Data Privacy Day is January 28, 2010!

Data Privacy DayAround the globe, people use powerful technologies and devices every day to improve their lives. Businesses develop software, build hardware and provide services designed to enhance individual productivity, communications and safety. We have come to depend on mobile communications, instant access to information, and intelligent services. We are empowered by these technologies in ways that those who have lived before us could never have imagined.

Despite all of the benefits of these technologies, doubts and worries persist about just how much personal information is collected, stored, used, and shared to provide these convenient and pervasive tools and services.

Data Privacy Day is an international celebration of the dignity of the individual expressed through personal information. In this networked world, in which we are thoroughly digitized, with our identities, locations, actions, purchases, associations, movements, and histories stored as so many bits and bytes, we have to ask – who is collecting all of this – what are they doing with it – with whom are they sharing it? Most of all, individuals are asking ‘How can I protect my information from being misused?’ These are reasonable questions to ask – we should all want to know the answers. Continue reading.

Related Posts

The Evil That Apple Does Apple’s new iPad is going to be a laptop supplement for some early-adopters, a laptop replacement for others, and a laptop instead-of for still other ...
Software sniffs out criminals by the shape of their nose Forget iris and fingerprint scans -- scanning noses could be a quicker and easier way to verify a person's identity, according to scientists at the Un...
No Warrant Necessary to Seize Your Laptop The U.S. Customs may search your laptop and copy your hard drive when you cross the border, according to their policy. They may do this even if they h...
Federal Intellectual Property Enforcement Gears Up The Obama Administration has been slowly ramping up its attention to intellectual property issues. Over the past few months, we've seen an IP "summit"...
Anonymity and the Internet Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we ca...
Open Source Think Tank: The Way Forward I have just finished attending the Fifth Annual Open Source Think Tank, hosted by Andrew Aitken and I at Meritage in Napa Valley.  Andrew and his te...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.

Leave a Comment

Your email address will not be published. Required fields are marked *