More Privacy In Depth
There are many major threats to our privacy that we should be up in arms about, but iBeacons, Gmail scanning and Google Glass are not among them, says Mike Elgan.
Employees can unintentionally share more than their employers want anyone to know.
Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands.
We've rounded up a bunch of experts' tips about how to retain your privacy.
When a world that's characterized by ubiquitous data collection and surveillance can lose sight of a jumbo jet, you start to question the worth of all that spying on us.
We've rounded up a bunch of experts' tips about how to retain your privacy when messaging and using apps, and while on social media.
It offers slightly greater payment convenience, but at what cost?
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
Even if a company were willing to expunge personal data that it had been authorized to collect, the realities of IT systems mean it probably could never completely do that.
We've rounded up a bunch of experts' tips about how to retain your privacy -- as much as possible, anyway -- and how to surf the Web silently, among other things.
A new call for transparency about what data mobile apps are retaining sounds fine and noble, but too many companies don't even know what their apps know about consumers.
EU privacy regulators say U.S. privacy laws are too weak to protect EU personal data. But a new analysis of 358 privacy-enforcement actions paints the opposite picture.
You might see security and privacy pitfalls, but the advantages of the Internet of Things mean there's no stopping it. Your smart fridge is going to miss you when you're working every night.
The evidence is all around us that the battle will eventually be lost.
The really important question right now isn't what to do about Edward Snowden; it's how much surveillance is tolerable in a free society.
The outrage is more about media hype, hypocrisy and grandstanding than firm principles.
Restoring trust in our information systems after Edward Snowden's NSA revelations will take years -- if it can be done at all.
Revelations in 2013 about NSA surveillance and the power of big-data analytics suggest the age of privacy is over. But a new 'privacy death index' places us far from the tipping point.
Companies have to fully confront the privacy issues they face and rethink their policies from the bottom up.
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Path Selection Infographic
- Path Selection Infographic
- Hyperconvergence Infographic
- A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era
- From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs
- If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Cloud Computing eGuide
- In this eGuide, CIO, Computerworld, and InfoWorld offer advice, tips, news, and predictions regarding cloud implementations in the coming year and beyond. Read... All Privacy White Papers
Data Protection and Disaster Recovery with iSCSI and VMware
Get this on demand webcast now
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- All Privacy Webcasts