Facebook fails to convince lawmakers it needs to track your location at all times

Facebook fails to convince lawmakers it needs to track your location at all times

Facebook acknowledged it also targets ads based on the limited location information it receives when users turn off or limit tracking.Facebook doesn't allow users to turn off location-based ads, although it does allow users to block Facebook from collecting their precise location, the company wrote.

Pager systems used in healthcare could be exposing patient data across Canada

Pager systems used in healthcare could be exposing patient data across Canada

VCH declined an interview and provided an email statement that said, in part, their health authority “has clear privacy protocols to protect patient information and we take breaches of privacy extremely seriously.” They also said they recently made changes to their systems to limit patient information sent through paging broadcasts and are working with B.C.’s Office of the Information and Privacy Commissioner as they “move to alternate technologies.”.

DOJ doesn't go far enough to limit searches of consumer DNA services

DOJ doesn't go far enough to limit searches of consumer DNA services

By requiring law enforcement officers to identify themselves prior to searching consumer genetic databases, it limits the problematic practice of officers posing as civilian users while uploading crime scene DNA.

President Trump wants to use an executive order to make the FCC and FTC police social media censorship

President Trump wants to use an executive order to make the FCC and FTC police social media censorship

President Trump’s executive order seeks to accomplish its goal by formally limiting the protections afforded to companies under Section 230 of the Communications Decency Act and by putting the job of policing social media censorship on the Federal Trade Commission (FTC) and the Federal Communications Commission (FCC).

Senator Wyden to AT&T and T-Mobile: You Don’t Need to Store So Much Customer Data

Senator Wyden to AT&T and T-Mobile: You Don’t Need to Store So Much Customer Data

"I write to ask that you protect your customers’ privacy—and U.S. national security—from foreign hackers and spies by limiting the time you keep records about your customers’ communications, web browsing, app usage and movements," Wyden's letter addressed to the CEOs of each teleco reads.

This Is How You're Being Manipulated

This Is How You're Being Manipulated

At a preliminary U.S. Senate hearing today on the subject of potentially putting legislative limits on the persuasiveness of technology - a diplomatic way of saying the addiction model the internet uses to keep people engaged and clicking - Tristan Harris, the executive director of the Center for Humane Technology, told lawmakers that while rules are important, what needs to come first is public awareness.

Canadian News Outlet Warns Canadians That US Law Enforcement Officers Will Pull Them Over And Seize Their Cash

Canadian News Outlet Warns Canadians That US Law Enforcement Officers Will Pull Them Over And Seize Their Cash

He points out that the Canadian government has no law limiting the amount of cash Canadians can take into or out of the country, but that has no bearing on what any local police force inside the US would consider to be the "legal" amount of cash a person -- especially a foreign citizen -- can carry.

Microsoft: The open source company

Microsoft: The open source company

Stallman, who liked to be called by his initials, RMS, in tribute to the way he logged on to the computer, used the Hacker Ethic as a guiding principle for his best-known work, an editing program called EMACS which allowed users to limitlessly customize it its wide-open architecture encouraged people to add to it, improve it endlessly.

How Google's anti-adblocking draft affects other Chromium-based browsers

How Google's anti-adblocking draft affects other Chromium-based browsers

The changes that Google proposes could impact other Chromium-based web browsers such as Vivaldi, Opera, Brave, or the new Microsoft Edge browser as well. How are Google's proposed changes to Chrome's extensions Manifest that would limit adblocking affecting other Chromium-based browsers?.

Data Protection Commission opens statutory inquiry into Google Ireland Limited

Data Protection Commission opens statutory inquiry into Google Ireland Limited

Arising from the Data Protection Commission’s ongoing examination of data protection compliance in the area of personalised online advertising and a number of submissions to the Data Protection Commission, including those made by Dr. Johnny Ryan of Brave, a statutory inquiry pursuant to section 110 of the Data Protection Act 2018 has been commenced in respect of Google Ireland Limited’s processing of personal data in the context of its online Ad Exchange.

Chrome to limit full ad blocking extensions to enterprise users

Chrome to limit full ad blocking extensions to enterprise users

In a response to the overwhelming negative feedback, Google is standing firm on Chrome’s ad blocking changes, sharing that current ad blocking capabilities will be restricted to enterprise users.

While you're sleeping, your iPhone stays busy harvesting data

While you're sleeping, your iPhone stays busy harvesting data

One app, the crime-alert service Citizen, shared personally identifiable information, in violation of its published privacy policy. Apple offers a privacy setting called "Limit Ad Tracking" (sadly off by default) which makes it a little bit harder for companies to track you across apps, by way of a unique identifier for every iPhone.

While you’re sleeping, your iPhone stays busy — snooping on you

While you’re sleeping, your iPhone stays busy — snooping on you

Apple offers a privacy setting called “Limit Ad Tracking” (sadly off by default) which makes it a little bit harder for companies to track you across apps, by way of a unique identifier for every iPhone.

Advertisers Are Hedging on Google as It Enacts GDPR-Compliant Policies

Advertisers Are Hedging on Google as It Enacts GDPR-Compliant Policies

Sources say there are “literally dozens” of RFPs for buy-side ad servers in the North American market at present, with the vast majority of these issued by advertisers reflecting on the impact of Google’s GDPR-compliance policies—i.e., limiting data passbacks to advertisers using its DoubleClick ad stack— that hampered their attempts to implement independent attribution strategies, and in some cases outright shut them down.

Why You Should Be Worried about Online Ad Tracking (Step-By-Step Guide to Stop It)

Why You Should Be Worried about Online Ad Tracking (Step-By-Step Guide to Stop It)

Open Settings Go to Privacy Select Advertising Toggle the Limit Ad Tracking switch Even if you turn this feature off, Apple can still collect data about you to send ads in the right language and for the right location.

Benchmark refutes Google's claim that content blockers slow down Chrome

Benchmark refutes Google's claim that content blockers slow down Chrome

The company plans to limit the webRequest API that extensions, content blockers like uBlock Origin or Adblock Plus, use currently to block certain elements on webpages.

Security/Anti tracking policy

Security/Anti tracking policy

Examples include, but are not limited to: While this type of tracking is not currently blocked in Firefox, we may apply additional restrictions to the third parties engaged in this type of tracking in the future.

The "Do Not Track" Setting Doesn't Stop You from Being Tracked

The "Do Not Track" Setting Doesn't Stop You from Being Tracked

When educated about the true function and limitation of the DNT setting, 75.5% (±3.8) of U.S. adults say it’s "important" or "very important" that these companies "respect the Do Not Track signal when it is enabled." So, in shocking news, when people say they don’t want to be tracked, they really don’t want to be tracked.

Facebook adviser rebukes 'lax' child checks

Facebook adviser rebukes 'lax' child checks

These are external links and will open in a new window These are external links and will open in a new window Image copyright Getty Images Image caption The app gave "nearly limitless access" to a teen's device One of Facebook's independent child safety advisers has criticised the firm over a scheme that gave it access to teenagers' highly personal information, without taking more effort to verify their parents had given permission.

Google can limit 'right to be forgotten' to EU says top court adviser

Google can limit 'right to be forgotten' to EU says top court adviser

FRENCH DISPUTE Google, which estimates that it has removed 2.9 million links under the right to be forgotten, had appealed a 100,000 euro ($115,000) fine from CNIL in March 2016 for failing to delist information across national borders, sending the case to the European Court of Justice.

GitHub now gives free users unlimited private repositories

GitHub now gives free users unlimited private repositories

That said, one weakness of the platform is that it limits who can create private repositories – that is, software projects that aren’t visible to the broader public, and are shared only with a handful of pre-defined collaborators – to paying users.

Facebook Used Data Access as Competitive Weapon, Documents Reveal – Variety

Facebook Used Data Access as Competitive Weapon, Documents Reveal – Variety

Zuckerberg, in a response he posted on Facebook after the documents were released, said the change to limit data access to third-party developers was to counter “shady apps that abused people’s data.” “This was an important change to protect our community, and it achieved its goal,” he wrote.

As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants

As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants

The privacy team had limited ability to review or suggest changes to some of those data-sharing agreements, which had been negotiated by more senior officials at the company.

Coalition and Labor do deal on law enforcement access to encrypted messages

Coalition and Labor do deal on law enforcement access to encrypted messages

In a deal between the attorney general, Christian Porter, and his shadow, Mark Dreyfus, the government has agreed to limit the powers to investigation of “serious offences” and add new safeguards to agencies’ ability to demand tech companies build backdoors into their products.

Understanding Database Reconstruction Attacks on Public Data

Understanding Database Reconstruction Attacks on Public Data

These techniques include cell suppression, which prohibits publishing statistical summaries from small groups of respondents; top-coding, in which ages higher than a certain limit are coded as that limit before statistics are computed; noise-injection, in which random values are added to some attributes; and swapping, in which some of the attributes of records representing different individuals or families are swapped.

Apple is distancing itself again from Google and Facebook with a new privacy website

Apple is distancing itself again from Google and Facebook with a new privacy website

Part of the website focuses on Apple's privacy features and the ways it limits the data it collects. The other part focuses on how a user can limit the data that's collected about him or her, including a new portal for downloading your personal data and deleting your Apple account.

The USMCA, international trade and your digital rights

The USMCA, international trade and your digital rights

The USMCA contains a number of positive provisions that recognize the realities of e-commerce and take steps to ensure that member countries limit barriers to digital trade. Trade agreements like the USMCA also limit the ability of member countries to make their own policies and strategies for the emerging digital world.

Endangering Student Privacy in the Name of School Safety - Center for Democracy & Technology

Endangering Student Privacy in the Name of School Safety - Center for Democracy & Technology

Amassing and integrating large amounts of data without first proving it will be effective, establishing boundaries on its use, enacting strong data governance practices that limit access, or articulating clear data retention and deletion timelines and protocols will almost certainly lead to misuse of this information that may harm the very students it is aimed to protect.