring and confusing.” This is true; it takes a lawyer to understand what the document is saying sometimes, and it is often quite vague.

“Some changes to terms of service are beneficial to customers, and some are not”, states Electronic Frontier Foundation Staff Attorney Fred von Lohmann. This is especially true in today’s internet travelers, trusting websites with friends, locations, and even personal photos.

Some of these documents hardly ever change, while some do rapidly, as Ebay did five times in two hours. Often, these changes are simply to clarify issues or just to correct a punctuation error, but are sometimes more drastic.

The TOSBack can’t explain the changes made to these Terms of Service documents just yet, but they can alert users who could. The system will continue to evolve and will support explanation capabilities in the future.

Monday, September 8, 2008

NebuAd Halts Invasion of Users' Privacy...

Reports from Internetnews.com state that NebuAd, creators of the very controversial behavioral targeting technology, recently announced they will stop their ad-targeting campaign. This comes shortly after many of their clients (such as CableOne) dropped NebuAd over privacy concerns and a Congressional hearing. In a statement made by NebuAd, they stated, "plans for wide spread deployment via the Internet service provider channel are delayed to allow time for Congress to spend additional time addressing the privacy issues and policies associated with online behavioral advertising." Along with the project being halted and ISPs canceling their contracts, CEO and co-founder Bob Dykes resigned.

NebuAd's behavioral targeting campaign was supposed to keep information anonymous and only collect and store pertinent information so that online advertisements could reflect an individuals tastes and offer products that they are more likely to want to purchase. The above mentioned ISP was one of the many multiple service operators that had contracts with NebuAd for their state-of-the-art services. ISPs have been tracking and recording their users' information and selling it to the highest bidder, which in many cases was NebuAd. While this concept seemed like a good idea, privacy advocates and security experts called it "browser high jacking," and made it clear that an ISP could be breaking federal wiretapping laws by using NebuAd.

NebuAd required the ISPs they contracted with to inform their users of the ad-tracking campaign. ISPs did inform their users, but in many cases did not allow them to opt-out of having their Internet privacy jeopardized. Also, many of the ISPs did not specifically tell their users what was happening, but just made small modifications to their privacy policies. Embarq, for example, stated in their privacy policy: "The Web sites that you visit or online searches that you conduct" may be used to "deliver or facilitate the delivery of targeted advertisements." On a side note--only 15 Embarq users opted out. Who should be blamed then? Is NebuAd at fault for developing the eavesdropping software, or is it the fault of the ISPs who don't tell their users they are being spied on and then sell the information? The next step is for Congress to introduce legislation requiring explicit consent from users that way they know and willingly allow their information to be collected.

Saturday, August 23, 2008

Protecting Personal and Financial Privacy - Blog Review

As an avid reader with more than a casual interest in privacy, I tend to find interesting sites on the topic of privacy. Today I found Protecting Personal and Financial Privacy, a blog by Mike Valentine. Not only does he write well, I found the articles thoughtful.

His latest post discusses AOL and behavioral targeting. He points out that people are careless with their personal information. This is point we've been making on this blog since we started it. Privacy starts with personal responsibility. If you give up your personal information too easily, you forfeit your right to privacy.

Wednesday, July 30, 2008

GovGab...your U.S. government blog

GovGab is an important tool for staying up to date on government legislation and resources. The blog posts vary by many different topics, with some of the newer ones focusing on keeping your food from spoiling during a power outage or discovering disabilityinfo.gov. The blog also breaks down into different categories so you can search for the things you are interested in.

The part of the blog I would like to focus on is one of their more recent posts. It is focused on privacy protection. The most important part of the posts points us to a list of privacy resources aimed at helping us maintain privacy. The resource page is set up with government and non-government sponsored websites that are all focused on helping us keep our privacy.

The resource page has just about any topic you could need to know about. It does have a lot of articles and resources for protecting children online, which is always a major concern. Other areas include financial information, identity theft protection, medical records privacy and Internet privacy. The resources site has a lot to offer and can keep you busy for a long time. Along with privacy resources, the resources site allows you to locate local officials, find information on a business, and get resources for teachers and consumers.

Ultimately the blog is a great source of information from our government. It does a great job of keeping the postings entertaining and not just focused on politics and policies.

Tuesday, July 15, 2008

Privacy International...defending your personal privacy.

Privacy International has been around for almost 20 years and works hard day-in and day-out to protect our personal privacy from corporations and governments. They are the oldest privacy advocacy group and the first of its kind international resource for privacy protection. Headquartered in London, with a U.S. headquarters in Washington D.C., they describe themselves as a chameleon-like group that advocates privacy but can also be a troublemaker. Privacy International's advisory group is not afraid to dive into a controversial campaign in order to protect privacy. Privacy International is a very involved privacy advocate group that uses the power of the pen to conduct studies and write reports that will benefit privacy for all.

Privacy International's website is very easy to use and navigate. It contains a listing of "Top News" articles that they are directly involved in, continues with a Key Resources section, followed by News and Developments and lastly a Reports/Studies/Campaigns section. The website also offers specific subject areas that offer more in depth coverage and information in such areas as: data protection and privacy laws, financial surveillance, and national ID cards. You can also search issues by specific privacy related keywords.

Wednesday, June 11, 2008

PogoWasRight.org

PogoWasRight.org is here to bring us, "Privacy news, data breaches, and privacy-related events and resources from around the world." This is a great site to visit for news and important information regarding your privacy. PogoWasRight contributor, PrivacyNews, updates frequently with headlines that are important to all of us. You can see the most recent, updated headlines and additions right on the front page.

If you want to search for articles and postings on a specific subject you have many to choose from. The sections include: Federal Government, REAL ID, Internet & Computers, Surveillance, and Business & Privacy. Clicking one of these topics brings you to the most recent updates for that section.

The "Other Privacy Sections," area offers resources for proposed legislation. The site also offers a blog, Chronicles of Dissent, which has some great articles and links to a blog dedicated to information about medical privacy. The site also shows upcoming Privacy Events and Conventions, with links to each for more details. PrivacyNews also takes leads by e-mail, in case something slipped by, that you feel should be a headline. You can also become a member of PogoWasRight.com and post comments and submit items.

This is definitely a place to go for news and information regarding privacy. The site offers relevant and recent headlines to keep us all informed on the next big threat to privacy.

Thursday, May 29, 2008

Today's privacy organization you should know about....Electronic Privacy Information Center

The Electronic Privacy Information Center (EPIC) is "a public interest research center in Washington, D.C. It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values."

EPIC is another great organization that was established to help people against all the privacy risks they may encounter. EPIC publishes a newsletter called the EPIC Alert which is openly available for anyone to read or subscribe to. Along with the Epic Alert, the organization also publishes books pertaining to privacy issues, open government, and free speech.

One of my favorite parts of the website is the "Policy Issues" menu. This is where you can look up more detailed information on free speech, open government, and privacy issues. The "Privacy A to Z" gives a very detailed list of Hot Topics and New Resources, as well as a comprehensive list of privacy issues (listed alphabetically of course). Many of the issues you can find here are ones that would be difficult to get any decent amount of information about. EPIC stays updated with the latest concerns and privacy risks through this section.

Another excellent part of the site that I use a lot is the "Resources" section. This is where you can also sign up for the EPIC Alert, visit the bookstore, check out EPIC-sponsored events, company press releases, and find privacy tools/resources. This section also offers a very useful Bill-Track, which keeps updated information on Congressional bills, and also features an entire section regarding "Former Secrets," uncovered by EPIC's use of the Freedom of Information Act (FOIA).

EPIC is another pioneer for privacy. The hard work and dedication of the staff makes it easier for everyone to be informed about the latest privacy issues and ways to stay protected. EPIC is regularly featured in the news, and continues to fight hard to protect us.

Tuesday, May 27, 2008

Electronic Frontier Foundation...protecting your digital privacy

The Electronic Frontier Foundation (EFF) is here to protect your digital privacy. The EFF is the first line of defense against cyber attacks. The nonprofit organization contains a mix of lawyers, analysts, activists and technologists that are working hard to protect us all from damage to our digital rights, ranging from cyber criminals to legislation against privacy.

EFF spends much of its time litigating and overseeing court cases that concern the digital rights of everyone who is entitled to them. Many crucial EFF court victories have shaped the way we use the Internet today.

The EFF website offers a wide array of information to research including e-voting rights and intellectual property issues. The site also has current cases that the EFF is involved in and any important updates. The Deeplinks Blog offers commentary and submission from various writers who have joined the fight with EFF in protecting us all.

It is great knowing that there is a place to turn when in need of information. EFF goes above and beyond most other organizations to protect us. The website offers an almost endless amount of content...just about anything you could want to know concerning privacy and the rights you have. EFF offers employment opportunities, internships, and volunteering for anyone who wants to join in the protection of our rights. The Electronic Frontier Foundation has been working hard since 1990 to set precedents and continues to fight against today's issues.

As mentioned in a previous post about Internet privacy and who can be trusted, it is important to know who you can and can't count on. The EFF does not remain anonymous about what they do. They put themselves on the front lines and allow themselves to be seen by everyone, including photos and biographical information.

Saturday, May 24, 2008

Privacy Rights Clearinghouse...helping protect your privacy

The Privacy Rights Clearinghouse is a "nonprofit consumer information and advocacy organization," helping people stay protected in most aspects of their lives. The site ranges from issues concerning financial privacy and identity theft to Internet privacy. The organization was founded and is still run by Beth Givens and its mission is two-fold: consumer information and consumer privacy. The San Diego-based company was established in 1992 and is predominately grant-supported. The goals of the PRC are:
  • Raise consumers' awareness of how technology affects personal privacy.

  • Empower consumers to take action to control their own personal information by providing practical tips on privacy protection.

  • Respond to specific privacy-related complaints from consumers, intercede on their behalf, and, when appropriate, refer them to the proper organizations for further assistance.

  • Document the nature of consumers' complaints and questions about privacy in reports, testimony, and speeches and make them available to policy makers, industry representatives, consumer advocates, and the media.

  • Advocate for consumers' privacy rights in local, state, and federal public policy proceedings, including legislative testimony, regulatory agency hearings, task forces, and study commissions as well as conferences and workshops.
The PRC website offers consumer information regarding just about any privacy issue that could be of concern. The website offers various fact sheets on privacy issues in both English and Spanish. The site is conveniently indexed so that the user can easily search for a specific issue. Of course, as any pioneer for privacy should, PRC has a very extensive privacy policy clearly stated on the website. The best part, I feel, is the "Alerts & New Info" section which shows current privacy-related issues that should be paid special attention to. At this time the newest alert is "Security & Privacy for your Windows Computer" (in PDF). Privacy Rights Clearinghouse is a great site and a great organization that is founded on helping consumers protect themselves from the many privacy risks out there.