privacy
See the following -
StopWatching.Us: Mozilla Launches Massive Campaign On Digital Surveillance
Last week, media reports emerged that the US government is requiring vast amounts of data from Internet and phone companies via top secret surveillance programs. The revelations, which confirm many of our worst fears, raise serious questions about individual privacy protections, checks on government power and court orders impacting some of the most popular Web services. Read More »
- Login to post comments
Suits Against Personal TV Technology And The Right To Innovate Without Permission: EFF 2012 In Review Series
As the year draws to a close, EFF is looking back at the major trends influencing digital rights in 2012 and discussing where we are in the fight for free expression, innovation, fair use, and privacy. Click here to read other blog posts in this series. Read More »
- Login to post comments
Summary Of “ITdotHealth II” – The 2012 Harvard Health IT Meeting
The following is an overview of the conference, held September 10-11, 2012. In several weeks, we will post a complete executive summary, as well as videos and slide presentations from the event. Read More »
- Login to post comments
Target Breach: Are Pharmacy Records Safe?
Target has not indicated that pharmacy records were exposed, although some say the recent data breach amplifies concerns about “medical identity theft” at retail chains with pharmacies. Read More »
- Login to post comments
Test Highlights: How To Do EHR Data Sharing Right
The Department Veterans Affairs and the Substance Abuse and Mental Health Services Administration have demonstrated how to securely share sensitive health information via electronic health records (EHRs). Read More »
- Login to post comments
The Anxiety of Waiting For Test Results
As medical records move online and state regulations loosen, many patients can bypass the doctor’s call and get the results of these tests faster, directly from labs via Web sites and apps.
- Login to post comments
The Belarusian Connection
U.S. intelligence agencies last week urged the Obama administration to check its new healthcare network for malicious software after learning that developers linked to the Belarus government helped produce the website, raising fresh concerns that private data posted by millions of Americans will be compromised. Read More »
- Login to post comments
The Blockchain Is the New Google
At its core, the blockchain is a technology that permanently records transactions in a way that cannot be later erased but can only be sequentially updated, in essence keeping a never-ending historical trail. This seemingly simple functional description has gargantuan implications. It is making us rethink the old ways of creating transactions, storing data, and moving assets, and that’s only the beginning. The blockchain cannot be described just as a revolution. It is a tsunami-like phenomenon, slowly advancing and gradually enveloping everything along its way by the force of its progression. Plainly, it is the second significant overlay on top of the Internet, just as the Web was that first layer back in 1990. That new layer is mostly about trust, so we could call it the trust layer.
- Login to post comments
The Brave New World Of Unmanned Vehicles
While the FAA, other legal and regulatory agencies, and privacy advocates catch up in terms of the legality and ethics o,f such uses of unmanned vehicles, manufacturers are envisioning a future in which UAVs will be a prevalent part of everyday life. "It's going to spark a lot of creativity," said UAV manufacturer Zenon Dragan. Read More »
- Login to post comments
The Coming Push For Open Source Everything
When we can no longer trust proprietary hardware or software, open source becomes the only option Read More »
- Login to post comments
The Data Divide
[T]he digitization of interactions means that every time we carry a smart phone, send a text message, or buy something online, we’re creating value for someone. A lot of it, as it turns out. These days, information isn’t just power, it’s big money.
- Login to post comments
The Digital Panopticon
If the American people sit back and let a digital panopticon be constructed by our government, we will have a nearly impossible time destroying it. The fear which can be created through the threats of constant surveillance and draconian persecution by a government (ex. using the Espionage Act to put leakers away for life) is a powerful mechanism of control that can paralyze an entire population. Read More »
- Login to post comments
The Google File System Makes NSA’s Hack Blatantly Illegal And They Know It
The latest Edward Snowden bombshell that the National Security Agency has been hacking foreign Google and Yahoo data centers is particularly disturbing. Plenty has been written about it so I normally wouldn’t comment except that the general press has, I think, too shallow an understanding of the technology involved. The hack is even more insidious than they know. Read More »
- Login to post comments
The Impact (Or Lack Thereof) Of Mobile Computing On Life Science R&D
The computing transformation being effected by mobile computing may not be one we fully appreciate while burying our heads and thumbs in the latest cool app or game. Yet this transformation is likely the most important since the introduction of the personal computer... It’s that the transformation marks a complete change to the underlying platform. Read More »
- Login to post comments
The iPhone 5S Just Brought Us Closer To The Internet Of Things And A World Of Constant Surveillance
Sensors have played a role in mobile devices for years, even if it was simply a compass designed to help phone users find their bearings (in the woods, supposedly). Yet at Apple’s iPhone launch today, the company announced a “motion co-processor,” the M7 chip, on its higher-end iPhone 5S... Read More »
- Login to post comments