Privacy Policy and Personal Data Storage

"By using this product, you consent to the storage of your IM, voicemail, and video message communications as described above...Your instant messaging (IM), voicemail, and video message content (collectively “messages”) may be stored by Skype (a) to convey and synchronize your messages and (b) to enable you to retrieve the messages and history where possible. Depending on the message type, messages are generally stored by Skype for a maximum of between 30 and 90 days unless otherwise permitted or required by law. This storage facilitates delivery of messages when a user is offline and to help sync messages between user devices."
In regards to the Privacy Policy above it seems that even if I delete my chat hisotory from my computer I have already consented to have my "messages" stored by skype for a maximum of 30 and 90 days. Also, what does skype mean by "video message content"? Are these video messages? There are no options I see to control your message storage outside your computer.

DITTO.  I'm gone too.  I sugest everyone read the new terms, in particular: 3.3 Information Stored on Your Mobile DeviceWith your permission, we may collect information stored on your mobile device, such as contacts, photos, or media files. Local law may require that you seek the consent of your contacts to provide their personal information to Spotify, which may use that information for the purposes specified in this Privacy Policy. “If you don’t agree with the terms of this Privacy Policy, then please don’t use the Service.” – Spotify So,  since I can't not give Spotify permission, I'll not be using the "service" anymore, they simply don't need access to my contacts or photos , that's is way too invasive and just plain creepy.

Similar Messages

  • How to acces and display datas storaged in cache for a SUP 2.0 workflow?

    HI to all.
    I have an application with a item menu which obtains data thought a online request. the result is shown is a listview.
    My problem is when my BlackBerry has no conection ( offline scenario). When I select the menu item, I obtain an error.
    How to acces and display datas storaged in cache for my MBO? I have read that I can use getMessageValueCollection in custom.js to access to my datas but once I get the datas, How can associate those datas to a Listview like a online request?? Do i have to develop my own screen in html or how?
    Thanks.

    I'm not entirely clear on what you mean by "cache" in this context.  I'm going to assume that what you are really referring to is the contents of the workflow message, so correct me if I'm wrong.  There is, in later releases, the ability to set an device-side request cache time so that if you issue an online request it'll store the results in an on-device cache and if you subsequently reissue the same online request with the same parameter values within that timeout period it'll get the data from the cache rather than going to the server, but my gut instinct is that this is not what you are referring to.
    To access the data in the workflow message, you are correct, you would call getMessageValueCollection().  It will return an object hierarchy with objects defined in WorkflowMessage.js.  Note that if your online request fails, the data won't magically appear in your workflow message.
    To use the data in the workflow message to update a listview, feel free to examine the code in the listview widgets and in API.js.  You can also create a custom listview as follows:
    function customBeforeNavigateForward(screenKey, destScreenKey) {
         // In this example, we only want to replace the listview on the "My Approvals" screen    
         if (destScreenKey == 'My_Approvals'){
              // First, we get the MessageValueCollection that we are currently operating on
              var message = getCurrentMessageValueCollection();
              // Next, we'll get the list MessageValue from that MessageValueCollection
              var itemList = message.getData("LeaveApprovalItem3");
              // Because its a list, the Value of the MessageValue will be an array
              var items = itemList.getValue();
              // Figure out how many items are in the list
              var numOfItems = items.length;
              // Iterate through the results and build our list
              var i = 0;
              var htmlOutput = '<div><ul data-role="listview" data-theme="k" data-filter="true">';
              var firstChar = '';
              while ( i < numOfItems ){
                   // Get the current item. This will be a MessageValueCollection.
                   var currItem= items<i>;
                   // Get the properties of the current item.
                   var owner = currItem.getData("LeaveApprovalItem_owner_attribKey").getValue();
                   var type = currItem.getData("LeaveApprovalItem_itemType_attribKey").getValue();
                   var status = currItem.getData("LeaveApprovalItem_itemStatus_attribKey").getValue();
                   var startDate = currItem.getData("LeaveApprovalItem_startDate_attribKey").getValue();
                   var endDate = currItem.getData("LeaveApprovalItem_endDate_attribKey").getValue();
                   // Format the data in a specific presentation
                   var formatStartDate = Date.parse(startDate).toString('MMM/d/yyyy');
                   var formatEndDate = Date.parse(endDate).toString('MMM/d/yyyy');
                   // Decide which thumbnail image to use
                   var imageToUse = ''
                        if (status == 'Pending'){
                             imageToUse = 'pending.png';
                        else if (status == 'Rejected'){
                             imageToUse = 'rejected.png';
                        else {
                             imageToUse = 'approved.png';
                   // Add a new line to the listview for this item
                   htmlOutput += '<li><a id ="' + currItem.getKey() + '" class="listClick">';
                   htmlOutput += '<img src="./images/' + imageToUse + '" class="ui-li-thumb">';
                   htmlOutput += '<h3 class = "listTitle">' + type;
                   htmlOutput +=  ' ( ' + owner + ' ) ';
                   htmlOutput += '</h3>';
                   htmlOutput += '<p>' + formatStartDate + ' : ' + formatEndDate + '</p>';
                   htmlOutput += '</a></li>';
                   i++;
              htmlOutput += '</ul></div>';
              // Remove the old listview and add in the new one.  Note: this is suboptimal and should be fixed if you want to use it in production.
              $('#My_ApprovalsForm').children().eq(2).hide();
              $('#My_ApprovalsForm').children().eq(1).after(htmlOutput);
              // Add in a handler so that when a line is clicked on, it'll go to the right details screen
              $(".listClick").click(function(){
                   currListDivID = $(this).parent().parent();
                   $(this).parent().parent().addClass("ui-btn-active");
                   navigateForward("Request_Details",  this.id );
                   if (isBlackBerry()) {
                        return;
         // All done.
         return true;

  • Address and Personal Data is not coming up on Portal ( ESS MSS )

    Folks,
    I am not able to see the Address and Personal Data is not coming up on Portal ( ESS MSS ) . when I click those links just the roadmap with exit button.
    Thanks

    Hi Manish,
                   Check with your system patch level both from ABAP and JAVA in the same Service Pack levels. if they are different then only we will get this type of errors. Even we i have faced the same problem, but solved with the basis help.
                   Have you gone through PA30, there Empl data has to be maintained. Then we can get the Data.
    Regards,
    kishore
    Edited by: kishore kumar on Dec 2, 2008 3:56 PM

  • I just got my iphone 5c ...went to the apps store and started a new id...its stuck on the privacy policy and i dont know how to get it off that ...please help

    I just got my iphone 5c ...went to the apps store and started a new id...its stuck on the privacy policy and i dont know how to get it off that ...please help

    Hi Bam,
    I am so ecstatic to hear that you are wanting to open an account in your name! We offer an Assumption of Liability that would allow you the current account holder to give permission for you assume liability of your number. Click here for information on how the process works http://vz.to/HverXe .
    Thanks,
    PamelaF_VZW
    Tweet us @vzwsupport

  • Hi,i need to upgrade my 13"late 2011macbook pro with an ssd drive.i have noticed there is a system hard drive for booting up and a data storage hard drive that my computer uses,are these the same hard drive i can see inside my laptop?

    hi,i use logic pro 9 and cubase to record,produce and master audio recordings and have bought a mac as recommended.have upgraded to 8gig memory (which i was told was the maximum you could upgrade a macbook pro)and still my recordin is slightley behind plauback.i need to replace my hard drive with a solid state drive to solve the problem.i have seen on youtube how to replace the hard drive but have noticed on the disk partition information that there is a 500gig harddrive for the system(booting up ect)and a 500gig harddrive for data storage,are these the same unit?i need to be sure im upgrading what the system uses to an ssd as well as the data storage or the problem wont be solved.i have an external hard drive so i have been looking at a smaller,faster ssd. hope you can help!

    DaisyMay wrote:
    Firewire 400/USB 2.0/1.1
    I would recommend not settling for less then USB 3 or hold out for Thunderbolt, if your machine is capable. Firewire 800 minimum.
    MacBook Pro, Mac OS X (10.7), 2.4GHz IntelCore i5 320 HD 8GB RAM ParallelsDesktop6.0

  • Alarming and Event Data Storage Locations

    I'm having a problem where the Alarms and Events files are filling up the system disk and causing Lookout to crash.  Is there any way I can set things up so that those files are stored on another disk?  I already have the Historical files being archived on a separate disk, but the alarms and events seem to have stayed on the System disk.  The system disk doesn't have that much free space all the time, which is why I put the historical files somewhere else.
    Also, I have the Historical Data system set to only archive data for 90 days (it was changed a while back from storing perpetually), but I still have files in the database going back years.  Is there a way to purge the old data out?
    David Dudley

    David,
    It's important to note the alarms and events are actually in a separate database from Citadel. 
    This KnowledgeBase article discusses removing/archiving alarms from the database:
    http://digital.ni.com/public.nsf/websearch/B23BDD585BAEB25086256C00005C2851?OpenDocument
    Moving the alarms database is a bit more tricky.  It uses the MSDE 2000 SQL engine, which defaults to using a database on the drive it gets installed to.  I think short of installing Lookout to another drive, there's no "easy" way to move it over.
    Message Edited by Paul M. on 04-08-2006 12:16 AM
    --Paul Mandeltort
    Automotive and Industrial Communications Product Marketing

  • Data storage and read

    Hello all,
    I got a problem in data storage and read. I used the combination of "Open data storage", "Write data" and "Close data storage" to store some data as an array as shown below.
    And used the inverted combination to read data as shown below:
    As shown the data file is in tdm form. This works fine in my computer, both the VI and the stand alone application. However when I run the stand alone application in a target pc, the storage file can't be generated!
    I don't know if it's the problem of my code or the problem of the target pc, since the target pc has tiny memory card with few drivers installed. I'm wondering if anybody could help me fix this problem. If there's other way I can store and read the file? or if I can make the target pc generate the tdm file.
    Thanks!
    Chao
    Solved!
    Go to Solution.

    What error is being presented when the file isn't being generated?  Is it an error with permissions?  Or an error with a folder not existing?  Can you manually make a file in the location where you expect the file to be generated?
    Unofficial Forum Rules and Guidelines - Hooovahh - LabVIEW Overlord
    If 10 out of 10 experts in any field say something is bad, you should probably take their opinion seriously.

  • File path of open data storage

    Hello all!
    Now I'm using the blocks of open data storage, write data and close data storage for storing and extracting result data. For the file path issue, before I
    set the data path by double clicking the "open data storage" block and inserting the file location in the indicated place, and that worked!
    Now since I made a stand alone application of this program and shall use it in other computers, the file location I inserted in open data storage block isn't
    valid any more in other PCs. So I modified my source code by connecting a "current vi path" to the open data storage block's file path node instead of
    inserting it inside the block, and this doesn't work! During running there shows an error in the write data block saying that the storage refnum isn't valid!
    I'm wondering why I couldn't specify the file path like this. Any way to allow me to specify the file path as the current vi path?
    Thanks!
    Chao
    Solved!
    Go to Solution.

    You need to account for the path changes when built in to an application, have a look at this example.
    https://decibel.ni.com/content/docs/DOC-4212
    Beginner? Try LabVIEW Basics
    Sharing bits of code? Try Snippets or LAVA Code Capture Tool
    Have you tried Quick Drop?, Visit QD Community.

  • Workflow - Family dependents, personal data

    Hi All,
    We are implementing ESS/MSS on ERP 6.0 and EP 7.0 with EhP4 and ESS 603 patch for India country grouping.
    We have a requirement of encorporating z-workflow template to the standard ESS application whenever employee add/change/delete family dependents using family dependent application and personal data as well using Personal data application.
    Once we have done with the z-workflow template creation, where we need to attach the events of the z-workflow to standard ESS application ? Can we attach these events to the standard RFC's used for updating family dependents and personal data ?
    NWDI  is required to accomplish this task ? Kindly suggest the best practises.
    Regards,
    Anil kumar.

    >
    Anil Kumar Venkatappa wrote:
    > So, based on this standard BOR (Family) which has various events for insert, delete and change operations we need to trigger the corresponding workflow. Henceforth, records can be updated for respective employee after the approval process.
    What approval process? Maybe you should outline your required process once more.
    >
    Anil Kumar Venkatappa wrote:
    > My question would be...the same events (CREATED, CHANGED, DELETED) are being called in front end WD Java using the RFC (HR_EVENT_RULES_PA0021) ?
    Yes. Just try it. Execute the service and check transaction SWEL to see the called Events.
    >
    Anil Kumar Venkatappa wrote:
    > Moreover, we not touching frontend source code using NWDI due to timelines and other restrictions. Is it really required to modify the code to achive above operations ? 
    No Java Code needs to be touched
    >
    Anil Kumar Venkatappa wrote:
    > And how about locking the infotype records during the approval stage ? Please share your experiences. Once again thanks for your time.
    So your requirenment is, that employees when editing their family data, they should just write locked infotype records? And your post-processing workflow is about unlocking the locked records once its approved?
    Please take a look at BAdI HRPAD00INFTYUI. This BAdI is called during the Input and Output Conversion. The Infotypes you can edit from the ESS Services are so called "Decoupled Infotpes". Which means the Business Logik is decoupled from the UI. With so called "Converting Classes" the mapping between UI and Backend data is done each time you call such an application. So what you have to do here is, once the INPUT_CONVERSION is processed, you have to set the LOCKED-Value of the current processed infotype record.
    I hope this helps,
    regards,
    Markus

  • Bulk Data Storage for Travelling & Charging

    Good day readers
    I shall be travelling later this year and don't want to take lots of SDHC cards. Does anyone have any advice on what to take that stores lotss of Video files and Stills please. I want to keep bulk and weight down.
    I have looked at the Vosonic range but these seem expensive
    I have considered a small Netbook - a lot less than a Vosonic unit - 160gig to 250gig will be sufficient
    I want to be able to view the video files and stills
    I also want to be able to charge the units, there will be no mains electricicity where I am going, so solar charging ideas needed to the Camcorder batteries and the data storage device
    All Ideas welcome, what solutions have people used
    Thanks....

    cookie2402 wrote:
    Harm
    Thanks, but how do I upload the SDHC data to the Hard Drives. I want to upload the SDHC cards and store the data and re-use the SDHC card.
    Sorry if I wasn't clear
    John
    John, many netbooks have a slot for installing your SDHC card and can read it. Then use Harm's suggested USB port hard drive to off load the data.  Possibly even better use an external SSD drive as they take appreciably less power than a hard drive.
    Bill

  • MAC and IP should specifically be listed "Personal Information" for all interactions in your Privacy Policy

    Except for those who run cute lil' programs that could disorient or disrupt the system, possessing someone's MAC is possessing the 'true name' of at least one portion of their computer. Follow the computer in your accumulated files, and somewhere, this note even, gives you the mailing address, and a good lead on who owner is. IP address, if too static, well, same deal. With policy in place, I can feel free to run a server AND the rest of my system on the same fiber broadband line, saving me enough $/yr to buy an upgrade or two.
    Let's face it, YOU are your equipment, and if I wanted to use my name, I would.

    First, if you keep up a file until you can match a firewall MAC with doc with a name on it, the rest is fairly simple. Traceroute the IP, and, while NOT as easy as a return address sticker, it is a pretty easy thing to do. Mozilla admits this:
    Any information that can connect even a firewall with a place or individual(s)should be defined strictly as "personal information in a privacy policy, period.
    I worry about the Eternal Word, especially the records kept by suppliers of everything, including Mozilla, which, without paperwork like a subpoena or warrant,
    "may share potentially-personally identifying information with its employees, contractors, service providers, and subsidiaries and related organizations. ..." Otherwise, Mozilla will not publicly release potentially-personally identifying information except under the same circumstances as Mozilla releases personally identifying information. Those circumstances are explained below, the Four Reasons Mozilla may release to companies including Google's Doubleclick Division, which crows, in privacy statements about a)getting access to all of Google's raw data, b) crunching and mashing for best web ad placement - NOT for "people like YOU" but Only for YOU the wife of Bradbury's Fireman is told, as she awaits a once-in-lifetime chance to influence the flow of a 3V soap opera..
    Here's one Mozilla protection against releasing information to the PUBLIC, private industry and the governments of the world:
    First, in admitting what you said above is not the case:,
    "... Mozilla also collects potentially-personally identifying information like Internet Protocol (IP) addresses, which are non-personally identifying in and of themselves but could be used in conjunction with other information to personally identify users"
    What does it do with these records, which I would prefer have every identification mark removed the microsecond it arrives?
    Well, if you are not in business with Mozilla, just another user:
    "1. Mozilla does not publicly release information gathered in connection with commercial transactions (i.e., transactions involving money), including transactions conducted through the Mozilla Foundation Store or donations to the Mozilla Foundation.
    2. Mozilla does not publicly release personally identifying information collected in connection with an application for employment with Mozilla.
    3. Mozilla does not make publicly available information that is used to authenticate users the publication of which would compromise the security of Mozilla's websites (e.g., passwords).
    4. Mozilla does not make publicly available information that it specifically promises at the time of collection to maintain in confidence."
    Part 1 is UNTRUE to the extent that Mozilla reports and/or verifies donations, either the 5 largest or everyone donating more than I think it's $30K for the annual Form IRS 990, a NfP's equivalent of a Form 1040 - the last three are generally posted on the foundation site.
    Part 2 is The Law in most states.
    Part 3 promises internal security to Mozilla, and says NOTHING about users.
    Part 4 avoids nasty suits.
    And the list is followed by a curious statement: "Outside those four contexts, users should assume that personally identifying information provided through Mozilla's websites will be made available to the public."
    What about PRIVATE transactions (purchases, trades, 'aid in kind') - curiously missing is any statement? Or 'requests' from public and private guys in suits?
    Ominously, for those who regard the rapid collection of data from social networking 'harmless' or 'fun', "Mozilla may interact with you through social networks to further our mission. When you interact with us at a third-party social network, such as Facebook, Twitter, or Google +, the network gives us the ability to access and store certain information from your profile for that social network.
    Like the guy who posted a copy of an ad he found for hospital lubricant in 55-gallon drums - and found himself the Facebook spokesman for a KY-Jelly-type product.
    "Consistent with our privacy commitments, we will scrutinize third party requests for information about YOU for compliance with the law, including those coming from governmental agencies or civil litigants. We may access, use, preserve or disclose information about you only WHEN WE HAVE A GOOD FAITH BELIEF that it is REASONABLY necessary to do so to satisfy the applicable law, regulation, legal process or LAWFUL GOVERNMENT REQUEST OF ANY COUNTRY, or to protect the rights, property or safety of Mozilla, its users or the public. We will provide notice of legal process or governmental requests unless prohibited to do so by law or the circumstances warrant otherwise."[emphases added, words a direct quote.] Good Faith in legality of actionswas Nixon's initial excuse too - for setting up the Plumbers unit.
    I would prefer a statement like:
    'Mozilla Foundation and its subdivisions are committed to neither selling, trading, supplying, borrowing or using any data that can possibly be linked to a given user or volunteer.
    We will fight tooth and claw on behalf of our users and participants - to resist ANY attempt by any agency, public or private, for ANY reason, including promises of money or advertising, to divulge ANY information about them to anyone, PARTICULARLY when the request comes from a government with a less-than-stellar civil/judicial rights record, according to agencies like Human Rights Watch, the European Union's human rights division, the Permanent Court of International Justice division dealing with mass murderers and the like.
    We will fight as strongly against US, State or local government agency requests for information. We will place the people we work so hard to serve above ourselves, and be dragged kicking and screaming all the way to the courthouse door, with as many live net feeds and calls to the traditional public media as possible. And we will barricade any door if we fear a midnight knock.
    We will provide governments outside the countries where we do business (list here) with nothing unless ordered to by US courts, at least after fighting as many rounds of appeals as we are allowed, and will publicly and politically battle any agency which attempts to get user/participant data from us. All Foundation AND subsidiary employees earning more than $150,000 a year have pledged a minimum of 10% of their salary to these battles, if needed.
    We further put agencies, public and private, on notice that we maintain as little data as possible on our free and paying customers, and do not maintain a single record we are not required to keep, even if it makes our business a bit more difficult to perform.
    And if we get word someone might be coming, they're liable to find all computers free of data, which, if legally possible - before a subpoena or warrant arrives, just on rumor it is coming, we will destroy everything - to the point of installing and activating scuttling devices on all disks and backups, no matter where stored. We take this protection very seriously, and would rather face a business and directory rebuild than give any information that could locate a product user.'
    I'd rather like to see a statement like this as part of the Privacy Policy of every IT-related corporation in the world - though I doubt even Mozilla has the nerve or commitment to its manifesto. We wont ever see anything like it - when asked by the local Homeland Security-style division, for info on a dozen or, for that matter, all users, it is CYA time around the world.
    Smith 1 is in 1984, Smith 2 is a great San Francisco xerography artist. Smiths 3,4,5,6,7 have been spotted on the net. Use the name, it is a good name to let Big Google know how you feel.

  • In the privacy policy, it states that percentages and durations of books read are being collected to ensure that publishers can have a metered price model, prices depending on how the book was read. Give me an example of a company with such a price model?

    In your privacy policy, you state that the percentages and durations of books read are being collected to ensure that publishers can choose a metered price model. Prices which depends on the duration for which the book was read.
    Give me an example of a company with such a price model? Are the information being collected even where the companies have not asked for the information, even when the metered price models are not being used?
    Here is an extract från the privacy policy:
    What information does Adobe Digital Editions collect and how is it used?
    The following information may be collected when an eBook with DRM is opened in Adobe Digital Editions software. If an eBook does not have any DRM associated with it, then no information is collected.
    User GUID: The User GUID is a unique value assigned in place of your User ID and is used to authenticate you.
    Device GUID: The Device GUID is a unique value generated to identify your device. It is used to ensure that the eBook may be viewed on your device and that the number of devices permitted by the license is not exceeded.
    Certified App ID: This ID represents the application that is being used to view the eBook, in this case Adobe Digital Editions. It is necessary to ensure that only a certified application may display an eBook. This helps to minimize piracy and theft of eBooks.
    Device IP (Internet Protocol): This identifies the country you are located in when you purchase an eBook.  It is used by eBook providers for the enablement of localized pricing models. Only the country identifier of the Device IP is stored.
    Duration for Which the Book was Read: This information may be collected to facilitate limited or metered pricing models entered into between eBook providers, such as publishers and distributors. These models are based on how long a reader has read an eBook. For example, you may borrow an eBook for a period of 30 days. While some publishers and distributors may charge libraries and resellers for 30 days from the date of the download, others may follow a metered pricing model and charge them for the actual time you read the eBook.
    Percentage of the eBook Read: The percentage of the eBook read may be collected to allow eBook providers such as publishers to implement subscription pricing models where they charge based on the percentage of the eBook read.
    Information provided by eBook providers relating to the eBook you have purchased: The following information is provided by the eBook provider to enable the delivery of the eBook to your device:Date of eBook purchase/download
    Distributor ID and Adobe Content Server Operator URL
    Metadata of the eBook, such as title, author, language, publisher list price, ISBN number
    How is the information transmitted?
    The data is sent periodically to Adobe via a secure transmission using HTTPS.
    How is the information used?
    Adobe uses the information collected about the eBook you have opened in Adobe Digital Editions software to ensure it is being viewed in accordance with the type of DRM license that accompanies that eBook. The type of license is determined by the eBook provider. For more information on how each piece of data is used, please see above.

    In your privacy policy, you state that the percentages and durations of books read are being collected to ensure that publishers can choose a metered price model. Prices which depends on the duration for which the book was read.
    Give me an example of a company with such a price model? Are the information being collected even where the companies have not asked for the information, even when the metered price models are not being used?
    Here is an extract från the privacy policy:
    What information does Adobe Digital Editions collect and how is it used?
    The following information may be collected when an eBook with DRM is opened in Adobe Digital Editions software. If an eBook does not have any DRM associated with it, then no information is collected.
    User GUID: The User GUID is a unique value assigned in place of your User ID and is used to authenticate you.
    Device GUID: The Device GUID is a unique value generated to identify your device. It is used to ensure that the eBook may be viewed on your device and that the number of devices permitted by the license is not exceeded.
    Certified App ID: This ID represents the application that is being used to view the eBook, in this case Adobe Digital Editions. It is necessary to ensure that only a certified application may display an eBook. This helps to minimize piracy and theft of eBooks.
    Device IP (Internet Protocol): This identifies the country you are located in when you purchase an eBook.  It is used by eBook providers for the enablement of localized pricing models. Only the country identifier of the Device IP is stored.
    Duration for Which the Book was Read: This information may be collected to facilitate limited or metered pricing models entered into between eBook providers, such as publishers and distributors. These models are based on how long a reader has read an eBook. For example, you may borrow an eBook for a period of 30 days. While some publishers and distributors may charge libraries and resellers for 30 days from the date of the download, others may follow a metered pricing model and charge them for the actual time you read the eBook.
    Percentage of the eBook Read: The percentage of the eBook read may be collected to allow eBook providers such as publishers to implement subscription pricing models where they charge based on the percentage of the eBook read.
    Information provided by eBook providers relating to the eBook you have purchased: The following information is provided by the eBook provider to enable the delivery of the eBook to your device:Date of eBook purchase/download
    Distributor ID and Adobe Content Server Operator URL
    Metadata of the eBook, such as title, author, language, publisher list price, ISBN number
    How is the information transmitted?
    The data is sent periodically to Adobe via a secure transmission using HTTPS.
    How is the information used?
    Adobe uses the information collected about the eBook you have opened in Adobe Digital Editions software to ensure it is being viewed in accordance with the type of DRM license that accompanies that eBook. The type of license is determined by the eBook provider. For more information on how each piece of data is used, please see above.

  • Sometimes, when I click on a link, I see in the address bar the words: "Search bookmarks and history" (greyed out) just before I am taken to the link. Should I be worried? Is someone searching my personal data? Is this just a FireFox error msg?

    Sometimes, when I click a link on a web page, I see in the address bar the words: "Search bookmarks and history" (greyed out) just before I am taken to the link I clicked. A moment later, when I'm at the link, its address appears in the address bar, and all is normal. It seems that this happens only from some particular sites. Is FireFox reporting that my bookmarks and history are being searched?
    Should I be worried? Is someone searching my personal data? Is this just a FireFox error msg when it has trouble finding the website I requested?

    That is OK. Firefox will only display the link in the location bar after the DNS look up has succeeded and a connection to the server has been established. Until that has been done you see the default setting for the location bar: Tools > Options > Privacy > Location Bar: When using the location bar, suggest

  • Russian Government and Customer Data--Privacy Legislation, what are you doing about this?

    Apparently the Russian government recently accelerated legislation that will require personal data on Russian citizens to be stored in Russia.  What is Oracle Eloqua or your company's feedback on how your are planning to respond to this or how other customers are responding.  As SaaS, I don’t believe we have a way to store Russian contacts in Eloqua in Russia.  See the basics of the legislation below. 
    Federal Law No. 242-FZ "On Amendments to Certain Legislative Acts of the Russian Federation for Clarification of the Procedure of Personal Data Processing in Information and Telecommunication Networks" (the "Federal Law No. 242") was adopted on 21 July 2014.
    Federal Law No. 242 introduces the following changes:
    to Federal Law No. 152-FZ "On personal data" dated 27 July 2006 (as amended) by establishing localization requirement for personal data processing; and
    to Federal Law No. 149-FZ "On information, information technologies and protection of information" dated 27 July 2006 (as amended) by establishing procedure for blocking access to information resources on which unlawful processing of personal data takes place.
    Federal Law No. 242 comes into force on 1 September 2016. The acceleration of the entry into force and change of the effective date of the Federal Law No. 242 to 1 January 2015 is however proposed by a draft law which was submitted to the State Duma (lower chamber of the Russian Parliament) on 1 September 2014. In order to become a law, the draft amendments shall be adopted through the usual law-making procedure, which duration is difficult to predict (it involves adoption by the State Duma in three readings, approval by the Federation Council (upper chamber of the Russian Parliament), signing by the President of the Russian Federation and official publication).
    Localization requirement for personal data processing
    Under Federal Law No. 242 so called "operators" or "personal data operators" are required to carry out certain types of "processing" of Russian citizens' "personal data" by using "databases", located in Russia. In this context:
    Personal data means any information directly or indirectly related to any identified or potentially identifiable person. It includes, among other things, first name and family name, date and place of birth, address, information about family status, education, profession, income;
    Personal data operator means a state or municipal authority, legal entity or individual that solely or jointly organize(s)and/or perform(s) the processing of personal data and determine(s) the purposes and scope of such processing;
    Localization requirement applies not to all but only to the following types of personal data processing: recording, systematization, accumulation, storage, specification (updating and amending), and extracting; [1]
    Personal data processing means any action or combination of actions performed with regard to / with any personal data, including collection, recording, systematization, accumulation, storage, use, transfer (distributing, providing or authorizing access to), blocking, deleting and destroying of any personal data;
    Database means set of independent materials systematized in such a way that these materials can be retrieved and processed using the computer; and
    Before starting personal data processing operators are required to notify the Federal Service for Supervision in the Area of Telecoms, Information Technologies and Mass Communications, which is the state authority responsible for the enforcement of the Personal Data Law ("Roskomnadzor") on the location of the database(s) containing personal data of Russian citizens.
    The requirement of using databases "located in Russia" is not entirely clear, especially given that location of certain databases (e.g. clouds) is difficult to ascertain, but most likely this requirement implies that personal data operators are required to use local facilities (server(s) / data center(s)) located in Russia either owned or provided by third parties; each potential option requires proper legal and tax consideration.
    It is not yet clear from Federal Law No. 242 whether Russian citizens' personal data may be processed with the use of the databases located outside of Russia in addition to being processed using databases located in Russia (e.g. for the purposes of back-up or duplicate storage).
    Procedure for blocking access to infringing information resources
    Procedure for blocking information resources on which unlawful processing of personal data takes place, introduced by Federal Law No. 242, includes the following stages:
    Stage 1: The "personal data subject" (any individual identified or potentially identifiable on the basis of the personal data) whose personal data is being processed unlawfully shall obtain the relevant court decision acknowledging the unlawful processing of his/her personal data.
    Stage 2: After entry of the relevant court decision into force the personal data subject may apply to Roskomnadzor with the request to limit access to his/her personal data.
    Stage 3: Roskomnadzor within 3 (three) business days from the date of the relevant court decision's entry to force shall determine the hosting provider or any other person ensuring the processing of the personal data (the "Hosting Provider"), serve the Hosting Provider with a notification requesting the Hosting Provider to take measures to terminate unlawful processing of personal data and include information on the unlawful processing of personal data (including domain name, webpage, web address identifying websites on which personal data has been unlawfully processed, etc.) into the Register of Infringers of Rights of the Personal Data Subjects.
    Stage 4: The Hosting Provider within 1 (one) business day from the date of receipt by the Hosting Provider of Roskomnadzor's notification shall liaise with the operator of the information resource, serviced by the Hosting Operator, requesting the operator of the information resource to terminate unlawful processing of personal data or restrict access to unlawfully processed information.
    Stage 5: The operator of the information resource shall terminate unlawful processing of personal data within 1 (one) business day from the date of receipt of the request from the Hosting Operator. If the unlawful processing of personal data is not terminated by the operator of the information resource, the Hosting Provider, must restrict access to the information resource on which that personal data has been unlawfully processed not later than within 3 (three) business days from the date of receipt by the Hosting Provider of Roskomnadzor's notification.
    Stage 6: Failure of the Hosting Provider or the operator of the information resource to undertake measures, described in Stages 4 and 5 above, entails submission of the information about unlawful processing of personal data to the telecommunication companies, which shall restrict access to the information resource on which that personal data has been unlawfully processed (including blocking of the relevant domain name or website). If the measures described in Stages 4 and 5 above are properly undertaken or if the court decision acknowledging the unlawful processing of personal data is overruled, Roskomnadzor or the entity keeping and maintaining the Register of Infringers of Rights of the Personal Data Subjects removes the information on the unlawful processing of personal data from such register.
    1 - Excluding personal data processing: to achieve objectives stipulated by the international treaties of the Russian Federation or law, and for the performance of functions, powers or obligations of the personal data operators, imposed by law; (ii) for the performance of justice, enforcement of a judicial act, act of another authority or official, as provided by the laws on enforcement of judicial decisions; (iii) for the performance of powers imposed on the federal and municipal authorities, non-budgetary funds and organizations rendering state and municipal services, including registration in the unified and regional portals of state and municipal services; or (iv) for the professional activities of a journalist or mass media or for scientific, literature or other artistic activities, provided that rights and legal interests of the personal data subjects are not breached.

    Í would like to know too! Some of our Eloqua customers are doing business in Russia.

  • My Mac has broken and I want to sell it for parts. How can I be sure that my personal data that is/was on the hard drive is safe?

    My 2006 MacBook Pro has broken. There is a little bit of drive noise when I turn it on, but then nothing happens. It is no big deal. Most of my files were backed up. There are a few files I would like to recover if possible, but nothing worth a major effort.
    I have seen that broken MacBook Pro's go for about $300 on eBay for parts, so I would like to sell the MacBook Pro. However, I only want to do that after I am sure that my personal data is wiped out. Does anyone know how I can accomplish that? Does anyone know of an easy way to search the old hard drive for some of the data that I lost? Can a Genius Bar take care of this stuff for me (and how much do they charge?)?
    Thank you for your help.
    - Eric

    EricNY wrote:
    I only want to do that after I am sure that my personal data is wiped out. Does anyone know how I can accomplish that?
    The ONLY real secure way to be sure that noone may recover data from your drive is, to remove the drive, and drill one or two 1" holes thru the disk.
    A bit less secure but useful way is, to wipe out the data with a tool that's overwrite all sectors of the drive with randomized data in multiple runs.
    For example: Permanent Ereaser http://www.edenwaith.com/products/permanent%20eraser/
    Independent tests bring out, that even specialized recovery companies with forensic tools are unable to find useful data after such a run.
    EricNY wrote:
    Does anyone know of an easy way to search the old hard drive for some of the data that I lost?
    There are some recovery tools out there to fit your needs, e.g. MacKeeper http://mackeeper.zeobit.com/mac-data-recovery
    Lupunus

Maybe you are looking for