Remove 11
Remove 2016 Remove Education Remove Information Security Remove Privacy
article thumbnail

ICO issues warning to charity workers

IT Governance

The Information Commissioner’s Office (ICO) has issued a warning to charity workers informing them that they must “obey strict privacy laws”. A total of 11 emails were sent on 22 February 2017 that included the personal information of 183 people, including 3 children. Educate your staff.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Starting with her first desktop on a Unix machine at age 12, Eva Galperin’s contributions to cybersecurity include research on malware and privacy. Carey | @marcusjcarey.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Announces Settlement Regarding Collecting Consumer TV Viewing Data

Hunton Privacy

VIZIO”), installed software on about 11 million consumer televisions to collect viewing data without consumers’ knowledge or consent. VIZIO did all of this without sufficiently informing consumers that the televisions’ settings enabled the collection of consumers’ viewing data or obtaining their informed consent.

article thumbnail

Parents’ Guide for Safe YouTube and Internet Streaming for Kids

Security Affairs

As a parent, you can’t monitor everything your child does all the time, and older teenagers might want (and genuinely need) some digital privacy. An Australian study later reported that 95% of 8- to 11-year-olds have accessed the Internet in the last month. What Children Do Online. Parents can block specific websites and keywords.

Access 80
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

But, as amazing as all that sounds, there are tradeoffs -- in privacy, for example. His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. And there's very little hands on education process.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

But, as amazing as all that sounds, there are tradeoffs -- in privacy, for example. His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. And there's very little hands on education process.