Search results

Jump to navigation Jump to search
  • ==Privacy by Policy vs. Privacy by Design== -Privacy by Policy?
    3 KB (481 words) - 18:07, 5 May 2015
  • # Tracking and challenging the emerging "Privacy Tech Industry" * Started working with Tor and other privacy tech as a young technologist in early aughts.
    5 KB (784 words) - 22:40, 25 November 2021
  • We assembled a checklist around privacy, but what other might be susceptible to these sorts of issues. IP policy. If they're funding the grantee, all the outputs should be openly licensed.
    3 KB (490 words) - 23:37, 4 May 2015
  • * Raising privacy awareness among the younger generation * Usable tools while not giving up privacy/security
    6 KB (855 words) - 18:28, 5 May 2015
  • * compliance (privacy law, regulations) translating convoluted policy for comprehension
    2 KB (210 words) - 21:49, 9 December 2023
  • == Values-driven organizational policy design == * Split staff structure into paid (lots of effective power, relatively little policy power) and unpaid (advisory / keyholder status)
    4 KB (676 words) - 22:59, 11 May 2015
  • ...xposed your IP address to a 3rd party and therefore have no expectation of privacy. ...ets more restrictive for a service, they can use the older versions of the policy.
    13 KB (2,128 words) - 18:07, 5 May 2015
  • * Complexity of policy creation. ..., will the machine have the same concerns a human would? Would it protect privacy?
    4 KB (721 words) - 21:39, 9 December 2023
  • * Although it can take take, it is best practice to create an organizational policy towards the use of social media so that multiple people can help in the con ...it doesn't work as well as when it's individuals doing this and there's no policy to guide them.
    7 KB (1,145 words) - 18:48, 5 May 2015
  • * [[Human Rights Security and Privacy]] * [[Privacy Designs for Websites]]
    4 KB (491 words) - 00:55, 4 February 2020
  • ...be effective in their online activism, from human rights practitioners to privacy advocates. This session will explore how Tor complements and supports other ...tions of information control, security through strong identity, privacy by policy, and the need to trust the infrastructure. Answering this challenge demands
    4 KB (595 words) - 18:48, 5 May 2015
  • ...rs of multiple organizations in support of their offline action on climate policy, while preserving each org's control of its brand and member list. Currentl Admin side: you can browse through all the members. See all the groups info, privacy settings. <br>
    4 KB (612 words) - 21:58, 15 May 2015
  • We think this could encourage privacy, because the assumption that IP address = users breaks down when networks a - Having some process and policy allows for DMCA protections. Having a “policy” that says you’ll ban offenders gives you, in theory, protections even
    2 KB (403 words) - 17:47, 5 May 2015
  • Corporate tools do a pretty good job with security. But then privacy is a whole other issue. #Have a data retention policy: Have a policy to delete emails after a certain number of weeks/months
    5 KB (800 words) - 22:45, 29 November 2017
  • ...ed about encryption of conversation, but we don’t think of the breaches of privacy built into internet protocol. Cables in the sea are designed and developed ...nd infrastructure; conviviality; sociotechnical imaginaries and shaping of policy of infrastructure; what barriers exist to free, low cost access to learners
    5 KB (776 words) - 21:37, 9 January 2019
  • there has privacy tradeoffs policy and why we have it
    8 KB (1,263 words) - 18:44, 6 September 2016
  • want to use it, what security it provides, and policy and legal issues. * large scale security, strengthening systems, privacy
    5 KB (790 words) - 21:30, 20 May 2015
  • (First initials used for privacy reasons :) * What's on the horizon for your work in organizing, policy and systems change?
    6 KB (925 words) - 15:24, 19 November 2021
  • * [[Cookies and privacy badger to respect privacy]] - Cooper * [[Civi CRM = Privacy]] - Dave
    6 KB (790 words) - 02:08, 18 November 2015
  • ** Privacy and data issues--using a cloud-hosted service vs something you install and ** Undocumented immigration, drug policy, reproductive rights, anti-nuke orgs; organizations trying to make active c
    7 KB (1,194 words) - 17:47, 5 May 2015

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)