Special Issue on "Issues and Challenges of the Diffusion of Web 2.0 and User Privacy and Security”

 Journal of Information Privacy and Security
http://jips.cob.tamucc.edu/

 

interview with Rainey Reitman
Director of Communications
Privacy Rights Clearinghouse 

 

How has societal perspective on privacy transformed with the evolution of web 2.0?

Privacy Rights Clearinghouse receives numerous inquiries about online information brokers. We’ve compiled this page to address some of the questions we get most frequently.  While we hope this page addresses all of your questions, we keep a list of grievances against specific companies. If you would like us to add your complaint to our database, please submit your complaint by visiting https://www.privacyrights.org/new-complaint.

 

COMMENTS TO U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES


Submitted by the Privacy Rights Clearinghouse

 

September 13, 2010

 

U.S. Department of Health and Human Services
Office for Civil Rights
Attention: Privacy and Security Rule Modification
Hubert H. Humphrey Building, Room 509F
200 Independence Avenue, SW
Washington, DC 20201


Submitted via: www.regulations.gov

 

Has your computer or smart phone become a resource to commit malicious acts against other persons and companies?  By taking advantage of a wide variety of computer vulnerabilities, your device may become a zombie that is under the control of a criminal that conducts crime using electronic devices (e-criminal).  Once an e-criminal has control, not only is your device being used to attack other systems, anything stored on, or typed into, that device is also compromised.

 

How Bots Work

The most recent total from the Privacy Rights Clearinghouse’s Chronology of Data Breaches shows more than a half billion sensitive records breached since 2005, leaving Americans vulnerable to identity theft.

Employees losing laptop computers, hackers downloading credit card numbers and sensitive personal data accidentally exposed online -- the Chronology of Data Breaches shows hundreds of ways that the personal information of consumers is lost, stolen or exposed.

Computers Freedom and Privacy Conference
June 15, 2010, San Jose State University

 

Panelists:

Joanne McNabb, moderator, Chief, California Office of Privacy Protection (see her panel introduction)
*Beth Givens, Director, Privacy Rights Clearinghouse
Pam Dixon, Executive Director, World Privacy Forum
Jim Adler, Chief Privacy Officer, Intelius Inc.
Les Rosen, President, Employment Screening Resources

 

While websites like Facebook and MySpace make it easy to share vacation photos with old classmates, the personal information on social networks is also attracting people besides friends and family members.  Scam artists, identity thieves, debt collectors, stalkers, hiring managers, and companies looking for a marketing advantage are turning to social networking sites to gather valuable information.