Protect Your Digital Privacy!: Survival Skills for the Information AgeQue Publishing, 2002 - 652 من الصفحات Annotation Explains to readers how to protect their privacy when using the wide range of digital devices now available that can connect to the Internet or each other. Clear discussion of privacy issues as they affect everyday users of digital devices. Comprehensive coverage of all current and near-future devices and technologies that pose privacy risks to their users. Practical recommendations-including third party hardware and software solutions-for implementing privacy safeguards when using different digital devices. A comprehensive book on privacy that is best for individuals and families looking to understand privacy issues and who want practical solutions for protecting their privacy when using digital devices. Unique features include a chapter on legal aspects of privacy, a chapter addressing privacy threats to children, a chapter on electronic/Internet voting, and special topic sidebars in each chapter written by a contributing expert. Glee Harrah Cady has 20 years of technology and Internet experience as a respected author, educator, developer, technologist, executive, and policy advisor. She is a frequent contributor and speaker participating in events sponsored by organizations such as the IT Congressional Working Group, the Internet Caucus, and the U.S. Department of Commerce and at conferences on Internet policy. Ms. Cady is currently Vice President of Marketing for Aldea Communications, Inc. Pat McGregor is currently the Chief Information Security Architect for Strategic Enterprise Architecture within Intel Corporation's Information Technology division. Ms. McGregor leads the development and coordination of the long-term Information Security strategy. She works with the product groups, Corporate Security, Internal Audit, and Intel Legal to develop security and privacy policy. Ms. McGregor will represent Intel at several external industry and advocacy groups helping assure the Internet's critical infrastructure. |
من داخل الكتاب
النتائج 1-5 من 80
الصفحة viii
... Browser Bookmarks or Favorites 252 Web Browsing History 253 Getting Rid of Files and Data 254 Minimum Controls to Keep Your Information Private 255 Summary for the Most Privacy Conscious 255 Online Session Privacy 256 Web Sessions 256 ...
... Browser Bookmarks or Favorites 252 Web Browsing History 253 Getting Rid of Files and Data 254 Minimum Controls to Keep Your Information Private 255 Summary for the Most Privacy Conscious 255 Online Session Privacy 256 Web Sessions 256 ...
الصفحة ix
... Browser to Manage Cookies the Way You Want 312 Cookie Management Software 312 Use a Mediator 313 Anonymizer 315 The Best Is Yet to Come ... Unfortunately 315 Don't Let Personal Information Slip Out 316 Using E - mail and Chatting Online ...
... Browser to Manage Cookies the Way You Want 312 Cookie Management Software 312 Use a Mediator 313 Anonymizer 315 The Best Is Yet to Come ... Unfortunately 315 Don't Let Personal Information Slip Out 316 Using E - mail and Chatting Online ...
الصفحة 10
عذرًا، محتوى هذه الصفحة مقيَّد.
عذرًا، محتوى هذه الصفحة مقيَّد.
الصفحة 31
عذرًا، محتوى هذه الصفحة مقيَّد.
عذرًا، محتوى هذه الصفحة مقيَّد.
الصفحة 36
عذرًا، محتوى هذه الصفحة مقيَّد.
عذرًا، محتوى هذه الصفحة مقيَّد.
المحتوى
Privacy in the Information | 1 |
Why Do Other People Care About | 11 |
Canaries in the Coal Mine The Internet Advertising Bureau | 14 |
We Need Healthy Skepticism | 17 |
Threats to Your Childrens What Companies Must Do 96 | 20 |
The Ability to Protect Ourselves from | 23 |
to You | 40 |
Privacy and the Individual | 41 |
Getting Rid of Files and Data | 254 |
Protecting Against Malicious Attacks | 262 |
What About Macs? | 272 |
Some General Security Resources | 283 |
How to Secure Your Internet | 285 |
Look For and Read the Privacy | 299 |
Practice Safe Shopping | 307 |
Using Email and Chatting Online | 317 |
Celebrities Can Educate Too | 46 |
Learning to Like New Things | 55 |
Its All About Trust | 67 |
What Are the Risks? | 70 |
Your Tone Sets the Stage 75 PII 100 | 77 |
Youre Not 84 Privacy 111 | 86 |
Discover Your Resources and Options tion About Yourself | 112 |
What Help do Parents Have in Off Beacons | 123 |
Always Connected Always Just for Planes and Fish Anymore | 137 |
Connecting the World | 148 |
No More Waiting in LineWell Bill | 190 |
Potential Broadband Provider 152 | 198 |
Understanding Cellular Technology Red Light District? | 204 |
Taking Control | 211 |
Finding You at Home | 219 |
Whats the point? | 227 |
Our Conclusions? | 236 |
What Can I Do If My Privacy | 323 |
Buying Items that Dont Exist | 332 |
Identity Theft | 339 |
What You Need to Know About Legal Protections for Privacy | 347 |
What You Need to Know Privacy Act of 1974 | 371 |
What U S Federal Law Applies 354 Different Approaches to Law | 377 |
Western Songs 434 WebTrust and Better Web 474 | 436 |
Singing Along Together | 442 |
Privacy and the Future | 479 |
SelfRegulation and Privacy | 491 |
Privacy Policies 451 Opening Pandoras Box | 497 |
Todays SelfRegulatory Leaders 460 the Law | 505 |
Technology Helps and Hurts | 522 |
Legislation and Regulation 541 C List of Privacy Bills in | 541 |
Can You Really Be Cyber Angels | 625 |
عبارات ومصطلحات مألوفة
advertising Amazon.com anonymous bill Bookmarks browser cable modems called Center chapter collected consumer cookies COPPA credit card database delete Destiny's Child Digital Angel e-mail e-mail address Edit View Go electronic enable encryption example Federal Federal Trade Commission files give Glee Cady glee harrah Glee's Go Communicator Help identity theft information practices Internet Explorer Internet Fraud Internet Junkbuster kids Larry Magid marketing mation Microsoft Netscape OnStar parents Parkinson's Disease password personal information personally identifiable information phone number privacy policy protect records request Search server share shown in Figure shows someone SpeedPass telephone number tell tion trust View Go Communicator What's Related