Remove tag privacy-rights
article thumbnail

Privacy Group Files FTC Complaint Regarding Facebook’s Facial Recognition Technology

Hunton Privacy

On June 10, 2011, the Electronic Privacy Information Center (“EPIC”) filed a complaint with the Federal Trade Commission, claiming that Facebook’s facial recognition and automated online image identification features harm consumers and constitute “unfair and deceptive acts and practices.”

Privacy 40
article thumbnail

President’s Council of Advisors on Science and Technology Release Health IT Report

Hunton Privacy

While much of the attention of the privacy policy community in Washington, D.C. has been focused on the two reports issued in December 2010 by the Federal Trade Commission and the Department of Commerce , a third government report has received far less press attention, but may have a greater impact on U.S.

IT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Welcome to The Hacker Mind, an original podcast from for all secure. Herfurt: My name is Martin Herfurt and I'm a security researcher. And the coffee spur was an attempt to show manufacturers of hands free sets that pre-programmed pin that cannot be changed by the user would not be the ideal way to handle security in this respect.

article thumbnail

The Future of the Web | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. ben.rattigan 08/14/2008 12:39 AM Flag But but but Yep you are right we need to be carefull of content or the quality there of. Hit google read the first link and you could be far away from the right answer.

Paper 45
article thumbnail

Free Taxonomy & Folksonomy Book | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0

Paper 40
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. It's not the only such claim either; earlier last year in the wake of another security controversy, another similarly spectacular claim was made : In public, UIDAI claimed Aadhaar was completely secure.

Security 111
article thumbnail

'ESME': Social messaging within an enterprise SOA environment | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. In some ways ESME is more advanced than Twitter since it features user groups and tag clouds, enabling project based contextual messaging. All rights reserved. Privacy Policy | Terms of Use Around the network

Paper 45