z3r0trust Privacy Newsletter #45–20

Surveillance is ubiquitous in America, all eyes are on us.

How Private Is Our Voting Information?

Voter information that California allows some form of public access to; credit: NCSL
  • Victims of domestic violence — every state EXCEPT GA, IL, MI, SC, SD, TN, WY
  • Crime victims, people with protective orders, and family members — TX, OK, NY, MD, KS, HI, VA, DE, CA
  • Law enforcement officers — VA, OK, MT, MO, MD, LA, HI, CA, AZ
  • Spouses of law enforcement — TX, OK, HI
  • Reproductive healthcare medical providers, employees, volunteers, or patients — CA
  • Retired state and federal judges and attorneys — VA, TX, OK
  • Foster parents — VA
  • Uniformed service members — OK
  • Pre-registered voters under the age of 18 — CO
  • Victims and witnesses under protection — MO, MD
  • Any voter who requests that their record be classified as private — UT, NV, DC, AK, AZ

No Reasonable Expectation of Privacy on the Internet

Twitter’s Privacy Policy control options for users; credit: Twitter

Data Breaches & Privacy Exposures

List of databases for sale; credit: BleepingComputer

Major Privacy-related Lawsuits

Privacy Legislation Developments

  • The right to correct inaccurate personal information businesses hold about them.
  • The right to opt-out of the use of their personal information by automated decision-making software that profiles consumers based on evaluations, economic status, behavior, location, health, personal preferences, etc.
  • The right to restrict the use of sensitive personal information such as GPS location data, race, religion, sexual orientation, SSNs, and certain non-HIPAA personal health information (PHI).
  • The right to data portability requires businesses to send certain PII to another business entity in a structured, commonly used, machine-readable format when consumers wish to move their data to another business.

The Ongoing Facial Recognition System Saga

Featured Privacy Tactics, Techniques, Tools, & Procedures

Low-Tech Private Life Evasion & Anonymity Tip

Additional Privacy Resources

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

A Guide to Online Media Privacy–And How to Evaluate Privacy Policies

Is It Reprehensible When I Track The Use Of My Website?

EARN IT Act Seeks to Undermine Encryption and Online Privacy

California’s New (New) Privacy Law: Part One

Employee Monitors and Big Brother at Work

Surveillance in Public Spaces

The Dangers of a Biometric Future

A Post about Bread (and Data too, I Guess)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Silk Fibers Used to Generate “Unbreachable” Secure Keys

Cybersecurity incidents in NZ for the 4th quarter of 2021

InfoSecSherpa’s News Roundup for Friday, January 14, 2022

Image by Jill Wellington from Pixabay