Table of Contents
Below you will find the full table of contents for the book, but first, if you would like here's a quick look inside taken from a couple of chapters...
Home Network Security/Firewalls
Social Hacking (also known as Social Engineering)
Chat (with special section on child safety)
What else is there? Just see below!
Contents
How to Use This Book vii
Preface viii
Acknowledgments xiii
Warning and Disclaimer xiv
Section 1: The Big Picture 1
Introduction 3
What Is Privacy? 16
Legal Rights to Privacy 31
The Future of Privacy Issues 34
Section 2: Major Issues 39
Cross-Referencing & Profiling 41
Biometrics 46
Privacy in the Workplace 52
Consumer Privacy: Recommendations for Marketers 55
Section 3: Privacy Tactics: Online Tracking,
Marketing, Junk Email & Email Security 59
Email: Privacy Overview 61
Email: Junk & Scams 63
Anonymous Remailers 82
Email: Secret/Encrypted Notes & Signatures 86
Carnivore & Magic Lantern 95
Chat 99
Instant Messaging (IM) 104
America Online (AOL) 111
Web Banner Ads & Cookie Tracking 113
Cookie Safety 121
Tracking with Sniffers & IP Addresses 122
Web & Email Bugs/Beacons 128
Your Web Browser Knows Where You Have Been 134
Web Browser Automated Programs,
Java, JavaScript, ActiveX 137
Spyware, Snoopware, Adware 139
Pop-Up Ads 150
Shopping Online 154
Platform for Privacy Preferences Project (P3P) 161
Section 4: Privacy Tactics:
Offline Marketing & Tracking 167
Telemarketing & Junk Faxes 169
National Do Not Call Registry 176
Postal Junk Mail & Marketing 178
Electronic Eavesdropping 183
Digital/Personal Video Recorders (TiVo and Similar) 185
Cell Phone Spam, Tracking and E911 189
GPS Tracking 196
Radio Frequency Identifier Device (RFID) 200
Automatic Vehicle Identification (AVI) & Toll Collection 204
Video Surveillance 210
Section 5: Privacy Tactics:
Public & Semi-Public Information 217
Licenses, Associations, Clubs & Affiliations 219
Public Information 222
USENET & Web Bulletin Boards 226
Section 6: Privacy Tactics: Computer Security 229
Computer: General Security 231
Home Network Security/Firewalls 235
Password Safety 246
PC CMOS/BIOS Password 255
Personal Digital Assistants (PDAs) 258
Social Hacking (also known as Social Engineering) 261
Virus Protection 265
Encryption 275
Section 7: Privacy Tactics:
Identity & Credit Card Fraud 285
Credit/Identity Fraud: General Risk and
Risk Reduction Strategies 287
Social Security Number Details 295
Post Identity Theft Recovery 298
Section 8: Privacy Laws: Overview 307
Finding Privacy Law 309
Section 9: Privacy Law: Online Privacy Law 313
Childrens Online Privacy Protection Act of 1998 (COPPA) 315
Digital Privacy Act of 2000 320
Digital Millennium Copyright Act 321
Electronic Communications Privacy Act (ECPA) (1986) 325
Electronic Communications Privacy Act of 2000 328
Online Personal Privacy Act 331
Section 10: Privacy Law: Electronic Privacy Law 335
Notice of Electronic Monitoring Act 337
Privacy Act of 1974 339
Telemarketing and Consumer Fraud and Abuse Prevention Act 341
Telephone Consumer Protection Act (1991) 343
Section 11: Privacy Law: Privacy Related Impact 345
Bank Secrecy Act 347
Computer Assisted Passenger Prescreening System II (CAPPS II) 349
Drivers Privacy Protection Act (DPPA) 352
Health Insurance Portability and Accountability Act of 1996 (HIPPA) 356
Identity Theft and Assumption Deterrence Act of 1998 359
Fair Credit Reporting Act (FCRA) 361
Financial Services Modernization Act of 1999 365
Patriot Act & Patriot Act II 367
Terrorism Information Awareness 370
Video Privacy Protection Act (1998) 372
Section 12: Resources 375
Privacy Organizations
Government and Legal Resources
Business and Industry Resources
Bibliography 379
Notes 380
Index 383
|