O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Privacy-Invasive Devices

In my line of work, I get to see new gadgets and technology all the time. I get excited thinking about all the scenarios in which a new piece of technology could be applied. Part of my job is also to look at the possible privacy issues that might exist with a new technology. I would like to think that people wouldn't misuse technology for personal gain or kicks, but it happens far too often. Expecting technology to always be used properly is not realistic. However, I'm hoping that by now when people are pushing the envelope with the capabilities of a new gadget, they are also thinking about the possible negative uses of the technology and providing protection mechanisms. A case in point: General Motors provided ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required