The Beeb Reports Your Microsoft Word document can give readers more information about you than you might think.
There is a function in many versions of Microsoft Office programs, which includes Word, Excel and PowerPoint, that means that fragments of data (which Microsoft refers to as metadata) from other files you deleted or were working on at the same time could be hidden in any document you save.
This could be embarrassing for any home workers whose colleagues find out that they have been applying for jobs while working at home or being less than complimentary about their co-workers.
The leaky net, from The BBC says in everyday life, with a few simple precautions, you can keep your personal details private. But on the net, almost no matter what you do, you leave behind scraps of information about what you have been doing.
The Wausau Daily Herald Reports the same anonymity that protects Internet users from credit card and identity thefts and from having ne'er-do-wells show up on their doorsteps is a hindrance to law enforcement officers.
Steve Fesenmaier writes "Corporations and other organizations are snooping on their workers' computers more than ever. Here is a good survey of what is going on - and how organizations should have a printed policy,etc.The full story is at
The NYTimes. They say corporate executives are becoming increasingly aggressive about spying on their employees, and with good reason: now, in addition to job shirkers and office-supply thieves, they have to worry about being held accountable for the misconduct of their subordinates. "
Two cheeky fellows at MIT have turned the tables on the US government and its Total Information Awareness program by creating a website that offers information on government officials. Called Government Information Awareness the bonus is that anyone can add their own intelligence reports on officials, with no requirement that the information be verified. One of the project\'s creators, Chris Csikszentmihalyi, refers to it as \"sort of a citizen\'s intelligence agency.\" The TIA, now renamed the Terrorist Information act, after a public outcry over privacy concerns, was created to track possible terrorist activity by analyzing vast amounts of information stored in government and private databases, such as credit card data.
The rest of the story here from Boston.com and here from Wired. Also a great discussion at slashdot. GIA page is very slow to load, or will not load at all, as of 7/5 a.m.
Someone writes " Jonathan Krim
Washington Post Staff Writer looks at the state of online privacy. With the onslaught of spam, almost all companies promise not to sell consumer data. But many don't mention that such information is rented. This means that the list owner won't release the data to an outside marketer, but it will send messages to the list on the outsider's behalf. Targeted lists available for rent number in the thousands, including those from magazines, professional organizations and even political interest groups such as Republicans for Jesus.
"Companies continually troll for, and exploit, personally identifiable information," said Joseph Turow, a media professor at the University of Pennsylvania who specializes in mass marketing. "Some Web sites unabashedly collect all the information they can about visitors and market [it] as aggressively as they can to advertisers and other marketers."
David Hoye has A Column on keeping your computer tracks a secret.
He says Pornography might be at the top of a few lists. But there are plenty of other reasons to cover your electronic tracks. Hiding online shopping for a surprise birthday gift, keeping a nosy roommate at bay or cleaning up an old computer before it's donated are just a few.
He provides a few ways to cover your tracks.
A Very Defiant Duckling Named Ender writes:
"Saying they are worried about Americans' privacy, Pentagon officials announced in a report today that they were changing the name of a projected system to mine databases for information to help catch terrorists to Terrorist Information Awareness from Total Information Awareness."
Ender gives us several views of the story, from the New York Times, the National Law Journal and the Gulf News
(Dateline Dubai). Also an interesting op/ed by Ted Rall.
CNN Reports on an unusual coalition of liberal and conservative advocacy groups and some senators who want to keep tight congressional control on the Pentagon's planned anti-terror surveillance system despite new promises it will use only legally collected personal data.
Surveillance Nation-2 (Part 1) from Technology Review says though we are submitting ourselves to a proliferation of monitoring technologies, a loss of privacy is not inevitable.
They say it will be constrained by the structure of the huge databases necessary to store and manipulate surveillance data—and by the cultural and legal environment in which those databases arise. In fact, the way databases are configured may help foster accountability and usage policies that could regulate the deployment of surveillance.
NPR\'s Larry Abramson reports on librarians\' concerns that anti-terrorism laws will require them to violate their patrons\' privacy. Librarians are holding workshops to learn about their responsibilities and options.
Listen Here [Real File]
Thanks to Jen Young for this link.