Protect Your Digital Privacy!: Survival Skills for the Information Age

الغلاف الأمامي
Que Publishing, 2002 - 652 من الصفحات
Annotation Explains to readers how to protect their privacy when using the wide range of digital devices now available that can connect to the Internet or each other. Clear discussion of privacy issues as they affect everyday users of digital devices. Comprehensive coverage of all current and near-future devices and technologies that pose privacy risks to their users. Practical recommendations-including third party hardware and software solutions-for implementing privacy safeguards when using different digital devices. A comprehensive book on privacy that is best for individuals and families looking to understand privacy issues and who want practical solutions for protecting their privacy when using digital devices. Unique features include a chapter on legal aspects of privacy, a chapter addressing privacy threats to children, a chapter on electronic/Internet voting, and special topic sidebars in each chapter written by a contributing expert. Glee Harrah Cady has 20 years of technology and Internet experience as a respected author, educator, developer, technologist, executive, and policy advisor. She is a frequent contributor and speaker participating in events sponsored by organizations such as the IT Congressional Working Group, the Internet Caucus, and the U.S. Department of Commerce and at conferences on Internet policy. Ms. Cady is currently Vice President of Marketing for Aldea Communications, Inc. Pat McGregor is currently the Chief Information Security Architect for Strategic Enterprise Architecture within Intel Corporation's Information Technology division. Ms. McGregor leads the development and coordination of the long-term Information Security strategy. She works with the product groups, Corporate Security, Internal Audit, and Intel Legal to develop security and privacy policy. Ms. McGregor will represent Intel at several external industry and advocacy groups helping assure the Internet's critical infrastructure.

من داخل الكتاب

المحتوى

Privacy in the Information
1
Why Do Other People Care About
11
Canaries in the Coal Mine The Internet Advertising Bureau
14
We Need Healthy Skepticism
17
Threats to Your Childrens What Companies Must Do 96
20
The Ability to Protect Ourselves from
23
to You
40
Privacy and the Individual
41
Getting Rid of Files and Data
254
Protecting Against Malicious Attacks
262
What About Macs?
272
Some General Security Resources
283
How to Secure Your Internet
285
Look For and Read the Privacy
299
Practice Safe Shopping
307
Using Email and Chatting Online
317

Celebrities Can Educate Too
46
Learning to Like New Things
55
Its All About Trust
67
What Are the Risks?
70
Your Tone Sets the Stage 75 PII 100
77
Youre Not 84 Privacy 111
86
Discover Your Resources and Options tion About Yourself
112
What Help do Parents Have in Off Beacons
123
Always Connected Always Just for Planes and Fish Anymore
137
Connecting the World
148
No More Waiting in LineWell Bill
190
Potential Broadband Provider 152
198
Understanding Cellular Technology Red Light District?
204
Taking Control
211
Finding You at Home
219
Whats the point?
227
Our Conclusions?
236
What Can I Do If My Privacy
323
Buying Items that Dont Exist
332
Identity Theft
339
What You Need to Know About Legal Protections for Privacy
347
What You Need to Know Privacy Act of 1974
371
What U S Federal Law Applies 354 Different Approaches to Law
377
Western Songs 434 WebTrust and Better Web 474
436
Singing Along Together
442
Privacy and the Future
479
SelfRegulation and Privacy
491
Privacy Policies 451 Opening Pandoras Box
497
Todays SelfRegulatory Leaders 460 the Law
505
Technology Helps and Hurts
522
Legislation and Regulation 541 C List of Privacy Bills in
541
Can You Really Be Cyber Angels
625
حقوق النشر

عبارات ومصطلحات مألوفة

معلومات المراجع