background preloader

Privacy

Facebook Twitter

In Microsoft’s New Browser, the Privacy Light Is Already On. Online Identity Verification Service | miiCard.com. Digital ‘passport’ proves identity for online transactions. Gain instant and exclusive access to over 5,000 of the most creative ideas, innovations and startups on our database and use our smart filters to take you direct to those that are most relevant to your industry and your needs. Not interested? You can still browse articles published in the last 30 days from our homepage and receive your daily and weekly fix of entrepreneurial ideas through our free newsletters. A place to preserve and share mementos online. Business - Richard Ting - Why Mobile Will Dominate the Future of Media and Advertising. We're about to enter a world where there are more tablets and smart phones than PCs. If you're in the mobile advertising business, your rocket ship takes off in five, four, three ...

Reuters This is the dawn of the smartphone age. But you wouldn't know it by looking at mobile advertising spend. The disparity between the two mediums gives a strong indication as to how much room mobile still has to grow. While industry analysts have become increasingly bullish on the growth of the mobile medium and industry behemoths like Facebook are building out their mobile capabilities with the recent acquisitions of Instagram, Glancee, and Karma, it is perfectly clear that advertisers have avoided chasing consumers' eyeballs into this medium. The diversity of tactics in the mobile medium is astounding. The quality of the work is at an all-time high.

Innovation has accelerated. Experimentation leads to advances. Cultural Influence on society. It's Still Only the First Inning. Technology - Joseph Turow - A Guide to the Digital Advertising Industry That's Watching Your Every Click. In this excerpt from his new book, The Daily You, University of Pennsylvania professor Joseph Turow takes you on a tour of the industry that's trafficking in the data you generate every day on the Internet. You don't have to be a privacy stickler to be worried. At the start of the 21st century, the advertising industry is guiding one of history's most massive stealth efforts in social profiling.

At this point you may hardly notice the results of this trend. You may find you're getting better or worse discounts on products than your friends. You may notice that some ads seem to follow you around the internet. You may actually like some of these intrusions. But look beneath the surface, and a different picture emerges. Consider a fictional middle class family of two parents with three children who eat out a lot in fast-food restaurants. His bitterness only becomes more acute when he describes to his boss the down-market Web he has been seeing lately. Personal Data Ecosystem Consortium — We connect companies that empower people to collect, curate, and derive value from their personal data. New Privacy Framework in Europe. European Commission - Press Release Commission proposes a comprehensive reform of data protection rules to increase users' control of their data and to cut costs for businesses Brussels, 25 January 2012 – The European Commission has today proposed a comprehensive reform of the EU's 1995 data protection rules to strengthen online privacy rights and boost Europe's digital economy.

Technological progress and globalisation have profoundly changed the way our data is collected, accessed and used. In addition, the 27 EU Member States have implemented the 1995 rules differently, resulting in divergences in enforcement. A single law will do away with the current fragmentation and costly administrative burdens, leading to savings for businesses of around €2.3 billion a year. "17 years ago less than 1% of Europeans used the internet. My proposals will help build trust in online services because people will be better informed about their rights and in more control of their information. Consumers Are Ready To Manage Their Own Data - Fatemeh Khatibloo.

By Fatemeh Khatibloo | 9:09 AM October 6, 2011 Facebook’s rollout of its new Timeline interface made plenty of waves both in the media and across the Facebook user base. But I’m most fascinated by how Timeline plugs in to Facebook Connect to create a new class of empowered consumers who are willing to share their personal data with marketers in exchange for convenience, a personalized experience, and value. Imagine this: I’m in the market for a new car, and I know a friend recently purchased a Subaru she’s enamored of. Via Timeline, I can explore her decision-making process, the feedback she got from her friends while she was car-shopping, and use that insight to inform my own decision.

I can check up on the dealership she used via its own Facebook page, and even send it a message to let it know I’m in the market. Now I’m ready to make a purchase, and I’ve shared my interest with a couple of different dealerships. Soon, a number of relevant offers come in, and I make my decision. Network Advertising Initiative. Technology - Alexis Madrigal - I'm Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web. Who are these companies and what do they want from me? A voyage into the invisible business that funds the web. This morning, if you opened your browser and went to NYTimes.com, an amazing thing happened in the milliseconds between your click and when the news about North Korea and James Murdoch appeared on your screen.

Data from this single visit was sent to 10 different companies, including Microsoft and Google subsidiaries, a gaggle of traffic-logging sites, and other, smaller ad firms. Nearly instantaneously, these companies can log your visit, place ads tailored for your eyes specifically, and add to the ever-growing online file about you. There's nothing necessarily sinister about this subterranean data exchange: this is, after all, the advertising ecosystem that supports free online content.

Even if you're generally familiar with the idea of data collection for targeted advertising, the number and variety of these data collectors will probably astonish you. High-Tech : Google paie les internautes pour scruter leur vie privée. Le géant de l'Internet propose de rémunérer ses utilisateurs en échange d'un accès complet aux sites qu'ils visitent. Google vient de présenter son programme Screenwise, qui permet de suivre à la trace les internautes en échange d'une rémunération pouvant monter «jusqu'à 25 dollars en cartes cadeau».

Tous les utilisateurs américains du navigateur Chrome de plus de 13 ans, disposant déjà d'un compte Google, peuvent s'inscrire à ce programme qui, selon l'entreprise, l'aidera à «améliorer ses produits et services et à créer une meilleure expérience en ligne pour tout le monde». Concrètement, après l'inscription, les utilisateurs devront installer une extension sur leur navigateur. Chaque inscrit recevra alors une carte cadeau Amazon d'une valeur de 5 dollars au moment de l'inscription, puis de 5 dollars supplémentaires tous les trois mois. En échange, Google aura accès, de façon anonyme promet-il, à l'intégralité des sites visités par l'internaute. Les Sages censurent le fichier des gens honnêtes. Le Conseil constitutionnel a censuré, jeudi 22 mars, la création d'un fichier central biométrique, proposition phare de la loi instaurant la nouvelle carte d'identité électronique, en invoquant l'atteinte au respect de la vie privée.

Si l'instauration d'un fichier --un "traitement de données à caractère personnel" dans le jargon juridique -- est justifié par un motif d'intérêt général (la lutte contre l'usurpation d'identité), celui-ci porte atteinte au droit au respect à la vie privée, ont considéré les Sages. Ceux-ci pointent en particulier la nature des données enregistrées (comme les empreintes digitales), l'ampleur du fichier (la quasi-totalité de la population française) et "les caractéristiques techniques" qui permettent son interrogation à d'autres fins que la vérification d'identité d'une personne. Le fichier était baptisé "le fichiers des gens honnêtes". La puce "vie quotidienne" censurée. Les boites noires dans les voitures américaines projètent, une nouvelle fois, les USA aux avant-postes des mutations du secteur des transports. Un malin génie rendit visite au président d’un certain pays et lui proposa le marché suivant : « je sais que votre économie est languissante.

Je suis désireux de vous aider à la raffermir. Je puis mettre à votre disposition une invention technologique fabuleuse, qui doublera votre production intérieure brute (PIB) et le nombre d’emploi disponibles. Mais il y a un prix à payer. Je vous demanderai chaque année la vie de 20 000 de vos concitoyens, dont une forte proportion de jeunes gens et de jeunes filles ». Cet extrait du dernier livre de Jean-Pierre DUPUY, l’avenir de l’économie, est régulièrement discuté dans l’enseignement de droit de l’Université de Yale, aux Etats-Unis. Le projet de Loi 1813 portant sur les boites noires Le projet de loi 1813 stipule qu’un EDR (Electronic Data Recorder) équipe chaque voiture vendue aux États-Unis à partir de l'année modèle 2015 ; il a déjà été adopté au Sénat.

L’EDR, les données et les assurances L’EDR et la Google car. FBI quietly forms secretive Net-surveillance unit | Security & Privacy. The FBI has recently formed a secretive surveillance unit with an ambitious goal: to invent technology that will let police more readily eavesdrop on Internet and wireless communications. The establishment of the Quantico, Va. -based unit, which is also staffed by agents from the U.S. Marshals Service and the Drug Enforcement Agency, is a response to technological developments that FBI officials believe outpace law enforcement's ability to listen in on private communications .

While the FBI has been tight-lipped about the creation of its Domestic Communications Assistance Center, or DCAC -- it declined to respond to requests made two days ago about who's running it, for instance -- CNET has pieced together information about its operations through interviews and a review of internal government documents. The center represents the technological component of the bureau's " Going Dark " Internet wiretapping push, which was allocated $54 million by a Senate committee last month. Placeme: Your Places Remembered. Tracking everything, Placeme is the smartphone assistant of the future — Mobile Technology News. Surveillance. The Surveillance project is drawing a map of the different forms and impacts of surveillance online.

Funded by the MacArthur Foundation and run in collaboration with our partner institutions from the OpenNet Initiative on Internet filtering, the project will explore the various technical, political, and social issues involved in Internet surveillance through its blog, An Eye on Surveillance, and through a series of upcoming research papers. As use of the Internet and other digital communication technologies have exploded over the past ten years, the accessibility of information has grown many times over. This increased access to information has been a source of individual empowerment in many, many ways.

The Internet facilitates participation in grassroots political campaigns, allows individuals to publish their writing (and music, video, and other media) to the world at virtually no cost, and puts vast stores of data instantly at the fingertips of billions of users. An Eye on Surveillance : from The Berkman Center for Internet & Society at Harvard University. On August 26, 2008, the Sunday Herald reported that a hacker had broken into the Best Western reservations system and stolen personal and financial data about eight million Best Western customers, including credit card numbers. According to the report, the thief had installed a virus on the machine of an employee of a local hotel and used that virus to log the employee’s username and password for the hotel system.

With that login information, the thief had simply and quickly mined the hotel reservation system for all the information about all of Best Western’s customers. The original report quoted a security expert in exclaiming that “there’s enough data there to spark a major European crime wave.” Accustomed to a string of announcements about large scale data breaches, news media and blogs across the Internet amplified the report. Almost immediately the CIO of Best Western posted a comment on the Sunday Herald story’s web page asserting that “This story is grossly unsubstantiated! Herdict Blog » Blog Archive » Resources for Online Anonymity, Encryption, and Privacy.

There are many tools available to help Internet users reach the content they seek more securely, safely, anonymously, and reliably. But the thicket of acronyms and technological terms can be intimidating to many people. What’s a VPN? How is that different than a proxy? Does “private browsing” stop my ISP from looking at my data? The complexity can cause people to throw up their hands and do nothing. We put together this primer because inaction born out of confusion is the worst outcome.

Below we will map out the basics of several options available to users—including proxies, VPNs, and Tor—as well as future emerging technologies like Telex. “Private Browsing” Mode in Web Browsers How It Works: All of the major web browsers offer a “Private Browsing” function. Limitations: People mistakenly believe that “private browsing” anonymizes them to the websites they visit and makes their communications private. Resources: Secure Browsing (through HTTPS) Circumvention & Anonymity Proxy Servers VPNs Tor.

Privacy - Internet Law Program 2011. Overview Wednesday, 4:00-5:30pmFormat: Lecture, featuring guest respondentsLeads: Phil Malone, with Herbert Burkert and John PalfreyParticipants: Urs Gasser, Charlie Nesson, and others This pillar topic, led by Phil Malone and featuring Herbert Burkert and John Palfrey, will cover a mixture of privacy history, theory, black letter law, regulatory developments and current controversies. Herbert Burkert will offer a multinational perspective of privacy law and policy, outlining the emergence of data protection law in Europe. Against this backdrop, recent global privacy developments, comparative EU vs. Required Readings Overview Hyperpublic Symposium 2011: Urs Gasser’s Opening Remarks, June 10, 2011.

Behavioral Targeting/Do Not Track “Researchers Expose Cunning Online Tracking Service That Can’t Be Dodged,” Wired epicenter blog, July 29, 2011. Facial Recognition Right to Be Forgotten Suzanne Daley, “On Its Own, Europe Backs Web Privacy Fights,” New York Times, August 8, 2011. Location Privacy. Events - Programs - Privacy Conferences. Guardian Activate Summit 2012: New York | Activate.

FTC Fair Information Practice. The United States Federal Trade Commission's Fair Information Practice Principles (FIPPs) are guidelines that represent widely accepted concepts concerning fair information practice in an electronic marketplace.[1] Introduction[edit] FTC Fair Information Practice Principles are the result of the Commission's inquiry into the manner in which online entities collect and use personal information and safeguards to assure that practice is fair and provides adequate information privacy protection.

The FTC has been studying online privacy issues since 1995, and in its 1998 report,[2] the Commission described the widely accepted Fair Information Practice Principles of Notice, Choice, Access, and Security.[1] The Commission also identified Enforcement, the use of a reliable mechanism to provide sanctions for noncompliance as a critical component of any governmental or self-regulatory program to protect online privacy.[1] History and development[edit] Principles[edit] 1. 2. 2-1. 3. 4. 5. Unbiased, data-driven ratings of the best restaurants, bars, spas, businesses. Backupify | Gmail Backup, Google Apps Backup, Backup and Restore for Web Application Data.

5 Predictions for Online Data In 2011. Factual | Home. Big Data Infrastructure Made Simple | Infochimps. Gnip Provides Social Media Data for the Enterprise. Information: Strata Online Conference April 2011 - O'Reilly Conferences, April 06. Christopher Soghoian. The convergence of Google, government and privacy. Scott Adams Blog: Noprivacyville 03/15/2011. The convergence of biometrics, location and surveillance. Device Identification for Advertising, Data, and Fraud. Collusion — mozilla.org. Protect Our Privacy. Www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf. La vie privée en contexte ou la vertu de la réciprocité. Personal Information Exposed Via Biggest U.S. Websites - Protect Your Privacy.

Google Tracked iPhones, Bypassing Apple Browser Privacy Settings. What They Know. What They Know About You - Personal Information Tracked Online. Analyzing What You Have Typed - Digits. Glossary - Online Privacy, Web Tracking & Information Security. Réinventer la libre circulation des données personnelles (2/3) : Lesquelles. TACO Opt-out. Singly. Home - Personal. Search engines remain popular—and users are more satisfied than ever with the quality of search results—but many are anxious about the collection of personal information by search engines and other websites.

Study on monetising privacy. An economic model for pricing personal information. Our Service. Time to pay for privacy? - Identity, Privacy and Trust. The Data Bubble. Nous faudra-t-il payer pour préserver notre vie privée. Consumer Privacy Project (CPP) WhatApp?