You are here: Fairness.com > Resources > Law & Justice > Civil Rights / Equal Protection > Privacy: Other > Internet/Online (General)

Internet/Online (General)

Search only Internet/Online (General), and everything underneath:

Articles and Resources

158 Articles and Resources. Go to:  [Next 50]   [End]

Date Fairness.com Resource Read it at:
May 27, 2014 New Curbs Sought on the Personal Data Industry

QUOTE: The Federal Trade Commission on Tuesday called on Congress to protect consumers against the unchecked collection and sharing of their digital data — from websites visited to their marital status — by providing people with tools to view, suppress and fix their information. The agency also said the little-known companies, called data brokers, that analyze and sell huge amounts of the consumer information for marketing purposes, needed to be reined in and more transparent to the public.

New York Times
Jan 20, 2014 On Facebook, clicking 'like' can help scammers

QUOTE: Often, Senft said, Facebook pages are created with the sole purpose of spreading viral content that will get lots of likes and shares. Once the page creators have piled up hundreds of thousands of likes and shares, they'll strip the page and promote something else, like products that they get a commission for selling. Or, they may turn around and sell the page through black-market websites to someone who does the same. It's a way to trick Facebook's algorithm...

CNN (Cable News Network)
Jan 17, 2014 Connected TVs, fridge help launch global cyberattack

QUOTE: a global cyberattack launched from more than 100,000 everyday consumer gadgets such as home-networking routers, televisions and at least one "smart" refrigerator. It's being called possibly the first proven cyberattack to originate from connected appliances -- the so-called "Internet of Things."

CNN (Cable News Network)
Dec 13, 2013 Twitter Reverses Privacy Change in Response to User Complaints

QUOTE: Before, a blocked user could not interact with the person who blocked them, and could tell that they had been blocked. Under the short-lived change, blocked users would not know they had been blocked. They could view and send tweets to the person who blocked them, but those tweets would have been invisible to that person.

New York Times
Oct 11, 2013 Google to Sell Users’ Endorsements

QUOTE: Google on Friday announced that it would soon be able to show users’ names, photos, ratings and comments in ads across the Web, endorsing marketers’ products. Facebook already runs similar endorsement ads. But on Thursday it, too, took a step to show personal information more broadly by changing its search settings to make it harder for users to hide from other people trying to find them on the social network.

New York Times
Sep 05, 2013 N.S.A. Foils Much Internet Encryption

QUOTE: The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world...

New York Times
Aug 27, 2013 Feds Back Away From Forced Decryption … For Now

QUOTE: Federal prosecutors have formally dropped demands that a child-porn suspect give up his encryption keys in a closely watched case, but experts warn the issue of forced decryption is very much alive....[an appellate court] eventually found the decryption order breached the Fifth Amendment right against being compelled to testify against oneself.

Wired
Jul 11, 2013 Internet trolls: What to do about the scourge of the Web?

QUOTE: "You can't easily taxonomize trolling behavior," she said. "A lot of trolling is about mischief and harmless, silly pranks. But really extreme behavior -- attacking friends and families of kids who have died, for example -- that seems to be a behavior with a different motivation."

CNN (Cable News Network)
Jun 23, 2013 Anger mounts after Facebook's 'shadow profiles' leak in bug

QUOTE: Facebook said Friday it fixed a bug that exposed contact info for over six million accounts. The admission revealed its 'shadow profile' data collection activities, and users are furious.

ZDnet
Mar 16, 2013 The Internet is a surveillance state

QUOTE: ...we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads....Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays.

CNN (Cable News Network)
Mar 08, 2013 Skype's Been Hijacked in China, and Microsoft Is O.K. With It

QUOTE: a conflict between Microsoft’s advocacy of privacy rights and its role in surveillance....When Internet users in China try to access Skype.com, they’re diverted to the TOM-Skype site. While the Chinese version bears the blue Skype logo—and provides services for online phone calls and text chats—it’s a modified version of the program found elsewhere in the world. The surveillance feature in TOM-Skype conducts the monitoring directly on a user’s computer...

BusinessWeek
Dec 18, 2012 F.T.C. Opens an Inquiry Into Data Brokers

QUOTE: as consumers conduct more of their personal and commercial lives online, that type of data collection has been steadily increasing, fueled by new online surveillance techniques and more sophisticated analytics. Some companies, for example, have compiled several thousand different pieces of information on a majority of adults in the United States. Regulators say they are concerned that such comprehensive data collection could be used to profile, score or segment consumers, with the potential to unfairly limit the kinds of financial, insurance, health, education or other marketing offers certain consumers receive.

New York Times
Dec 13, 2012 Attorney General Secretly Granted Gov. Ability to Develop and Store Dossiers on Innocent Americans

QUOTE: In a secret government agreement granted without approval or debate from lawmakers, the U.S. attorney general recently gave the National Counterterrorism Center sweeping new powers to store dossiers on U.S. citizens...Earlier this year, Attorney General Eric Holder granted the center the ability to copy entire government databases...

Wired
Nov 15, 2012 The Real Reason You Should Care About the Petraeus Affair: Privacy

QUOTE: Once you've opened an email or your Facebook account, you've provided your personal information to a third party. The government can then ask that third party—Google, Yahoo, Facebook, Friendster, or whatever—for your information, and they don't necessarily need a warrant. The Constitution protects you from unreasonable search and seizure by the government. It doesn't stop third parties from sharing personal information you willingly give them.

Mother Jones
Jul 19, 2012 It's legal: cops seize cell phone, impersonate owner: Court says sending texts using a seized iPhone doesn't violate privacy rights.

QUOTE: Mobile phones exist in a constitutional grey area. The law has well-developed doctrines protecting the privacy of our desktop computers, landline telephones, and filing cabinets. But modern cell phones perform all of these functions, and more. If the police are free to rummage through any cell phone that falls into their hands, every arrest would automatically give the police access to a treasure trove of private data that they would otherwise need a warrant, based on probable cause, to obtain.

Ars Technica
May 29, 2012 Published mug shots: A constant reminder of one man's past

QUOTE: mug shots, which are public record, from sheriffs and local police departments, who hand over the information with the names listed in alphabetical order, detailing the criminal charges...."They are using a person's image for commercial gain without their permission," said Singh-Grover. "To me, its extortion, maybe not legally, but the common use of that term."

CNN (Cable News Network)
May 11, 2012 Should Congress Move To Ban Employers From Demanding Employees’ Facebook Passwords? Is it a big enough invasion of privacy to warrant government intervention?

QUOTE: If your future employer or current boss asks you for your Facebook password, it might soon be against the law. That’s because there is new national legislation against the practice of employers demanding access to employees’ personal accounts....“People have an expectation of privacy when using social media like Facebook and Twitter,” said Representative Perlmutter.

WebProNews
Mar 16, 2012 Jury Finds Spying in Rutgers Dorm Was a Hate Crime

QUOTE: A former Rutgers University student was convicted on Friday on all 15 charges he had faced for using a webcam to spy on his roommate having sex with another man, a verdict poised to broaden the definition of hate crimes in an era when laws have not kept up with evolving technology....The case set off a debate about whether hate-crime statutes are the best way to deal with bullying.

New York Times
Feb 17, 2012 Google Accused of Tracking Safari Usage Without Permission

QUOTE: A Stanford University graduate student has released a report that accuses Google and three other ad networks [Vibrant Media, Media Innovation Group, and PointRoll] of side-stepping the privacy settings on Apple's Safari browser to track usage on iPhones and Macs without permission.

PC Magazine
Feb 16, 2012 Shocker: Facebook Users Hate Surprise Photo Tagging

QUOTE: nearly all Facebook users think it's rude when someone posts a photo or video of them without asking their permission first. In the survey of more than 800 Facebook users, 83 percent of respondents said it's just "common courtesy" to ask permission before posting someone else's photo or video online.

PC Magazine
Feb 15, 2012 Apple: Apps need 'explicit approval' before collecting user contacts

QUOTE: Apple on Wednesday said it will start requiring mobile apps to get explicit permission from iPhone and iPad owners before the apps collect and store information about users' personal contacts. The statement came after a week of revelations that popular social tools like Twitter and Path were doing just that -- sometimes without the user even knowing it.

CNN (Cable News Network)
Jan 23, 2012 Europe Weighs Tough Law on Online Privacy

QUOTE: Europe is considering a sweeping new law that would force Internet companies like Amazon.com and Facebook to obtain explicit consent from consumers about the use of their personal data, delete that data forever at the consumer’s request and face fines for failing to comply.

New York Times
Nov 30, 2011 Is your phone telling the carrier everything you do?

QUOTE: the XDA-Developer site noticed that a preinstalled mobile app, named CarrierIQ, was logging all smartphone activities with no way to opt out....Although consumers are buying smartphones — and assume they have ownership — are the handsets theirs to do with as they please, without the carriers or handset makers know what they’re doing?

GigaOM
Oct 10, 2011 Secret Orders Target Email: WikiLeaks Backer's Information Sought

QUOTE: The court clashes in the WikiLeaks case provide a rare public window into the growing debate over a federal law that lets the government secretly obtain information from people's email and cellphones without a search warrant. Several court decisions have questioned whether the law, the Electronic Communications Privacy Act, violates the U.S. Constitution's Fourth Amendment protections against unreasonable searches and seizures.

Wall Street Journal, The (WSJ)
Sep 21, 2011 Facebook makes it easier than ever to eavesdrop: The new mini stream feature makes it simple to see what people are saying, even when they might not realize you're listening

QUOTE: any comment you make is potentially open to a new level of scrutiny by all of your peers and followers: casual acquaintances, family members, a boss, a co-worker, a business partner, your pastor....Making matters worse, Facebook doesn't provide much in the way of evident guidance or functionality to keep these privacy barriers intact. You can't easily flip a switch, for example, to prevent a Facebook friend from subscribing to your comments or links.

InfoWorld
Sep 19, 2011 In Small Towns, Gossip Moves to the Web, and Turns Vicious

QUOTE: In rural America, where an older, poorer and more remote population has lagged the rest of the country in embracing the Internet, the growing use of social media is raising familiar concerns about bullying and privacy. But in small towns there are complications. The same Web sites created as places for candid talk about local news and politics are also hubs of unsubstantiated gossip, stirring widespread resentment in communities where ties run deep, memories run long and anonymity is something of a novel concept.

New York Times
Sep 02, 2011 Group Says It Has New Evidence of Cisco’s Misdeeds in China

QUOTE: An advocacy group that accuses Cisco Systems of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong organization said Friday that it had new evidence to suggest that Cisco specifically tailored its technology for that purpose.

New York Times
Aug 25, 2011 In Britain, a Meeting on Limiting Social Media

QUOTE: British officials and representatives of Twitter, Facebook and BlackBerry met Thursday to discuss voluntary ways to limit or restrict the use of social media to combat crime and periods of civil unrest, while trying to dodge charges of hypocrisy and censorship that trailed Prime Minister David Cameron’s call to restrict use of the networks after this month’s riots.

New York Times
Aug 22, 2011 Browsing and Privacy: How to Not Get Tracked: All modern browsers have built-in tools and add-ons to protect users from having their Web behavior tracked. But regardless, some sites still find ways to

QUOTE: Every time browser developers and others come up with a defense against tracking — the use of tiny bits of computer code that tells Web sites where you've been on the Internet — the other side ups the ante with a new trick. And it's happening again.

CIO Magazine
Aug 08, 2011 Facebook’s Privacy Issues Are Even Deeper Than We Knew

QUOTE: privacy issues go beyond what the social networking giants themselves do. Now the question includes what they’ve enabled others to do. The research also neuters the conventional retort, “you can opt out,” because the results are based on public information.

Forbes
Jul 07, 2011 Murdoch paper suffers new blow in hacking scandal

QUOTE: the latest blow to the British Sunday tabloid [News of the World--Ed.] that has been accused of illegally eavesdropping on the messages of murder and terror victims, celebrities and politicians. Prime Minister David Cameron Wednesday backed calls for an independent inquiry into the scandal

CNN (Cable News Network)
Jun 24, 2011 LulzSec Hackers Make Enemies Online

QUOTE: After six weeks of attacks — and hundreds of sarcastic Twitter posts — a number of people, offended by the exposure of innocent Internet users’ personal information and irritated by the bravado, are working to stop LulzSec by investigating and revealing its members’ identities to the world, and especially to the F.B.I.

New York Times
Jun 10, 2011 U.S. Senators Want to Shut Down Bitcoins, Currency of Internet Drug Trade

QUOTE: The tone of the senators' letter comes off as though they themselves don't know what entity they want to destroy or how to go about it. Bitcoins, by nature and general practice, are harmless; they're merely an Internet-based alternative to traditional federal banks. Silk Road is what the U.S. government is really after.

PC World
May 21, 2011 The Privacy Challenge in Online Prize Contests (Bits)

QUOTE: The Netflix contest was celebrated as a triumph for the company and as a catalyst for bringing new techniques to data analysis. But in 2010, Netflix was forced to cancel a planned second prize because of privacy concerns....Mr. Vengroff, who called the Netflix contest “tremendously valuable” for elevating the field of data analysis, said the privacy model in his contest was far more secure.

New York Times
May 16, 2011 Dropbox caught with its finger in the cloud cookie jar: Online file storage and sharing site Dropbox admits that it can see the data you've stored. Oops...

QUOTE: Dropbox now asserts that it can decrypt and pass your data on to a third party if Dropfox feels it needs to do so, in order to protect its property rights. As a result, Soghoian has filed a 16-page complaint [5]with the U.S. Federal Trade Commission...

InfoWorld
May 12, 2011 Facebook's failed Google smear: Stupidity squared

QUOTE: In the universe of things that are not very bright, there are three basic categories: stupid, really stupid, and how-do-you-even-manage-to-get-your-pants-on-every-morning stupid. Now there's a fourth category: Facebook stupid. The world's largest social network earned this sobriquet via its shocking-yet-laughable attempts to launch a smear campaign against Google.

InfoWorld
Apr 27, 2011 India Puts Tight Leash on Internet Free Speech

QUOTE: Even before the new rules… India has periodically tried to restrict speech on the Internet… The rules do not provide a way for content producers to defend their work or appeal a decision to take content down.

New York Times
Apr 27, 2011 Holding Companies Accountable for Privacy Breaches

QUOTE: Yet there seems to be no real repercussions for these companies when a person’s information stored online is exposed. “Today the only real hit a company takes when these data breaches happen is to the company’s image.”

New York Times
Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns

QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.

Washington Post
Jan 09, 2011 1986 Privacy Law Is Outrun by the Web

QUOTE: Many Internet companies and consumer advocates say the main law governing communication privacy — enacted in 1986, before cellphone and e-mail use was widespread, and before social networking was even conceived — is outdated, affording more protection to letters in a file cabinet than e-mail on a server...a patchwork of confusing standards that have been interpreted inconsistently by the courts, creating uncertainty.

New York Times
Dec 01, 2010 F.T.C. Backs Plan to Honor Privacy of Online Users

QUOTE: Saying that online companies have failed to protect the privacy of Internet users, the Federal Trade Commission recommended a broad framework for commercial use of Web consumer data, including a simple and universal “do not track” mechanism that would essentially give consumers the type of control they gained over marketers with the national “do not call” registry.

New York Times
Oct 28, 2010 Will the lawyers shut down the Web over privacy?

QUOTE: A class-action lawsuit accuses Google of leaking personal data to advertisers -- but would the Web survive if search engines and social networks really had to preserve your privacy?

InfoWorld
Jun 27, 2010 Travelers, be wary of 'data passing' online

QUOTE: "Data pass" refers to a shady practice of sending credit card information along to a third party at the end of a transaction without the buyer's explicit approval. In years past, travelers often found themselves unwittingly enrolled in clubs that automatically charged a monthly enrollment fee while travel companies raked in millions in profits, according to investigators and consumers.

Washington Post
May 26, 2010 Facebook Bows to Pressure Over Privacy

QUOTE: The back and forth between Facebook and its users over privacy is gaining importance as the company’s growth continues unabated. It now has nearly 500 million users around the world, and its policies, more than those of any other company, are helping to define standards for privacy in the Internet age.

New York Times
May 22, 2010 In shoppers' online networks, privacy has no price tag

QUOTE: Blippy, a sort of Twitter for shopping that allows users to automatically broadcast what they bought using credit and debit cards to the rest of the world....privacy advocates say that users are divulging a dangerous level of personal financial information...

Washington Post
May 21, 2010 Social networks may be sharing your info with advertisers

QUOTE: several social networking sites are sharing, with advertisers, information that can be used to identify individuals....In the case of social networking sites, the information on the last page viewed often reveals user names or profile ID numbers that could potentially be used to look up the individuals.

InfoWorld
May 18, 2010 EFF: Forget cookies, your browser has fingerprints

QUOTE: Even without cookies, popular browsers such as Internet Explorer and Firefox give Web sites enough information to get a unique picture of their visitors about 94 percent of the time, according to research compiled over the past few months by the Electronic Frontier Foundation.

MacWorld
May 15, 2010 Google Data Admission Angers European Officials

QUOTE: European privacy regulators and advocates reacted angrily Saturday to the disclosure by Google, the world’s largest search engine, that it had systematically collected private data since 2006 while compiling its Street View photo archive.

New York Times
May 06, 2010 Facebook's new features secretly add apps to your profile

QUOTE: When a piece of software is automatically installed on your computer without your knowledge, it's called malware. But what do you call it when Facebook apps are added to your profile without your knowledge? We discovered Wednesday that this is actually happening, and stopping it isn't as easy as checking a box in your privacy settings.

MacWorld
May 05, 2010 Facebook Glitch Brings New Privacy Worries

QUOTE: For many users of Facebook, the world’s largest social network, it was just the latest in a string of frustrations. On Wednesday, users discovered a glitch that gave them access to supposedly private information in the accounts of their Facebook friends, like chat conversations.

New York Times

158 Articles and Resources. Go to:  [Next 50]   [End]