(Translated by https://www.hiragana.jp/)
Privacy and Security - SocialTimes.com
The Wayback Machine - https://web.archive.org/web/20110722064716/http://socialtimes.com:80/category/privacy-and-security

Privacy and Security

Featured Story
Privacy and Security Social Media
Connecticutstatehouse

It has something to do with semantics because the coupons that Groupon sells can fall under that category of gift certificates. Similar to other states, like California, Connecticut says it illegal for gift certificates to expire.

Top Stories
Privacy and Security
Privacy and Security Social Media
Connecticutstatehouse

It has something to do with semantics because the coupons that Groupon sells can fall under that category of gift certificates. Similar to other states, like California, Connecticut says it illegal for gift certificates to expire.

Mediabistro Events
EVENTS
Join best-selling author Gretchen Rubin (left) in our online conference and hands-on workshop, Social Media Marketing Boot Camp, starting September 13. She'll show you how The Happiness Project became a multimedia sensation. Other speakers include David Meerman Scott (Real-Time Marketing & PR), Justin Smith (Inside Network), and Lauren Dugan (AllTwitter). Learn more.
Privacy and Security
Teenagers talking, outdoors

More and more parents are keeping tabs on their children by using Facebook, and a recent study reports kids are becoming aware of their parent’s meddling into their social media activities. I find this statistic interesting: 11 percent of the parents surveyed use Facebook to snoop on their children.

Privacy and Security
knoe.com

total of 500 medium-to-large firms were polled by messaging infrastructure specialist bluesource. Of those polled 75 per cent were in favor of using social media and 58 per cent did so in a concerted way, with Twitter the most popular format, followed by Facebook, Linkedin and Youtube. Those numbers are an indication that security policies or regulations need to be in place in businesses that use social media.

Privacy and Security
kyleproject

Those who were captured on the computer did not know that McDonald was capturing their expressions. Now, people are wondering if it is illegal. Plus, the Secret Service is now looking into the matter.

Privacy and Security
workfromhomescams

The victim clicks on the link in the email. He arrives at the Tumblr site, and is redirected to the fraudulent site. Turiel says the destination page is a “newspaper” where every link leads to the scam purchase page. The page is then customized based on the user’s IP address.

Privacy and Security
googleplus_web

Barely out of the incubator, Google+ has experienced its first major privacy complaint. The Financial Times discovered a loophole. There is a slight bug where users “reshare” any content with anyone. Even if the Circle is private, users can still “reshare” anyone’s content.

Privacy and Security
thetechjump

Grzelak is referring to the whole user database of Groupon’s Indian subsidiary Sosasta.com. The database was accidentally published to the Internet, and then indexed by Google. The database consisted of e-mail addresses and clear-text passwords of the site’s 300,000 users.

Privacy and Security
Governmentsremoval

The requests break down into two key categories. One category is for request for user information, and the other category is for content removal. Similar to other companies, Google reports that they receive requests on a regular basis from government agencies and federal courts around the world. Google’s Government Requests tool reveals the number of requests the platform receives from each government within six-month periods with certain limitations.

Privacy and Security
Phishing Icon

This particular phishing scheme stands out from others. In fact that the scammers are using the compromised Tumblr accounts to set up more and more phishing pages, which are all registered in the last few weeks to bogus clients.

Privacy and Security
Privacy Settings

“This is not only to protect minors from unwanted contacts but also to protect their online reputation. Youngsters do not fully understand the consequences of disclosing too much of their personal lives online. Education and parental guidance are necessary, but we need to back these up with protection until youngsters can make decisions based on full awareness of the consequences.”

NEXT PAGE >>