April 28, 2006

Identification cards & RFID



Electronic Frontier Foundation (EFF) presents California Action Alert

Californians: Keep Privacy-Leaking Chips out of State ID!

"Governments across the world are considering placing RFID (Radio Frequency Identification)tags into state-provided cards. Without careful safeguards, these tagged cards can broadcast your personal information to anyone nearby with cheap, readily-available equipment. Your government could be exposing you to the risk of covert tracking, stalking and identity theft." Source EFF

April 27, 2006

Perspectives for 2006 by European Data Protection Supervisor


Perspectives for 2006 on privacy and data protection issues by the European data protection supervisor / Contrôleur européen de la protection des données.

New technological developments

1. RFID a promising and challenged technology

In 2005, the EDPS contributed to the Article 29 Working Party activities in the field of RFID

2. Ambient intelligence merging environment

The emerging information society is being built on an "Internet of things", establishing bridges between the digital world and the real world.

3. Identity management systems

Identity management systems are considered to be the key elements of emerging e-government services.

4. The biometric age

Second Generation Schengen Information System (SIS II)

proposed the Prüm Convention (sometimes called "Schengen III")

Source Annual Report 2005

Source Rapport Annuel 2005

April 26, 2006

Unisys report


Unisys publishes the first worldwide survey on biometrics and trust, the research is part of a broader analysis of identity authentication that Unisys will spearhead at the upcoming 15th World Congress on Information Technology (WCIT 2006).

People around the world are willing to share personal data for identity verification if they perceive they are gaining real value in return (e.g., additional convenience and security) Source Unisys

April 24, 2006

Privacy under pressure

"Privacy under pressure" (mp4 format) is a webcast by James Rule in a seminar held last 10 Febrery at Oxford Internet Institute.

James Rule is professor of Sociology at the State University of New York at Stony Brook.

Is it reasonable to seek meaningful limits on institutions accumulation and use of data on ourselves?
And if so, what principle or strategy could one put forward to draw the line between acceptable and unacceptable uses of personal data?


Papers by James Rule:

Computing and Social Change: Employment and Efficiency

Books by James Rule:

Theory and Progress in Social Science

April 21, 2006

April 20, 2006

10.000 processors

Article published at Digital-Lifestyles.info by Guy Kewney


'In the near future, you will have 10,000 computers': BT Futurologist

The quote isn't quite accurate, but it makes the point. The words are (nearly) of chose of BT's internal "tame futurologist" Graham Whitehead; and what he actually said was that you will be associated with 10,000 processors.


Full article

April 19, 2006

Image Source: Social Network at wikipedia


Social Networks

Business week publishes this article about Social Networks: Social Networkings Golden Rush

And this book, The Weath of Networks, by Yochai Benkler is out. The book can be downloaded as a pdf for free under a Creative Commons license.

April 18, 2006



Image source: Art Favor

Openness and privacy: No-tell government

Article published in Democrat and Chronicle

Secrecy is as much a part of state Capitol furnishings as the oil paintings
hanging along the long hallways

April 12, 2006

Voice authentication



Technology Review publishs an article Say Hello to Voiceprinting about voice authetication and Voice Vault, the world leader in biometric voice verification.

April 11, 2006

Protect your privacy

Protect your privacy

It is an article published

By Daniel Tynan, PC World.com

By the Book: This article is an excerpt from Computer Privacy Annoyances, by Dan Tynan (copyright 2005; reprinted by permission of O’Reilly Media).

April 07, 2006

RFID & Privacy website


MIT (Massachusetts Institute of Technology ) and HID Global, a leading supplier and manufacturer in the access control industry, create a educational Website RFID PRIVACY at rfidprivacy.mit.edu/access.

Email news alert

April 06, 2006

AudioBerkman



AudioBerkman is a production of the Berkman Center for Internet and Society, is an initiative to let you overhear what leading experts, industry executives, and Internet users have to say about some of the hottest subjects in cyberlaw, technology, Internet politics, new technologies, social networks...
There a lot of Podcast availables, one of them:

April 05, 2006

RFID Essentials

RFID Essentials a book by

Bill Glover has been writing software since 1981 and has worked as a programmer, lead developer or architect on systems of all sizes, from small automated systems controlling dams and feedmills up to a complete redesign and reimplementation of one of the world's busiest travel websites

Himanshu Bhatt heads the U.S. RFID Practice and Software Technology Lab for Sun Microsystems, Inc


Sample Chapter at Oreilly
Chapter 1: An Introduction to RFID

book review

April 04, 2006

3L Epiphany: a taxonomy of legal blogs


Ian Best is a third-year law student at Ohio State University.

He has just completed a taxonomy of American and Canadian legal blogs.

Ian first became interested in the technology while working as a research assistant for one of Moritz Law's most prolific bloggers, Professor Douglas Berman.

So you can see a compilation of blogs categorized by legal speciality, legal event, author, topics . . . .

For example on privacy issues:

  1. The Canadian Privacy Law Blog
  2. EPIC West: Electronic Privacy Information Center West Coast Office
  3. Privacy and Security Law Blog
  4. UnivAtty
Technology and the law


Article about Ian Best

April 01, 2006

Privacy saved my life

Labels

Contact Me

Creative Commons License
Esta obra está bajo una licencia de Creative Commons.