Main

  • Privacy

    Privacy

    • This piglix contains articles or sub-piglix about Privacy

    • Privacy activists

    • This piglix contains articles or sub-piglix about Privacy activists


      Wikipedia
    • Anonymity

    • This piglix contains articles or sub-piglix about Anonymity


      Wikipedia
    • Privacy awards

    • This piglix contains articles or sub-piglix about Privacy awards


      Wikipedia
    • Biometrics

    • This piglix contains articles or sub-piglix about Biometrics


      Wikipedia
    • Privacy controversies and disputes

    • This piglix contains articles or sub-piglix about Privacy controversies and disputes


      Wikipedia
    • Data retention

    • This piglix contains articles or sub-piglix about Data retention


      Wikipedia
    • Information privacy

    • This piglix contains articles or sub-piglix about Information privacy


      Wikipedia
    • Privacy organizations

    • This piglix contains articles or sub-piglix about Privacy organizations


      Wikipedia
    • Privacy by country

    • This piglix contains articles or sub-piglix about Privacy by country


      Wikipedia
    • Privacy law

    • This piglix contains articles or sub-piglix about Privacy law


      Wikipedia
    • Privacy of telecommunications

    • This piglix contains articles or sub-piglix about Privacy of telecommunications


      Wikipedia
    • Public records

    • This piglix contains articles or sub-piglix about Public records


      Wikipedia
    • Secrecy

    • This piglix contains articles or sub-piglix about Secrecy


      Wikipedia
    • Surveillance

    • This piglix contains articles or sub-piglix about Surveillance


      Wikipedia
    • Works about privacy

    • This piglix contains articles or sub-piglix about Works about privacy


      Wikipedia
    • Privacy

    • Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person, it usually ... Read »


      Wikipedia
    • Address confidentiality program

    • An address confidentiality program allows victims of domestic violence, sexual assault, stalking or other types of crime to receive mail at a confidential address, while keeping their actual address undisclosed. This is usually done through the state's Secretary of State’s address or some other address which will ... Read »


      Wikipedia
    • Attorney–client privilege


    • Bank secrecy

    • Bank secrecy (or bank privacy) is a legal requirement in some jurisdictions which prohibits banks providing to authorities personal and account information about their customers, except in certain conditions, such as if a criminal complaint has been filed. In some cases, additional privacy is provided to beneficial own ... Read »


      Wikipedia
    • Banking in Switzerland

    • Banking in Switzerland is regulated by the Swiss Financial Market Supervisory Authority (FINMA), which derives its authority from a series of federal statutes. The country's tradition of bank secrecy, which dates to the Middle Ages, was first codified in the Federal Act on Banks and Savings Banks, colloquially known as ... Read »


      Wikipedia
    • Bulk personal datasets

    • "Bulk personal datasets" is the UK government's euphemism for datasets containing personally identifiable information on a large number of individuals, as part of mass surveillance in the United Kingdom and on citizens around the world. The term was first used publicly in March 2015 by the Intelligence and Security Co ... Read »


      Wikipedia
    • Cabinet noir

    • Cabinet noir (French for "black room") was the name given in France to the office where the letters of suspected persons were opened and read by public officials before being forwarded to their destination. However, this had to be done with some sophistication, as it was considered undesirable that the subjects of the ... Read »


      Wikipedia
    • COBIT

    • COBIT (Control Objectives for Information and Related Technologies) is a good-practice framework created by international professional association ISACA for information technology (IT) management and IT governance. COBIT provides an implementable "set of controls over information technology and organizes them around a ... Read »


      Wikipedia
    • Communication privacy management theory

    • Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory designed to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information. CPM theory suggests that individuals maintain and coordi ... Read »


      Wikipedia
    • Cone of Silence (device)

    • The Cone of Silence is one of many recurring joke devices from Get Smart, an American comedy television series of the 1960s about an inept spy. The essence of the joke is that the apparatus, designed for secret conversations, makes it impossible for those inside the device - and easy for those outside the device - to h ... Read »


      Wikipedia
    • Consumer privacy

    • External image

      Consumer privacy is the use of laws and regulations to protect individuals from privacy loss due to the failures and limitations of corporate customer privacy measures. The damage done by privacy loss is not measurable, nor can it be undone, and commercial organizations have little or no interest in taking unprofitable ... Read »


      Wikipedia
    • Data Privacy Day

    • Data Privacy Day (known in Europe as Data Protection Day) is an international holiday that occurs every 28 January. The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, India and 47 European countries. Data ... Read »


      Wikipedia
    • Data Privacy Lab

    • Data Privacy Lab is a program dedicated to teaching and research in all areas related to privacy technology. The Data Privacy Lab in Harvard University is operating in the Institute for Quantitative Social Science (IQSS). Latanya Sweeney founded the Lab and continues as its Director. The program was first started in 20 ... Read »


      Wikipedia
    • Datafly algorithm

    • Datafly algorithm is an algorithm for providing anonymity in medical data. The algorithm was developed by Latanya Arvette Sweeney in 1997−98. Anonymization is achieved by automatically generalizing, substituting, inserting, and removing information as appropriate without losing many of the details found within the ... Read »


      Wikipedia
    • De-anonymization

    • De-anonymization (also spelt as deanonymization) is a strategy in data mining in which anonymous data is cross-referenced with other sources of data to re-identify the anonymous data source. The term became popular in 2006 when Arvind Narayanan and Vitaly Shmatikov entered a contest hosted by Netflix, and applied their ... Read »


      Wikipedia
    • Digital privacy

    • Digital privacy is a trending social concern. For example, the TED talk by Eric Berlow and Sean Gourley subsequent to the 2013 mass surveillance disclosures casted a shadow over the privacy of cloud storage and social media. While digital privacy is concerned with the privacy of digital information in general, in many ... Read »


      Wikipedia
    • Digital self-defense

    • Digital self-defense is the use of self-defense strategies by Internet users to ensure digital security; that is to say, the protection of confidential personal electronic information.Internet security software provides initial protection by setting up a firewall, as well as scanning computers for malware, viruses, Tro ... Read »


      Wikipedia
    • DNA database

    • A DNA database or DNA databank is a database of DNA profiles. A DNA database can be used in the analysis of genetic diseases, genetic fingerprinting for criminology, or genetic genealogy. DNA databases may be public or private, but the largest ones are national DNA databases. When a match is made from a national DNA d ... Read »


      Wikipedia
    • Door hanger

    • A door hanger (also spelled doorhanger or door-hanger) is a plastic or cardboard sign, generally rectangular in shape, cut to hang from the handle or knob of a door. They are sometimes used to distribute print advertising to residences. Door hangers are often seen in hotels and other places of lodging as a means for gu ... Read »


      Wikipedia
    • Duty of confidentiality

    • In common law jurisdictions, the duty of confidentiality obliges solicitors (or attorneys) to respect the confidentiality of their clients' affairs. Information that solicitors obtain about their clients' affairs may be confidential, and must not be used for the benefit of persons not authorized by the client. Confiden ... Read »


      Wikipedia
    • Employee monitoring

    • Employee monitoring is the act of surveying employee activity. Organizations engage in employee monitoring to track performance, avoid legal liability, protect trade secrets, and address other security concerns. The practice may impact employee satisfaction due to its impact on privacy. If employees use company co ... Read »


      Wikipedia
    • Financial privacy

    • Financial privacy refers to the maintenance of confidentiality of customer information about transactions and finances by financial institutions. The primary principle is that customers of a financial institution are entitled to a high level of privacy for their personal and transaction information. However, complete a ... Read »


      Wikipedia
    • Full body scanner

    • A full-body scanner is a device that detects objects on a person's body for security screening purposes, without physically removing clothes or making physical contact. Depending on the specific technology, the operator may see an alternate-wavelength image of the person's naked body, or merely a cartoon-like represent ... Read »


      Wikipedia
    • Generally Accepted Privacy Principles

    • Generally Accepted Privacy Principles is a framework intended to assist Chartered Accountants and Certified Public Accountants in creating an effective privacy program for managing and preventing privacy risks. It was developed through joint consultation with the Canadian Institute of Chartered Accountants (CICA) and t ... Read »


      Wikipedia
    • Genetic exceptionalism

    • Genetic exceptionalism is the belief that genetic information is special and must therefore be treated differently from other types of medical information. For example, patients are able to obtain information about their blood pressure without involving any medical professionals, but obtaining information about their ... Read »


      Wikipedia
    • 4INFO

    • 4INFO Inc.

      Coordinates: 37°31′29″N 122°20′21″W / 37.524596°N 122.339093°W / 37.524596; -122.339093 4INFO is an American corporation that provides mobile advertising technology for the placement and tracking of advertisements; including on computers, mobile phones, and end-point s ... Read »


      Wikipedia
    • Geomarketing

    • Geomarketing is the integration of geographical intelligence into various aspects of marketing, including sales and distribution. Geomarketing research is the use of geographic parameters in marketing research methodology, including from sampling, data collection, analysis, and presentation. Geomarketing Services relat ... Read »


      Wikipedia
    • GingerMaster

    • GingerMaster is malware that affects Android operating system version 2.3. It was first detected in August 2011. GingerMaster is Android malware that contains a root exploit packaged within an infected app. Once the application is launched on an Android device, it acquires root privileges on the device and then a ... Read »


      Wikipedia
    • GOMVPN

    • Gom VPN, is a browser extension which was specifically built for Singapore and its Internet Censorship. ... Read »


      Wikipedia
    • Government database

    • A government database collects information for various reasons, including climate monitoring, securities law compliance, geological surveys, patent applications and grants, surveillance, national security, border control, law enforcement, public health, voter registration, vehicle registration, social security, and sta ... Read »


      Wikipedia
    • Government Security Classifications Policy

    • The Government Security Classifications Policy (GSCP) is a new system for classifying sensitive government data in the United Kingdom. Historically, the Government Protective Marking Scheme was used by government bodies in the UK; it divides data into UNCLASSIFIED, PROTECT, RESTRICTED, CONFIDENTIAL, SECRET and TOP ... Read »


      Wikipedia
    • Honest broker

    • An honest broker is an entity that keeps sets of private information but distributes parts of those sets to other entities who should not have access to the entire set. Honest brokers often work in clinical research with biological specimens; in that case, donors of specimens allow researchers to do research on those s ... Read »


      Wikipedia
    • Ikee

    • Ikee is a worm that spread by means of SSH Connections between jailbroken iphones and steals apple id and passwords.It is discovered in 2009 and changed wallpaper to Rick Astley photo. Iphone owners of Australia reported that smart phones of them are infected by a worm and it has changed their iphone wallpaper to Rick ... Read »


      Wikipedia
    • In camera

    • In camera (/ɪŋˈkæmrə, -mərə/; Latin: "in a chamber") is a legal term that means in private. The same meaning is sometimes expressed in the English equivalent: in chambers. Generally, in-camera describes court cases, parts of it, or process where the public and press are not allowed to observe the p ... Read »


      Wikipedia
    • Data Protection Act, 2012

    • Data Protection Act, 2012

      The Data Protection Act, 2012 (The Act) is legislation enacted by the Parliament of the Republic of Ghana to protect the privacy and personal data of individuals. It regulates the process personal information is acquired, kept, used or disclosed by data controllers and data processors by requiring compliance with cert ... Read »


      Wikipedia
    • Information privacy

    • Information privacy, or data privacy (or data protection), is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally identifiable information or other sensitive informa ... Read »


      Wikipedia
    • Information technology controls

    • In business and accounting, information technology controls (or IT controls) are specific activities performed by persons or systems designed to ensure that business objectives are met. They are a subset of an enterprise's internal control. IT control objectives relate to the confidentiality, integrity, and availabilit ... Read »


      Wikipedia
    • International Principles on the Application of Human Rights to Communications Surveillance

    • The International Principles on the Application of Human Rights to Communications Surveillance(also called the "Necessary and Proportionate Principles" or just "the Principles") is a document which attempts to "clarify how international human rights law applies in the current digital environment". Communications Survei ... Read »


      Wikipedia
    • Internet censorship

    • Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or ... Read »


      Wikipedia
    • Intimization

    • Intimization is "a revelatory process which involves the publicizing of information and imagery from what we might ordinarily understand as [an individuals’s] personal life – broadly defined. It is a publicity process (involving the media) that takes place over time and involves flows of personal information ... Read »


      Wikipedia
    • K-anonymity

    • k-anonymity is a property possessed by certain anonymized data. The concept of k-anonymity was first introduced by Latanya Sweeney in a paper published in 2002 as an attempt to solve the problem: "Given person-specific field-structured data, produce a release of the data with scientific guarantees that the individuals ... Read »


      Wikipedia
    • L-diversity

    • l-diversity is a form of group based anonymization that is used to preserve privacy in data sets by reducing the granularity of a data representation. This reduction is a trade off that results in some loss of effectiveness of data management or mining algorithms in order to gain some privacy. The l-diversity model is ... Read »


      Wikipedia
    • Penumbra (law)

    • In United States constitutional law, the penumbra includes a group of rights derived, by implication, from other rights explicitly protected in the Bill of Rights. These rights have been identified through a process of "reasoning-by-interpolation", where specific principles are recognized from "general idea[s]" that ar ... Read »


      Wikipedia
    • Privacy law

    • Privacy law refers to the laws that deal with the regulation, storage, and use of personal information about individuals, which can be collected by governments and other public as well as private organizations. Privacy laws are considered in the context of an individual's privacy rights or within reasonable expectatio ... Read »


      Wikipedia
    • MAC Address Anonymization

    • MAC Address anonymization is the idea of performing a one way function on a MAC address so that the result may be used in tracking systems for reporting and the general public, while making it nearly impossible to obtain the original MAC Address from the result. The idea is that this process allows companies like Googl ... Read »


      Wikipedia
    • Mobile phone tracking

    • Mobile phone tracking is the ascertaining of the position or location of a mobile phone, whether stationary or moving. Localization may occur either via multilateration of radio signals between (several) cell towers of the network and the phone, or simply via GPS. To locate a mobile phone using multilateration of radio ... Read »


      Wikipedia
    • Nothing to hide argument

    • The nothing to hide argument states that government surveillance programs do not threaten privacy unless they uncover illegal activities, and that if they do uncover illegal activities, the person committing these activities does not have the right to keep them private. Hence, a person who favors this argument may stat ... Read »


      Wikipedia
    • Nothing to Hide: The False Tradeoff Between Privacy and Security

    • Nothing to Hide: The False Tradeoff Between Privacy and Security is a book written by Daniel J. Solove regarding the nothing to hide argument regarding privacy. It was published by Yale University Press in 2011. The book, written for a general audience, includes some material that had been adapted by law review ar ... Read »


      Wikipedia
    • Numbered bank account

    • A numbered bank account is a type of bank account where the name of the account holder is kept secret, and they identify themselves to the bank by means of a code word known only by the account holder and a restricted number of bank employees, thus providing accountholders with a degree of bank privacy in their financi ... Read »


      Wikipedia
    • Personal Data Service

    • Personal Data Service or Personal Data Store (PDS) is a service to let an individual store, manage and deploy their key personal data in a highly secure and structured way. It gives the user a central point of control for their personal information (e.g. interests, contact information, affiliations, preferences, friend ... Read »


      Wikipedia
    • Personal identifier

    • Personal Identifiers (PID) are a subset of personally identifiable information (PII) data elements, which identify a unique individual and can permit another person to “assume” that individual’s identity without their knowledge or consent. This can occur when PID data elements are used in any of these w ... Read »


      Wikipedia
    • Personally identifiable information

    • Personally identifiable information (PII), or sensitive personal information (SPI), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. The abbreviation PII is wid ... Read »


      Wikipedia
    • Printer steganography

    • Printer steganography is a type of steganography – "hiding data within data" where tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers and timestamps. Unlike many forms of steganography, the hidden information is not intended to be available from a comput ... Read »


      Wikipedia
    • Privacy by design

    • Privacy by Design is an approach to systems engineering which takes privacy into account throughout the whole engineering process. The concept is an example of value sensitive design, i.e., to take human values into account in a well-defined manner throughout the whole process and may have been derived from this. The c ... Read »


      Wikipedia
    • Privacy-enhancing technologies

    • Privacy-Enhancing Technologies (PET) is the standardized term referring to specific methods that act in accordance with the laws of data protection - PETs allow online users to protect the privacy of their personally identifiable information (PII) provided to and handled by such services or applications. Privacy-enhan ... Read »


      Wikipedia
    • Privacy for research participants

    • Privacy for research participants is a concept in research ethics which states that a person in human subject research has a right to privacy when participating in research. Some examples of typical scenarios are that a surveyor doing social research conducts an interview where the research participant is a respondent, ... Read »


      Wikipedia
    • Privacy software

    • Privacy software is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or limit the amount of information made available to third parties. The software can apply encryption or filtering of various kinds. Privacy software can refer to two d ... Read »


      Wikipedia
    • Privacy-invasive software

    • Privacy-invasive software is a category of computer software that ignores users’ privacy and that is distributed with a specific intent, often of a commercial nature. Three typical examples of privacy-invasive software are adware, spyware and content hijacking programs. In a digital setting, such as the Inter ... Read »


      Wikipedia
    • Private currency

    • A private currency is a currency issued by a private organization, be it a commercial business or a nonprofit enterprise. It is often contrasted with fiat currency issued by governments or central banks. In many countries, the issuance of private paper currencies is severely restricted by law. Today, there are over fo ... Read »


      Wikipedia
    • Public hypersphere

    • Public hypersphere is a new kind of public sphere that has come into existence globally through the use of modern information technology, digital media, and computer networks. Swedish writer Karl-Erik Tallmo used the corresponding Swedish term hyperoffentlighet in an article in the daily Sydsvenska Dagbladet in 1999 a ... Read »


      Wikipedia
    • Public records

    • Public records are documents or pieces of information that are not considered confidential and generally pertain to the conduct of government. For example, in California, when a couple fills out a marriage license application, they have the option of checking the box as to whether the marriage is "confidential" (Recor ... Read »


      Wikipedia
    • Radio-frequency identification

    • Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves. Active tags have a local power source such as a battery a ... Read »


      Wikipedia
    • Resident registration

    • A resident register is a government database which contains information on the current residence of persons. In countries where registration of residence is compulsory, the current place of residence must be reported to the registration office or the police within a few days after establishing a new residence. In some ... Read »


      Wikipedia
    • Safe deposit box

    • A safe deposit box, sometimes known erroneously as a safety deposit box, is an individually secured container, usually held within a larger safe or bank vault. Safe deposit boxes are generally located in banks, post offices or other institutions. Safe deposit boxes are used to store valuable possessions, such as gemsto ... Read »


      Wikipedia
    • Secrecy of correspondence

    • The secrecy of correspondence (German: Briefgeheimnis, French: secret de la correspondance) or literally translated as secrecy of letters, is a fundamental legal principle enshrined in the constitutions of several European countries. It guarantees that the content of sealed letters is never revealed and letters in tran ... Read »


      Wikipedia
    • Shedun

    • Shedun is a family of malware software (also known as Kemoge, Shiftybug and Shuanet) targeting the Android (operating system) first identified in late 2015 by mobile security company Lookout (company), affecting roughly 20,000 popular Android applications. Lookout claimed the HummingBad malware was also a part of the S ... Read »


      Wikipedia
    • Statistical disclosure control

    • Statistical disclosure control (SDC), also known as statistical disclosure limitation (SDL) or disclosure avoidance, is a technique used in data-driven research to ensure no person or organization is identifiable from the results of an analysis of survey or administrative data, or in the release of microdata. The purpo ... Read »


      Wikipedia
    • Surveillance

    • Surveillance (/sərˈveɪ.əns/ or /sərˈveɪləns/) is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. This can include observation from a distance by means of electronic equipment (su ... Read »


      Wikipedia
    • Swedish Commission on Security and Integrity Protection

    • Swedish Commission on Security and Integrity Protection

      The Swedish Commission on Security and Integrity Protection (Swedish: Säkerhets- och integritetsskyddsnämnden) is a Swedish administrative authority sorting under the Ministry of Justice responsible for supervising law enforcement agencies' use of secret surveillance techniques, assumed identities and other assoc ... Read »


      Wikipedia
    • Latanya Sweeney

    • Latanya Sweeney

      Latanya Arvette Sweeney is a Professor of Government and Technology in Residence at Harvard University and the Director of the Data Privacy Lab in the Institute of Quantitative Social Science (IQSS) at Harvard. She served as the Chief Technologist of the Federal Trade Commission, a position she has held from January 20 ... Read »


      Wikipedia
    • T-closeness

    • t-closeness is a further refinement of l-diversity group based anonymization that is used to preserve privacy in data sets by reducing the granularity of a data representation. This reduction is a trade off that results in some loss of effectiveness of data management or mining algorithms in order to gain some privacy. ... Read »


      Wikipedia
    • Trial by media

    • Trial by media is a phrase popular in the late 20th century and early 21st century to describe the impact of television and newspaper coverage on a person's reputation by creating a widespread perception of guilt or innocence before, or after, a verdict in a court of law. Its first inception was the phrase Trial by Tel ... Read »


      Wikipedia
    • Trigger list

    • Trigger list in its most general meaning refers to a list whose items are used to initiate ("trigger") certain actions. In the United States, when a person applies for a mortgage loan, the lender makes a credit inquiry about the potential borrower from the national credit bureaus, Equifax, Experian and TransUnion. ... Read »


      Wikipedia
    • Visual privacy

    • Visual Privacy is the relationship between collection and dissemination of visual information, the public expectation of privacy, and the legal issues surrounding them. In particular, large-scale camera networks have created increasing interest in understanding the advantages and disadvantages of such deployments. It i ... Read »


      Wikipedia
    • Webcam

    • A webcam is a video camera that feeds or streams its image in real time to or through a computer to a computer network. When "captured" by the computer, the video stream may be saved, viewed or sent on to other networks via systems such as the internet, and emailed as an attachment. When sent to a remote location, the ... Read »


      Wikipedia
    • White noise machine

    • A white noise machine is a device that produces a sound that is random in character, which sounds like a rushing waterfall or wind blowing through trees. Often such devices do not produce actual white noise, which has a harsh sound, but pink noise, whose power rolls off at higher frequencies, or other colors of noise. ... Read »


      Wikipedia
    • Workplace privacy

    • Employees typically must relinquish some of their privacy while at the workplace, but how much they must do so can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for employers to monitor the actions of their employees. Employers believe that monitoring is necessary both to disc ... Read »


      Wikipedia
    Wikipedia
  • What Else?

    • Privacy

Extras