Privacy at work book – New Zealand

Cool the New Zealand’s privacy commissioner has issued a set of guidelines aimed at addressing workplace privacy issues. The Commissioner Marie Shroff hopes the book will help clear up ambiguity surrounding such issues as email monitoring and Internet use, employee surveillance and the use of biometric technologies in the workplace, among others.

And the guidelines are available for purchase on the Privacy Commission’s Web site, yes you have to pay for it. It’s only $20 a copy.

Physiological screeners at airports!

Oh my goodness, ever felt stressed at airports, well it’s getting worse! On Thursday, the Homeland Security Department (U.S.) showed off an early version of physiological screeners that could spot terrorists.

A scene from the airport of the future: A man’s pulse races as he walks through a checkpoint. His quickened heart rate and heavier breathing set off an alarm. A machine senses his skin temperature jumping. Screeners move in to question him.
Signs of a terrorist? Or simply a passenger nervous about a cross-country flight?

Read more…

Cloud Computing

Do you know what ‘cloud computing is’?

Cloud services basically offload computing or data storage functions to someone else’s server, e.g. e-mail like Google, photos like Flicker, or just documents that can be accessed anywhere.

Apparently according to Pew Internet and American Life project study “Cloud computing services are growing in popularity, but concerns about the privacy of personal data in the cloud environment exist” Read more..
Well you know is this not sort of obvious?

Laws of Identity too technically orientated

Just been looking at a condensed form of Kim Cameron’s “Laws of identity”. I can’t leave a comment due to some problem on the web-site.

However, after having read the technical version some time ago and then again now reading this non-technical version, I am feeling more and more how technically orientated it is. Take for example the first point: “People using computers should be in control of giving out information about themselves”, but why is it only people using computers? It could also be people not using computers, RFID chips in passports or ID cards for example.

It should state “People using/possessing any device capable of holding or linking to PII should be in control of giving out information about themselves”, or something like that.

California trying to be privacy conscious…..

It seems that California is better than Iowa at protecting the privacy of residents and customers, or at least trying!

“A federal appeals court reinstated part of California’s financial privacy law Thursday, allowing consumers to prevent banks from sharing information with affiliated companies about a customer’s savings account or buying habits.” Read more….

Do you trust your government to protect your identity?

Can you imagine what’s going on in the U.S.? If you trust your government with your personal information, think again. Money is more important for them!

Iowa county officials have been negotiating with a real estate database company to sell the contents of a database that includes the Social Security numbers and other personal information of mortgage holders statewide. The site, IowaLandRecords.org, said Wednesday it negotiated selling its database and ongoing updates for about $11,750 a month to Data Tree, a company that manages more than 4 billion records nationwide. Read more…

Internet Explorer 8 and anonymity

I saw this come out in the news end of August that the next version of Internet Explorer will support online anonymity. In fact Internet Explorer 8 will come with a series of new features designed to protect the security and privacy of Web browsers, including a mode that allows surfers to anonymously view web sites. I wonder how Google will deal with this 😉

Your gait as your signature!

What about this? Interesting article on how ‘gait recognition’ could be used by spy satelite.

“Spy satellites could soon be able to identify someone from space by looking at their shadow.
They would use a computer program that searches for the movement of shadows on the ground, and then identifies their owners from the way they walk. The technique – called gait analysis – relies on the fact that someone’s walking style is very difficult to disguise.”