Launch Map. Human Rights Watch finds that officials use the IJOP app to fulfill three broad functions: collecting personal information, reporting on activities or circumstances deemed suspicious, and prompting investigations of people the system flags as problematic.
This particular instance is more alarming than previous—not only are some of the most-downloaded apps on the Google Play Store implicated in the report, they also happen to be developed by Chinese companies that may be sharing collected data with the Chinese government.
As stated by Jerry Brito of the Coin Center, “a cashless society is a surveillance economy.” Bank-mediated transactions enable unprecedented monitoring, and the “death of cash means the birth of perfect financial control.” For example, China’s Social-Credit System punishes behavior the regime deems unfavorable, aided by monitoring via payment platforms.
The Chinese government has been using a private company jointly owned by a U.S. investment firm and its Chinese counterpart to expand its surveillance and telecommunications capabilities using American technology, The Wall Street Journal reports.
As of October, the company has permanently eliminated its “Partner Categories” feature, which had enabled advertisers targeting hyper-specific user demographics to do so by purchasing access, through Facebook, to consumer data gathered by third-party brokers like Acxiom, Datalogix, Epsilon, BlueKai, Oracle, and others.
In 2012, a report by the Federal Trade Commission recommended that the industry set up a public Web portal that would display the names and contact information of every data broker doing business in the United States, as well as describe consumers’ data access rights and other choices.
HELSINKI (Reuters) - Finland’s data protection ombudsman said on Thursday he would investigate whether Nokia-branded phones had breached data rules after a report said the handsets sent information to China.
Twitter is adding new options to its reporting process for tweets that share personal information, adding much more specific fields that users can highlight when submitting reports.
REUTERS/Kacper Pempel/Illustration/File Photo Joseph Cannataci, the U.N. special rapporteur on the right to privacy, submitted the draft questionnaire - touching on everything from chatrooms to systematic surveillance - to the U.N. Human Rights Council, and invited comments by June 30.
Image copyright Google Image caption The Nest Guard acts as a way to arm and disarm the firm's home security alarm system by use of a code or tap of a key fob In response to criticism, Google said on Tuesday: "The on-device microphone was never intended to be a secret and should have been listed in the tech specs.
A coalition of child and privacy advocates filed a complaint with the Federal Trade Commission (FTC) Thursday after court documents that were unsealed last month revealed employees were aware that young children were playing games on the Facebook app and that the company was making it harder for their parents to obtain refunds.
Data from the Office of the Australian Information Commissioner (OAIC) reveals that last year it received 812 notifications as part of the mandatory breach reporting regime. Tags privacy cyber security data breaches Office of the Australian Information Commissioner (OAIC)
— Facebook Filed A Patent To Calculate Your Future Location tech The methods described in three Facebook patent applications use your historical location data - and others' - to…www.buzzfeednews.com So far these two reports have been about downstream data mishandling — what happens several steps after the origin protocols capture and digest location data before selling it off to third parties.
Already under fire for apparently tricking kids into spending their parents’ money to play games on the social networking platform, Facebook now finds itself confronting a new privacy wrinkle that’s emerged and reportedly involves the company paying teenagers and young adults for permission to track everything they do on their phones.
"Despite early reports, there was nothing 'secret' about this; it was literally called the Facebook Research App. It wasn't 'spying' as all of the people who signed up to participate went through a clear on-boarding process asking for their permission and were paid to participate.
In a report published today, Selianin described how someone could exploit the Avastar firmware (based on a custom implementation of the ThreadX real-time operating system) to execute malicious code without any user interaction.
The public will learn how often federal investigators in Seattle obtain private details about your communications, such as who you called and when, as a result of a petition to unseal those records brought by EFF client The Stranger.
USB images instead of ISO images We need your help to test the simplified installation methods of Tails that we will release with 3.12 on January 29.
Nova chief executive Cathy O’Connor said in a statement on Thursday that individuals were being notified about the steps they can take, with the disclosed information varying from person to person.
Private Winten is a new open source software program to adjust privacy and other settings on devices running Microsoft's Windows 10 operating system. The software program has two main functions: provide users with access to privacy related settings, and act as a firewall frontend to block outbound connections by default.
According to the report, which covers the first half of this year, Apple received 32,342 demands for user data from governments -- up 9 percent from the previous period -- spanning access to 163,823 devices.
The company also said it received between 0 and 499 national security orders, including secret rulings from the Foreign Intelligence Surveillance Court, affecting 1,000 and 1,499 accounts.
(Reuters) - Apple Inc (AAPL.O) on Thursday changed how it reports on U.S. national security requests for user data, bringing its procedures more in line with those of technology rivals such as Microsoft Corp (MSFT.O) and Alphabet Inc’s (GOOGL.O) Google.
Late on Tuesday, the New York Times reported that Facebook entered into data-sharing agreements with fellow tech companies that looked a lot like selling our data in exchange for, not money, but access to more of our data.
Target calls its private fusion centers "investigations centers" — the company has people in these centers working 24/7 to monitor surveillance operations at its hundreds of stores nationwide using high tech tools, even satellite imagery.