Are app permissions important?
Yes. If you don't pay attention to the permissions, you may give apps access to more information than you'd like. Read More
What’s a data breach?
A data breach is a security violation in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an unauthorized individual. It could be a result of
Read MoreIs a website that has outdated information about me allowed to charge me to take it down?
Sometimes. Currently, no federal law gives you the right to prevent data brokers from collecting, sharing or publishing your personal information. Read More
What is mobile device management (MDM) software?
MDM software allows employers to have varying degrees of control over devices (like phones and tablets) that their employees use for work purposes. Read More
Statement on Outsourcing and Privacy: Testimony to the California Senate Select Committee on International Trade Policy and State Legislation
Testimony of Beth Givens, Director
Legislative Hearing: Outsourcing California: Our Jobs and Privacy at Risk
Read More
Public Access to Electronic Case Files: Comments to the Administrative Office of the United States Courts
The Administrative Office of the United States Courts
Court Administration Policy Staff
Attn: Privacy Comments, Suite 4-560
One Columbus Circle, N.E.
Washington, D.C. 20544
Read More
A Review of the Fair Information Principles: The Foundation of Privacy Public Policy
In 1973 the U.S. Dept of Health Education and Welfare (HEW) to look at the impact of computerization on medical records privacy. The members wanted to develop policies that would allow the benefits of computerization to go forward, but at the same time provide safeguards for personal privacy.
Read More