Privacy Tactics Masthead  
location on site: home > Table of Contents
spacer

Privacy Tactics Book Cover

 

Table of Contents

Below you will find the full table of contents for the book, but first, if you would like here's a quick look inside taken from a couple of chapters...

Home Network Security/Firewalls
Social Hacking (also known as Social Engineering)
Chat (with special section on child safety)

What else is there? Just see below!


Contents

How to Use This Book vii
Preface viii
Acknowledgments xiii
Warning and Disclaimer xiv


Section 1: The Big Picture 1
Introduction 3
What Is Privacy? 16
Legal Rights to Privacy 31
The Future of Privacy Issues 34

Section 2: Major Issues 39
Cross-Referencing & Profiling 41
Biometrics 46
Privacy in the Workplace 52
Consumer Privacy: Recommendations for Marketers 55


Section 3: Privacy Tactics: Online Tracking,
Marketing, Junk Email & Email Security 59

Email: Privacy Overview 61
Email: Junk & Scams 63
Anonymous Remailers 82
Email: Secret/Encrypted Notes & Signatures 86
Carnivore & Magic Lantern 95
Chat 99
Instant Messaging (IM) 104
America Online (AOL) 111
Web Banner Ads & Cookie Tracking 113

Cookie Safety 121
Tracking with Sniffers & IP Addresses 122
Web & Email Bugs/Beacons 128
Your Web Browser Knows Where You Have Been 134
Web Browser Automated Programs,
Java, JavaScript, ActiveX 137
Spyware, Snoopware, Adware 139
Pop-Up Ads 150
Shopping Online 154
Platform for Privacy Preferences Project (P3P) 161


Section 4: Privacy Tactics:
Offline Marketing & Tracking 167

Telemarketing & Junk Faxes 169
National Do Not Call Registry 176
Postal Junk Mail & Marketing 178
Electronic Eavesdropping 183
Digital/Personal Video Recorders (TiVo and Similar) 185
Cell Phone Spam, Tracking and E911 189
GPS Tracking 196
Radio Frequency Identifier Device (RFID) 200
Automatic Vehicle Identification (AVI) & Toll Collection 204
Video Surveillance 210


Section 5: Privacy Tactics:
Public & Semi-Public Information 217

Licenses, Associations, Clubs & Affiliations 219
Public Information 222
USENET & Web Bulletin Boards 226

Section 6: Privacy Tactics: Computer Security 229
Computer: General Security 231
Home Network Security/Firewalls 235
Password Safety 246
PC CMOS/BIOS Password 255
Personal Digital Assistants (PDAs) 258
Social Hacking (also known as Social Engineering) 261
Virus Protection 265
Encryption 275


Section 7: Privacy Tactics:
Identity & Credit Card Fraud 285

Credit/Identity Fraud: General Risk and
Risk Reduction Strategies 287
Social Security Number Details 295
Post Identity Theft Recovery 298


Section 8: Privacy Laws: Overview 307
Finding Privacy Law 309


Section 9: Privacy Law: Online Privacy Law 313
Children’s Online Privacy Protection Act of 1998 (COPPA) 315
Digital Privacy Act of 2000 320
Digital Millennium Copyright Act 321
Electronic Communications Privacy Act (ECPA) (1986) 325
Electronic Communications Privacy Act of 2000 328
Online Personal Privacy Act 331

Section 10: Privacy Law: Electronic Privacy Law 335
Notice of Electronic Monitoring Act 337
Privacy Act of 1974 339
Telemarketing and Consumer Fraud and Abuse Prevention Act 341
Telephone Consumer Protection Act (1991) 343


Section 11: Privacy Law: Privacy Related Impact 345
Bank Secrecy Act 347
Computer Assisted Passenger Prescreening System II (CAPPS II) 349
Drivers Privacy Protection Act (DPPA) 352
Health Insurance Portability and Accountability Act of 1996 (HIPPA) 356
Identity Theft and Assumption Deterrence Act of 1998 359
Fair Credit Reporting Act (FCRA) 361
Financial Services Modernization Act of 1999 365
Patriot Act & Patriot Act II 367
Terrorism Information Awareness 370
Video Privacy Protection Act (1998) 372


Section 12: Resources 375
Privacy Organizations
Government and Legal Resources
Business and Industry Resources


Bibliography 379
Notes 380
Index 383

Top of Page Top of Page
spacer
bullet off graphicOrder now from Just Bookz!

spacer
Enter Privacy Tactics Additional ResourcesEnter Privacy Tactics Additional Resources links online...
spacer
privacy policy :: customer service :: media :: booksellers/wholesalers :: partners :: contact


Privacy Tactics Bottom Logo