Exercendo O “Dereito Ao Esquecemento”

Total Page:16

File Type:pdf, Size:1020Kb

Exercendo O “Dereito Ao Esquecemento” Exercendo o “dereito ao esquecemento” Desaparecer da internet ou minimizar a nosa pegada dixital é posible, con todo, esta práctica require ser constante e seguir unha serie de pasos para exercer o que se coñece como “dereito de supresión”, máis coñecido como “dereito ao esquecemento”. Neste artigo describiranse os pasos que deberemos seguir para eliminar o noso rastro da Rede ou, polo menos, reducilo ao máximo. Desde a OSI queremos lembrar que poñemos ao dispor dos usuarios a Liña de Axuda en Ciberseguridad de INCIBE para dar resposta a todas as cuestións relacionadas coa nosa privacidade e seguridade na Rede. O Regulamento Xeral de Protección de Datos (https://www.osi.es/es/actualidad/blog/2018/01/30/proteccion-de-datos-que-novedades-se-avecinan) dita que calquera persoa ten dereito a solicitar, baixo certas condicións, que as ligazóns aos seus datos persoais non figuren nos resultados de procura na internet realizada polo seu nome. Esta posibilidade é o que comunmente se coñece como “exercer o dereito ao esquecemento” e que, noutras palabras, obriga aos buscadores da internet, como Google, a dar todas as facilidades para suprimir da Rede calquera dato persoal con cuxa publicación non estea de acordo a persoa interesada. Ás veces, estes resultados poden vincularse con información desactualizada, erros de fonte mal documentada ou de carácter malicioso. Vexámolo a través dun exemplo: Nosa protagonista, a nai da familia Cibernauta, atopábase facendo un pouco de egosurfing (https://www.osi.es/es/actualidad/blog/2015/11/06/egosurfing-que-sabe-internet-de-nosotros) sobre ela e a súa familia por curiosidade. Para a súa sorpresa, atopou unha web onde aparecía como debedora dun contrato telefónico cun operador moi famoso. Aínda que é certo que tivera problemas con esta empresa no pasado, todos os pagos foron liquidados e non había ningún tipo de débeda que saldar. Rapidamente mobilizouse e púxose en contacto cos administradores do sitio web para solicitar a retirada desa información, con todo, non recibiu resposta algunha. Como se trataba de información que podería prexudicala a ela e á súa familia, non llo pensou dúas veces e púxose en contacto coa Axencia Española de Protección de Datos (https://www.aepd.es/es/areas-de- actuacion/internet-y-redes-sociales/derecho-al-olvido. Eles explicaron paso a paso á nosa protagonista como debía proceder para eliminar a devandita información da internet. Finalmente, a nai da familia conseguiu o seu obxectivo e tras presentar próbalas pertinentes e seguir os pasos requiridos, conseguiu impedir que terceiras persoas puidesen acceder a esa información que non era correcta. Como podo exercer o dereito ao esquecemento en buscadores? Desde que se asinase a sentenza (https://curia.europa.eu/juris/document/document.jsf? docid=152065&doclang=ES) en maio de 2014 onde o Tribunal de Xustiza da Unión Europea declarase que as persoas teñen dereito a solicitar aos motores de procura que retiren determinados resultados das súas procuras, os principais motores puxeron ao dispor dos usuarios unha serie de formularios cos que realizar as súas peticións: 1. Formulario de Google (https://www.google.com/webmasters/tools/legal-removal-request? complaint_type=rtbf&visit_id=1-636515271663747244- 1730995169&hl=es&rd=1&pli=1&authuser=1%20) 2. Formulario de Yahoo (https://io.help.yahoo.com/contact/index? page=contactform&locale=es_ES&token=Zh %2FBBVqXzLHlIbokbUqVWTUbuuQeXGkGFw6kaYtcsz3bJLmIlI3EUv0z8vEZZIiUaV M %2FeyBEjFUCaMU2WNilF1pt08EKxz55Rcv1x17V0EmPwqCwTMq3EFzwfnJNrIXz0Jm kcIODVsGATkR7pX7Nwg%3D%3D&selectedChannel=email-icon&yid=) 3. Formulario de Bing (https://www.bing.com/webmaster/tools/eu-privacy-request) Google mesmo facilitou unha web desde a que poderemos comprobar as estatísticas destas solicitudes. Cando nos atopemos nunha situación similar e queiramos eliminar unha determinada información ou unha URL dos principais buscadores, deberemos seguir estes pasos: 1. Acceder ao formulario correspondente ao buscador do que queiramos eliminar esta información ou URL. Neste exemplo, seguiremos o de Google. 2. Encher todos os campos do apartado A TÚA INFORMACIÓN: país de orixe, nome legal completo, dirección de correo electrónico de contacto, etc. 3. A continuación, cumprimentar os datos referentes á información persoal que queremos eliminar e onde se atopa aloxada (URL). 4. Tras ler e confirmar que entendemos a explicación do tratamento de datos, poderemos asinar a petición e enviala directamente a Google. Debemos ter en conta que a retirada de información non sempre é posible, xa que só deixará de estar visible a través do buscador (https://www.aepd.es/es/areas-de-actuacion/internet-y-redes-sociales/derecho-al-olvido), e que pode tardar un tempo en levar a cabo. Como podo exercer o dereito ao esquecemento en redes sociais? As redes sociais conteñen unha cantidade inmensa de información persoal sobre nós. Por sorte, tamén podemos exercer o dereito ao esquecemento” nelas e conseguir que se elimine toda a información que almacenan. Unha opción sería eliminar de maneira definitiva nosa propia conta de usuario. Con todo, como esta acción borrará todas as imaxes, vídeos e comentarios que publicásemos, moitas redes sociais dispoñen dunha opción para descargar toda a información do noso perfil. Así, aínda que eliminemos a nosa conta, poderemos ter acceso a todas as nosas publicacións e á información que non queiramos perder. • Como eliminar a miña conta de Facebook (https://www.facebook.com/help/250563911970368) • Como eliminar a miña conta de Instagram (https://es- la.facebook.com/help/instagram/139886812848894?helpref=related) • Como eliminar a miña conta de Twitter (https://help.twitter.com/es/managing-your- account/how-to-deactivate-twitter-account) • Como eliminar a miña conta de TikTok (https://support.tiktok.com/es) Se pola contra, consideramos que hai información publicada sobre nós noutros perfís e queremos reclamar a súa eliminación por falta de veracidade ou porque afectan á nosa imaxe e reputación, sempre podemos exercer o noso dereitos ARCO (acceso, rectificación, supresión, oposición https://www.osi.es/es/actualidad/historias-reales/2019/03/27/un-doble-en-la-red) ou pedir aos administradores do servizo que eliminen esta información a través dos mecanismos que faciliten para tal fin. Como podo exercer o dereito ao esquecemento en persoas falecidas? Segundo a LODGDD (https://www.boe.es/buscar/act.php?id=BOE-A-2018-16673), as persoas vinculadas ao falecido, como familiares ou parella de feito, ou aquelas que fosen designadas previamente, poderán exercer o dereitos ARCO dos datos persoais da persoa falecida para a súa rectificación ou supresión (https://www.aepd.es/es/prensa-y-comunicacion/blog/conoces-las- novedades-de-la-nueva-ley-organica-de-proteccion-de-datos). Ademais, moitas redes sociais permiten designar un contacto de legado que poderá administrar a conta do falecido, que pasará a ser conmemorativa, como é o caso de Facebook (https://es- es.facebook.com/help/requestmemorialization), aínda que na maioría bastará con demostrar a nosa relación coa persoa segundo o establecido na LODGDD (Twitter (https://help.twitter.com/es/managing-your-account/contact-twitter-about-a-deceased-family- members-account), Instagram (https://www.facebook.com/help/instagram/264154560391256), Youtube (https://support.google.com/accounts/troubleshooter/6357590?hl=es). Este contacto poderá ademais solicitar a eliminación total da conta en nome do falecido. Como protexer a privacidade? • Agora que xa sabemos como exercer o noso dereito ao esquecemento, é importante que coñezamos como protexer a nosa privacidade cando navegamos pola rede para minimizar a pegada dixital que imos deixando ao noso paso: • Revisemos detidamente a información que compartimos na internet, especialmente en redes sociais (https://www.osi.es/es/campanas/redes-sociales). Unha soa fotografía pode revelar moita máis información do que cremos. • Cifremos aquela información especialmente sensible que debamos enviar por correo electrónico ou que queiramos almacenar na nube. • Á hora de navegar en redes abertas e pouco seguras, non debemos esquecernos de utilizar unha VPN (https://www.osi.es/es/actualidad/blog/2016/11/08/te-explicamos-que-es-una- vpn-y-para-que-se-usa) para crear unha rede privada coa que manter a nosa privacidade intacta. • Activar o modo incógnito cando naveguemos por Internet e, se nos esquecemos, convén eliminar cada certo tempo o historial, as cookies e mesmo o caché do noso navegador (https://www.osi.es/es/actualidad/blog/2019/11/08/sabias-que-los-navegadores-web- almacenan-mas-informacion-de-la-que). • Utilicemos contrasinais seguros (https://www.osi.es/es/campanas/contrasenas- seguras/mejora-tus-contrasenas) para protexer as nosas contas. • Ademais, temos á nosa disposición servizos de correos electrónicos temporais, especialmente útiles cando queremos crearnos unha conta dun só uso nalgunha web ou servizo. • Finalmente, lembremos actualizar os nosos dispositivos, así como manter activadas as ferramentas de protección como o antivirus (https://www.osi.es/es/actualidad/blog/2013/11/04/antivirus-siempre-activados-y- actualizados). Fonte: Oficina de Seguridad del Internauta (OSI).
Recommended publications
  • Vanity Or Privacy? Social Media As a Facilitator of Privacy and Trust
    Vanity or Privacy? Social Media as a Facilitator of Privacy and Trust Jessica Staddon Abstract Google In this position paper, we argue that social media 1600 Amphitheatre Pkwy. provides valuable support for the perception of one’s Mountain View, CA 94043 USA self and others, and in doing so, supports privacy. In [email protected] addition we suggest that engagement, which reflects a certain degree of trust, can be facilitated by social information. We support our arguments with results from a recent privacy survey and a study of social annotations in search. Author Keywords Social; vanity search; social search annotations; privacy; trust ACM Classification Keywords K.4.1.f Privacy General Terms Human Factors; Privacy; Security Introduction The abundance of communication that social media enables clearly can lead to privacy problems, often with severe personal consequences. Jobs have been lost, marriages ended and court cases won all because of unintended sharing of online social communication (e.g. Copyright is held by the author/owner(s). [5, 7]). CSCW’12, February 11–15, 2012, Seattle, Washington, USA. ACM 978-1-4503-1051-2/12/02. This online social communication often comes with two types of audiences. First, there may be a specific target in doing so enables better privacy. In particular, we for the communication (e.g. the owner of the Facebook present survey evidence that “vanity” searches are wall on which a comment is left). In addition, there is associated with an important privacy need. We also often a broader audience who can observe the present evidence compatible with the conjecture that communication (e.g.
    [Show full text]
  • ORACLE MAGAZINE Jonathan Vincenzo, Dan Vlamis Is PROVIDED on an “As Is” Basis
    JULY/AUGUST 2010 Oracle Enterprise Manager 11g New release delivers business-driven IT management / 21 Deriving and Sharing BI Metadata Integrate Oracle Warehouse Builder 11g Release 2 information with Oracle Business Intelligence Enterprise Edition / 59 Automating Parallelism Take the guesswork out of setting the degree of parallelism for queries / 63 On Connecting, Pivoting, and Learning New Things Our technologist bypasses TNSNAMES.ORA, turns rows to columns, and ORACLE.COM/ORACLEMAGAZINE meets the NO_DATA_FOUND exception / 69 THE VIRTUAL ENTERPRISE From desktop to datacenter, Oracle o ers a complete virtualization solution Strategize. Plan. Execute. Gain more insight with Oracle’s enhanced enterprise performance management solution Java Hits the Road Learn the latest from Java luminaries as the Java Bus goes from code to coast One City, One Week, Three Conferences Oracle OpenWorld, JavaOne, and Oracle Develop converge on San Francisco September 19–23 JA10_cover_R1.indd 2 5/25/10 2:30:41 PM Untitled-2 1 3/22/10 8:42 PM Untitled-2 2 3/22/10 8:42 PM Oracle development PL/SQL Developer by Allround Automations. everywhere... PL/SQL Developer is the Oracle development tool that gives you maximum productivity, ease of use and all the features you need, for a reasonable price. Visit our website for additional details: www.allroundautomations.com/plsqldev 4 FEATURED CONTENT VOLUME XXIV - ISSUE 4 CONTENTS THE VIRTUAL ENTERPRISE /36 Virtualization—of desktop, server, or storage resources—requires a reliable infrastructure, solid plan, and strategic management. The payoffs include IT flexibility and efficiency, as well as server consolidation and lower energy costs. Learn how Oracle’s desktop-to-datacenter solutions can virtualize your enterprise.
    [Show full text]
  • Computer-Mediated Discourse Analysis: an Overview of Leading Vocabulary Teaching Strategies
    Advances in Social Science, Education and Humanities Research, volume 217 2nd International Conference on Social, economic, and academic leadership (ICSEAL 2018) Computer-mediated discourse analysis: an overview of leading vocabulary teaching strategies Zinaida Vozgova Faculty of English Philology South Ural State Humanitarian Pedagogical University Lenin prospect, 69, 454080 Chelyabinsk Russian Federation e-mail: [email protected] Olga Afanasyeva Faculty of English Philology South Ural State Humanitarian Pedagogical University Lenin prospect, 69, 454080 Chelyabinsk Russian Federation e-mail: [email protected] Abstract Rapid advances in information technology and proliferation of social media services have caused a radical transformation of human communication. Having created a social media presence people engage in computer-mediated communication, set their own goals as well as perfect their knowledge of English as a global language. The richness and diversity of computer-mediated discourse is concentrated in multiple online experiences and therefore enables to study a great number of linguistic changes. Various studies of computer-mediated discourse analyze socio-psychological characteristics in coherent sequences of sentences, propositions, speech or turns-at-talk. The given article aims at presenting vocabulary teaching strategies to new computer-mediated language and their influence on students’ acquisition. Our contribution provides an overview of the recent new entries of computer-mediated vocabulary in online crowdsourced dictionaries. The main ways of forming new words as well as wide-spread semantic changes are viewed (acronyms, compounds, suffixes, blended words, conversion, etc.) Computer-mediated vocabulary teaching in the classroom covers change, diversity, disputes in economical, political, social spheres (such as narcissistic tendencies, emotional correctness, excessive use of social media and increasing reliance on technology, equal rights movement, task-based employment, etc).
    [Show full text]
  • Contributions to Lifelogging Protection in Streaming Environments
    CONTRIBUTIONS TO LIFELOGGING PROTECTION IN STREAMING ENVIRONMENTS David Pàmies Estrems ADVERTIMENT. L'accés als continguts d'aquesta tesi doctoral i la seva utilització ha de respectar els drets de la persona autora. Pot ser utilitzada per a consulta o estudi personal, així com en activitats o materials d'investigació i docència en els termes establerts a l'art. 32 del Text Refós de la Llei de Propietat Intel·lectual (RDL 1/1996). Per altres utilitzacions es requereix l'autorització prèvia i expressa de la persona autora. En qualsevol cas, en la utilització dels seus continguts caldrà indicar de forma clara el nom i cognoms de la persona autora i el títol de la tesi doctoral. No s'autoritza la seva reproducció o altres formes d'explotació efectuades amb finalitats de lucre ni la seva comunicació pública des d'un lloc aliè al servei TDX. Tampoc s'autoritza la presentació del seu contingut en una finestra o marc aliè a TDX (framing). Aquesta reserva de drets afecta tant als continguts de la tesi com als seus resums i índexs. ADVERTENCIA. El acceso a los contenidos de esta tesis doctoral y su utilización debe respetar los derechos de la persona autora. Puede ser utilizada para consulta o estudio personal, así como en actividades o materiales de investigación y docencia en los términos establecidos en el art. 32 del Texto Refundido de la Ley de Propiedad Intelectual (RDL 1/1996). Para otros usos se requiere la autorización previa y expresa de la persona autora. En cualquier caso, en la utilización de sus contenidos se deberá indicar de forma clara el nombre y apellidos de la persona autora y el título de la tesis doctoral.
    [Show full text]
  • The Self-Googling Phenomenon: Investigating the Performance of Person- Alised Information Resources
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Nicolai, Thomas, Kirchhoff, Lars, Bruns, Axel, Jason, Wilson, & Saunders, Barry (2009) The self-Googling phenomenon: Investigating the performance of person- alised information resources. First Monday, 14(12), pp. 1-9. This file was downloaded from: https://eprints.qut.edu.au/29349/ c Copyright 2009 [please consult the authors] This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] License: Creative Commons: Attribution-Noncommercial-Share Alike 2.5 Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. http:// www.uic.edu/ htbin/ cgiwrap/ bin/ ojs/ index.php/ fm/ article/ view/ 2683/ 2409 QUT Digital Repository: http://eprints.qut.edu.au/ Nicolai, Thomas and Kirchhoff, Lars and Bruns, Axel and Wilson, Jason A.
    [Show full text]
  • Trends 2019 Strangers in a Strange Land
    TRENDS 2019 STRANGERS IN A STRANGE LAND Culture Forecast / January 2019 Trends 2019: Strangers in a Strange Land Table of Contents TABLE OF CONTENTS Navigating this report FRONT MATTER Methodology 04 About Q 05 The Elements of Culture 06 Forces Shaping Culture in 2019 07 Preface 09 Three Driving Cultural Forces in 2019 10 The 15 Trends Shaping Culture in 2019 11 LIVING IN THE SHADOWS Welcome to the Uncanny Valley 17 Identity Integrity 23 Negotiated Reality 31 Accepted Deception 39 Emerging Trends: Spiritual Selfishness + Vetting as a Service 47 Implications for Business & Organizations 50 CTRL-ALT-ESCAPE Technology Giveth — and Taketh Away 53 Tunneling 59 Semi-Presence 67 Thingsourcing 75 Emerging Trends: It’s Complicated + Digital Minimalism 83 Implications for Business & Organizations 86 BREAKING THE ORDINARY The Definition of Us Continues To Expand 89 Algorithms as New Demographics 95 Renorming 105 Rethinking Humanity 113 Emerging Trends: Blank Like Me + Instant Counterculture 123 Implications for Business & Organizations 127 FINAL THOUGHTS On “Hopefunk” 130 Endnote 131 The Team 132 3 Trends 2019: Strangers in a Strange Land Methodology METHODOLOGY Data-driven and expert-informed cultural intelligence. 1 2 3 deep personalization trolling blurred ID shadow + world reality manipulation DATA CULTURAL CULTURAL ANALYTICS FORENSICS LISTENING Using our active learning system We conducted desk research using We used a suite of proprietary tools Q,™ we identified high-energy, public and academic databases to and methodologies to explore and high-momentum macro trends understand the deep contexts of analyze hundreds of millions of with strong current and near- the three macro trends and to cultural conversations to future relevance and explored frame algorithms we subsequently understand how consumers have their interactions with adjacent used in our cultural listening.
    [Show full text]
  • Menores En Internet Y Redes Sociales
    XX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos ACCÉSIT 2016 Es una realidad incontestable que las nuevas tecnologías se han integrado en el día a día de los menores españoles. Partiendo de la asunción de esta coyuntura, la obra de Laura Davara Fernández de Marcos profundiza en el estudio de las impli- Menores en Internet y Redes Sociales: caciones que de ello se deriva, así como en el impacto que internet Derecho Aplicable y Deberes de los Padres y las redes sociales generan en la privacidad de este colectivo. Para ello aborda el marco jurídico nacional aplicable a las distintas y Centros Educativos situaciones que se pueden producir en el uso de internet, con refe- Breve referencia al fenómeno Pokémon Go rencias a normativa de distintos países. Examina, asimismo, el FernándezLaura Davara Marcos de papel que deberían asumir en este ámbito los centros educativos y los padres por su responsabilidad en la educación de los menores Laura Davara Fernández de Marcos y, finalmente, realiza un análisis específico de las implicaciones que el juego «Pokémon Go» ha provocado en la privacidad de sus usuarios y, en particular, en las personas más jóvenes. La obra concluye con una serie de recomendaciones dirigidas a reforzar las garantías, los derechos y la seguridad de los menores en el uso de internet. ISBN 978-84-340-2399-4 Y PARA LAS ADMINISTRACIONES TERRITORIALES 9 7 8 8 4 3 4 0 2 3 9 9 4 enMenores Internet y Redes Sociales MENORES EN INTERNET Y REDES SOCIALES: DERECHO APLICABLE Y DEBERES DE LOS PADRES Y CENTROS EDUCATIVOS Breve referencia al fenómeno Pokémon Go MENORES EN INTERNET Y REDES SOCIALES: DERECHO APLICABLE Y DEBERES DE LOS PADRES Y CENTROS EDUCATIVOS Breve referencia al fenómeno Pokémon Go LAURA DAVARA FERNÁNDEZ DE MARCOS Agencia Española de Protección de Datos Agencia Estatal Boletín Oficial del Estado Madrid, 2017 Copyright ® 2017 Todos los derechos reservados.
    [Show full text]
  • Societal Impacts- Cybercrime & Cyber Law, IT Act.,Ewast Mgmt Health Issues - Technology
    New syllabus 2020-21 Chapter 10 Societal Impacts- Cybercrime & cyber law, IT Act.,Ewast mgmt Health issues - technology Informatics Practices Class XII ( As per CBSE Board) Visit : python.mykvs.in for regular updates Societal Impacts- Part2 Cyber Crime - Any crime that involves a computer and a network is called a “Computer Crime” or “Cyber Crime. Or in other term ,it is a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). STEPS TO PROTECT YOURSELF AGAINST CYBER CRIME 1. Make sure your security software is current – and update it regularly. 2. Lock or log off your computer when you step away. 3. Go offline when you don’t need an internet connection. 4. Consider sharing less online. 5. Think twice about using public Wi-Fi. 6. When in doubt, don’t click. Visit : python.mykvs.in for regular updates Societal Impacts- Part2 Types of Cyber Crime A computer is the target of the attack—for example, a data breach on a bank site A computer is the weapon for an attack—for example, a denial of service (DoS) attack A computer is an accessory to a criminal act—for example, digital identity theft which leads to theft of funds from a bank account Visit : python.mykvs.in for regular updates Societal Impacts- Part2 Hacking – Hacking is the process of gaining unauthorized access into a computing device, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems.
    [Show full text]
  • Guide to Staying Safe Online
    # BEWARE! A Guide to staying safe online BEWARE Ersamus+ Programme Strategic Partnership AGREEMENT No. 2018-1-RO01-KA205-048881 Project Coordinated by: Smart Educational Projects Strada Calea Severinului, Nr.59, Bl.1, Ap1 TÂRGU JIU Romania https://www.bewareproject.eu/ https://www.facebook.com/bewareprojecteu/ https://twitter.com/eu_beware https://www.instagram.com/bewareproject/ https://www.linkedin.com/company/beware-project/ This project has been funded with support from the European Commission. This publication reflects the views of only the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein. Additional information on the Erasmus+ is available on the Internet via the Erasmus+ Project Results Platform https://ec.europa.eu/programmes/erasmus-plus/projects/ Project Partners: 2 # BEWARE! A Guide to staying safe online Preface BEWARE is a project, designed to raise awareness among youths about potential dangers online, whilst equipping them with the knowledge and power to protect themselves. It aims to reach young people, youth workers and other EU citizens to become empowered and responsible digital users. 5 European Superheroes (otherwise known as Project Partners) have joined forces to execute a detailed set of project objectives set out to improve the knowledge and skills of specifically selected sidekicks (target groups). This guide is the result of their research carried out in different countries and will be the sidekicks’ bible. It covers 2 chapters: • Data Protection in the Virtual Environment • Cyber Bullying: from Game to Misdemeanour Amongst other things, it will target the peer-to-peer part of online safety, which is increasingly fostering harassment and cyberbullying, as well as the growing threat of information and identity theft.
    [Show full text]
  • BOG OPEN Agenda
    Oregon State Bar Meeting of the Board of Governors June 22, 2012 Ashland Springs Hotel, Ashland, OR Open Session Agenda The Open Session Meeting of the Oregon State Bar Board of Governors will begin at 1:00 p.m. on June 22, 2012. 1. Call to Order/Finalization of the Agenda 2. Department Presentation A. Diversity & Inclusion [Ms. Hyland] 3. Reports A. Report of the President [Ms. Naucler] Written Exhibit B. Report of the President-elect [Mr. Haglund] Written Exhibit C. Report of the Executive Director [Ms. Stevens] Inform Exhibit D. Board Members’ Reports Inform E. Director of Diversity & Inclusion [Ms. Hyland] Inform F. MBA Liaison Report [Ms. Kohlhoff] Inform G. Oregon New Lawyers Division Report [ONLD Representative] Inform Exhibit 4. Professional Liability Fund A. General Report [Mr. Martinez] Inform Exhibit B. Financial Report [Mr. Martinez] Inform Exhibit 5. Emerging Issues Discussion A. Out-of-Town BOG Meetings [Ms. Naucler] Discuss B. BOG Meeting Frequency [Ms. Naucler] Discuss 6. BOG Committees, Special Committees, Task Forces and Study Groups A. Policy and Governance Committee [Ms. Stevens] 1. Amendment to OSB Bylaw Article 27 Action Exhibit BOG Agenda OPEN June 22, 2012 Page 1 of 3 2. Proposed Amendment to Oregon RPC 5.4 e Inform Exhibit B. Public Affairs Committee [Mr. Larson] 1. Legislative Update Inform 7. Other Action / Discussion Items A. Illinois State Bar Association Resolution/Report re: ABA Policy Action Exhibit B. Centralized Legal Notice System [OLF] Inform Exhibit & Handout C. CLE Seminars Business Plan [Ms. Lee] Inform Exhibit D. Legal Publications Author / Editor Survey Summary Inform Exhibit E.
    [Show full text]
  • " Who Controls the Vocabulary, Controls the Knowledge"
    Acronyms from Future-Based Consultancy & Solutions "Translation" of some Business, Finance, ICDT acronyms (including several SAP ones), initialims, tech term oddities and techronyms, loaded words and buzzwords to ease the reading of courses, books, magazines and papers: see "anacronym", "ASS" and many others ... (third main version since 1997) ( www.fbc-e.com , updated & corrected twice a month. Release 02-10-2009) " Who controls the vocabulary , 6170+ controls the knowledge " George ORWELL in "1984" Instruction To ease your researches , we are inviting you to use the " search " function within the Menu " edit " Pour faciliter vos recherches, utilisez la fonction " rechercher " disponible dans le menu " Edition " Information Underligned names are identifying authors, editors and / or copyrighted applications ©, ®, ™ FBWPA Free Business White Page Available (www.fbc-e.com ) Acronym Rose salmon is related to acronyms and assimilated terms and concepts. IL / InLin Internet Lingo also called " PC talk" Intelligence Light green color is related to intelligence, business intelligence ( BI , CI ) FBC>s Yellow color is related to FBC>s concepts and methodologies (more on www.fbc-e.com ) Finance Deep blue color is related to Finance and Accounting ( FI ) Note: BOLD acronyms KM Deep green color is related to Knowledge Management ( KM ) and texts are "translated" HR & R Lemon green color is related to HR and recruitment in the list. Mobility Light blue color is related to mobile communication ( MoMo ) Security Red color is related to security and risks management ( RM ) Note : US spelling Virtual Pink color is related to virtual / virtuality ( VR ) & ampersand $$$ temporary files Feel free to copy and distribute this "computer-babble *.001 Hayes JT Fax translator" provided that it is distributed only in its 0 Day FTP server supposed to be moved within original and unmodified state with our name, address, the next 24 hours to another IP .
    [Show full text]
  • Towards Efficient and Accurate Privacy Preserving Web Search
    Towards Efficient and Accurate Privacy Preserving Web Search Albin Petit Sonia Ben Mokhtar Lionel Brunie Université de Lyon, CNRS Université de Lyon, CNRS Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, INSA-Lyon, LIRIS, UMR5205, INSA-Lyon, LIRIS, UMR5205, F-69621, France F-69621, France F-69621, France [email protected] [email protected] [email protected] Harald Kosch Universität Passau Innstrasse 43, 94032 Passau, Germany [email protected] ABSTRACT General Terms Querying Web search engines is by far the most frequent Security, Algorithms activity performed by online users and consequently the one in which they are likely to reveal a significant amount of Keywords personal information. Protecting the privacy of Web re- questers is thus becoming increasingly important. This is Privacy, Web search, Unlinkability, Unidentifiability often done by using systems that guarantee unlinkability be- tween the requester and her query. The most effective so- 1. INTRODUCTION lution to reach this objective is the use of anonymous com- Recent surveillance programs (e.g., PRISM) and online munication protocols (e.g., onion routing [10]). However, services (e.g., Google, Facebook, Twitter, etc) demonstrate according to [14], anonymity might not resist to machine the massive use of personal data without any control or learning attacks. Thus, an adversary could link a query to agreement from end-users. In this context, protecting user her requester's public profile. Other approaches (e.g., [8,17]) privacy is becoming increasingly important. Indeed, a re- guarantee unidentifiability of the user interests by generat- cent study shows that 73% of search users do not agree with ing noise (e.g., creating covert queries or adding extra key- search engines keeping track of their searches1.
    [Show full text]