.comment-link {margin-left:.6em;}
Friday, July 22, 2005
  www.GovExec.com - DHS policy shop may reshape agency priorities (7/20/05)
So what's the subtext?
www.GovExec.com - DHS policy shop may reshape agency priorities (7/20/05): "Privacy abuses, Baker said, can be prevented by controlling access to data, conducting electronic audits, and through a cryptographic tool known as anonymization, which allows data to be shared while still controlling conditions of access to that data. For example, lists could be encrypted and then compared electronically. Only items common to both lists would be identified."
Wednesday, July 06, 2005
  blog*on*nymity - bloggin On the Identity Trail
Here's an interesting commentary by outgoing B.C. Information and Privacy Commissioner David Loukidelis:

blog*on*nymity - bloggin On the Identity Trail: "Before privacy laws or the Charter, there was little if anything to stop police or national security operatives from cajoling or coercing information from private sector organizations. A civic-minded government department or company could blab all it wanted about its customers or employees."


You think you know something?
How do you know what you think you know?

May 2004 / June 2004 / July 2004 / August 2004 / September 2004 / October 2004 / November 2004 / December 2004 / January 2005 / March 2005 / April 2005 / May 2005 / June 2005 / July 2005 / August 2005 / November 2005 / December 2005 / January 2006 / July 2006 / October 2006 / January 2009 /


Blogroll Me!

Creative Commons License
Listed on BlogsCanada
Listed on Blogwise
Blogarama - The Blog Directory
Listed on BlogShares
Powered by Blogger


The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.