Teaching Privacy
  • Home
  • Principles
    • You’re Leaving Footprints
    • There’s No Anonymity
    • Information Is Valuable
    • Someone Could Listen
    • Sharing Releases Control
    • Search Is Improving
    • Online Is Real
    • Identity Isn’t Guaranteed
    • You Can’t Escape
    • Privacy Requires Work
  • Teacher’s Portal
  • About the Project
    • About the Project
    • Who We Are
  • Blog
Select Page

All About Email Encryption

by Julia Bernd | May 23, 2016 | Apps/Tools, Blog, Privacy Requires Work, Resources/How-Tos, Someone Could Listen

The Free Software Foundation recently released a set of tools and guides on email encryption: Email Self-Defense Site For those who are concerned about protecting their email against any possible eavesdropping (including government surveillance), FSF provides some...

Finding The Perfect Password

by Melody Valdez | Oct 26, 2015 | Blog, Information Is Valuable, Privacy Requires Work, Someone Could Listen

You may have already heard that keeping your online accounts safe from hackers require secure and unique passwords for each account. However, how can you think of several passwords containing random letters, numbers, and symbols that are easy to remember? Researchers...

California’s Comprehensive Digital Privacy Law

by Melody Valdez | Oct 19, 2015 | Blog, Privacy Requires Work

On October 8, 2015, Governor Jerry Brown signed the California Electronic Communications Privacy Act, which requires any state law enforcement agency to get a warrant before accessing any electronic information or metadata — including emails, texts, and location...

Can Information Truly Be “Forgotten”?

by Melody Valdez | Sep 28, 2015 | Blog, Privacy Requires Work, Sharing Releases Control, You're Leaving Footprints

With the rapid growth of the Internet in today’s digital age, resulting in Big Data that is continuously growing and replicating, it is becoming impossible to completely delete any information that one shares online. It is important to realize that others can...

“Digital Kidnapping”?

by Itzel Martinez | Aug 10, 2015 | Blog, Information Is Valuable, Privacy Requires Work, Sharing Releases Control

Brittany Champagne from Utah is a mother who likes to share photos of her children on Facebook, like many other parents today. But what Brittany never thought to find was images of her children on more than ten porn sites. The images seemed to be taken from her...

Alternatives for Passwords

by Itzel Martinez | Jun 1, 2015 | Blog, Information Is Valuable, Privacy Requires Work

Strong passwords are important in preventing data breaches, but the top five passwords in 2014 were strings like “123456” and “password”, which are predictable. How can we then prevent cyberattacks from happening? TechNewsWorld covered a...
« Older Entries

Recent Posts

  • New Addition: Programming for Privacy!
  • Oakland Police Scandal Uncovered Through Facebook and Instagram
  • The Continuum of “Public”
  • It’s Not Just Social Media
  • All About Email Encryption

Recent Comments

  • New Addition: Programming for Privacy! | Teaching Privacy on Module 5: Sharing Releases Control
  • New Addition: Programming for Privacy! | Teaching Privacy on Module 3: Information Is Valuable

Archives

  • January 2019
  • June 2016
  • May 2016
  • April 2016
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014

Categories

  • Apps/Tools
  • Blog
  • Identity Isn't Guaranteed
  • Information Is Valuable
  • Online Is Real
  • Privacy Requires Work
  • Project News
  • Resources/How-Tos
  • Search Is Improving
  • Sharing Releases Control
  • Someone Could Listen
  • There's No Anonymity
  • You Can't Escape
  • You're Leaving Footprints

The content on this website is licensed by the International Computer Science Institute under the Creative Commons Attribution 4.0 License (CC-BY) | Disclaimer