Data protection
Information privacy, or data privacy (or data protection), is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political ...
All the Ways Your Wi-Fi Router Can Spy on You
It can even be trained to read your lips.
Google Can Now Tell You When And Where You Were Mentioned Online
The company's new Stay In The Loop feature does just that. If you weren’t scared that Google knows too much about you, here’s yet another reason to be so. The company’s new ‘Stay In the Loop’ feature ...
Americans Are Getting Freaked Out About Doing Stuff on the Internet
If you've started to think twice about what you type into a search engine or whether you should hit that Wi-Fi hotspot, you're not alone. Literally.
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Paris Attack Could Renew Debate Over Encrypted Messaging Apps
The deadly terror attack in Paris could reignite the debate over whether the government should have a 'back door' to access encrypted communications. Law enforcement officials and cyberexperts have po...
Internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Interne...
Internet privacy - Wikipedia
Medical privacy
Medical privacy or health privacy is the practice of keeping information about a patient confidential. This involves both conversational discretion on the part of health care providers, and the securi...
Medical privacy - Wikipedia
Financial privacy
Financial Privacy is a blanket term for a multitude of privacy issues:Debates on the first sense of the phrase have many different points of view, from crypto anarchists who want to create a completel...
Political privacy
Political privacy has been a concern since voting systems emerged in ancient times. The secret ballot is the simplest and most widespread measure to ensure that political views are not known to anyon...
Information privacy law
Information privacy or data protection laws prohibit the disclosure or misuse of information held on private individuals. Over 80 countries and independent territories have now adopted comprehensive d...
All the Ways Your Wi-Fi Router Can Spy on You
It can even be trained to read your lips.
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
De-identification
De-identification is the process used to prevent a person’s identity from being connected with information. Common uses of de-identification include human subject research for the sake of privacy for ...
EU Open Data Portal
The EU Open Data Portal is the single point of access to a wide range of data held by EU institutions, agencies and other bodies. The portal is a key element of EU open data strategy.
Launched in ...
EU Open Data Portal - Wikipedia
CTERA Networks
CTERA Networks is a cloud storage and data protection hardware and software company that specializes in cloud storage gateways, which are integrated with a datacenter or cloud-side service delivery pl...
CTERA Networks - Wikipedia
Information privacy
Information privacy, or data privacy (or data protection), is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political ...
Asigra
Asigra Inc. is a company that produces a cloud backup and recovery software platform known as Asigra Cloud Backup. The company is privately held and is headquartered in Toronto, Canada.
The compan...
Privacy laws of the United States
The privacy laws of the United States embody several different legal concepts. One is the invasion of privacy, a tort based in common law allowing an aggrieved party to bring a lawsuit against an indi...
Privacy law
Privacy law refers to the laws which deal with the regulation of personal information about individuals which can be collected by governments and other public as well as private organizations and its ...
Privacy for research participants
Privacy for research participants is a concept in research ethics which states that a person in human subject research has a right to privacy when participating in research. Some examples of typical s...
Safe harbor arrangement
US-EU Safe Harbor is a streamlined process for US companies to comply with the EU Directive 95/46/EC on the protection of personal data.Intended for organizations within the EU or US that store custom...
Cloud storage gateway
A cloud storage gateway is a network appliance or server which resides at the customer premises and translates cloud storage APIs such as SOAP or REST to block-based storage protocols such as iSCSI or...