Search results

Jump to navigation Jump to search
  • ==Privacy by Policy vs. Privacy by Design== -Privacy by Policy?
    3 KB (481 words) - 18:07, 5 May 2015
  • # Tracking and challenging the emerging "Privacy Tech Industry" * Started working with Tor and other privacy tech as a young technologist in early aughts.
    5 KB (784 words) - 22:40, 25 November 2021
  • We assembled a checklist around privacy, but what other might be susceptible to these sorts of issues. IP policy. If they're funding the grantee, all the outputs should be openly licensed.
    3 KB (490 words) - 23:37, 4 May 2015
  • * Raising privacy awareness among the younger generation * Usable tools while not giving up privacy/security
    6 KB (855 words) - 18:28, 5 May 2015
  • * compliance (privacy law, regulations) translating convoluted policy for comprehension
    2 KB (210 words) - 21:49, 9 December 2023
  • == Values-driven organizational policy design == * Split staff structure into paid (lots of effective power, relatively little policy power) and unpaid (advisory / keyholder status)
    4 KB (676 words) - 22:59, 11 May 2015
  • ...xposed your IP address to a 3rd party and therefore have no expectation of privacy. ...ets more restrictive for a service, they can use the older versions of the policy.
    13 KB (2,128 words) - 18:07, 5 May 2015
  • * Complexity of policy creation. ..., will the machine have the same concerns a human would? Would it protect privacy?
    4 KB (721 words) - 21:39, 9 December 2023
  • * Although it can take take, it is best practice to create an organizational policy towards the use of social media so that multiple people can help in the con ...it doesn't work as well as when it's individuals doing this and there's no policy to guide them.
    7 KB (1,145 words) - 18:48, 5 May 2015
  • * [[Human Rights Security and Privacy]] * [[Privacy Designs for Websites]]
    4 KB (491 words) - 00:55, 4 February 2020
  • ...be effective in their online activism, from human rights practitioners to privacy advocates. This session will explore how Tor complements and supports other ...tions of information control, security through strong identity, privacy by policy, and the need to trust the infrastructure. Answering this challenge demands
    4 KB (595 words) - 18:48, 5 May 2015
  • ...rs of multiple organizations in support of their offline action on climate policy, while preserving each org's control of its brand and member list. Currentl Admin side: you can browse through all the members. See all the groups info, privacy settings. <br>
    4 KB (612 words) - 21:58, 15 May 2015
  • We think this could encourage privacy, because the assumption that IP address = users breaks down when networks a - Having some process and policy allows for DMCA protections. Having a “policy” that says you’ll ban offenders gives you, in theory, protections even
    2 KB (403 words) - 17:47, 5 May 2015
  • Corporate tools do a pretty good job with security. But then privacy is a whole other issue. #Have a data retention policy: Have a policy to delete emails after a certain number of weeks/months
    5 KB (800 words) - 22:45, 29 November 2017
  • ...ed about encryption of conversation, but we don’t think of the breaches of privacy built into internet protocol. Cables in the sea are designed and developed ...nd infrastructure; conviviality; sociotechnical imaginaries and shaping of policy of infrastructure; what barriers exist to free, low cost access to learners
    5 KB (776 words) - 21:37, 9 January 2019
  • there has privacy tradeoffs policy and why we have it
    8 KB (1,263 words) - 18:44, 6 September 2016
  • want to use it, what security it provides, and policy and legal issues. * large scale security, strengthening systems, privacy
    5 KB (790 words) - 21:30, 20 May 2015
  • (First initials used for privacy reasons :) * What's on the horizon for your work in organizing, policy and systems change?
    6 KB (925 words) - 15:24, 19 November 2021
  • * [[Cookies and privacy badger to respect privacy]] - Cooper * [[Civi CRM = Privacy]] - Dave
    6 KB (790 words) - 02:08, 18 November 2015
  • ** Privacy and data issues--using a cloud-hosted service vs something you install and ** Undocumented immigration, drug policy, reproductive rights, anti-nuke orgs; organizations trying to make active c
    7 KB (1,194 words) - 17:47, 5 May 2015
  • '''Zuckerberg:''' Minimized FB's role, hesitant to change policy (should not be arbiter) '''Google:''' Changed ad serving policy -- block spam and porn, but now also will block ad sharing that shares misi
    11 KB (1,895 words) - 19:59, 22 November 2016
  • | Influence government policy from the inside ! Crypto Privacy
    17 KB (2,437 words) - 16:42, 5 May 2015
  • *Have a privacy policy – build tools that don’t personally identify people
    6 KB (960 words) - 23:37, 4 May 2015
  • A lot of everything. Journalism content – score cards, policy analysis. Requires structured database responses, not going to work to send System protocol/standard for user privacy is that everything that goes into the system is intended to be published. U
    6 KB (1,004 words) - 18:48, 5 May 2015
  • - legal jurisdiction/policy on request? cost, SLA, terms (privacy)
    7 KB (1,270 words) - 17:47, 5 May 2015
  • ** Open to anyone to write their policy documents. ...NSSEC! So people's intuition about the exact nature of "security" and the privacy benefits that we will get is not necessarily right.]
    11 KB (1,719 words) - 17:21, 5 May 2015
  • * The way that we talk and think about privacy technology is super fucked up. It’s clear that technology requires govern * Works on disinformation on the policy side and in elections.
    9 KB (1,411 words) - 17:37, 14 November 2019
  • Daily life impacts for people affected by policy change *Client privacy issues, particulary with kids and other vulnerable pops. Consent, legal iss
    8 KB (1,259 words) - 20:48, 27 November 2017