Knowledge (XXG)

Talk:Internet privacy

Source 📝

1964:
various different products, they were all run as a single business, and were later merged to form Berkeley Premium Nutraceuticals, Inc. Berkeley took orders over the phone, mail and Internet orders. Customers could only purchase products with credit cards which would later be entered into a database along with all of their other information. During sales calls, representatives would read from a script. Shelley Kinmon (an employee) testified that Warshak had the final word on the content of the scripts. The scripts would include a description of the product, as well as persuasive language to get customers to make additional purchases. Enzyte’s popularity was due to Berkeley’s aggressive advertising campaigns. 98% of their advertising was conducted through television sports. Around 2004, network television was covered with Enzyte advertisements featuring a character called “Smilin’ Bob,” whose trademark exaggerated smile was an asset to the result of Enzyte’s success. Warshak used false advertisement within the media. He claimed that there was a 96% customer satisfaction rating, when in reality it was nowhere near those numbers. Many print and television ad’s bragged that Enzyte had been created by reputable doctors with Ivy League educations. According to the ads, “Enzyte was developed by Dr. Fredrick Thomkins, a physician with a biology degree from Stanford and Dr. Michael Moore, a leading urologist from Harvard.” The ads also stated that the doctors had been working on developing such a supplement to “stretch and elongate” for over 13 years. In reality, the doctors were made up characters who didn’t exist nor attended university at Harvard or Stanford.
1601:, enacted in 1986, is known as a “victory for privacy.” This act lays the boundaries for law enforcement having access to person electronic communication and stored electronic records. This includes email, pictures, date books, etc. With the enormous growth in the use of computers, many people store numerous items on servers that can ultimately be visible to many people. The ECPA protects this information from being accessed by law enforcement. There are five parts to the Act. Part I discusses the origin of the ECPA, Part II the law enforcement and the access provisions made involving electronic communication. Part II explains why this Act is needed due to the increase of personal internet use by individuals. Part IV observes the “business records cases” and pinpoints three principles. Lastly, Part V discusses ECPA’s reliance on the “business records cases” and the points against Part IV of the act. 1614:
they will regulate the internet traffic. By doing so, this relates to the employees that the employer will be searching and monitoring emails and internet usage. Delaware charges $ 100 for a violation where Connecticut charges $ 500 for the first violation and then $ 1000 for the second. When looking at public employees and employers, California and Colorado created laws that would also create legal ways in which employers controlled internet usage. The law stated that a public company or agency must create a prior message to the employees stating that accounts will be monitored. Without these laws, employers could access information through employees accounts and use them illegally. In most cases, the employer is allowed to see whatever he or she pleases because of these laws stated both publicly and privately.
1573:
received substantial attention. These rights protect individuals against the obligations by government. The growth of the Internet in general has produced new concerns about protecting the rights of consumers online. The Privacy Act prohibits the disclosure of personal information, no matter how this information is gathered. The consumers’ control and knowledge applied to on the internet come under two categories- purchasing and surfing. The legal protection law for individual privacy in the United States has been passed fairly recently, and limits the protection of data. Data collection methods have raised concerns about consumer privacy. The FTC, in their efforts to ensure success, has developed principles that would protect consumers and the information they choose to display.
1673:"right" is transparency. Companies should outline clearly why they want to collect consumer's data. The third "right" is Respect for context. It means that the firm cannot decide it wants to use data for another purpose. The fourth "right" is Security. Consumers expect that firms provide adequate protection of their data. The fifth "right" is Access and Accuracy. The consumer should able to access their personal data to make edits. The sixth "right" is Focused collection. Companies should only collect the data that they need. The last "right" is Accountability. Companies should be held accountable for lost data. This document has not become a law yet. 1354:). Helps a user identify speziäle policing program. This means - Get internet from any activities in Belgium out without the Belgian police for a Kentnis. Publication, VerÜfentlichengen, discussion, chat, forum's, blog's, preparation, organization and Koordiniation a terrorist attack, etc., transactions over the Internet - Internet - such as banking, including credit card information. The question - Young Gay `s (obgemagerte Cruchon's) erlädigen this difficult job for Belgian police are subject to a secrecy about what they do or can they also Dinst auserkundschaft pralen free to express his opinion and so on? If the police or simply <Boy`s: --> 989:-- I have to disagree. I think that these case studies give the casual wikipedia reader great insight into specific instances where internet search engines have been used by law enforcement agencies. i suspect many people would be interested to know this and the citation provided to the Global Privacy Journal Article would be a great starting point for them to find out more. There simply isn't enough room in this article to have a comprehensive discussion of the need for a "compelte history of the use of search engine data by law enforcement." While that would be great, i think this article does enough to provide a overview of the issues. 1874:
Illinois Ill. Rev. Stat. ch. 5 § 177/15 Maine Me. Rev. Stat. tit. 1 § 14-A § 541- 542 Maryland Md. State Government Code § 10-624 (4) Michigan 2003 Mich Pub. Acts, Act 161 (sec. 572 (7)) Minnesota Minn. Stat. § 13.15 Montana Mont. Code Ann. § 2-17-550 to – 553 New York N.Y. State Tech. Law § 201 to 207 South Carolina S.C. Code Ann. § 30-2-40 Texas Tex. Government Code Ann. § 10-2054.126 Utah Utah Code Ann. § 63D-2-101, −102, −103, −104 Virginia Va. Code § 2.2-3800, – 3801, −3802, −3803
1585:, signed into law on October 26, 2001 by former President Bush, is legislation to enhance law enforcement investigatory tools, investigate online activity, as well as to discourage terrorist acts both within the United States and around the world. This act reduced restrictions for law enforcement to search various methods and tools of communication such as telephone, e-mail, personal records including medical and financial, as well as reducing restrictions with obtaining of foreign intelligence. Many of these expanded powers and lowered standards are not limited to terrorist investigations. 1652:
an act in 1998 and took effect in 2000. Personal information that is not allowed to be obtained from children includes their full name, home or e-mail address, telephone number or social security number. This law was enacted in order to give parental control over the information collected from their children online and to know how that information is used or shared. In order to enforce this law, the FTC actively monitors websites. The FTC recommends that websites screen users if they collect personal information or if children under 13 could potentially be using the website.
600:, just let me cite the first two sentences: "Knowledge (XXG) is not a web directory. However, adding a certain number of external links is of valuable service to our readers.". Ok, not all of those links have been valueable but some of those definitely are. Also links to services for privacy enhancing technologies fit perfectly to this article. You were right, the internal links were placed wrongly, also I didn't know that there were some broken links, because you deleted all of them and not only the broken ones with a suitable comment. 348: 327: 2914:
using false identities or those attempting to work anonymously. A.D.A.P.T. uses only HTTP and JavaScript to identify a device and identifies devices without requesting any personal information entered directly by the user. It makes an accurate “fingerprint” of the device by using many different pieces of information including, operating system, browser, and PC characteristics. A.D.A.P.T. is concealed in that the user of the device has no idea that the device is being “fingerprinted” and there is no actual tagging of the device.
243: 222: 253: 3668: 1589:
believed that by keeping an eye on communication around the country, terrorism could be diminished. Although many people supported this law because of the September 11 attacks and the desire to keep America safe, many believe that this act interferes with civil liberties. The USA PATRIOT Act has been described as “unjustified infringement of privacy, association, and due process rights.” After the act passed, federal law enforcement now has access to additional wiretapping and surveillance.
1960:, decided December 14, 2010 by the Sixth Circuit Court of Appeals, maintained the idea that an ISP actually is allowed access to private e-mail. However, the government must get hold of a search warrant before obtaining such e-mail. This case dealt with the question of emails hosted on an isolated server. Due to the fact that e-mail is similar to other forms of communication such as telephone calls, e-mail requires the same amount of protection under the 4th amendment. 3770:
Applications” (Minen et al.), "Google Street View," and parts of “Big Data,” “Device Fingerprinting,” and “Facial Recognition Technology,” I found that none of these sources specifically categorize the discussed issues as “internet privacy” concerns. The term "internet privacy" does not appear in these references (unless I missed something), and the contexts of the sources focus more on general privacy risks, data protection, or even broader technological impacts.
516:"The Chronicle of Higher Education wrote an article on April 27, 2007 entitled "A MySpace Photo Costs a Student a Teaching Certificate" about Stacy Snyder. She was a student of Millersville University of Pennsylvania who was denied her teaching degree because of an unprofessional photo posted on MySpace, which involved her drinking with a pirates’ hat on and a caption of “Drunken Pirate". Due to this, she was given an English degree." 569:, or links with topical material for those interested in a deeper insight or more perspectives than what the article gives. We normally discourage adding links to mere "services" or "tools", and especially if those are for-pay, commercial entities. The external links section insisted on by the anons is ripe with those. In addition, external links should, obviously, be external. The external links section the anons insist on, contains four 785:
not provide, but nevertheless, I think that it is clear that such a comment fails to satisfy NPOV. Who says that the privacy measures of Facebook (for example) are 'adequate'? additionally, I was encountering difficulty with the spam filter on this page because of the inclusion of one of the links in the 'broken links' section above. I reformatted the spelling of the website so that this edit would go through.
3510:"Google had publicly stated on January 24, 2012, that its privacy policy will once again be altered. This new policy will change the following for its users: (1) the privacy policy will become shorter and easier to comprehend and (2) the information that users provide will be used in more ways than it is presently being used. The goal of Google is to make users’ experiences better than they currently are. 3514:
he/she has used in order to be more accommodating. Google's new privacy policy will combine all data used on Google's search engines (i.e., YouTube and Gmail) in order to work along the lines of a person's interests. A person, in effect, will be able to find what he/she wants at a more efficient rate because all searched information during times of login will help to narrow down new search results."
1843:
to post a conspicuous privacy policy on its web site or online service and to comply with that policy. The bill, among other things, would require that the privacy policy identify the categories of personally identifiable information that the operator collects about individual consumers who use or visit its web site or online service and third parties with whom the operator may share the information.
1661:
recent uprisings about how companies, such as Facebook and Google, are using people’s information, the Obama administration felt it necessary to act. These new regulations will be a “privacy bill of rights.” And as a result, companies will have to change their privacy policies to ensure that personal information will only be used for things specifically permitted by the person giving it.
191: 3575: 1442: 1978:) in turn filed a claim stating "that Google engaged in unfair and deceptive trade practices by transforming its email service into a social networking service without offering users meaningful control over their information or opt-in consent." The FTC established new privacy safeguards for users of Google products in October 2011. 950:
article. To this end I added the "Legal Threats" section, and two such legally sanctioned mens in which online privacy (for better or worse) is curtailed by the state. I view this information as similar, but distinct and more useful than a potentially endless enumeration of case studies. I would love others thoughts on this angle.
2064:, an employee had accessed child pornography websites from his workplace. His employer noticed his activities, made copies of the hard drive, and gave the FBI the employee's computer. At his criminal trial, Ziegler filed a motion to suppress the evidence because he argued that the government violated his Fourth Amendment rights. 1035:
are hiding yourself. Recruiters would be interested in those social medias only for minimizing the risk of hiring a non-interesting workers or also for choosing the best profile between two applicants. Nevertherless it is not always necessarily in a descriminative way, they would rather hire someone that they can trust.
2092:
subscriber records can only be disclosed to law enforcement upon the issuance of a grand jury subpoena. As a result, New Jersey offers greater privacy rights to computer users than most federal courts. This case also serves as an illustration of how case law on privacy regarding workplace computers is still evolving.
678:, but they perfectly belong here and additionaly they are valuable services. No. 5 does not sell anything unlike you said, No 6. sells seals only to website-owners but offers filing of privacy complaints for private persons therefore the target group are also Knowledge (XXG) readers. Mark, 09:02, 16 January 2006 (UTC) 2010:
interference," and "make device interfere wireless network." While court papers did not describe how the FBI obtained his searches (e.g. through a seized hard-drive or directly from the search-engine), Google has indicated that it can provide search terms to law enforcement if given an Internet address or Web cookie.
2049:, reversed its earlier August 2006 decision upon a petition for rehearing. In contrast to the earlier decision, the Court acknowledged that an employee has a right to privacy in his workplace computer. However, the Court also found that an employer can consent to any illegal searches and seizures. See 3769:
I've noticed a few sections in the "Internet Privacy" article that seem to address important privacy concerns, but I’m questioning whether they fit under the scope of “Internet Privacy” as defined by the references used. After reviewing the sources cited in sections such as “Privacy Issues of Medical
3513:
This new privacy policy is planned to come into effect on March 1, 2012. Peter Fleischer, the Global Privacy Counselor for Google, has explained that if a person is logged into his/her Google account, and only if he/she is logged in, information will be gathered from multiple Google services in which
1943:
against Mr. Fortuny and ordered a damages hearing for January 7, 2009. After failing to show up at multiple hearings on damages, Fortuny was ordered to pay $ 74,252.56 for violation of the Copyright Act, compensation for Public Disclosure of Private Facts, Intrusion Upon Seclusion, attorneys fees and
1842:
California (Calif. Bus. & Prof. Code §§ 22575-22578): California's Online Privacy Protection Act requires an operator, defined as a person or entity that collects personally identifiable information from California residents through an Internet web site or online service for commercial purposes,
1613:
When considering the rights between employees and employers regarding internet privacy and protection at a company, different states have their own laws. Connecticut and Delaware both have laws that state an employer must create a written notice or electronic message that provides understanding that
949:
I also agree. Unless a specific case sets a precedent that informs the nature and scope of Internet privacy, I don't believe case studies lend much. I do think that specific ways in which laws, etc. contour online privacy, and a recounting of the laws responsible, add another, needed dimension to the
916:
I'm not convinced that the case studies make a valuable addition to this article. Several commenters above have questioned the neutrality of this article in various ways. These examples are interesting, but seem rather arbitrary and not particularly illustrative of the breadth of the internet privacy
523:
Without knowing the case any more than the article, I suggest someone with more knowledge rectify this situation. I would separate the fact the MySpace experience from the information about her receiving an English degree. I suggest rewriting the last sentence, to "Because of the community's reaction
469:
It does need a lot of clean up still, Steve Rambam's opinion hardly seems significant enough to be front and center on an encyclopedic entry. He was arrested by the FBI in 2006 for "witness tampering and obstruction of justice in an ongoing government case against a former Brooklyn assistant district
2067:
The Ninth Circuit allowed the lower court to admit the child pornography as evidence. After reviewing relevant Supreme Court opinions on a reasonable expectation of privacy, the Court acknowledged that Ziegler had a reasonable expectation of privacy at his office and on his computer. That Court also
3027:
The four cleanup templates at the top of the article had been there for 17 months. That is long enough for improvements to have been made, so I removed them. The templates removed were: "update", "globalize", "overly", and "essay". I left the "Globalize/US|date=September 2012" template that appears
1902:
Although some online exposures of personal information have been seen as justified for exposing malfeasance, many commentators on the Fortuny case saw no such justification here. "The men who replied to Fortuny's posting did not appear to be doing anything illegal, so the outing has no social value
1846:
Connecticut (Conn. Gen Stat. § 42-471): Requires any person who collects Social Security numbers in the course of business to create a privacy protection policy. The policy must be "publicly displayed" by posting on a web page and the policy must (1) protect the confidentiality of Social Security
1651:
prohibits website operators from knowingly collecting personally identifiable information from children under 13 years old without parental consent. It requires site operators to collect only personal information that is “reasonably necessary” for an online activity. This law was put into action as
1588:
The USA PATRIOT Act, professionally known as the “Uniting and Strengthening America by Providing Appropriate Tools Require to Intercept and Obstruct Terrorism Act” was put in to effect in reaction to the 9/11 Terrorist attacks. President Bush wanted to prevent terrorism in the United States and he
799:
I found that in terms of expressing the concept of internet privacy, there was a lot of straightforward statements about the "strength" of some forms of privacy as well as "legitimate" uses of information. I feel it's difficult to nail down in a fashion that is agreeable by everyone as to what is a
784:
I added a fact tag to the assertion that social networking websites provide 'adequate' privacy measures. I don't necessarily disagree, and often counsel friends who hype the perceived privacy problems of sites like myspace and facebook that such pages cannot reveal information that they as users do
2091:
The lower court suppressed the information from Comcast that linked Reid with the crime on grounds that the disclosure violated Reid's constitutional right to be protected from unreasonable search and seizure. The appellate court affirmed, as did the New Jersey Supreme Court, which ruled that ISP
1873:
Arizona Ariz. Rev. Stat. Ann. § 41-4151, 41–4152 Arkansas Ark. Code § 25-1-114 California Cal. Government Code § 11019.9 Colorado Colo. Rev. Stat. § 24-72-501, 24-72-502 Delaware Del. Code tit. 29 § 9017C et seq. Iowa Iowa Code § 22.11
1755:
In addition, California and Utah laws, although not specifically targeted to on-line businesses, require all nonfinancial businesses to disclose to customers, in writing or by electronic mail, the types of personal information the business shares with or sells to a third party for direct marketing
1672:
created to suggest how companies should protect consumer online information. Seven different rights that are outlined in this document. The first "right" is Individual control. Companies must provide clear and easy to understand policies on how they are going to use the consumer's data. The second
1660:
On February 22, 2012 the Obama administration signed an agreement to put some new rules in place to regulate the information that can be taken from people on the Internet. Previously, companies have not been under any federal restrictions and have been basically in charge of themselves. Due to the
1513:
should be cited. The basic point—that storage mechanisms have multiplied, so merely wiping cookies is no longer enough—should be mentioned. I can't confirm the "HTML 5 can store information from at least 10 different sites from your computer, much more than the ordinary cookie" which sounds simply
1469:
The HTML 5 section of the main article seems a bit overbearing and convoluted. There is only one reference for the whole section. It also seems slightly biased, as if trying to convey that HTML 5 as a whole is a negative thing. The second paragraph is written in a confusing manner and does not add
1034:
For example, I think that in the context of an job interview it is very important to do your best to please the recruiters but finally it turns out, after a while, you don't suit the recruiters moreover it is very difficult for them to figure out you really are for two hours specially because you
1018:
I simply cannot get over the fact that people are being treated unfairly in their PROFESSIONAL lives, simply because they have a PERSONAL social networking profile, and are judged by it, ie - what it looks like, what pictures, music, etc, are on it. WHY are professional employers and schools even
2847:
This article needs a massive rewrite & editing. I started to do a little but gave up b/c I don't have the time. It reads like it was written by someone with an extremely dysfunctional grasp on the English language. Sentences are jumbled, words are missing, clauses conflict & repeat, &
1963:
In 2001, Steven Warshak owned and operated a number of small businesses in the Cincinnati area. One of his businesses was TCI Media, Inc, which sold media advertisements in sporting venues. Warshak also owned a dozen other companies that sold herbal supplements. Although all of his companies sold
1743:
Two states, Nevada and Minnesota, require Internet Service Providers to keep private certain information concerning their customers, unless the customer gives permission to disclose the information. Both states prohibit disclosure of personally identifying information, but Minnesota also requires
1604:
This act makes it unlawful under certain conditions for an individual to reveal the information of electronic communication and contains a few exceptions. One clause allows the ISP to view private e-mail if the sender is suspected of attempting to damage the internet system or attempting to harm
1423:
This website could help in supporting information in regards to cases that refer to privacy laws. Many people may not know exactly what their state's laws maybe in regards to internet privacy and this site definitely helps in clearing up information. I feel that cases should be decided off of the
3773:
I believe this article is already rich with highly relevant content on cookies, tracking, and other privacy risks directly linked to internet usage. As such, I’d like to open up a discussion on whether these specific sections should be restructured or potentially relocated to focus more on their
2913:
Sentinel Advanced Detection Analysis and Predator Tracking (A.D.A.P.T.) is device fingerprinting software technology that identifies the device (computer, tablet, smartphone, …) being used to access a website. This information in turn can be used to help differentiate legitimate users from those
1938:
Fortuny did not enter an appearance in the Illinois suit, secure counsel, or answer the complaint after an early amendment. Mr. Fortuny had filed a motion to dismiss, but he filed it with the Circuit Court of Cook County, Illinois, and he did not file proof that he had served the plaintiff. As a
640:
Of course the broken links should not be in the article, the free services should be in the article additionally No. 5 because A4Proxy is a very valueable service and No. 6 because TRUSTe let users file privacy complaints against (registered) websites and informs users about privacy practices of
2112:
against the school district after plaintiffs charged two suburban Philadelphia high schools violated the privacy of students and others when they secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home. The
1572:
The concept of “online privacy” is very broad and tends to cover other aspects of telecommunications and technology. The privacy concerns relate to both the misuse of certain information or the disclosure of this to others. Over the last thirty years, consumer privacy is a public issue that has
1664:
The National Telecommunications and Information Administration in collaboration with certain privacy activist groups will be working to develop “codes of conduct” for companies who collect personal information. However, some people fear the that the Federal Trade Commission will not be able to
453:
Yeah. There's the bit about logging temperature and vibration, and I can't figure out what "a young woman in New York City was on a first date with an online acquaintance and later sued for sexual harassment as they went back to her apartment after when everything became too real" means. This
3272: 2009:
In 2006, a wireless hacker pled guilty when his Google searches were used as evidence against him. The defendant ran a Google search over the network using the following search terms: "how to broadcast interference over wifi 2.4 GHZ," "interference over wifi 2.4 Ghz," "wireless networks 2.4
1981:
The safeguard issued prohibits Google from misrepresenting their privacy practices. It also requires Google to obtain consent from their users before disclosing any information, and lastly, it also requires Google to follow a comprehensive privacy program. Because of this case, Google now
1015:"She was a student of Millersville University of Pennsylvania who was denied her teaching degree because of an unprofessional photo posted on MySpace, which involved her drinking with a pirates’ hat on and a caption of “Drunken Pirate". As a substitute, she was given an English degree." 1383:
The ratings for this article aren't particularly good. 42 to 47 people have rated the page and the ratings on a scale from 1 (poor) to 5 (good) are: 2.3 Trustworthy (47), 2.0 Objective (42), 2.0 Complete (44), and 2.0 Well-written (47). What needs to be done to make the article better?
2087:
In that case, Shirley Reid was indicted for computer theft for changing her employer's password and shipping address on its online account with a supplier. The police discovered her identity after serving the ISP, Comcast, with a municipal subpoena not tied to any judicial proceeding.
921:), an incomplete history of the use of search engine data by law enforcement, and two cherry-picked court cases. I recommend removing this content, though perhaps linking to the Fortuny article. Since this is a large change, I thought I would post here first to see what people think. 3028:
at the beginning of the "Levels of privacy" section since it hasn't been there quite as long and isn't as prominent as the other cleanup tags. None of this should prevent editors from making improvements to the article or discussing possible improvements here on the talk page. --
1772:
Two states, Connecticut and Delaware, require employers to give notice to employees prior to monitoring e-mail communications or Internet access. Colorado and Tennessee require states and other public entities to adopt a policy related to monitoring of public employees' e-mail.
872:
I had a friend check for domain names, and somehow someone grabbed it after several days. This has also happened to me once. How does the law approach this issue? Obviously someone sniffed our IP packets and recovered the domain name we were checking. Who's liable for this?
3003:
Yes, it is long, detailed, and does elaborate on US experience. The subject matter is also large, and many key players in both the open and the closed net tracking business are US based, hence labelling it in a way that makes it look tedious and ethnocentric seems unfair.
1850:
Nebraska (Nebraska Stat. § 87–302(14)): Nebraska prohibits knowingly making a false or misleading statement in a privacy policy, published on the Internet or otherwise distributed or published, regarding the use of personal information submitted by members of the public.
1733:
California Civil Code § 1798.90: The California Reader Privacy Act protects information about the books Californians browse, read or purchase from electronic services and online booksellers, who may have access to detailed information about readers, such as specific pages
1827:
Requires the state or any agency, institution, or political subdivision thereof that operates or maintains an electronic mail communications system to adopt a written policy on any monitoring of electronic mail communications and the circumstances under which it will be
1019:
going on these sites searching for people anyways? I've heard about a clinic denying a patient because of what her Facebook page has on it. Are you FREAKING KIDDING ME??!!!? those people who judge others like this and deny them professional equality. Seriously.
1605:
another user. Another clause allows the ISP to reveal information from a message if the sender or recipient allows to its disclosure. Finally, information containing personal information may also be revealed for a court order or law enforcement’s subpoena.
3007:
Conclusion: while encouraging knowledgeable people to contribute with later than 2012 info, structuring the text with "sattelite" themes to make it shorter and other improvements, the introductory "consumer beware" label should be made more supportive.
1665:
enforce these “codes of conduct” due to the fact that Congress has not passed these privacy regulations to law as of yet. It does appear that companies are willing to work with the government in order to calm the uproar with online privacy currently.
1269:
I've read the section about Sweden under "Laws and regulation" and it feels weird. And what's the matter with the picture of the US politician? As if the picture is there for all to see and know the man who did something. Feels unencyclopedic for me.
1634:
of 1933. The purpose of the legislation was to allow institutions to participate more broadly across investment banking, insurance, and commercial banking. The GLB also includes several provisions that aim to protect consumer data privacy. The
3544:
One of the sources (126) is from a website called "The Rumor Mill News", which seems to be some sort of conspiracy tabloid. On the page itself is a link to a Washington Post article, which would probably be the much better source to choose here.
2827:
moved a lot of material to the talk page (see above), without discussion, and has been blocked. Quite a lot of the moved material was US-specific, so it would have been better to move it to a new US-specific page rather than to the talk page.
2457:
After receiving death threats, Fortuny meticulously scrubbed his real address and phone number from the Internet. "Anyone who knows who and where you are is a security hole," he told me. "I own a gun. I have an escape route. If someone comes, I'm
1473:
Stepping back from the section itself - are cookies the only possible exploit on HTML 5? I don't know the answer myself, but surely there is more information on what things, good or back, HTML 5 brings to the table in regards to Internet privacy.
771:{{cite web | url = http://www.encycl0pediadramatica.com/RFJason_CL_Experiment | author = Encyclopedia Dramatica | title = RFJason CL Experiment | publisher = EncyclopediaDramatica.com | date = 2006-09-13 | accessdate = 2006-09-13 }}</ref: --> 936:
I agree. The article's becoming a coatrack for detailed discussions of cases that don't merit their own articles. Anything in the Fortuny's section that isn't already covered in his article should be moved there, but the rest can go, imo. --
3604:
In the beginning of the article, the word "Physical address" is used, which in this context refers to a person's address (the location of their house). But the hypertext links redirects to the physical address of a memory cell in a computer
971:
Agreed. That material is better organized by moving it to a "list of" type article or just using a category or links to any notable incident. The article needs improvement and clean-up in other ways but narrowing the focus is a good
3774:
actual classification or relevance to other areas (or merged into a more appropriate category). I would greatly appreciate the community's perspective on this matter before making any further edits. Thank you for your consideration!
1681:
In response to rising concerns among Americans regarding privacy on the Internet, states have passed numerous laws that require companies to be somewhat open to showing the users or customers the information they are collecting. The
1106:
Browser and device(as in computer, smart phone, etc.) fingerprinting should be added and have a substantial discussion because this is the latest method of tracking. Editors should look at websites like Panopticlick, BrowserSpy, and
660:
about what not to include: "Sites that primarily exist to sell products or services"). As for 7 and 8, I'm glad we agree :-) I'm sure we can also agree that many potentially useful links are available already through the DMOZ link.
1784:
If an employer has reasonable grounds to believe that employees are engaged in illegal conduct and electronic monitoring may produce evidence of this misconduct, the employer may conduct monitoring without giving prior written
1854:
Pennsylvania (18 Pa. C.S.A. § 4107(a)(10)): Pennsylvania includes false and misleading statements in privacy policies published on web sites or otherwise distributed in its deceptive or fraudulent business practices statute.
773:{{cite web | url = http://www.youtube.com/watch?v=4y6LqhrdAxg | author = ] | title = RFJason CL Experiment on Encyclopedia Dramatica | publisher = Youtube.com | date = 2006-09-13 | accessdate = 2006-09-13 }}</ref: --> 686:
Why is it necessary to highlight these two particular "Noted cases" (AOL data & Craigslist thing). Seems there have been many internet privacy cases over the decades, and these just happen to be recent ones. (I hate
3582: 1355:
mĂšit best connections to Islamist circles? A placement of a child porn Web Since Ciber or - send viruses via a Belgian provider, incognito and invisible to the police Belgique even impossible, right? <Police Kisky:
3822: 1982:
consolidates all of its data files about users into one merged file from each Google service, instead of keeping separate files for each Google service used by each user. This change became effective in March 2012.
713:
I know that Fortuny referred to the prank as an 'experiment', but I don't think the article itself should follow suit, at least not without sarcasm quotes, as there was nothing in Fortuny's methods that resembled an
153: 3624:
It is said that : "Privacy settings are also available on other social networking websites such as Google Plus and Twitter", as though Google plus were still available, while the service stopped a few years ago.
753:
The spam filter is currently stopping me from reverting the vandalism on this page because there is a link already existing on the page which now is on a spam blacklist meaning I can't save the reverted page.
1831:
The policy shall include a statement that correspondence of the employee in the form of electronic mail may be a public record under the public records law and may be subject to public inspection under this
1639:, which implements the security requirements of the GLB Act, requires financial institutions to have reasonable policies and procedures to ensure the security and confidentiality of customer information. 1863:
At least sixteen states require, by statute, government web sites or state portals to establish privacy policies and procedures, or to incorporate machine-readable privacy policies into their web sites.
1798:
Prohibits employers from monitoring or intercepting electronic mail or Internet access or usage of an employee unless the employer has first given a one-time written or electronic notice to the employee.
1200:
This article is very turstworthy, quite biased, very complete, very well-written,and quite accurate. This is very well written and provides a broad variety of information related to internet security.
3718: 1137:; Proposed Changes Aim to Cut Red Tape, but Some Tech Firms Fear Added Burdens. January 26, 2012 page B9. "Companies could be fined up to 2% of global annual turnover if they breach new 1899:
all 178 of the responses, complete with photographs and personal contact details, describing this as the Craigslist Experiment and encouraging others to further identify the respondents.
2444: 3648: 3626: 2929:, Eschell Hamel (Sentinel Tech Holding Corp), a paper submitted to the Internet Safety Technical Task Force, Berkman Center for Internet and Society, Harvard University, July 30, 2008 1935:
According to Fortuny, two people lost their jobs as a result of his Craigslist Experiment and another "has filed an invasion-of-privacy lawsuit against Fortuny in an Illinois court."
1111:(Anonymity Test). Apparently there's a lot of money to be made in user-specific(?) or targeted advertising on the internet, which seems to be what's driving this invasion of privacy. 1289:
Upon quick glance not a single of those is familiar to me as a trustworthy resource. Please feel free to add them back, with explanation here and preferably backed by a statement by
710:
I've trimmed the section on Jason Fortuny's Craigslist prank; it's still a bit too long, I think, but I think getting it any shorter would require an actual rewrite of the section.
1756:
purposes or for compensation. Under the California law, businesses may post a privacy statement that gives customers the opportunity to choose not to share information at no cost.
1928:
indicated that it thought Fortuny might be liable under Washington state law, and that this would depend on whether the information he disclosed was of legitimate public concern.
2020:
In the United States many cases discuss whether a private employee (i.e., not a government employee) who stores incriminating evidence in workplace computers is protected by the
1932:, the EFF's staff attorney, said "As far as I know, they (the respondents) are not public figures, so it would be challenging to show that this was something of public concern." 887:
There are plenty of ways to do that without direct sniffing of your packets; and those methods are far more likely, and irrelevant here. King Spook 02:49, 5 December 2008 (UTC)
820:
Although some online exposures of personal information have been seen as justified as exposing malfeasance, many commentators on the Fortuny case saw no such justification here.
1253:
The article doesn't read like it's in an encyclopedia. It reads more like an essay on the topic. It goes into too many specifics, and I feel that it isn't encyclopedic overall.
800:
valid use of people's information and what isn't. I tried to clean up some of the more blatant issues I felt were there, but I do still feel there is a leaning in this article.
405: 1730:
California Government Code § 6267: Protects an individual’s privacy when using online library resources, such as writing email or text messages, online chat or reading e-books.
3817: 2021: 395: 147: 3446: 3442: 3428: 3100: 3096: 3082: 3234:
I apologize if any of the above are effectively identical; I am just a simple computer program, so I can't determine whether minor differences are significant or not.
2270:
Privacy Rights Clearinghouse (January 2011). “Fact Sheet 7: Workplace Privacy and Employee Monitoring.” Privacy Rights Clearinghouse. Retrieved January 23, 2011 from
3000:
The introduction characterizing this article is exceedingly disparaging. It does give an overview of an important subject and enough links to enable further study.
1781:
Employers who engage in any type of electronic monitoring must give prior written notice to all employees, informing them of the types of monitoring which may occur.
3348: 2973:
Before the Snowden incident, Lavabit had complied with previous search warrants. For example, on June 10, 2013, a search warrant was executed against Lavabit user
573:
links, which should be at "See also" instead. Further, external links should work. The current section includes two links that turn up the HTTP Forbidden message.
371: 2227: 3324: 1974:
In February 2009, Google attempted to create an application called "Buzz." It was attached to Gmail, and allowed for social networking among other users. EPIC (
1216:
Very optimistic view. The article is full if irrelevant details and most important issues are completely missing or buried deeply and very hard to find such as:
2068:
found that his employer could consent to a government search of the computer and that, therefore, the search did not violate Ziegler's Fourth Amendment rights.
3418: 3404: 3390: 3376: 3342: 79: 454:
important article lacks coherence and flow. I'd suggest seperating into provided information (eg. facebook) and collected information (eg. malware, logs, etc)
3162: 2034:
However, one federal court held that employees can assert that the attorney-client privilege with respect to certain communications on company laptops. See
2027:
Most case law holds that employees do not have a reasonable expectation of privacy when it comes to their work related electronic communications. See, e.g.
1801:
Provides exceptions for processes that are performed solely for the purpose of computer system maintenance and/or protection, and for court ordered actions.
309: 3812: 3802: 3254: 1068: 299: 2128: 367: 358: 332: 1648: 1683: 430:
This article includes some good information. Perhaps if the ideas are combined with the digital trail article, we can have a really strong article.
3219: 3166: 1514:
untrue. Each domain can store precisely 1 cookie upon your computer & you can have an essentially unlimited number of domains employing cookies.
44: 85: 2104: 1788:
Provides for civil penalties of $ 500 for the first offense, $ 1,000 for the second offense and $ 3,000 for the third and each subsequent offense.
656:, so I don't see how they belong better here. Nos. 5 and 6 may be valuable to its customers, but not to Knowledge (XXG) readers in general (see 3807: 1744:
ISPs to get permission from subscribers before disclosing information about the subscribers' online surfing habits and Internet sites visited.
3576:
Screengrab of 'Disconnect', (an internet-browser addon), visualizing the many trackers on the website 'abovetopsecret' (on 141127)-cropped.png
2246:
NCSL (October 9, 2009). “State Laws Related to Internet Privacy.” National Conference of State Legislatures. Retrieved January 23, 2011, from
275: 2196: 1975: 1598: 1076:
privacy in particular that does not also apply to all other electronic networking technologies, past, present and almost certainly future. —
3358: 3314: 3068: 2898:
section, but am now wondering if the material is really appropriate for this article or if it should be removed as being too specific or as
2174: 3606: 854: 30: 2680:
Tim Wafa (2009). "Global Internet Privacy Rights – A Pragmatic Approach". University of San Francisco Intellectual Property Law Bulletin.
520:
The funny inference from this paragraph is that due to her picture on Mysapce, she was given an English degree. (as a conciliatory prize)
2926: 1112: 835: 3797: 3722: 3552: 2849: 1364: 1184: 996: 99: 3779: 3529: 3424:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
3078:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
1271: 1090: 497: 455: 1062:
is too narrow. Just for starters, the most crucial legal case in the field had nothing to do with the Internet at all, but rather
266: 227: 104: 20: 3652: 3630: 2113:
schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.
580:(and common sense) on my side, and I'll revert back to my link (which contains many, many links to services and tools through the 3349:
https://web.archive.org/web/20120113003519/http://www.pewinternet.org/Reports/2000/Trust-and-Privacy-Online/Summary/Findings.aspx
3672: 3647:
Please include date, time, and latitude/longitude location in the Exif data of a photograph in the photo internet privacy part.
74: 2343: 168: 3325:
https://web.archive.org/web/20101018071436/http://lippmannwouldroll.com/2010/08/02/privacy-privacy-where-for-art-thou-privacy/
2258:
Cranor, Lorrie Faith (June 1998). “Internet Privacy: A Public Concern.” Lorrie Faith Cranor. Retrieved January 24, 2011, from
2006:
even provided a chunk of its own search data online, allowing reporters to track the online behaviour of private individuals.
202: 3202: 1925: 1353:
Monitoring all connections to the Internet was here in Brussels, angekundigt publicly in newspapers (eg <Metrotime.be: -->
1315: 1145:
that aim to simplify the laws and reduce red tape. The changes, the first overhaul to the data protection rules since 1995,
903: 878: 135: 3419:
http://0-vnweb.hwwilsonweb.com.sculib.scu.edu/hww/results/getResults.jhtml?_DARGS=%2Fhww%2Fresults%2Fresults_common.jhtml.35
3405:
http://0-vnweb.hwwilsonweb.com.sculib.scu.edu/hww/results/getResults.jhtml?_DARGS=%2Fhww%2Fresults%2Fresults_common.jhtml.35
3391:
http://0-vnweb.hwwilsonweb.com.sculib.scu.edu/hww/results/getResults.jhtml?_DARGS=%2Fhww%2Fresults%2Fresults_common.jhtml.35
3377:
http://0-vnweb.hwwilsonweb.com.sculib.scu.edu/hww/results/getResults.jhtml?_DARGS=%2Fhww%2Fresults%2Fresults_common.jhtml.35
3343:
http://0-vnweb.hwwilsonweb.com.sculib.scu.edu/hww/results/getResults.jhtml?_DARGS=%2Fhww%2Fresults%2Fresults_common.jhtml.35
1331:
Lots to clean up here... but the references need a lot of work in particular. Better overview references would be super. --
65: 471: 3676: 2308: 2197:"Reasonable Expectations In Electronic Communications: A Critical Perspective on the Electronic Commincations Privacy Act" 2084:
that computer users have a reasonable expectation of privacy concerning the personal information they give to their ISPs.
1493:
article are interrelated in that security defects in browsers and browser plugins can affect privacy as well as security.
1420: 512:
Under the heading of "Teachers and Myspace", there is a coherence problem in the second paragraph (about Stacy Snyder).
3775: 3590: 3489: 3143: 492: 1847:
numbers, (2) prohibit unlawful disclosure of Social Security numbers, and (3) limit access to Social Security numbers.
1510: 3328: 1814:
In addition, Colorado and Tennessee require certain public entities to adopt a written policy on monitoring of email:
824:
What's malfeasance got to do with semi-random private citizens? This sentence seems irrelevant as phrased currently.
3352: 562: 2129:
http://www.forbes.com/sites/kashmirhill/2012/03/06/what-employers-are-thinking-when-they-look-at-your-facebook-page/
3280: 3177:
article, so I am asking for a sentient editor to look it over and copy the correct ref content into this article.
2282:"FTC Enforces Gramm-Leach-Bliley Act's Safeguards Rule Against Mortgage Companies" Retrieved October 1, 2011 from 566: 129: 109: 1896: 1134: 874: 3667: 3445:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
3099:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
2321: 1550: 3173:'s orphans, the problem is that I found more than one version. I can't determine which (if any) is correct for 2886:
Should the sub-section on "Sentinel Advanced Detection Analysis and Predator Tracking (A.D.A.P.T.)" be removed?
1956: 1895:
Seattle seeking a casual sexual encounter with men in that area. On September 4, he posted to the wiki website
3680: 3610: 2369: 1296:
The first reference is entirely erroneous. The citation belongs to Scott McNealy from Sun Microsystems, 1999:
1279: 1264: 858: 208: 3571:
The following Wikimedia Commons file used on this page or its Wikidata item has been nominated for deletion:
1116: 959: 543: 524:
to her MySpace picture she was not granted her teaching degree." Scrap the whole idea of her English degree.
125: 3744: 3586: 3556: 3480: 3306: 3227: 3134: 3060: 3016: 2853: 2078:
The New Jersey Supreme Court has also issued an opinion on the privacy rights of computer users, holding in
1891:, a Seattle-area freelance graphic designer and network administrator, posed as a woman and posted an ad to 1157:
rules would apply if data are handled abroad by companies that offer their services to EU citizens, such as
1146: 1000: 839: 347: 326: 3548: 3525: 3517: 2859: 2297: 1360: 1303: 1275: 1180: 992: 891: 459: 3302: 2659: 1636: 1623: 1429: 1368: 1225: 1188: 478: 3359:
https://web.archive.org/web/20100802122230/http://www.harvardlawreview.org/issues/120/may07/Note_4397.php
3315:
https://web.archive.org/web/20111005203739/http://www.atg.wa.gov/InternetSafety/FamiliesAndEducators.aspx
3069:
https://web.archive.org/web/20131017033653/http://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt
1260: 55: 3464:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
3452: 3276: 3118:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
3106: 2692: 1479: 1084: 539: 274:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
175: 3305:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit 3059:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit 3012: 2960:
Talk:Lavabit#RfC: Should information about Lavabit complying with previous search warrants be included?
1519:
I'm going to make edits reflecting the above. I also think "code" isn't the right term, HTML5 is a web
766:
I settled for simply removing the citation causing the problem. Replace the '0' in the URL with an 'o'.
474: 70: 3521: 732:
as of oct 2007 the article needs wikified. it seems to be done now, maybe that needs to be taken off?
635: 434: 252: 242: 221: 2833: 2824: 1669: 1498: 1425: 1404: 1024: 739: 696: 2753: 2731: 1546:
Feel free to create an article for us-specific cases or put in article "internet privacy in the us"
1256: 190: 3238: 2986: 1888: 1475: 1142: 977: 918: 853:
This article is too US specific. It gives place names without indicating what country they are in.
161: 1523:
not a code. I'm not sure what privacy enhancements there are in HTML5 but I can research it a bit.
1219: 1050:
just yet, since what to rename it is an open question. This article should obviously be at either
577: 557:
Ok, since anons keep reverting my external links cleanup, let's discuss it. You may be aware that
525: 3756: 3702: 3412: 3398: 3384: 3370: 3362: 3336: 3318: 3072: 2581:(enforcement of the google consent order). Electronic Privacy Information Center, Retrieved from 1929: 1531: 1509:
I agree with Chriisss - the HTML5 section is strange & one-sided. The WHATWG HTML section on
1311: 1055: 955: 899: 671: 445: 3449:
before doing mass systematic removals. This message is updated dynamically through the template
3103:
before doing mass systematic removals. This message is updated dynamically through the template
2616: 801: 470:
attorney who was indicted for money-laundering." From Brian Krebs' time at the Washington Post.
3684: 3465: 3119: 2421: 3738: 3199: 2684: 2681: 1904: 1631: 1490: 1238: 756: 630:: certification, monitoring and dispute resolution in matters of Internet privacy 7. Broken: 529: 363: 141: 51: 2899: 3752: 3298: 3193: 3170: 3155: 3052: 2895: 2891: 1940: 1338: 1205: 1079: 1059: 926: 786: 24: 3472: 3126: 2637: 558: 2829: 2717: 2705: 1582: 1494: 1400: 1138: 1020: 805: 735: 692: 258: 1424:
laws that have been set instone but the laws can be bended to intiate rightful Justice. -
1047: 657: 597: 502: 482: 463: 2595:"Bush Administration Demands Search Data; Google Says No; AOL, MSN & Yahoo Said Yes" 472:
http://voices.washingtonpost.com/securityfix/2006/07/fbi_arrest_private_eye_speaker.html
3431:, "External links modified" talk page sections are no longer generated or monitored by 3235: 3085:, "External links modified" talk page sections are no longer generated or monitored by 3033: 2982: 2941: 2875: 2594: 2259: 1909: 1454: 1389: 1297: 1154: 1051: 973: 941: 723: 3471:
If you found an error with any archives or the URLs themselves, you can fix them with
3438: 3125:
If you found an error with any archives or the URLs themselves, you can fix them with
3092: 2298:/ ' 'The Economist' ', Online Privacy in America: Rights and Wrongs, February 23, 2012 1372: 3791: 3698: 3567:
A Commons file used on this page or its Wikidata item has been nominated for deletion
3195:
Regulating Privacy: Data Protection and Public Policy in Europe and the United States
2080: 2042: 1527: 1307: 895: 442: 3329:
http://lippmannwouldroll.com/2010/08/02/privacy-privacy-where-for-art-thou-privacy/
3223: 2959: 1627: 1234: 649: 3353:
http://pewinternet.org/Reports/2000/Trust-and-Privacy-Online/Summary/Findings.aspx
1399:
It seems far too long, rambling (unfocused), non-neutral, and disorganized to me.
366:
and mass surveillance-related topics. If you would like to participate, visit the
2547: 2529: 2511: 2493: 2475: 2152: 1686:
maintains a web page that lists selected state laws related to Internet privacy.
3748: 3187: 2974: 2417: 2108:(U.S. Eastern District of Pennsylvania 2010), the federal trial court issued an 1918: 1914: 1332: 1201: 922: 662: 585: 3165:
to try to fix reference errors. One of the things I do is look for content for
2582: 2271: 2247: 2140: 3437:. No special action is required regarding these talk page notices, other than 3091:. No special action is required regarding these talk page notices, other than 2617:"Yahoo Knew More About China Journalist Subpoena Than It Told Congress It Did" 2109: 1903:
other than to prove that someone could ruin lives online," said law professor
1892: 1162: 715: 688: 653: 603:
So the following links are missing now in the current verison of the article:
248: 2956:
There is a request for comments (RfC) that may be of interest. The RfC is at
584:
links). I hope the anons will discuss my points here before reverting again.
433:
This page contains a bunch of stupid stuff and just plain nonsense. Cleanup?
3029: 2937: 2871: 1999: 1450: 1385: 1166: 1150: 938: 917:
topic. So far the examples consist of a case study which has its own entry (
719: 675: 645: 2041:
Another recent federal case discussed this topic. On January 30, 2007, the
718:
in the scientific sense. So I've changed one 'experiment' to 'prank'. --
3783: 3726: 3706: 3656: 3634: 3614: 3594: 3560: 3533: 3494: 3284: 3243: 3148: 3037: 3020: 2990: 2945: 2879: 2863: 2837: 2283: 1535: 1502: 1483: 1458: 1433: 1408: 1393: 1343: 1319: 1242: 1209: 1120: 1096: 1038:
Here an article from Forbes magazin that depicts widely my point of view.
1028: 1004: 981: 963: 944: 930: 882: 862: 843: 809: 789: 760: 743: 726: 700: 665: 588: 547: 533: 2927:
Sentinel Advanced Detection Analysis & Predator Tracking (A.D.A.P.T.)
2395: 1526:
I don't understand how LittleBen's comment relates to the HTML5 section.
1170: 271: 426:
Some old comments mixed with one newer comment that weren't in a section
2965: 2964:
At issue is whether we should delete or keep the following text in the
2907:
Sentinel Advanced Detection Analysis and Predator Tracking (A.D.A.P.T.)
2892:
Sentinel Advanced Detection Analysis and Predator Tracking (A.D.A.P.T.)
2311:, National Conference of State Legislatures, accessed 17 September 2012 2322:"Public Access to Records Policy - Libraries and Information Services" 2038:., No. 03CV6327, 2006 U.S. Dist. LEXIS 29387 (E.D.N.Y. May 15, 2006). 623: 2024:
reasonable expectation of privacy standard in a criminal proceeding.
1991: 1158: 3255:
Index of Articles Relating to Terms of Service and Privacy Policies
3257:, which I created in early August. That index helps readers find: 3253:
This week there's discussion about whether to delete or keep the
1072:). Very little (other than technical details) can be said about 3823:
Knowledge (XXG) Ambassador Program student projects, 2012 Spring
2002:), have already been subpoenaed by the US government and China. 581: 2638:"Forget The Government, AOL Exposes Search Queries To Everyone" 644:
There has been consensus to remove nos. 1-3 from articles like
619: 611: 565:. Specifically, we link to sites that are either necessary for 3363:
http://www.harvardlawreview.org/issues/120/may07/note_4397.php
3319:
http://www.atg.wa.gov/InternetSafety/FamiliesAndEducators.aspx
3073:
http://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt
2003: 1995: 1126: 1063: 815:
Possible Fortuny Prank Justification: Exposure of Malfeasance?
184: 15: 3762:
Proposed restructuring of certain sections within the article
3643:
Photo should include information available via the EXIF data
2053:, ___F.3d 1077 (9th Cir. Jan. 30, 2007, No. 05-30177). Cf. 634:
Internet Privacy - Resources, Tips and Articles. 8. Broken:
631: 615: 3683:
during the 2012 Spring term. Further details are available
1349:
NO PROTECTION AGAINST POLICE ! Or, 99999999 Cop's no job's.
674:
it is obvious that they do not belong in the general group
3309:
for additional information. I made the following changes:
3063:
for additional information. I made the following changes:
2981:
Your input on this question would be very much welcome. --
3169:
in wikilinked articles. I have found content for some of
2754:"State v. Reid'', 194 N.J. 386, 954 A.2d 503 (N.J. 2008)" 1804:
Provides for a civil penalty of $ 100 for each violation.
607: 1108: 270:, a collaborative effort to improve the coverage of the 3056: 3271:
Wikipedians are welcome to improve the index, and/or
487:
I would like to suggest that the pronoun "you" should
362:, which aims to improve Knowledge (XXG)'s coverage of 160: 1642: 827:
If you want to talk about justification for exposing
627: 3662:
Knowledge (XXG) Ambassador Program course assignment
2260:
http://lorrie.cranor.org/pubs/networker-privacy.html
1643:
The Children's Online Privacy Protection Act (COPPA)
1298:
http://www.wired.com/politics/law/news/1999/01/17538
3441:using the archive tool instructions below. Editors 3095:using the archive tool instructions below. Editors 2215: 2213: 1419:One link that could be included in this article is 622:: Test to see if your proxy is working 5. Payed: 610:: anonymous surfing, emailing and posting 2. Free: 174: 3267:articles which cover privacy at specific companies 2890:I just spent some time editing the sub-section on 2848:much of it reads like a poorly worded scare tract. 1768:Employee e-mail communications and Internet access 1696:Employee E-mail communications and Internet access 1290: 491:be used in this (or any) Knowledge (XXG) article. 3264:articles on different aspects of privacy policies 2389: 2387: 2309:"Selected State Laws Related to Internet Privacy" 2139:(January 2011) “USA PATRIOT Act.” Retrieved from 1248: 441:Yes, needs cleanup. Did you forget to loigin? -- 3228:EC wants to suppress internet bomb-making guides 33:for general discussion of the article's subject. 2031:, 206 F.3d 392, 398 (4th Cir., Feb. 28, 2000). 1821: 1792: 1775: 831:of some kind, that idea is remotely plausible. 3581:Participate in the deletion discussion at the 3427:This message was posted before February 2018. 3081:This message was posted before February 2018. 1990:Data from major Internet companies, including 1763:Utah Code §§ 13-37-101, −102, −201, −202, −203 2996:Calling for a more positive editorial "label" 2349:. Official California Legislative Information 641:websites. Mark, 19:11, 16 January 2006 (UTC) 380:Knowledge (XXG):WikiProject Mass surveillance 8: 3163:Category:Pages with incorrect ref formatting 2976:for alleged possession of child pornography. 2272:http://www.privacyrights.org/fs/fs7-work.htm 2248:http://www.ncsl.org/default.aspx?tabid=13463 2141:http://www.fincen.gov/statutes_regs/patriot/ 1739:Privacy of personal information held by ISPs 1705:Privacy of personal information held by ISPs 1626:(GLB) was signed into law by U.S. President 1609:Employees and employers Internet regulations 1593:Electronic Communications Privacy Act (ECPA) 1551:Knowledge (XXG):Article size#A rule of thumb 626:: connects to anonymous proxies 6. Payed: 559:Knowledge (XXG) is not a repository of links 3275:if it should be deleted or kept available. 2583:http://epic.org/privacy/ftc/google/consent- 3732:Why is this article's neutrality disputed? 3546: 3515: 3051:I have just modified one external link on 2242: 2240: 2238: 1069:Steve Jackson Games v. U.S. Secret Service 321: 216: 3818:Top-importance Mass surveillance articles 3297:I have just modified 4 external links on 1777:General Statutes of Connecticut § 31-48d 1711:Privacy policies for government web sites 1684:National Conference of State Legislatures 1421:National Conference of State Legislatures 1293:or similar. -- 10:03, 4 March 2012 (UTC) 1249:Doesn't read like an encyclopedic article 3249:Delete or keep an index to this subject? 3220:Bomb-making instructions on the internet 2952:RfC concerning the Lavabit email service 2564: 2562: 2560: 2558: 2556: 2293: 2291: 1649:Children's Online Privacy Protection Act 1561:Start of content saved from main article 1549:This article is also still way too long 3691:The above message was substituted from 2919: 2443:Schwartz, Mattathias (August 3, 2008). 2396:"Prankster posts sex ad replies online" 2226:was invoked but never defined (see the 2155:. Electronic Privacy Information Center 2121: 2105:Robbins v. Lower Merion School District 2097:Robbins v. Lower Merion School District 1760:California Civil Code §§ 1798.83 to .84 749:Help reverting vandalism -- impossible! 323: 218: 188: 3719:2600:1002:B02A:CA96:7467:4D7:FEBC:6DD5 2812:End of content saved from main article 2713: 2701: 2690: 2615:Previous post Next post (2007-07-30). 2284:http://www.ftc.gov/opa/2004/11/ns.shtm 1986:Search engine data and law enforcement 1859:Privacy policies: Government web sites 1489:This Internet privacy article and the 1415:State Laws Related to Internet Privacy 383:Template:WikiProject Mass surveillance 2394:Anick Jesdanun (September 12, 2006). 1976:Electronic Privacy Information Center 1599:Electronic Communications Privacy Act 7: 3731: 2870:I agree that a rewrite is needed. -- 1748:Minnesota Statutes §§ 325M.01 to .09 1702:Privacy of certain online activities 868:How about the privacy of IP packets? 284:Knowledge (XXG):WikiProject Internet 264:This article is within the scope of 2662:. London: Technology.guardian.co.uk 2218: 207:It is of interest to the following 23:for discussing improvements to the 3813:B-Class Mass surveillance articles 3681:Knowledge (XXG) Ambassador Program 3671:This article is the subject of an 3649:2600:1700:D591:5F10:526:FAD:2:ED24 3627:2A04:CEC0:100E:25A5:0:6A:E852:7A01 3620:Google plus does not exist anymore 2368:Neva Chonin (September 17, 2006). 14: 3803:High-importance Internet articles 3766:Hello Knowledge (XXG) Community, 3600:"Physical Adress" is a wrong link 3507:Under "Search Engines" it reads: 3301:. Please take a moment to review 3055:. Please take a moment to review 2057:, 456 F.3d 1138 (9th Cir. 2006). 1818:Colorado Rev. Stat. § 24-72-204.5 1751:Nevada Revised Statutes § 205.498 561:. There are guidelines regarding 50:New to Knowledge (XXG)? Welcome! 3675:at Carnegie Mellon supported by 3666: 2658:Andrew Brown (August 28, 2006). 1440: 1141:rules proposed Wednesday by the 346: 325: 251: 241: 220: 189: 45:Click here to start a new topic. 849:There is a world outside the US 636:How To Cover Your Online Tracks 400:This article has been rated as 304:This article has been rated as 3784:16:16, 16 September 2024 (UTC) 3727:22:34, 30 September 2023 (UTC) 3657:22:28, 12 September 2022 (UTC) 3503:Seemingly outdated information 3285:17:06, 13 September 2017 (UTC) 2324:. City of Pasadena, California 1926:Electronic Frontier Foundation 1838:Privacy policies for web sites 1708:Privacy policies for web sites 1503:02:15, 20 September 2012 (UTC) 1484:03:34, 18 September 2012 (UTC) 1459:02:58, 18 September 2012 (UTC) 1434:01:37, 18 September 2012 (UTC) 1409:02:21, 20 September 2012 (UTC) 1177:22:39, 27 January 2012 (UTC) 701:20:20, 12 September 2006 (UTC) 598:Knowledge (XXG) External Links 534:01:29, 14 September 2008 (UTC) 1: 3808:WikiProject Internet articles 3495:15:13, 15 November 2017 (UTC) 3038:09:47, 23 November 2013 (UTC) 3021:06:53, 23 November 2013 (UTC) 1542:Create a us-specific article? 1536:18:04, 11 December 2012 (UTC) 1265:19:44, 16 February 2012 (UTC) 1121:18:03, 28 December 2011 (UTC) 1097:06:08, 28 February 2011 (UTC) 982:23:21, 21 February 2009 (UTC) 810:03:36, 10 February 2008 (UTC) 727:15:47, 24 November 2006 (UTC) 464:05:45, 15 February 2012 (UTC) 359:WikiProject Mass surveillance 287:Template:WikiProject Internet 278:and see a list of open tasks. 42:Put new text under old text. 3757:00:04, 8 November 2023 (UTC) 3595:01:52, 1 December 2021 (UTC) 3540:The Rumor Mill News, Really? 3198:. Cornell University Press. 2902:. Here is the current text: 2838:00:08, 19 October 2012 (UTC) 2597:. Blog.searchenginewatch.com 2478:(D. Ill. December 15, 2008). 1939:result, the court entered a 1883:Jason Fortuny and Craigslist 1243:14:17, 7 February 2012 (UTC) 1210:16:20, 5 February 2012 (UTC) 1135:EU Unveils Web-Privacy Rules 1029:02:00, 21 January 2010 (UTC) 1005:19:17, 25 October 2009 (UTC) 964:00:49, 9 February 2009 (UTC) 945:23:23, 24 January 2009 (UTC) 931:16:55, 5 December 2008 (UTC) 883:22:21, 3 December 2008 (UTC) 795:Degrees of severity and risk 790:16:35, 25 October 2007 (UTC) 666:19:45, 16 January 2006 (UTC) 589:11:44, 16 January 2006 (UTC) 483:16:25, 31 October 2015 (UTC) 425: 3707:15:54, 2 January 2023 (UTC) 3561:15:00, 6 October 2021 (UTC) 2991:05:05, 29 August 2013 (UTC) 2819:Moved material needs review 2036:Curto v. Medical World Comm 1668:It was a document that the 1511:privacy & user tracking 863:11:35, 18 August 2008 (UTC) 780:social networks and privacy 548:16:32, 6 October 2020 (UTC) 503:03:47, 26 August 2005 (UTC) 3839: 3743:Why does the article have 3635:17:49, 5 August 2022 (UTC) 3615:17:39, 5 August 2022 (UTC) 3458:(last update: 5 June 2024) 3294:Hello fellow Wikipedians, 3149:05:04, 12 April 2017 (UTC) 3112:(last update: 5 June 2024) 3048:Hello fellow Wikipedians, 2864:01:17, 15 March 2013 (UTC) 2640:. Techdirt.com. 2006-08-07 1823:Tennessee Code § 10-7-512 1280:07:21, 24 April 2021 (UTC) 406:project's importance scale 386:Mass surveillance articles 310:project's importance scale 3798:B-Class Internet articles 2946:12:50, 17 July 2013 (UTC) 2880:12:52, 17 July 2013 (UTC) 2660:"They know all about you" 2372:. San Francisco Chronicle 1887:In early September 2006, 1794:Delaware Code § 19-7-705 1630:and repealed part of the 1373:10:58, 15 June 2012 (UTC) 1348: 1320:19:44, 9 March 2012 (UTC) 744:04:27, 5 April 2008 (UTC) 448:07:28, Dec 20, 2004 (UTC) 437:07:27, 20 Dec 2004 (UTC) 399: 341: 303: 236: 215: 80:Be welcoming to newcomers 3534:12:22, 4 June 2019 (UTC) 3244:10:48, 11 May 2017 (UTC) 3161:I check pages listed in 2756:. Lawlibrary.rutgers.edu 2734:. Lawlibrary.rutgers.edu 2153:"EPIC – USA PATRIOT Act" 1957:United States v. Warshak 1394:02:31, 6 July 2012 (UTC) 1357:-- Drink only Uissky . 1344:22:56, 22 May 2012 (UTC) 844:01:44, 17 May 2008 (UTC) 761:22:12, 22 May 2007 (UTC) 652:already, and no. 4 from 3776:Professorincryptography 3713:4325 Chippendale Street 3290:External links modified 3154:Orphaned references in 3044:External links modified 1693:Electronic surveillance 1153:, would also mean that 1149:was used by just 1% of 1011:MySpace? Seriously???? 670:As the links are about 493:One-dimensional Tangent 370:, or contribute to the 356:is within the scope of 3673:educational assignment 3181:Reference named "reg": 2700:Cite journal requires 2528:(D. Ill. 04/09/2009), 1917:described Fortuny as " 1897:Encyclopædia Dramatica 1835: 1807: 1791: 1656:Privacy Bill of Rights 1624:Gramm-Leach-Bliley Act 1618:Gramm-Leach-Bliley Act 1226:browser fingerprinting 1102:Browser Fingerprinting 822: 578:Knowledge (XXG) policy 197:This article is rated 75:avoid personal attacks 2896:Device fingerprinting 2550:(D. Ill. 04/09/2009). 2514:(D. Ill. 01/07/2009). 2496:(D. Ill. 11/12/2008). 2420:(September 8, 2006). 2344:"Senate Bill No. 602" 1470:much to the article. 1109:http://ip-check.info/ 1046:Not filing this as a 818: 201:on Knowledge (XXG)'s 100:Neutral point of view 3439:regular verification 3093:regular verification 2222:The named reference 1670:Obama Administration 1568:Laws and regulations 912:Remove Case Studies? 875:Nathanael Bar-Aur L. 267:WikiProject Internet 105:No original research 3429:After February 2018 3167:orphaned references 3083:After February 2018 2732:"a-105-06.doc.html" 2195:Mulligan, Deirdre. 2173:McCarthy, Michael. 1725:Libraries and books 1327:overview references 1143:European Commission 508:Editing one section 3694:{{WAP assignment}} 3685:on the course page 3587:Community Tech bot 3483:InternetArchiveBot 3434:InternetArchiveBot 3192:Bennett, Colin J. 3137:InternetArchiveBot 3088:InternetArchiveBot 2712:Unknown parameter 2398:. Associated Press 2370:"Sex and the City" 2022:Fourth Amendment's 1689:These laws cover: 1449:. I added this. -- 1056:electronic privacy 672:internet anonymity 203:content assessment 86:dispute resolution 47: 3717:I get no privacy 3563: 3551:comment added by 3536: 3520:comment added by 3459: 3113: 3030:Jeff Ogden (W163) 2938:Jeff Ogden (W163) 2872:Jeff Ogden (W163) 2224:privacyrights.org 2175:"USA PATRIOT Act" 1905:Jonathan Zittrain 1714:Security breaches 1632:Glass-Stegall Act 1491:Internet security 1451:Jeff Ogden (W163) 1386:Jeff Ogden (W163) 1363:comment added by 1342: 1323: 1306:comment added by 1183:comment added by 1147:when the Internet 1094: 995:comment added by 908: 894:comment added by 576:I believe I have 501: 420: 419: 416: 415: 412: 411: 377:Mass surveillance 364:mass surveillance 333:Mass surveillance 320: 319: 316: 315: 290:Internet articles 183: 182: 66:Assume good faith 43: 3830: 3745:this cleanup tag 3742: 3709: 3696: 3695: 3670: 3493: 3484: 3457: 3456: 3435: 3416: 3402: 3388: 3374: 3340: 3299:Internet privacy 3277:Numbersinstitute 3241: 3215: 3213: 3211: 3171:Internet privacy 3156:Internet privacy 3147: 3138: 3111: 3110: 3089: 3053:Internet privacy 2930: 2924: 2866: 2804: 2801: 2795: 2792: 2786: 2783: 2777: 2771: 2765: 2764: 2762: 2761: 2750: 2744: 2743: 2741: 2739: 2728: 2722: 2721: 2715: 2709: 2703: 2698: 2696: 2688: 2677: 2671: 2670: 2668: 2667: 2655: 2649: 2648: 2646: 2645: 2634: 2628: 2627: 2625: 2624: 2619:. Blog.wired.com 2612: 2606: 2605: 2603: 2602: 2591: 2585: 2575: 2569: 2566: 2551: 2545: 2539: 2533: 2527: 2521: 2515: 2509: 2503: 2497: 2491: 2485: 2479: 2473: 2467: 2461: 2460: 2454: 2452: 2447:. New York Times 2440: 2434: 2433: 2431: 2429: 2414: 2408: 2407: 2405: 2403: 2391: 2382: 2381: 2379: 2377: 2365: 2359: 2358: 2356: 2354: 2348: 2340: 2334: 2333: 2331: 2329: 2318: 2312: 2306: 2300: 2295: 2286: 2280: 2274: 2268: 2262: 2256: 2250: 2244: 2233: 2232: 2231: 2225: 2217: 2208: 2207: 2205: 2203: 2192: 2186: 2185: 2183: 2181: 2170: 2164: 2163: 2161: 2160: 2149: 2143: 2137: 2131: 2126: 2117:Saved references 1941:default judgment 1810:Public employers 1448: 1444: 1443: 1375: 1336: 1322: 1300: 1192: 1095: 1089: 1088: 1060:Internet privacy 1007: 907: 888: 538:I love bellies 495: 388: 387: 384: 381: 378: 354:Internet privacy 350: 343: 342: 337: 329: 322: 292: 291: 288: 285: 282: 261: 256: 255: 245: 238: 237: 232: 224: 217: 200: 194: 193: 185: 179: 178: 164: 95:Article policies 25:Internet privacy 16: 3838: 3837: 3833: 3832: 3831: 3829: 3828: 3827: 3788: 3787: 3764: 3736: 3734: 3715: 3693: 3692: 3690: 3677:Knowledge (XXG) 3664: 3645: 3622: 3602: 3583:nomination page 3569: 3542: 3505: 3487: 3482: 3450: 3443:have permission 3433: 3410: 3396: 3382: 3368: 3334: 3307:this simple FaQ 3292: 3251: 3239: 3230:, Julye 4, 2007 3209: 3207: 3205: 3191: 3159: 3141: 3136: 3104: 3097:have permission 3087: 3061:this simple FaQ 3046: 2998: 2954: 2933: 2925: 2921: 2888: 2857: 2845: 2825:User:Waveclaira 2821: 2814: 2807: 2803:Id. at 3 96–97. 2802: 2798: 2793: 2789: 2784: 2780: 2772: 2768: 2759: 2757: 2752: 2751: 2747: 2737: 2735: 2730: 2729: 2725: 2711: 2699: 2689: 2679: 2678: 2674: 2665: 2663: 2657: 2656: 2652: 2643: 2641: 2636: 2635: 2631: 2622: 2620: 2614: 2613: 2609: 2600: 2598: 2593: 2592: 2588: 2576: 2572: 2567: 2554: 2541: 2540: 2536: 2523: 2522: 2518: 2505: 2504: 2500: 2487: 2486: 2482: 2469: 2468: 2464: 2450: 2448: 2442: 2441: 2437: 2427: 2425: 2416: 2415: 2411: 2401: 2399: 2393: 2392: 2385: 2375: 2373: 2367: 2366: 2362: 2352: 2350: 2346: 2342: 2341: 2337: 2327: 2325: 2320: 2319: 2315: 2307: 2303: 2296: 2289: 2281: 2277: 2269: 2265: 2257: 2253: 2245: 2236: 2223: 2221: 2219: 2211: 2201: 2199: 2194: 2193: 2189: 2179: 2177: 2172: 2171: 2167: 2158: 2156: 2151: 2150: 2146: 2138: 2134: 2127: 2123: 2119: 2100: 2076: 2018: 1988: 1972: 1952: 1949:USA vs. Warshak 1885: 1880: 1861: 1840: 1812: 1770: 1741: 1727: 1679: 1677:U.S. state laws 1658: 1645: 1637:Safeguards Rule 1620: 1611: 1595: 1583:USA Patriot Act 1579: 1577:USA Patriot Act 1570: 1563: 1544: 1467: 1441: 1439: 1417: 1381: 1358: 1351: 1329: 1301: 1287: 1251: 1198: 1178: 1139:data protection 1131: 1104: 1083: 1077: 1044: 1013: 990: 914: 889: 870: 851: 817: 797: 782: 751: 746: 708: 684: 638: 563:what to link to 555: 510: 428: 385: 382: 379: 376: 375: 335: 306:High-importance 289: 286: 283: 280: 279: 259:Internet portal 257: 250: 231:High‑importance 230: 198: 121: 116: 115: 114: 91: 61: 12: 11: 5: 3836: 3834: 3826: 3825: 3820: 3815: 3810: 3805: 3800: 3790: 3789: 3763: 3760: 3733: 3730: 3714: 3711: 3663: 3660: 3644: 3641: 3639: 3621: 3618: 3607:80.214.127.225 3601: 3598: 3579: 3578: 3568: 3565: 3541: 3538: 3504: 3501: 3499: 3477: 3476: 3469: 3422: 3421: 3407: 3393: 3379: 3365: 3357:Added archive 3355: 3347:Added archive 3345: 3331: 3323:Added archive 3321: 3313:Added archive 3291: 3288: 3269: 3268: 3265: 3262: 3250: 3247: 3232: 3231: 3216: 3203: 3158: 3152: 3131: 3130: 3123: 3076: 3075: 3067:Added archive 3045: 3042: 3041: 3040: 2997: 2994: 2979: 2978: 2953: 2950: 2949: 2948: 2932: 2931: 2918: 2917: 2916: 2915: 2910: 2909: 2887: 2884: 2883: 2882: 2862:comment added 2844: 2843:Rewrite Needed 2841: 2823:It seems that 2820: 2817: 2816: 2815: 2810: 2809: 2808: 2806: 2805: 2796: 2787: 2778: 2766: 2745: 2723: 2672: 2650: 2629: 2607: 2586: 2570: 2552: 2543:Doe v. Fortuny 2534: 2525:Doe v. Fortuny 2516: 2507:Doe v. Fortuny 2498: 2489:Doe v. Fortuny 2480: 2471:Doe v. Fortuny 2462: 2445:"Malwebolence" 2435: 2409: 2383: 2360: 2335: 2313: 2301: 2287: 2275: 2263: 2251: 2234: 2209: 2187: 2165: 2144: 2132: 2120: 2118: 2115: 2099: 2094: 2075: 2070: 2017: 2012: 1987: 1984: 1971: 1966: 1951: 1946: 1884: 1881: 1879: 1878:Specific cases 1876: 1860: 1857: 1839: 1836: 1834: 1833: 1829: 1820: 1819: 1811: 1808: 1806: 1805: 1802: 1799: 1790: 1789: 1786: 1782: 1769: 1766: 1765: 1764: 1761: 1753: 1752: 1749: 1740: 1737: 1736: 1735: 1731: 1726: 1723: 1722: 1721: 1718: 1715: 1712: 1709: 1706: 1703: 1700: 1697: 1694: 1678: 1675: 1657: 1654: 1644: 1641: 1619: 1616: 1610: 1607: 1594: 1591: 1578: 1575: 1569: 1566: 1565: 1564: 1559: 1558: 1557: 1555: 1543: 1540: 1539: 1538: 1524: 1516: 1515: 1506: 1505: 1466: 1463: 1462: 1461: 1416: 1413: 1412: 1411: 1380: 1377: 1350: 1347: 1328: 1325: 1291:http://eff.org 1286: 1285:External links 1283: 1250: 1247: 1246: 1245: 1231: 1230: 1229: 1228: 1223: 1197: 1194: 1175: 1174: 1155:European Union 1130: 1124: 1103: 1100: 1052:online privacy 1043: 1040: 1033: 1012: 1009: 987: 986: 985: 984: 952: 951: 947: 913: 910: 869: 866: 855:78.149.219.203 850: 847: 816: 813: 796: 793: 781: 778: 776: 768: 767: 750: 747: 734: 731: 707: 704: 683: 680: 612:Stay invisible 605: 554: 553:External links 551: 518: 517: 509: 506: 467: 466: 450: 449: 427: 424: 422: 418: 417: 414: 413: 410: 409: 402:Top-importance 398: 392: 391: 389: 351: 339: 338: 336:Top‑importance 330: 318: 317: 314: 313: 302: 296: 295: 293: 276:the discussion 263: 262: 246: 234: 233: 225: 213: 212: 206: 195: 181: 180: 118: 117: 113: 112: 107: 102: 93: 92: 90: 89: 82: 77: 68: 62: 60: 59: 48: 39: 38: 35: 34: 28: 13: 10: 9: 6: 4: 3: 2: 3835: 3824: 3821: 3819: 3816: 3814: 3811: 3809: 3806: 3804: 3801: 3799: 3796: 3795: 3793: 3786: 3785: 3781: 3777: 3771: 3767: 3761: 3759: 3758: 3754: 3750: 3746: 3740: 3729: 3728: 3724: 3720: 3712: 3710: 3708: 3704: 3700: 3688: 3686: 3682: 3678: 3674: 3669: 3661: 3659: 3658: 3654: 3650: 3642: 3640: 3637: 3636: 3632: 3628: 3619: 3617: 3616: 3612: 3608: 3599: 3597: 3596: 3592: 3588: 3584: 3577: 3574: 3573: 3572: 3566: 3564: 3562: 3558: 3554: 3550: 3539: 3537: 3535: 3531: 3527: 3523: 3519: 3511: 3508: 3502: 3500: 3497: 3496: 3491: 3486: 3485: 3474: 3470: 3467: 3463: 3462: 3461: 3454: 3448: 3444: 3440: 3436: 3430: 3425: 3420: 3414: 3408: 3406: 3400: 3394: 3392: 3386: 3380: 3378: 3372: 3366: 3364: 3360: 3356: 3354: 3350: 3346: 3344: 3338: 3332: 3330: 3326: 3322: 3320: 3316: 3312: 3311: 3310: 3308: 3304: 3300: 3295: 3289: 3287: 3286: 3282: 3278: 3274: 3266: 3263: 3260: 3259: 3258: 3256: 3248: 3246: 3245: 3242: 3237: 3229: 3225: 3221: 3217: 3206: 3201: 3197: 3196: 3189: 3185: 3184: 3183: 3182: 3178: 3176: 3172: 3168: 3164: 3157: 3153: 3151: 3150: 3145: 3140: 3139: 3128: 3124: 3121: 3117: 3116: 3115: 3108: 3102: 3098: 3094: 3090: 3084: 3079: 3074: 3070: 3066: 3065: 3064: 3062: 3058: 3054: 3049: 3043: 3039: 3035: 3031: 3026: 3025: 3024: 3022: 3018: 3014: 3009: 3005: 3001: 2995: 2993: 2992: 2988: 2984: 2977: 2975: 2971: 2970: 2969: 2967: 2962: 2961: 2957: 2951: 2947: 2943: 2939: 2935: 2934: 2928: 2923: 2920: 2912: 2911: 2908: 2905: 2904: 2903: 2901: 2897: 2893: 2885: 2881: 2877: 2873: 2869: 2868: 2867: 2865: 2861: 2855: 2851: 2842: 2840: 2839: 2835: 2831: 2826: 2818: 2813: 2800: 2797: 2791: 2788: 2782: 2779: 2775: 2770: 2767: 2755: 2749: 2746: 2738:September 13, 2733: 2727: 2724: 2719: 2707: 2694: 2686: 2683: 2676: 2673: 2661: 2654: 2651: 2639: 2633: 2630: 2618: 2611: 2608: 2596: 2590: 2587: 2584: 2580: 2574: 2571: 2568:US Court 2010 2565: 2563: 2561: 2559: 2557: 2553: 2549: 2544: 2538: 2535: 2531: 2526: 2520: 2517: 2513: 2508: 2502: 2499: 2495: 2490: 2484: 2481: 2477: 2472: 2466: 2463: 2459: 2446: 2439: 2436: 2428:September 12, 2424:. Wired Blogs 2423: 2419: 2413: 2410: 2397: 2390: 2388: 2384: 2371: 2364: 2361: 2345: 2339: 2336: 2323: 2317: 2314: 2310: 2305: 2302: 2299: 2294: 2292: 2288: 2285: 2279: 2276: 2273: 2267: 2264: 2261: 2255: 2252: 2249: 2243: 2241: 2239: 2235: 2229: 2216: 2214: 2210: 2198: 2191: 2188: 2176: 2169: 2166: 2154: 2148: 2145: 2142: 2136: 2133: 2130: 2125: 2122: 2116: 2114: 2111: 2107: 2106: 2098: 2095: 2093: 2089: 2085: 2083: 2082: 2081:State v. Reid 2074: 2073:State v. Reid 2071: 2069: 2065: 2063: 2058: 2056: 2055:US v. Ziegler 2052: 2051:US v. Ziegler 2048: 2047:US v. Ziegler 2044: 2043:Ninth Circuit 2039: 2037: 2032: 2030: 2025: 2023: 2016: 2015:US v. Ziegler 2013: 2011: 2007: 2005: 2001: 1997: 1993: 1985: 1983: 1979: 1977: 1970: 1967: 1965: 1961: 1959: 1958: 1950: 1947: 1945: 1942: 1936: 1933: 1931: 1927: 1922: 1920: 1916: 1912: 1911: 1906: 1900: 1898: 1894: 1890: 1889:Jason Fortuny 1882: 1877: 1875: 1872: 1869: 1865: 1858: 1856: 1852: 1848: 1844: 1837: 1830: 1826: 1825: 1824: 1817: 1816: 1815: 1809: 1803: 1800: 1797: 1796: 1795: 1787: 1783: 1780: 1779: 1778: 1774: 1767: 1762: 1759: 1758: 1757: 1750: 1747: 1746: 1745: 1738: 1732: 1729: 1728: 1724: 1719: 1716: 1713: 1710: 1707: 1704: 1701: 1698: 1695: 1692: 1691: 1690: 1687: 1685: 1676: 1674: 1671: 1666: 1662: 1655: 1653: 1650: 1640: 1638: 1633: 1629: 1625: 1617: 1615: 1608: 1606: 1602: 1600: 1592: 1590: 1586: 1584: 1576: 1574: 1567: 1562: 1556: 1553: 1552: 1547: 1541: 1537: 1533: 1529: 1525: 1522: 1518: 1517: 1512: 1508: 1507: 1504: 1500: 1496: 1492: 1488: 1487: 1486: 1485: 1481: 1477: 1471: 1464: 1460: 1456: 1452: 1447: 1438: 1437: 1436: 1435: 1431: 1427: 1422: 1414: 1410: 1406: 1402: 1398: 1397: 1396: 1395: 1391: 1387: 1378: 1376: 1374: 1370: 1366: 1362: 1346: 1345: 1340: 1334: 1326: 1324: 1321: 1317: 1313: 1309: 1305: 1299: 1294: 1292: 1284: 1282: 1281: 1277: 1273: 1267: 1266: 1262: 1258: 1254: 1244: 1240: 1236: 1233: 1232: 1227: 1224: 1222:, paypal bugs 1221: 1220:facebook bugs 1218: 1217: 1215: 1214: 1213: 1211: 1207: 1203: 1195: 1193: 1190: 1186: 1182: 1172: 1168: 1164: 1160: 1156: 1152: 1148: 1144: 1140: 1136: 1133: 1132: 1128: 1125: 1123: 1122: 1118: 1114: 1113:107.36.164.74 1110: 1101: 1099: 1098: 1092: 1086: 1082: 1081: 1075: 1071: 1070: 1065: 1061: 1057: 1053: 1049: 1042:Proposed move 1041: 1039: 1036: 1031: 1030: 1026: 1022: 1016: 1010: 1008: 1006: 1002: 998: 994: 983: 979: 975: 970: 969: 968: 967: 966: 965: 961: 957: 956:SoulSyndicate 948: 946: 943: 940: 935: 934: 933: 932: 928: 924: 920: 919:Jason Fortuny 911: 909: 905: 901: 897: 893: 885: 884: 880: 876: 867: 865: 864: 860: 856: 848: 846: 845: 841: 837: 836:63.249.110.32 832: 830: 825: 821: 814: 812: 811: 807: 803: 794: 792: 791: 788: 779: 777: 774: 765: 764: 763: 762: 759: 758: 748: 745: 741: 737: 733: 729: 728: 725: 721: 717: 711: 706:Fortuny prank 705: 703: 702: 698: 694: 690: 681: 679: 677: 673: 668: 667: 664: 659: 655: 651: 647: 642: 637: 633: 629: 625: 621: 620:WhatismyProxy 617: 613: 609: 604: 601: 599: 594: 591: 590: 587: 583: 579: 574: 572: 568: 567:verifiability 564: 560: 552: 550: 549: 545: 541: 540:J.kitsonmoore 536: 535: 531: 527: 521: 515: 514: 513: 507: 505: 504: 499: 494: 490: 485: 484: 480: 476: 473: 465: 461: 457: 452: 451: 447: 444: 440: 439: 438: 436: 431: 423: 407: 403: 397: 394: 393: 390: 373: 369: 365: 361: 360: 355: 352: 349: 345: 344: 340: 334: 331: 328: 324: 311: 307: 301: 298: 297: 294: 277: 273: 269: 268: 260: 254: 249: 247: 244: 240: 239: 235: 229: 226: 223: 219: 214: 210: 204: 196: 192: 187: 186: 177: 173: 170: 167: 163: 159: 155: 152: 149: 146: 143: 140: 137: 134: 131: 127: 124: 123:Find sources: 120: 119: 111: 110:Verifiability 108: 106: 103: 101: 98: 97: 96: 87: 83: 81: 78: 76: 72: 69: 67: 64: 63: 57: 53: 52:Learn to edit 49: 46: 41: 40: 37: 36: 32: 26: 22: 18: 17: 3772: 3768: 3765: 3739:Hodl-baggins 3735: 3716: 3689: 3665: 3646: 3638: 3623: 3603: 3580: 3570: 3553:156.12.7.141 3547:— Preceding 3543: 3516:— Preceding 3512: 3509: 3506: 3498: 3481: 3478: 3453:source check 3432: 3426: 3423: 3296: 3293: 3270: 3261:this article 3252: 3233: 3224:The Register 3208:. Retrieved 3194: 3180: 3179: 3174: 3160: 3135: 3132: 3107:source check 3086: 3080: 3077: 3050: 3047: 3013:Paul hofseth 3010: 3006: 3002: 2999: 2980: 2972: 2963: 2958: 2955: 2922: 2906: 2889: 2850:75.73.11.164 2846: 2822: 2811: 2799: 2790: 2781: 2773: 2769: 2758:. Retrieved 2748: 2736:. Retrieved 2726: 2693:cite journal 2675: 2664:. Retrieved 2653: 2642:. Retrieved 2632: 2621:. Retrieved 2610: 2599:. Retrieved 2589: 2578: 2573: 2548:1:08-cv-1050 2542: 2537: 2524: 2519: 2512:1:08-cv-1050 2506: 2501: 2494:1:08-cv-1050 2488: 2483: 2476:1:08-cv-1050 2470: 2465: 2456: 2449:. Retrieved 2438: 2426:. Retrieved 2422:"Craigslist" 2412: 2400:. Retrieved 2374:. Retrieved 2363: 2351:. Retrieved 2338: 2326:. Retrieved 2316: 2304: 2278: 2266: 2254: 2220:Cite error: 2200:. Retrieved 2190: 2178:. Retrieved 2168: 2157:. Retrieved 2147: 2135: 2124: 2103: 2101: 2096: 2090: 2086: 2079: 2077: 2072: 2066: 2061: 2059: 2054: 2050: 2046: 2040: 2035: 2033: 2029:US v. Simons 2028: 2026: 2019: 2014: 2008: 1989: 1980: 1973: 1969:EPIC vs. FTC 1968: 1962: 1955: 1953: 1948: 1937: 1934: 1923: 1908: 1901: 1886: 1870: 1867: 1866: 1862: 1853: 1849: 1845: 1841: 1822: 1813: 1793: 1776: 1771: 1754: 1742: 1688: 1680: 1667: 1663: 1659: 1646: 1628:Bill Clinton 1621: 1612: 1603: 1596: 1587: 1580: 1571: 1560: 1554: 1548: 1545: 1520: 1472: 1468: 1445: 1418: 1382: 1379:Page ratings 1365:194.78.58.10 1359:— Preceding 1352: 1330: 1302:— Preceding 1295: 1288: 1268: 1255: 1252: 1199: 1185:97.87.29.188 1179:— Preceding 1176: 1105: 1078: 1073: 1067: 1058:. The name 1045: 1037: 1032: 1017: 1014: 997:64.32.145.74 988: 953: 915: 886: 871: 852: 833: 828: 826: 823: 819: 798: 783: 775: 772:<ref: --> 770:<ref: --> 769: 757:Angus Lepper 755: 752: 730: 712: 709: 685: 682:Noted cases? 669: 650:proxy server 643: 639: 602: 595: 592: 575: 570: 556: 537: 522: 519: 511: 488: 486: 475:Bluemoonsoon 468: 432: 429: 421: 401: 368:project page 357: 353: 305: 265: 209:WikiProjects 171: 165: 157: 150: 144: 138: 132: 122: 94: 19:This is the 3522:Jandrocamus 3188:Privacy law 2894:within the 2858:—Preceding 2794:Id. at 402. 2579:Epic v. FTC 2418:Ryan Singel 1930:Kurt Opsahl 1919:sociopathic 1915:Ryan Singel 1272:85.64.39.12 1080:SMcCandlish 991:—Preceding 890:—Preceding 829:misbehavior 787:Cuffeparade 691:biases). -- 616:Proxy Blind 456:68.149.1.64 435:24.5.54.218 148:free images 31:not a forum 3792:Categories 3490:Report bug 3204:0801480108 3144:Report bug 2785:Id. at 393 2760:2011-11-25 2666:2011-11-25 2644:2011-11-25 2623:2011-11-25 2601:2011-11-25 2202:5 February 2180:5 February 2159:2011-12-17 2110:injunction 1893:Craigslist 1828:conducted. 1426:Jmckella16 1339:talk to me 1169:Corp. and 1163:Apple Inc. 1021:Viperpulse 736:Badmachine 716:experiment 693:ZimZalaBim 689:presentist 654:IP address 632:IP Privacy 614:3. Payed: 608:Anonymouse 372:discussion 3473:this tool 3466:this tool 3413:dead link 3399:dead link 3385:dead link 3371:dead link 3337:dead link 3236:AnomieBOT 3127:this tool 3120:this tool 2983:Guy Macon 2968:article: 2830:LittleBen 2716:ignored ( 2702:|journal= 2451:August 1, 2228:help page 2045:court in 2000:Microsoft 1954:The case 1495:LittleBen 1401:LittleBen 1257:Inglonias 1167:Microsoft 1151:Europeans 974:Wikidemon 676:anonymity 646:anonymity 618:4. Free: 606:1. Free: 88:if needed 71:Be polite 21:talk page 3699:PrimeBOT 3679:and the 3549:unsigned 3530:contribs 3518:unsigned 3479:Cheers.— 3133:Cheers.— 2577:(2012). 2402:June 27, 2376:June 17, 1907:, while 1734:browsed. 1699:Phishing 1528:Phette23 1521:standard 1476:Chriisss 1361:unsigned 1316:contribs 1308:Iknovate 1304:unsigned 1181:unsigned 1171:Facebook 1129:resource 1091:Contribs 1074:Internet 1066:(namely 993:unsigned 904:contribs 896:Kngspook 892:unsigned 571:internal 443:Chris 73 281:Internet 272:Internet 228:Internet 56:get help 29:This is 27:article. 3417:tag to 3403:tag to 3389:tag to 3375:tag to 3341:tag to 3303:my edit 3273:discuss 3057:my edit 2966:Lavabit 2900:WP:Spam 2860:undated 2776:at 393. 2714:|month= 2685:1444191 2458:ready." 2062:Ziegler 1944:costs. 1913:writer 1871:Statute 1785:notice. 1720:Spyware 1235:Richiez 1212:agampa 624:a4proxy 596:I knew 526:Writerz 404:on the 308:on the 199:B-class 154:WP refs 142:scholar 3749:Jarble 3409:Added 3395:Added 3381:Added 3367:Added 3333:Added 3210:10 May 2353:7 July 2328:7 July 1992:Yahoo! 1465:HTML 5 1333:phoebe 1202:Agampa 1196:Review 1161:Inc., 1159:Google 972:start. 663:Haakon 628:TRUSTe 586:Haakon 205:scale. 126:Google 3705:) on 3218:From 3186:From 2347:(PDF) 1910:Wired 1868:State 1832:part. 1087:ʕ(ل)ˀ 1085:Talk⇒ 1064:BBSes 1048:WP:RM 802:Roadm 658:WP:EL 169:JSTOR 130:books 84:Seek 3780:talk 3753:talk 3723:talk 3703:talk 3653:talk 3631:talk 3611:talk 3591:talk 3557:talk 3526:talk 3281:talk 3212:2017 3200:ISBN 3175:this 3034:talk 3017:talk 3011:p. ( 2987:talk 2942:talk 2876:talk 2854:talk 2834:talk 2740:2010 2718:help 2706:help 2682:SSRN 2530:Text 2453:2008 2430:2006 2404:2007 2378:2007 2355:2012 2330:2012 2204:2012 2182:2012 1994:and 1924:The 1717:Spam 1647:The 1622:The 1597:The 1581:The 1532:talk 1499:talk 1480:talk 1455:talk 1446:Done 1430:talk 1405:talk 1390:talk 1369:talk 1312:talk 1276:talk 1261:talk 1239:talk 1206:talk 1189:talk 1117:talk 1025:talk 1001:talk 978:talk 960:talk 942:Talk 939:Vary 927:talk 923:Judd 900:talk 879:talk 859:talk 840:talk 806:talk 740:talk 724:Talk 720:Vary 697:talk 648:and 582:DMOZ 544:talk 530:talk 498:Talk 479:talk 460:talk 446:Talk 300:High 162:FENS 136:news 73:and 3697:by 3687:. 3585:. — 3447:RfC 3361:to 3351:to 3327:to 3317:to 3101:RfC 3071:to 2856:) 2774:Id. 2102:In 2060:In 2004:AOL 1996:MSN 1921:". 1356:--> 1127:WSJ 1054:or 593:-- 489:not 396:Top 176:TWL 3794:: 3782:) 3755:) 3747:? 3725:) 3655:) 3633:) 3613:) 3593:) 3559:) 3532:) 3528:• 3460:. 3455:}} 3451:{{ 3415:}} 3411:{{ 3401:}} 3397:{{ 3387:}} 3383:{{ 3373:}} 3369:{{ 3339:}} 3335:{{ 3283:) 3226:, 3222:: 3190:: 3114:. 3109:}} 3105:{{ 3036:) 3023:) 3019:) 2989:) 2944:) 2936:-- 2878:) 2836:) 2710:; 2697:: 2695:}} 2691:{{ 2555:^ 2546:, 2510:, 2492:, 2474:, 2455:. 2386:^ 2290:^ 2237:^ 2230:). 2212:^ 1534:) 1501:) 1482:) 1457:) 1432:) 1407:) 1392:) 1384:-- 1371:) 1335:/ 1318:) 1314:• 1278:) 1263:) 1241:) 1208:) 1191:) 1173:." 1165:, 1119:) 1027:) 1003:) 980:) 962:) 954:-- 929:) 906:) 902:• 881:) 873:-- 861:) 842:) 808:) 742:) 722:| 699:) 546:) 532:) 481:) 462:) 156:) 54:; 3778:( 3751:( 3741:: 3737:@ 3721:( 3701:( 3651:( 3629:( 3609:( 3589:( 3555:( 3524:( 3492:) 3488:( 3475:. 3468:. 3279:( 3240:⚡ 3214:. 3146:) 3142:( 3129:. 3122:. 3032:( 3015:( 2985:( 2940:( 2874:( 2852:( 2832:( 2763:. 2742:. 2720:) 2708:) 2704:( 2687:. 2669:. 2647:. 2626:. 2604:. 2532:. 2432:. 2406:. 2380:. 2357:. 2332:. 2206:. 2184:. 2162:. 1998:( 1530:( 1497:( 1478:( 1453:( 1428:( 1403:( 1388:( 1367:( 1341:) 1337:( 1310:( 1274:( 1259:( 1237:( 1204:( 1187:( 1115:( 1093:. 1023:( 999:( 976:( 958:( 925:( 898:( 877:( 857:( 838:( 834:— 804:( 738:( 695:( 542:( 528:( 500:) 496:( 477:( 458:( 408:. 374:. 312:. 211:: 172:· 166:· 158:· 151:· 145:· 139:· 133:· 128:( 58:.

Index

talk page
Internet privacy
not a forum
Click here to start a new topic.
Learn to edit
get help
Assume good faith
Be polite
avoid personal attacks
Be welcoming to newcomers
dispute resolution
Neutral point of view
No original research
Verifiability
Google
books
news
scholar
free images
WP refs
FENS
JSTOR
TWL

content assessment
WikiProjects
WikiProject icon
Internet
WikiProject icon
icon

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑