Category «Privacy»

Guide to Privacy Resources 2019

This guide by Marcus Zillman is a comprehensive listing of free privacy applications, tools and services that users may implement across multiple devices. These applications are from a range of sources that include small and large tech companies as well as subject matter specific websites, consumer industry groups and organizations. The focus of this article is on leveraging the latest technology and information that allows users to: (1) identify privacy issues and (2) implement privacy protections specific to their requirements, that span email, phone calls, chats, text messages, web browsing, computer drives and files, networks, collaboration spaces, and your photos.

Subjects: Computer Security, Cybersecurity, Email Security, Encryption, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues October 28 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: How Russian trolls manipulated American politics; How to Spot a Twitter Bot; Suspected explosive devices are hard for UPS, FedEx, USPS to detect; and Apple boss takes aim at ‘weaponization’ of customer data.

Subjects: Congress, Cybercrime, Cybersecurity, E-Commerce, Government Resources, Privacy, Social Media

The Government Must Now Obtain A Warrant To Compel Disclosure of Cell Phone Location Records

Attorney Charles Holster discusses the ramifications of the June 22, 2018 Supreme Court decision, Carpenter v. United States that held a warrant is required before a wireless telephone service provider may be compelled by a governmental entity to turn over its customer’s “historical” Cell Site Location Information.

Subjects: Civil Liberties, Communications, Communications Law, Criminal Law, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues October 21 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: The Employer Surveillance State; How to Recover Google Contacts; How to delete your account with Facebook, Google, Amazon, Apple, and more; and last but certainly not least – ‘Do Not Track’ Privacy Tool Doesn’t Do Anything!

Subjects: Big Data, Civil Liberties, Congress, Cybercrime, Cybersecurity, E-Commerce, E-Government, Email, KM, Legal Research, Privacy, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues October 14 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Consumer genetic testing that it’s now possible for law enforcement agencies to use genetic data to hunt down virtually anyone of European descent; FBI chief says threats from drones to U.S. ‘steadily escalating’; and Voice Phishing Scams Are Getting More Clever.

Subjects: Cybersecurity, E-Government, Government Resources, Privacy, RSS Newsfeeds, Terrorism

Pete Recommends – Weekly highlights on cyber security issues October 8 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Tim Cook on Apple’s view on privacy; Google intern built the AI behind these shockingly good fake images; and the FTC Issues Alert on Recent Facebook Breach.

Subjects: AI, Congress, Cybersecurity, Education, Privacy, Social Media

Book Review of “Frenemies: The Epic Disruption of the Ad Business (and Everything Else)”

Advertising is now part of a complex ecosystem that engages a wide range of components, including but not limited to: social media, Big Data, AI, data mining, competitive intelligence, and marketing. Alan Rothman reveals and explains for readers just how utterly different and hyper-competitive advertising now is, with work product largely splayed across countless mobile and stationary screens on Planet Earth. Rothman describes how expertly chronicling and precisely assaying the transformative changes happening to this sector is an informative and engaging new book, Frenemies: The Epic Disruption of the Ad Business (and Everything Else), by the renowned business author Ken Auletta. Just as a leading ad agency in its day cleverly and convincingly took TV viewers on an endearing cultural tour of the U.S .as we followed the many ad-ventures of Bartles & Jaymes, so too, this book takes its readers on a far-ranging and immersive tour of the current participants, trends, challenges and technologies affecting the ad industry. Auletta’s book is not only timely and insightful, but demonstrably valuable for the professionals in the legal sector who are striving to effectively engage, employ and measure the value of marketing to clients and potential clients in a rapidly changing environment increasingly dependent upon using big data and analytical platforms.

Subjects: AI, Big Data, Blockchain, Book Reviews, Communication Skills, Communications, Competitive Intelligence, Law Firm Marketing, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues September 29 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Be careful about what you post on social media [really]; Overruling Constitutional Precedents; and If Your Data is Found on the Dark Web, Firefox Monitor Will Let You Know.

Subjects: Big Data, Civil Liberties, CRS Reports, Cybercrime, Government Resources, Health, KM, Privacy, Search Engines, Social Media, Supreme Court

Text Analysis Systems Mine Workplace Emails to Measure Staff Sentiments

Giving the processes of observation, analysis and change at the enterprise level a modern spin, is a fascinating new article in the September 2018 issue of The Atlantic, titled What Your Boss Could Learn by Reading the Whole Company’s Emails, by Frank Partnoy. Alan Rothmam summarizes and annotates this article that raises timely and significant issues around privacy, data mining and organizational management. Rothman concludes his review by posing important questions concerning the impact of text analysis data on executive training and development and on employee performance.

Subjects: AI, Data Mining, Email, Employment Law, KM, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues September 15 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Verizon data breach digest lifts the lid on theft tactics; Samsung SmartThings Tracker Locates People, Pets, and Things; and Who controls your data?

Subjects: Big Data, Cybercrime, Cyberlaw, Cybersecurity, Government Resources, Privacy