Revoking Personal Data in the Digital World

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Revoking Personal Data in the Digital World
# 1  
Old 11-23-2009
Revoking Personal Data in the Digital World

HPL-2009-362 Revoking Personal Data in the Digital World - Kounga, Gina; Bramhall, Pete
Keyword(s): Privacy, Security and Privacy Protection
Abstract: Requiring data subjects to authorise organisations, from which they request some services, to use their personal data in order for these services be provided has become common practice. This, partly because in order to provide a service to the right individual, an organization needs to know who that ...
Full Report

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. What is on Your Mind?

Mad World Remix of Moby Video (Are You Lost In The World Like Me)

This is an excellent video comment on modern society and the remix is good too: https://www.youtube.com/watch?v=5DU1B_XkyIk 5DU1B_XkyIk Watch the video above and post your comments. (3 Replies)
Discussion started by: Neo
3 Replies

2. Linux

How to Keep your core System and personal Data safe while updating to latest distro?

Hi everyone, Almost everything is in the title! Which partitions do you keep? Which partitions do you reformat, while doing a clean install? Personaly, I never format /var and /home partitions when I update to latest linux distribution. It has been working quite ok up to now, but I was... (3 Replies)
Discussion started by: freddie50
3 Replies

3. Cybersecurity

How can i secure my personal data and E-mail id?

Today the problem of hacking is increasing day by day so in this situation how can i secure my personal data and E-mail id? Please reply me soon. (1 Reply)
Discussion started by: andrepitt77
1 Replies

4. Programming

The World's Most Advanced Lexicon-Data-Structure

Hello, Over the past few years, I've conducted some rather thorough R&D in the field of lexicon-data-structure optimization. A Trie is a good place to start, followed by a traditional DAWG. Smaller means faster, but a traditional DAWG encoding operates as a Boolean-graph, unable to index... (1 Reply)
Discussion started by: HeavyJ
1 Replies
Login or Register to Ask a Question
gpa(1)								   User Commands							    gpa(1)

NAME
gpa - graphical frontend for the GNU Privacy Guard SYNOPSIS
gpa [OPTION(S)] [FILE(S)] DESCRIPTION
The GNU Privacy Assistant (GPA) is a graphical user interface for the GNU Privacy Guard (GnuPG). gpa can be used to encrypt, decrypt, and sign files, to verify signatures and to manage the private and public keys. OPTIONS
-c, --clipboard Open the clipboard. -C, --card Start with the card-manager open. -d, --daemon Enable the UI server. --disable-ticker Disable ticker used for card operations. -f, --files Start with the file-manager open. This is the default if one or more FILE(S) are added to the command arguments. -k, --keyring Start with the keyring editor. This is the default. -o, --options=FILE Read options from the specified file instead of ~/.gnupg/gpa.conf. -s, --settings Open the settings dialog. -x, --cms Enable basic support for X.509. -?, --help, --help-all Print usage information and exit. --help-gtk Print options related to GTK. See also gtk-options(7). -v, --version Print version information and exit. FILES
~/.gnupg/gpa.conf Standard user configuration file read by gpa on startup. BUGS
Please report bugs to <bug-gpa@gnupg.org>. AUTHORS
gpa was written by Miguel Coca, amongst others. This manual page was written by Arthur de Jong <adejong@debian.org> and Daniel Leidert <daniel.leidert@wgdd.de> for the Debian GNU/Linux system (but may be used by others). SEE ALSO
gpg(1), gpg2(1), gpgconf(1), gpgsm(1), gtk-options(7) gpa(1)