Search
Content type: News & Analysis
Creative Commons Photo Credit: Source
The financial services industry is eager to gather more and more data about our lives. Apart from mining the data they have historically collected such as credit history, they are looking to use our social media profiles to reach into our friendships and social interactions. They are using these data in new and unexpected ways, including personality profiling to determine the risk of lending to you, and thus the price you will pay.
Firstcarquote, a…
Content type: News & Analysis
This piece originally appeared in the Responsible Data Forum.
Would you mind if, every time you post a comment on Twitter, Facebook or another social media platform, the police logged it? I mean, it’s public — surely it’s fair game?
If you think that’s OK, then maybe it’s also OK for a police officer to follow you when you walk down a busy street. That’s also public, right?
Clearly, definitions of public and private become very problematic when you are communicating with potentially…
Content type: News & Analysis
The connectivity afforded by the internet has changed the world forever. While the increasing ‘corporatization’ of what many still feel is an open, non-hierarchical, largely uncensored and unfiltered ecosystem, this is increasingly not the case. The emergence of the ‘Internet of Things’ will soon throw into sharp relief who owns the internet and who owns the data we all generate when using the internet. Companies today have a vested interest in portraying their products as safe and…
Content type: News & Analysis
Privacy can be seen as a reflex of innovation. One of the seminal pieces on the right to privacy as the 'right to be let alone emerged in response to the camera and its use by the tabloid media. Seminal jurisprudence is in response to new surveillance innovations... though often with significant delays.
While one approach would be to say that privacy is a norm and that with modern technologies the norm must be reconsidered and if necessary, abandoned; I think there’s an interesting idea around…
Content type: News & Analysis
The relationship between users and companies is based primarily on trust. However, many recent developments have the potential to undermine this trust and to question companies loyalties to their users. From excessive data collection and transmission to the failure to guard against basic security risks, one could be forgiven for thinking that the privacy and security interests of users and devices have taken a back seat. Governments of the world are unilaterally endeavouring to…
Content type: Press release
28 October 2015
Leading privacy and consumer organizations meeting in Amsterdam this week called on data protection officials around the world to support a meaningful legal framework that would protect the fundamental rights of both citizens and consumers in the online era.
In a statement issued today at the International Data Protection and Privacy Conference, the organizations criticized a just-released “Bridges” report that primarily recommended a continuation of industry self-regulation…
Content type: Press release
A European privacy group claimed today that dozens of amendments to the new Data Protection Regulation being proposed by Members of the European Parliament (MEPs) are being copied word-for-word from corporate lobby papers, with MEPs frequently failing to even remember their own amendments. Max Schrems, of the website and campaign Europe v Facebook, noticed striking similarities between proposed amendments and lobby papers written by representatives of Amazon, eBay, the American Chamber of…
Content type: News & Analysis
Gradually and almost imperceptibly, we have immersed ourselves in a global hypermedia environment. This environment increasingly contains everything we do: we work, we play, we organize within it. Our lives have been, in essence, turned inside out and dispersed in endless ethereal clouds - multi-verses - that follow us around in extra dimensionality. “Big Data” refers to the endless digital grains of sand we produce as we move, think and act. Internet Service Providers, web hosting companies,…
Content type: News & Analysis
Independent security researcher Trevor Eckhart revealed yesterday that a recent software update to some HTC smartphones has accidentally given third party applications access to huge amounts of private data, including call logs, geolocation history, SMS data and a whole lot more.
The update surreptitiously installs a suite of applications logging users' interactions with their devices. When a device is first switched on, the user ostensibly has the option not to allow HTC to…