PRIVACY + SECURITY BLOG

News, Developments, and Insights

high-tech technology background with eyes on computer display

Cartoon: HIPAA Confidentiality and PHI Sharing

Cartoon HIPAA Confidentiality - TeachPrivacy HIPAA Training 01

Here’s a cartoon about HIPAA confidentiality and our modern medical system. In the old days, medical confidentiality meant that people’s health information was seen by just a handful of people – doctors and their staff. These days, health information is widely shared. Countless people see a patient’s medical records and numerous organizations are provided with […]

Cartoon – Phishing Emails

Cartoon Phishing Email - TeachPrivacy Data Security Training 02 small

This cartoon involves a common phishing scam – the inheritance email. For decades, phishers have been sending out the same email scams. One would think that after a while, people would learn about the common scams, and they wouldn’t work anymore. Unfortunately, people keep falling for the same scams over and over again.  Even a […]

Cartoon: Nothing to Hide

Cartoon Nothing to Hide 02 small

Here’s a cartoon about the nothing-to-hide argument. One of the most common arguments of those unconcerned about government surveillance or privacy invasions is “I’ve got nothing to hide.” I wrote a book addressing this argument and other faulty arguments made in the debate about privacy versus security. Recently, I posted the full text of my […]

Cartoon: Implantable Devices and Privacy

Cartoon Implantable Devices - TeachPrivacy Privacy Training 02 small

This cartoon is about implantable devices and privacy.  Increasingly devices require subscriptions, and there is tremendous lock in, as the devices can only work with a particular company’s services. Implantable devices up the ante – a person could be locked in for life.  The law must address lock in with more than data portability. When […]

Cartoon: Profiling

This cartoon is about profiling. A profile consists of a particular set of characteristics and behaviors that are deemed as suspicious by law enforcement.  Profiles can be created by people or generated by algorithms that identify suspicious things from data of known criminals or terrorists.