June 29, 2005

Berkman Luncheon Series: "Public Spaces/Public Spheres"

Yesterday took place the Conference "Public Spaces/ Public Spheres " in the Berkman Center, Harvard Law School by Martin Zogran, who is Assistant Professor of Urban Design in the Harvard University Graduate School of Design and spoke to the Berkman Community about the history of the commons and public space (primarily in the context of the urban environment). Before joining the GSD faculty full-time in 2004, Zogran was an urban designer and architect with the Cambridge firm Chan Krieger & Associates, and a design critic at the GSD, teaching in the urban design core studio and offering seminars in urban theory. At Chan Krieger he managed urban design and planning projects for the cities of Louisville, Washington DC, Davenport, and New York, working on long-term development plans, streetscapes, and public space design.

To get a better sense of Zogran's work, please check out Zogran's H2O playlist. Harvard Law School's Berkman Center for Internet & Society has developed H2O playlists -- a new tool for finding academic content through people you trust. In music, the playlist lets everyone share their expertise with friends and networks online. At the Berkman Center, we are extending this communal mapping of music to the world of information and educational resources.

June 28, 2005

El DNI electrónico no puede incluir datos de carácter personal ajenos a la identificación

Noticia publicada en Consumer.es EROSKI 28 Junio de 2005.

Ante iniciativas como la de integrar el permiso de conducir por puntos en el futuro DNI electrónico, medida aprobada la semana pasada en el Senado "cuando sea posible", la Comisión de Libertades Informáticas (CLI) ha señalado que el futuro DNI electrónico no puede incluir datos de carácter personal ajenos a la identificación.

La CLI expresa su preocupación ante el hecho de que el texto que desarrolle el proyecto de DNI electrónico pueda vulnerar derechos fundamentales, como el derecho a la intimidad y a la protección de los datos personales en el ámbito de las administraciones públicas.

Según este organismo, que integra a asociaciones de usuarios, empresarios y sindicatos, se pretende concentrar en el DNI electrónico la mayor cantidad de datos posible, lo que puede derivar, por ejemplo, en la inclusión de datos de salud en una tarjeta electrónica, cuya única finalidad es la identificativa. "Esta estrategia de concentrar cuántos más datos mejor, no está sujeta a la normativa vigente, salvo que se respaldara con la acreditación de un consentimiento individual, informado y expreso", advierte.

Por ello, solicita al Congreso de los Diputados que no ratifique esta iniciativa "pues existen indicios de que pueden quedar vulnerados tanto la Jurisprudencia del Tribunal Constitucional como de la Audiencia Nacional" en lo que respecta al principio de que los datos de carácter personal objeto de tratamiento "no podrán usarse para finalidades distintas de aquellas para las que hubieran sido recogidos, ni podrán tratarse posteriormente de manera incompatible con dichos fines

June 27, 2005

Babble: the voice privacy device

Babble is a device who provides voice confidentiality at your desk, offering security for spoken information as well as reduced distraction.

In some office enviroments, the human voice can be understood from a distance of up to 50 feet.

Babble can be used as a stand-alone solution or as part of a layered approach to sound management. In a layered application, it complements other sound solutions to fit the needs of groups and individuals within their workspaces.

Babble requires standard office power and can plug into any outlet. The footprint is approximately the size of a tape dispenser and it is compatible with most office telephone systems.

By Sonare Technologies, a Herman Miller company.

June 24, 2005

Ponemon 2005 Benchmark Study of Data Privacy Practices

Ponemon 2005 Benchmark Study of Data Privacy Practices

Executive Panel :Larry Ponemon, Founder and Chairman, Ponemon Institute Janet Chapman, Chief Privacy Officer, Charles Schwab
Date: July 14 , 2005Time: 11:00 am PST; 2:00 pm EST



Free to all attendees: All attendees will receive a free copy of the Ponemon Institute's “2005 Benchmark Study of Corporate Privacy Practices” report.

Ponemon 2005 Data Privacy Benchmark Study Webcast: The security and privacy of customer, patient, employee data and intellectual property is critical for privacy and security teams. Join us in the only Webcast sharing the results of the Ponemon Institute's “2005 Benchmark Study of Corporate Data Privacy Practices.” This study surveyed Privacy Executives on privacy and security issues, as well as, trends including roles and responsibilities, technology, training, performance metrics and much more.

In this Webcast, you will learn about the 2005 Study results:
> The evolving relationship between the CPO and information security.
> What are the top technologies for enabling data privacy and security?
> Privacy training and best practices. What's working and what's not?

For more information, visit www.vontu.com/news/events.asp

June 23, 2005

Information Assurance Advisory Council

The Information Assurance Advisory Council (IAAC) is a unique partnership that brings together corporate leaders, public policy makers, law enforcement and the research community to address the challenges of information infrastructure protection.

They are engaged in the development of policy recommendations to government and corporate leaders at the highest levels. Their recommendations are influential because IAAC's Sponsors and Members comprise leading commercial end-users, government policy makers and the research community.

At the end of 2002, IAAC introduced the idea of Cyber Hood Watch with a view to empowering the digital citizen. Awareness would be raised and citizens would recognise their responsibility for protecting themselves and become more risk-aware and literate. It envisages a nation-wide network of community groups that collect, disseminate and share information and advice about information security incidents.


Presentation on Cyberhoodwatch: Empowering the Digital Citizen
Neil Robinson

Summary of the Cyberhoodwatch Concept
Neil Robinson Download

June 22, 2005

World e-ID 2005

World e-ID (previously named "eGovernment & SmartCard International Meeting"), is organized by the main pan-european e-government association "eForum" (+ Strategies Telecoms & Multimedia) and endorsed by representative organizations and consortiums.

It is co-located with the "eSmart" conference (September 21, 22 & 23, 2005 on the French Riviera).

Programme:


DAY 1Sept. 21

WORLD & REGIONAL STRATEGIES
OPENING SESSION WORLD & REGIONALSTRATEGIES
Transversal Common Panel "Emergence of Systems Integrators in SC and e-ID"

DAY 2Sept. 22

APPLICATIONS & E-PASSPORTS
NATIONAL IMPLEMENTATIONS & BUSINESS MODELS

DAY 3Sept. 23

BIOMETRICS
ARCHITECTURES & STANDARDISATION

This is the Biometrics Program



Biometrics offer increased security and convenience for the end-user. The
session also addresses the future of biometrics. Will DNA become the one and
only system, and when may we expect DNA and other biometric technologies to be
part of our daily life scenario's ? When and how to implement, the impact of
border control, new technologies



• The biometrics work in Governmental applications
Marcel Boogaart, Director - HSB Cards & Cards Systems

• Stop! We know who you are
Paul McKeown, Emea Customs, Ports and Border Management , IBM BCS

• Intelligent Enrollment for ICAO Compliance
Michal Shai - Director of Marketing - Metaform

• DNA: Future Biometric Identifier
Dr Sabine. Delaitte ICT Unit, IPTS, European Commission DG JRC
Ioannis Maghiros- European Commission DG, Joint Research Centre, Institute for Prospective Technological Studies

Biometric Identification in 2015: a scenario exercise
Yves Punie, Elsa Lignos, Ioannis Maghiros, - ITPS European Commission DG JRC

eBorders: The Biometrics Perspective
Cyril Dujardin, Product Manager, Government Solutions Business Unit, Security Division - Sagem

June 21, 2005

CEN: Data Protection & Privacy Audit tools

CEN is the European Committee for Standardization, was founded in 1961 by the national standards bodies in the European Economic Community and EFTA countries.

Now CEN is contributing to the objectives of the European Union and European Economic Area with voluntary technical standards which promote free trade, the safety of workers and consumers, interoperability of networks, environmental protection, exploitation of research and development programmes, and public procurement.

One of these aresas is ISSS (Information Society Standardization System), and you can find CEN Workshop Agreements (CWAs), consensus-based specifications, drawn up in an open Workshop environment.

CWAs are CEN publications.

Copies can be obtained from the CEN Member Organizations.
In addition,
the CEN Members have agreed that certain CWAs may be provided on this web-site
for electronic downloading free of charge. The CWAs concerned are produced
by Workshops whose participants have concluded a special arrangement, or they
relate to the eEurope standardization effort. Other CWAs may be purchased
from a CEN Member.
CWAs are CEN copyright. Those made available for
downloading are provided on the condition that they may not be modified,
re-distributed, sold or repackaged in any form without the prior consent of CEN,
and are only for the use of the person downloading them. For additional
copyright information, please refer to the statements on the cover pages of the
CWAs concerned.

CWA 15262Inventory of Data Protection Auditing Practices


CWA 15263Analysis of Privacy Protection Technologies, Privacy- EnhancingTechnologies (PET), Privacy Management Systems (PMS) andIdentity Management systems (IMS), the Drivers thereof and theneed for standardization


CWA 15292 Standard form contract to assist compliance with obligations imposed by article 17 of the Data Protection Directive 95/46/EC (and implementation guide)

June 20, 2005

Google Library Project & Privacy Concerns

Privacy issues with Google library
Published: June 17, 2005,
By Elinor Mills Staff Writer, CNET News.com

A contract between Google and the University of Michigan released publicly on Friday contains no provisions for protecting the privacy of people who will eventually be able to search the school's vast library collection over the Internet.

Google announced plans late last year to digitize and index as many as 7 million volumes of material from the University of Michigan to make them searchable on the Internet as part of its Google Print service, a searchable index of books. Google also has agreements with Harvard, Oxford, the New York Public Library and Stanford, where Google co-founders Sergey Brin and Larry Page began their search work before launching their company in 1998.

While the library projects have prompted copyright concerns from university groups and publishers, privacy issues are the latest wrinkle in Google's plans to expand the universe of Web-searchable data.

"I would have hoped that the University of Michigan would be sensitive to the fact that Google tracks everything that everyone searches," said Daniel Brandt, founder of the Google-watch.org Web site, which is highly critical of the search company's policies.

A Google spokesman was not available to respond directly to that comment late Friday, but said earlier that Google Print does not require users to share any personally identifiable information.

Full paper in: News.com

June 16, 2005

La protección jurídica de los datos biomédicos

La protección jurídica de los datos biomédicos
Artículo publicado en la web de Madri+d, por el profesor Narciso Martínez Morán de la Facultad de Derecho. Departamento Filosofía Jurídica. Universidad Nacional de Educacióna Distancia (UNED)

La importancia que tienen los derechos de las personas en cuanto enfermos potenciales ha hecho que, ya desde hace décadas, diferentes organizaciones como Naciones Unidas, UNESCO, Organización Mundial de la Salud, la Unión Europea o el Consejo de Europa, así como muchos Estados Nacionales hayan promulgado normas jurídicas relacionadas con los problemas clínico-asistenciales para proteger los derechos de los pacientes.

PACTOS Y CONVENIOS INTERNACIONALESSi la declaración Universal de Derechos Humanos ha sido un punto de referencia obligado para todos los Pactos, Convenios y Constituciones en todo lo relativo a Derechos Humanos, en el ámbito estricto sanitario el punto de referencia lo encontramos en la Declaración sobre los Derechos de los Pacientes en Europa, promovida el año 1994 por la Oficina Regional para Europa de la Organización Mundial de la Salud, sin olvidar la existencia de múltiples declaraciones internacionales, que han insertado referencias, más o menos explícitas, a la protección de los derechos de los pacientes. Uno de los textos más recientes que toma conciencia de la importancia que tiene la privacidad de los datos personales en el ámbito de la medicina y de la necesidad de su protección es la Recomendación del Consejo de Europa (13 de febrero de 1997) relativa a la Protección de los Datos Médicos.Pero debemos resaltar entre los textos jurídicos internacionales más importantes el Convenio para la protección de los Derechos Humanos y de la Dignidad del ser humano respecto a las aplicaciones de la biología y de la medicina de 30 de abril de 1997 (Convenio de Asturias), el cual goza de gran trascendencia no sólo por la especialidad y exclusividad temática referida a la dignidad del ser humano con respecto a las aplicaciones de la biología y la medicina, sino porque, a diferencia de otras declaraciones precedentes, es el primer instrumento internacional con carácter jurídico vinculante para todos aquellos Estados que lo suscriban y lo ratifiquen. Entre las finalidades del Convenio se encuentra la de garantizar la dignidad humana y los derechos humanos en el ámbito de la biología y la medicina. Pero, al reconocer y garantizar los derechos de los pacientes, en él se resalta explícitamente la necesidad de reconocer y garantizar el derecho a la información, al consentimiento informado y el derecho a la intimidad relativa a la salud y los datos médicos de los pacientes.

Artículo completo en la web de madri+d

June 15, 2005

IBM Addresses RFID Privacy

IBM Addresses RFID Privacy published in Internetnews By Susan Kuchinskas

Radio frequency identification (RFID) technology promises to speed supply chain operations by automating the tracking of goods. But its potential to track people has privacy advocates crying foul.

IBM's privacy practice, launched on Tuesday, aims to help businesses avoid privacy fallout.

"RFID is a mechanism to capture information, so the issue becomes, 'What information are people capturing?'" said Cal Slemp, vice president of security and privacy services for IBM Global Services. "Are they sensitive to what they're capturing? Are they also sensitive to regulations around the world?"

IBM broadened its security practice to include privacy seven years ago; the company has a chief privacy officer and about 3,500 specialists in offices around the world. Practitioners provide information on local and international privacy laws, as well as the principles of the Organisation for Economic Co-operation and Development.

Now, the privacy practice specifically includes an RFID component, which is offered to customers as an option during RFID engagements.

IBM Global Services RFID clients don't see grave risks to privacy, Slemp said, but most are aware of the issues. Sometimes, organizations start gathering data through techniques like RFID, but they haven't thought of all the things they're capturing," Slemp said.

The privacy practice will help them plan and be conscious of the effects of tracking goods on those who ultimately buy those goods.

A privacy engagement might include assessment, design and implementation of RFID technology in a way that maximizes consumer privacy. Consultants also will help develop corporate policies and design principles for RFID, as well as communication, employee education and awareness programs.

Slemp said the RFID privacy issue is especially acute for global companies, because laws and standards differ from country to country

June 14, 2005

Conceptualizing Privacy by Daniel Solove

We have talked about the book The Digital Person by Prof. Daniel J. Solove, who is an associate professor of law at the George Washington University Law School.

I have found this paper by Solove "Conceptualizing Privacy" in SSRN (Social Science Research Network)

In this Article, Professor Solove develops a new approach for conceptualizing privacy. He begins by examining the existing discourse about conceptualizing privacy, exploring the conceptions of a wide array of jurists, legal scholars, philosophers, psychologists, and sociologists. Solove contends that the theories are too narrow or too broad. With a few exceptions, the discourse seeks to conceptualize privacy by isolating one or more common essential or core characteristics of privacy. Expounding upon Ludwig Wittgenstein's notion of family resemblance, Solove contends that privacy is better understood as drawing from a common pool of similar characteristics. Rather than search for an overarching concept, Solove advances a pragmatic approach to conceptualizing privacy.

June 13, 2005

Media Awareness Network - Réseau Éducation-médias

MNet is a Canadian non-profit organization that has been pioneering the development of media literacy programs since its incorporation in 1996. Working out of offices in Ottawa and Montreal, they promote media and Internet education by producing online programs and resources, working in partnership with Canadian and international organizations, and speaking to audiences across Canada and around the world.

For example this article "Food for thought" Have you ever wondered how they make food look so good in ads?

If we spend so many time watching TV, ads we need education. This web site is available in french

and what about privacy?

Mnet has a information privacy section, that explains how new technologies have created challenges for the protection of personal information, and provides an overview of the ways in which online marketing affects children's privacy. It also provides information about Canadian and international guidelines that address the collection, use and disclosure of personal information.

Why is Information Privacy an issue?

Privacy is a fundamental human right and a cornerstone of a democratic
society. It lies at the foundation of the rule of law, the secret ballot,
doctor-patient confidentiality, lawyer-client privilege, the notion of private
property, and the value our society places on the autonomy of the
individual.

A full web site with candian law (PIPEDA), reports Privacy
in Canada
, articles and links.

Information Privacy and Childrens

A amazing web site, A decouvrir absolument ¡¡¡¡

June 10, 2005

Ubiquitous Computing & Privacy

There is a fantastic course available at Open Course Ware, is Ambient Intelligence by Pr. Patricia Maes.

Course Topics

1 Introduction to Ambient Intelligence
2 Tangible and Ambient Interfaces
3 Interfaces with Common Sense
4 Software Agents and Intelligence Augmentation
5 Ubiquitous Computing
6 The Meaning of Things
7 Sensor Technologies
8 Augmented Reality/Mixed Realities
9 Intelligent Environments
10 Embedded Intelligence/Smart Objects
11 Pervasive Computing and Wearables
12 Location Based and Context-Aware Systems
13 Project Presentation

So if these the way Computing moves in the next 20 years what is going to be the role of privacy? There is this commentary in this report:

"Scenarios for Ambient Intelligence in 2010" By European Comisión,


A consistently strong response to AmI (Ambient Intelligence) is the need to
build trust and confidence. A key aspect is management of privacy: more open
systems tend to lower privacy levels. Technological developments are outpacing
regulatory adjustments. To what extent can people be protected in the AmI
landscape? What belief can we have that there will be effective norms of trust
(in business, government, inter-personal relations) that prevent
invasive/intrusive usage of AmI technologies.

June 09, 2005

Place Lab

Place Lab is software providing low-cost, developped by Intel Research Networks of Laboratories, easy-to-use device positioning for location-enhanced computing applications. Place Lab tries to provide positioning which works worldwide, both indoors and out (unlike GPS which only works outside). Place Lab clients can determine their location privately without constant interaction with a central service (unlike badge tracking or mobile phone location services where the service owns your location information).

The Place Lab approach is to allow commodity hardware clients like notebooks, PDAs and cell phones to locate themselves by listening for radio beacons such as 802.11 access points, GSM cell phone towers, and fixed Bluetooth devices that already exist in large numbers around us in the environment. These beacons all have unique or semi-unique IDs, for example, a MAC address. Clients compute their own location by hearing one or more IDs, looking up the associated beacons’ positions in a locally cached map, and estimating their own position referenced to the beacons’ positions.

There is a paper: Privacy and Security in the Location-enhanced World Wide Web.Jason Hong, Gaetano Borriello, James Landay, David McDonald, Bill Schilit and Doug Tygar.In Proceedings of Ubicomp 2003, Seattle, WA. October 2003.

June 08, 2005

ISTPA: Privacy Framework 1.1

The International Security, Trust, and Privacy Alliance (ISTPA) is a global alliance of companies, institutions and technology providers working together to clarify and resolve existing and evolving issues related to security, trust, and privacy. The ISTPA's focus is on the protection of personal information.


There is available Privacy Framework 1.1 a proactive tool wich is able to support businesses in developing and managing their own privacy policies, even in the absence of law regulation.

ISTPA Members:

AMD
Carnegie Mellon University
Computer Associates
Cordance Corporation
CYVA Research Corporation
EWA Information & Infrastructure Technologies, Inc.
Gemplus
Government of Alberta, Office of the CIO
GSR Strategic Consulting
Harry Lewis, Esq.
HiSoftware Company
Iain Henderson
IBM
International Systems Security Engineering Association
Johns Hopkins University
Kendall Scott
Motorola
NCR
Potter Group
Seagate Technology
TRUSTe
Vanguard Integrity Professionals
Wave Systems Corporation

June 07, 2005

Top High-tech Firms Rank Poorly on Online Customer Privacy and Responsiveness, Says The Customer Respect Group

Top High-tech Firms Rank Poorly on Online Customer Privacy and Responsiveness, Says The Customer Respect Group

The Customer Respect Group - June 6, 2005

The Customer Respect Group released its second quarter 2005 Online Customer Respect Study on the largest high technology companies. The study found that 27 percent of all online inquiries were ignored, and only 20 percent received responses within one day that were considered helpful. Overall, HP and Xerox scored highest, garnering "excellent" ratings, while Toshiba and Siebel Systems scored lowest.

“We were pleased to see an overall increase in the industry’s CRI scores since the last report,” said Terry Golesworthy, president of The Customer Respect Group. “But we continue to be concerned that the high-tech industry, which we believe has the know-how to do even better, hasn’t yet found the will. The gap between firms at the top and the bottom -- especially in the area of Privacy and Responsiveness -- is increasing, which implies that while some companies see the commercial value in respecting the customer and investing accordingly, others are being left behind, which may negatively affect their brand and company reputations.”


Summary results

Two Web sites received “excellent” CRI scores (8.0 and above), including HP and Xerox. Across more than 1,000 Web sites measured in the last 12 months, just three percent qualify for this rating.

At the other end of the table, two Web sites were rated “poor,” (4.0 and below) including Toshiba and Siebel Systems.

Privacy

The Customer Respect Group sees an overall improvement in the category of Privacy, however most of this improvement can be attributed to significant improvements among the top ranked companies:

Some 10 firms now score “excellent” for Privacy, up from six in the last report. Leading the pack in Privacy are IBM, HP and Veritas.

At the bottom of the Privacy index was Siebel.

Despite the improvements in Privacy, scores and practices continue to be inconsistent.
The industry scored only about average compared with all other industries surveyed in the sharing data of personal data with third parties. Nearly one-third of firms are unclear or share data with third parties.

June 06, 2005

Tasmania's new Smart Card causes privacy concerns

Published by Tim Jeanes in The World Today - Monday, 6 June , 2005.

ELEANOR HALL: A potential lifesaver or an Orwellian tool of Government?That's the core of a debate emerging over a new Smart Card being offered to Tasmanians swapping over their Medicare cards from today. The new cards can be used to gain access to a patient's medical history, an important new medical tool according to proponents, but civil libertarians aren't so sure.In Hobart, Tim Jeanes reports.

TIM JEANES: On the streets of Hobart this morning, the issue was generating a wide range of opinions.

VOX POP 1: I think it's a good thing. I think it's important that people have all that information at their fingertips in case of an emergency.

TIM JEANES: So you wouldn’t have any privacy concerns?

VOX POP 1: No, not at all.

VOX POP 2: I don't think that's good actually. There's people out there that you don't want people to know their business.

VOX POP 3: That's how society's going – identification and personal information's going to be available, it's happening now, and I think it's probably inevitable. Personally, yeah, I'd give it a go, yeah. I think it'd be okay.

TIM JEANES: That option is now a reality as of today, for any Tasmanian whose Medicare card expires. It's part of a widening trial with the new card containing a digital chip instead of a magnetic strip.The card doesn't store information, instead it provides access to patient information stored elsewhere. It's this aspect of the trial which civil libertarians say could be open to abuse.Greg Taylor is the Chair of Electronic Frontiers Australia.

GREG TAYLOR: These things have the potential to become a Big Brother tool in which your entire life history is recorded in one place and available to those who wish to utilise that information.

TIM JEANES: But what if it could genuinely save lives?

GREG TAYLOR: Well, that remains to be seen. We don't have an objection to the card per se, but we believe that there should be protections built in so that future uses of the card for purposes other than it was originally designed should be subject to very careful scrutiny.

TIM JEANES: Some opponents of the card are comparing it with the controversial Australia Card proposal of the 1980s, which sparked mass rallies around Australia. It's a suggestion rejected out of hand by Special Minister of State, Tasmanian Senator Eric Abetz.

ERIC ABETZ: This Medicare Smart Card is nothing like an Australia card. As technology develops, we as a government, I think, have a responsibility to see how we can deliver for the benefit of our citizens.

TIM JEANES: Senator Abetz says the practical applications of the card will be a big step forward for doctors and their patients.

ERIC ABETZ: A good example might be retirees travelling in their caravan in Queensland, one of the retirees gets a bad cut, goes to a doctor and the doctor wants to know when did you last have a tetanus booster. The important thing is to ensure that the only people that have access to your medical records are people that you personally authorise. As is the case now with physical records, as is the case now with electronic records, all that the card would be is basically a card that would access information for you.

LEANOR HALL: Special Minister of State Eric Abetz ending that report from Tim Jeanes.

June 03, 2005

Consumers Vulnerable to Profiling, Price Discrimination

Published in Epic news.

A new report released by the Annenberg Public Policy Center shows thatconsumers are largely unaware of how their personal information is usedby businesses, and they object to behavioral profiling, pricediscrimination, and the purchase of their personal information fromdatabase companies. The report also found that the respondentsincorrectly believe that "laws prevent online and offline stores fromselling their personal information," and that "stores cannot charge themdifferent prices based on what they know about them."

The report isbased on a phone survey of 1,500 Internet-using adults. It focuses ontwo trends that are driven by the collection of personal information:behavioral targeting, where individuals are presented different productsbased on their shopping habits; and price discrimination, whereindividuals are charged differently based on what the business knowsabout consumers.Using "first degree" price discrimination, a company can determine themaximum that an individual is willing to pay for a product, and engagein "dynamic" pricing. This enables sellers to hawk the same products atthe same time to different people at different prices. Dynamic pricingis even easier to employ in an online environment, where users aretracked by registration data and cookies.

June 02, 2005

Privacy2000.org

The Privacy2000 website is home to comprehensive information about the nationally renowned Privacy2000 conference series. In addition, the site provides links to the latest national and international news on privacy & security issues, and a headline archive that dates back to 2000.

Finally, the Privacy2000 website houses the Presidential Privacy Archives, a repository of electronic materials related to privacy, security, and encryption from the White House and other executive agencies dating from 1996 through the present.

Privacy2000 is brought to you by the Technology Policy Group (TPG) part of the Fisher College of Business at The Ohio State .

June 01, 2005

Freedom is slavery

Freedom is slavery is a website about freedom and technlogy, and as we can read in its manifesto.

This is an independent website, the work of one individual citizen and not affiliated with any political party or movement. This site is PRO: God, freedom, free thought, free expression, human rights and the individual. This site is ANTI: war, big government, big brother, police state, censorship and the right wing


They have a full list of links, such as 1984's novel by George Orwell.

Privacy saved my life

Blog Archive

Labels

Contact Me

Creative Commons License
Esta obra está bajo una licencia de Creative Commons.