Difference between revisions of "Discussion:PrivacyNightmare"
(11 intermediate revisions by 2 users not shown) | |||
Line 5: | Line 5: | ||
Extraits pertinents... | Extraits pertinents... | ||
+ | Mettre un "~" et une petite explication devant les articles lus et considérés comme peu pertinents. | ||
+ | Put a ~ and a short explanation in front of articles that are read and considered to be less relevant. | ||
+ | |||
+ | Dataindustry: | ||
+ | http://adage.com/article/digital/facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles/239967/ | ||
+ | |||
+ | Data breach | ||
+ | |||
+ | http://www.hilltimes.com/open-government/2013/01/28/privacy-breaches-underline-weak-secretive-federal-data-protection-laws/33460 | ||
+ | weak data protection laws allow for your personal data to exist unencrypted on free-floating harddrives (in some countries). These are prone to get lost. | ||
+ | |||
+ | Surveillance state | ||
− | + | weak data protection laws allow governments to pass laws giving RETROACTIVE immunity to companies who share personal data with the government http://www.harvardlawreview.org/issues/122/february09/Recent_Legislation_527.php | |
+ | government agents in Australia seek power to break into discrete networks like Tor. http://www.crikey.com.au/2013/05/30/revealed-australian-spies-seek-power-to-break-into-tor/ | ||
+ | http://press.uchicago.edu/ucp/books/book/chicago/P/bo5503960.html - Privacy at RiskTHE NEW GOVERNMENT SURVEILLANCE AND THE FOURTH AMENDMENT | ||
+ | Studies | ||
+ | |||
+ | http://www.ceps.eu/book/online-personal-data-processing-and-eu-data-protection-reform | ||
− | |||
− | |||
~ pas une bonne reference (it's not a great newspaper... sometimes perhaps but better to find a better journal) http://www.dailymail.co.uk/news/article-2368336/Anonymous-claim-hacked-Femas-servers-posting-staff-details-online-retaliation-threats-agency.html | ~ pas une bonne reference (it's not a great newspaper... sometimes perhaps but better to find a better journal) http://www.dailymail.co.uk/news/article-2368336/Anonymous-claim-hacked-Femas-servers-posting-staff-details-online-retaliation-threats-agency.html | ||
− | |||
− | |||
http://www.thedenverchannel.com/news/man-denied-account-sues-bank-alleges-racial-profiling | http://www.thedenverchannel.com/news/man-denied-account-sues-bank-alleges-racial-profiling | ||
Line 23: | Line 36: | ||
~ http://bits.blogs.nytimes.com/2013/06/01/why-big-data-is-not-truth/ | ~ http://bits.blogs.nytimes.com/2013/06/01/why-big-data-is-not-truth/ | ||
− | |||
~ Ireland DPA : http://www.rte.ie/news/2013/0520/451428-data-protection/ | ~ Ireland DPA : http://www.rte.ie/news/2013/0520/451428-data-protection/ | ||
Line 42: | Line 54: | ||
http://www.uschamber.com/sites/default/files/reports/020508_EconomicImportance_Final_Revised_lr.pdf | http://www.uschamber.com/sites/default/files/reports/020508_EconomicImportance_Final_Revised_lr.pdf | ||
− | + | Verizon/NSA | |
+ | http://www.wired.com/threatlevel/2013/06/nsa-verizon-call-records | ||
+ | |||
+ | http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order | ||
http://www.lgi.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf | http://www.lgi.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf | ||
Line 51: | Line 66: | ||
http://www.marketingweek.co.uk/trends/privacy-for-whose-eyes-only/4006357.article | http://www.marketingweek.co.uk/trends/privacy-for-whose-eyes-only/4006357.article | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
http://www.huntonprivacyblog.com/2013/01/articles/eu-parliament-committee-issues-study-on-cybercrime-and-the-privacy-implications-of-cloud-computing/ | http://www.huntonprivacyblog.com/2013/01/articles/eu-parliament-committee-issues-study-on-cybercrime-and-the-privacy-implications-of-cloud-computing/ |
Latest revision as of 00:07, 25 November 2013
Le mise en page est la suivante :
===NomDuSite - [url Nom de l'article] (date)=== Extraits pertinents...
Mettre un "~" et une petite explication devant les articles lus et considérés comme peu pertinents. Put a ~ and a short explanation in front of articles that are read and considered to be less relevant.
Dataindustry: http://adage.com/article/digital/facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles/239967/
Data breach
http://www.hilltimes.com/open-government/2013/01/28/privacy-breaches-underline-weak-secretive-federal-data-protection-laws/33460 weak data protection laws allow for your personal data to exist unencrypted on free-floating harddrives (in some countries). These are prone to get lost.
Surveillance state
weak data protection laws allow governments to pass laws giving RETROACTIVE immunity to companies who share personal data with the government http://www.harvardlawreview.org/issues/122/february09/Recent_Legislation_527.php
government agents in Australia seek power to break into discrete networks like Tor. http://www.crikey.com.au/2013/05/30/revealed-australian-spies-seek-power-to-break-into-tor/
http://press.uchicago.edu/ucp/books/book/chicago/P/bo5503960.html - Privacy at RiskTHE NEW GOVERNMENT SURVEILLANCE AND THE FOURTH AMENDMENT Studies
http://www.ceps.eu/book/online-personal-data-processing-and-eu-data-protection-reform
~ pas une bonne reference (it's not a great newspaper... sometimes perhaps but better to find a better journal) http://www.dailymail.co.uk/news/article-2368336/Anonymous-claim-hacked-Femas-servers-posting-staff-details-online-retaliation-threats-agency.html
http://www.thedenverchannel.com/news/man-denied-account-sues-bank-alleges-racial-profiling
liste d'études ; https://edri.pad.foebud.org/coll-resource-eudatap?
~ http://bits.blogs.nytimes.com/2013/06/01/why-big-data-is-not-truth/
~ Ireland DPA : http://www.rte.ie/news/2013/0520/451428-data-protection/
~ what an IP Address Can Reveal About You: http://www.priv.gc.ca/information/research-recherche/2013/ip_201305_e.asp
~ Apple deluged by police demands to decrypt iPhones : http://news.cnet.com/8301-13578_3-57583843-38/apple-deluged-by-police-demands-to-decrypt-iphones/
~ https://www.nytimes.com/2013/05/13/business/media/bloomberg-admits-terminal-snooping.html
~ Condamnation Apple : http://www.huntonprivacyblog.com/2013/05/articles/german-court-rules-apples-privacy-policy-violates-german-law/
http://www.pcmag.com/article2/0,2817,2418659,00.asp
http://consent.law.muni.cz/view.php?cisloclanku=2013040001 http://consent.law.muni.cz/view.php?cisloclanku=2013040002
http://www.uschamber.com/sites/default/files/reports/020508_EconomicImportance_Final_Revised_lr.pdf
Verizon/NSA http://www.wired.com/threatlevel/2013/06/nsa-verizon-call-records
http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order
http://www.lgi.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf
http://www.ftc.gov/opa/2013/02/path.shtm
http://www.marketingweek.co.uk/trends/privacy-for-whose-eyes-only/4006357.article
~http://www.wired.com/wiredenterprise/2013/04/siri-two-years/ This article just says that Siri keeps recordings that users made for up to two years, initially the recordings are saved with a random number, after that the associated numbers are deleted... main point it makes is that it's good that apple finally made this public but that they should include this more openly in their user agreements.
https://pinboard.in/u:hugoroy/t:privacy
http://europe-v-facebook.org/EN/en.html
http://mashable.com/2011/08/19/germany-like-button/
anecdote orange accès mail
Google Buzz
add the changes in user conditions wrt instagram/facebook.
gmail that shows who you sent the most email to