App Store Privacy Nutrition Labels Feed Our Security Awareness
by Lee Rickwood
By requiring and then presenting information about an app’s data collection activities, Apple is giving us tools to protect ourselves online.
by Lee Rickwood
By requiring and then presenting information about an app’s data collection activities, Apple is giving us tools to protect ourselves online.
by Lee Rickwood
Without tough laws to level today’s digital playing field, data privacy and security disputes can pit people against corporations (or their own governments). The legal, financial and administrative muscle the enterprise can muster far outstrips that of most individuals to protect themselves.
by Lee Rickwood
Under the new Act, Canadians could demand that their information on social media platforms, such as Facebook or Twitter, be permanently deleted. And the country’s privacy commissioner could order them to comply.
By Christine Persaud
Cybersecurity is a growing concern, especially as we rely more and more on digital channels to communicate with one another. cybercriminals are getting more and more clever in their tactics, and we’re seeing new methods emerge, especially when it comes to monetary extortion.
Much of today’s technology is designed to deceive and manipulate us — not to protect us, our privacy or our property. Into our smartphones and our social media sites and our connected digital gadgetry, product designers have embedded certain techniques…
by Lee Rickwood
Public consultations by the Ontario government to improve the province’s privacy protection laws are so important – especially now.
by Lee Rickwood
In just the few days since its official release, the new COVID-19 notification app has already shown what it does and does not do.
By Christine Persaud
Pretty much every phone has a screen lock of some kind that ensures someone passing by can’t swipe your phone and easily log into it to see your private photos, sensitive work information, or personal financial details. While the old four-digit passcode is still being used these days, there are many other ways you can secure a mobile device. What are they and which is best?