Companies you trust are taking your data

September 2016
Electronics Weekly;9/7/2016, Issue 2678, p22
Trade Publication
The article presents the views of Mike Patterson, founder of security analytics firm Plixer, regarding the use of consumers' data by antivirus software firm, and mentions that after the installation of software on computers and mobile devices firms use personally identifiable information (PII).


Related Articles

  • Canadian government keeping tabs on your Internet use. Anderson, Steve // Asian Pacific Post;6/20/2013, p4 

    The article reports that the Communications Security Establishment Canada (CSEC), a secretive Canadian spy agency, has been challenged for spying on personal data without oversight.

  • She's Got Mail. Maclin, Amy // O, The Oprah Magazine;Mar2016, p109 

    A personal narrative is presented which explores the author's experience of accidentally sending personal documents in e-mail to the wrong person.

  • Government takes tough stance on access to digital data.  // Marketing Week;8/2/2012, Vol. 35 Issue 29, p10 

    The article reports on the British government's "midata" initiative, a plan to provide consumers with more access to and control over their online personal data, focusing on the extent of participation by businesses in the voluntary program.

  • Consumers still cold to the idea of targeted ads. McEleny, Charlotte // Marketing Week (Online Edition);3/13/2012, p2 

    The article reports on a Media Democracy survey conducted by Deloitte regarding views of British consumers on the use of their personal data for targeted advertising.

  • Should visitors be made to hand over personal data at events?  // Event;May2012, p10 

    The article discusses the percentage of positive and negative responses to the question on whether visitors should be asked to give personal data at events.

  • Apple begins storing users' personal data on servers in China.  // Flare (Pakistan);Sep2014, p80 

    The article reports that technology firm Apple Inc has started storing the personal data of some Chinese users on servers in China.

  • Who's talking about you online? GILMAN, MARGOT // Consumer Reports Money Adviser;Aug2013, Vol. 10 Issue 8, p2 

    An introduction is presented in which the editor discusses controlling personal information about oneself available on the Internet, the subject of an article in the issue.

  • Behind closed doors. Groom, Richard // Mortgage Finance Gazette;Apr2013, p24 

    In this article, the author discusses mortgage fraud along with the techniques used to commit the fraud including misrepresentation of personal data, spurious salary data, and inflation of valuations to pocket the difference.

  • 개인정보보호법의 개관 및 개정방향에 관한 연구. 김일환; 성재호 // Journal of Korean Society for Internet Information;Aug2015, Vol. 16 Issue 4, p141 

    The Personal Information Protection Act enacted in March 2011 stated that the application target of this law includes all personal information processors in the public and private sector, and established the protection standard by phase such as collection, use and provision of personal...

  • NSA's Telecom Connections. Fenn, Peter // U.S. News Digital Weekly;6/14/2013, Vol. 5 Issue 24, p20 

    The article points out that the government should not coerce private companies to surrender personal data to the U.S. National Security Agency (NSA) as it violates human rights and the Fourth Amendment to the Constitution.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics