twitter facebook rss

Update on FTC penalties against TRUSTe

Posted by Alexander Hanff on November 22, 2014

As many people will know I was in Brussels earlier this week delivering two presentations at the IAPP Europe Data Protection Congress.  I was there to talk about encrypted email in the first session and mobile privacy (more specifically the risks BYOD pose to corporate networks, data and infrastructure) in the second session. On Wednesday […]

It is official, you can’t trust TRUSTe.

Posted by Alexander Hanff on November 17, 2014

Today the Federal Trade Commission (FTC) issued a press release outlining details of a settlement reached with TRUSTe on the grounds that the “company failed to conduct annual recertifications, facilitated misrepresentation as non-profit”.  The FTC goes on to accuse TRUSTe of not following through on annual recertifications of companies who obtained their privacy seal from […]

Taking Back My Privacy – DIY Secure Phone

Posted by Alexander Hanff on November 14, 2014

Over the last week I decided to start a new project mostly as a proof of concept but also down to curiosity as to how easy/difficult it would be – I decided to try to make myself a secure phone. Hardware-wise it was fairly simple, I have an old HTC Desire handset which has been […]

Protect your Privacy from as little as 7p per day

Posted by Alexander Hanff on November 10, 2014

How many of you use mobile data? Have you read the terms and conditions of your mobile contract? If you have you will be aware that pretty much every mobile carrier in the world grants themselves permission to read your emails, monitor which web sites you visit and a whole host of other privacy invading […]

Westin’s “Privacy Segmentation” critiqued.

Posted by Alexander Hanff on November 9, 2014

Professor Alan Westin was a privacy giant with research dating back to the 1960s and a professional career seen by many privacy professionals as paramount to the development of the current legal regime regarding privacy and data processing. It is without question that Westin dedicated his life to privacy law but his research was often private […]

Google and Differential Privacy – RAPPOR

Posted by Alexander Hanff on November 8, 2014

There is a great deal of press coverage this week about Google’s announcement at CCS 2014 that they are working on a new project called RAPPOR (PDF) which reportedly uses techniques from the 1960s based around differential privacy. This is good news, or would be if it meant Google were becoming more ethical with regards […]

The right to privacy Vs the right to spy

Posted by Kevin on November 5, 2014

Human rights are hugely misunderstood — there is actually no such thing. We are born with no ‘rights’; we are simply born. The assertion of a right is nothing more than a refusal to accept a negative. It is a denial that some third party should be allowed to prevent something. In this way, a […]

Google, RAPPOR and

Posted by Kevin on November 3, 2014

The Holy Grail of acquiring statistics without impinging privacy has, according to Google, been found. It is an application of Randomized Aggregatable Privacy-Preserving Ordinal Response (Rappor); and Google will present its technical paper at this week’s 21st ACM Conference on Computer and Communications Security in Scottsdale, Arizona. The paper claims, RAPPORs allow the forest of client […]

LinkedIn and the Irish data protection regulator

Posted by Kevin on November 3, 2014

The Office of the Data Protection Commissioner (ODPC), Ireland’s data protection regulator, has said that it issued a raft of ‘significant’ recommendations on LinkedIn — but neither it nor LinkedIn will say what they are. All LinkedIn will say is that it has implemented some, is implementing some, and is considering the others. Is this […]

Money and Power: the motivations of surveillance

Posted by Kevin on November 2, 2014

When we go shopping, would we accept someone with a notebook following our every footstep and making notes on where we stop at every counter in every shop, what we buy and when? And if we challenged that stalker, would we accept the argument that he is doing it for our own good so that […]