Do youth care about privacy? We will explore this question on September 8, 2011, when our Office holds its next Insights on Privacy armchair discussion. We have invited two experts on young people’s use of social media, Kate Raynes-Goldie (@oceanpark) and Matthew Johnson (@MFJ72) to talk about what privacy means to youth and how we can help youth preserve their privacy by promoting digital literacy skills.
Read more
The Media Awareness Network, benefactor of the Office of the Privacy Commissioner’s Contributions Program, has launched the third Phase (Phase III) of its ongoing study, Young Canadians in a Wired World (YCWW). This third phase is a crucial element to the project, as it will shed a more distinct light on the need for online education resources in classrooms and communities.
Read more
We have been following recent cases where online social networks have been accused of leaking personal information to third parties. The leakage is caused by the networks’ use of referrer headers (information about where on the web a user is coming from) that can include the username, allowing automatic linking to profile information if it is available.
Read more
On June 23rd, 2011, the Office of the Privacy Commissioner is holding the fourth Insights on Privacy armchair discussion. We heard in April about opportunities for privacy in the design of intimate devices that we share our lives with every day, like smart phones, and the sensor-rich landscape that’s upon us.
Read more
Last month, our Office was invited to participate in a youth privacy conference hosted by the American Library Association (ALA). The ALA’s Office for Intellectual Freedom has been focused on the issue of libraries and privacy awareness for the last three years, thanks to a grant from the Open Society Institute. They plan to focus their efforts in 2011 on developing strategies for how best to deliver the privacy message to young people and see libraries as ideal places for youth to learn about privacy. They brought together privacy advocates, policy experts, librarians, educators, and our Office to pick our brains on how to best achieve this.
Read more
Our Office is pleased to be hosting the 49th meeting of the “Berlin Group”, more formally known as the International Working Group on Data Protection in Telecommunications, which takes place today and tomorrow, in Montreal. This is the first time that this Group has met in Canada. Participants in the meeting, representing more than 20 international data protection and privacy authorities, will be focusing on privacy-related topics such as electronic payments, vehicle event data recorders and locational privacy.
Read more
On April 20th, 2011, our Office is holding the third Insights on Privacy armchair discussion. We heard in February about what motivates us to reveal or conceal details of our personal lives, and how we protect the private lives of others around us.
Read more
Last month, we held our second Insights on Privacy armchair event, with Alessandro Acquisti and Christena Nippert-Eng as our guests. Much of the discussion revolved around the challenges of negotiating privacy in an online environment, and we heard many interesting observations about how human nature gets in the way of good online privacy decisions. Dr. Acquisti’s research shows that the more in control people feel over their personal information, the more sensitive information they tend to disclose. Granular controls in privacy settings give people a sense of power over their information that may be more illusion than reality. When deciding how much information to reveal, people also become confused in online environments because they cannot rely on the physical cues that guide them in their off-line interactions. Without physically seeing our audience, it’s easy to misjudge or disregard those who can see us.
Read more
While there are always advance warnings about the potential privacy risks of emerging technologies, it usually takes a “killer app” for people to take notice of the real dangers. For geotagging, that app is the rather aptly named creepy.
Read more
There have been recent reports about security vulnerabilities arising from the reuse of passwords on different web sites. What about the reuse of usernames? Can identities established on multiple web sites be linked together based on the usernames, and what are the implications for privacy?
Read more