Children’s Online Privacy Protection Act

Children’s Online Privacy Protection Act

In a previous article I discussed how people who qualify as a public official or law enforcement officer can reference State laws in their letters to data brokers and people search websites to assist them with removing their personal information.  If you are a qualified individual who can utilize these laws to help achieve faster compliance and more advanced opt-outs, I encourage you to articulate this in the letters and emails you send to companies who are exposing your personal…

Read More Read More

Podcast 051 – Snail Mail Control

Podcast 051 – Snail Mail Control

A while back I shared my collection of links to take control your mail (HERE).  If you have not yet visited that article, I highly recommend taking the time to rearrange how your mail is handled, remove yourself from marketing lists, and compartmentalize your address as part of an overall strategy to reduce how often your real name and physical address are used together.  This past week I recorded another podcast with co-host Justin Carroll to discuss these mail control…

Read More Read More

Podcast 050 – Privacy Round Table

Podcast 050 – Privacy Round Table

This week I sat down with friends Jason, Jesse, Michael and Justin for a round-table discussion of privacy and security issues.  Had a lot of fun talking about current privacy issues and also reviewing the last fifty episodes of The Complete Privacy & Security Podcast.  Something in here for everyone, so take a listen! Play below or Subscribe at: RSS / iTunes / Google / Stitcher Listen to previous episodes at https://privacy-training.com/podcast.html  

For The Rookies

For The Rookies

I often tell people that learning about privacy and security is like going to a salad bar.  When you attend a live training about these subjects or begin to explore the large number of topics that are related to this endeavor, it can be a bit overwhelming.  With so many options and choices to consider, how does a person decide where to begin?  Hence the salad bar analogy.  There are decisions to made at every turn along the way.  What…

Read More Read More

The Equifax Debacle

The Equifax Debacle

Here is the latest information from reputable sources on the massive Equifax breach from this past week.  I encourage everyone to review the information, stay informed, and take proactive steps to protect your personal information.  A recent podcast about this breach is embedded below which discusses important actions a person can take, and also a free credit freeze tutorial is included in the notes below.  Unfortunately, this latest breach will not be the last. Breach at Equifax May Impact 143M…

Read More Read More

Phone Strategy: Update

Phone Strategy: Update

Last year I wrote an article (here) which detailed a way to set up your phone strategy with enhancements to privacy & security in mind.  Since that time, I have received numerous emails with questions and feedback on the solutions I set up.  I decided to post an update to my strategy and highlight some of the changes I have made over the past year.  I am going to leave the original article untouched so that readers can compare the…

Read More Read More

Metapho: App Review

Metapho: App Review

I wanted to do a quick review for a useful iOS app that I have been using for a while now.  Metapho allows you to view, edit, and remove the metadata from your photos before sharing them.  It should come as no surprise that anytime someone sends me a photo, I check it for metadata.  I am curious who among my contacts has location services enabled on their phone.  Many of the people I associate with are also privacy conscious,…

Read More Read More

Privacy For Pets

Privacy For Pets

The personal information you provide and associate with your pets should be considered as part of your overall strategy to protect your personal information.  Pet owners know that there are many entities and businesses that gather information about your pets and you during the course of doing business.  If/when that information is compromised, then it could easily lead to the disclosure of information you did not want leaked.  We take our pets to the veterinarian, groomer, and many municipalities require…

Read More Read More

Address Confidentiality Programs

Address Confidentiality Programs

Address Confidentiality Programs (ACP) were created to protect victims of stalking, domestic violence, sexual assault, and other crimes from offenders who use public records, such as voter or drivers’ license registries, to locate them. These programs give victims a legal substitute address to use in place of their real physical address; this address can be used whenever an address is required by public agencies.  First class mail sent to the substitute address is forwarded to the victim’s actual address. One…

Read More Read More

Voter Records

Voter Records

On June 12, 2017, media outlets in the U.S. began reporting the news that information on over 200 million registered voters was accidentally exposed online due to poor security measures.  The data, which was stored on a publicly accessible cloud server, included 1.1 terabytes of unsecured personal information including names, dates of birth, addresses, phone numbers, voter registration details, as well as data described as “modeled” voter ethnicities and religions.  The disclosure exposed the personal details of over 61% of…

Read More Read More