<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://blog.intelius.com/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>The Official Intelius Blog</title>
    <link>http://blog.intelius.com/</link>
    <description></description>
    <language>en</language>
          <item>
    <title>When Self-Regulation Works, Your Privacy Is In Good Hands</title>
    <link>http://blog.intelius.com/when-self-regulation-works-your-privacy-good-hands</link>
    <description>&lt;p&gt;Despite the ongoing discussions about online privacy by legislatures, regulators,&amp;nbsp;and data conservationists — self-regulation remains the primary tool to ensure consumer information is handled responsibly. And rightly so.&lt;/p&gt;&lt;p&gt;Too often, privacy debates devolve into false dichotomies, dominated by arguments that advocate for being&amp;nbsp;&lt;em&gt;always anonymous&lt;/em&gt;&amp;nbsp;or that&amp;nbsp;&lt;em&gt;privacy is dead&lt;/em&gt;. Both are wrong.&amp;nbsp;Online privacy continues to be an important conversation because we humans are both social&amp;nbsp;&lt;em&gt;and&amp;nbsp;&lt;/em&gt;autonomous creatures. And, we need solutions that balance values of both disclosure and discretion. The U.S. founders&amp;nbsp;&lt;a title=&quot;http://jimadler.me/post/7227294258/what-would-the-founding-fathers-do-in-the-age-of-social&quot; href=&quot;http://jimadler.me/post/7227294258/what-would-the-founding-fathers-do-in-the-age-of-social&quot; target=&quot;_blank&quot;&gt;knew&lt;/a&gt;&amp;nbsp;that.&lt;/p&gt;&lt;p&gt;Through products and services, the technology industry is well positioned to address the weighty nuances of deciphering public from private places, understanding who uses what products, and how those products might be abused.&lt;/p&gt;&lt;p&gt;But although industry might be best positioned to address privacy issues, they have no monopoly on them. Privacy is a team sport. As I discussed in&amp;nbsp;&lt;a title=&quot;http://jimadler.me/post/23467315105/pii2012-the-emergent-privacy-industrial-complex&quot; href=&quot;http://jimadler.me/post/23467315105/pii2012-the-emergent-privacy-industrial-complex&quot; target=&quot;_blank&quot;&gt;my talk&lt;/a&gt;&amp;nbsp;at the recent&amp;nbsp;&lt;a title=&quot;http://www.privacyidentityinnovation.com/events/pii2012-seattle&quot; href=&quot;http://www.privacyidentityinnovation.com/events/pii2012-seattle&quot; target=&quot;_blank&quot;&gt;Privacy Identity Innovation&lt;/a&gt;&amp;nbsp;conference, technologists drive innovation. But&amp;nbsp;&lt;em&gt;responsible&lt;/em&gt;&amp;nbsp;innovation is only achieved when tempered with the counsel (and sometimes warnings) of humanitarians — philosophers, journalists, economists, anthropologists, and historians. And, where appropriate, this counsel must be heeded and enforced, either voluntarily through self-regulation or involuntarily by&amp;nbsp;law.&lt;/p&gt;&lt;p&gt;Self-regulation is simply the most efficient way to protect consumers&amp;nbsp;&lt;em&gt;and&lt;/em&gt;&amp;nbsp;encourage innovation. Let me break it down:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Self-regulation adapts better than government regulation&lt;br /&gt;&lt;/strong&gt;The process of creating, passing, implementing, sustaining and auditing government regulation is, as you can imagine, quite long. Congress has attempted comprehensive privacy legislation for years. While the FTC has been effective at prosecuting offenders&amp;nbsp;&lt;a title=&quot;http://www.nytimes.com/2011/11/30/technology/facebook-agrees-to-ftc-settlement-on-privacy.html&quot; href=&quot;http://www.nytimes.com/2011/11/30/technology/facebook-agrees-to-ftc-settlement-on-privacy.html&quot; target=&quot;_blank&quot;&gt;recently&lt;/a&gt;, it just can’t&amp;nbsp;give consumers the protections they need and the innovation they want. Self-regulation is fast. Privacy companies, like&amp;nbsp;&lt;a href=&quot;http://truste.com/&quot; target=&quot;_blank&quot;&gt;TRUSTe&lt;/a&gt;, can verify the claims of their clients and operate at the speed of&amp;nbsp;technology.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Self-regulation offers solutions to actual problems&lt;br /&gt;&lt;/strong&gt;By allowing industry to self-regulate, innovation is prioritized alongside consumer protection — not innovation at the expense of consumer protection. We tend to forget how new the Internet is and, to some extent, that we are all making this up as we&amp;nbsp;go.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Self-regulation encourages a race to the top&lt;br /&gt;&lt;/strong&gt;Industry players vie for users. Winning companies offer the best products and are most responsive to all stakeholders including customers, advocates, and regulators.&amp;nbsp;Take, for example, Intelius’ work with the&amp;nbsp;&lt;a title=&quot;http://nnedv.org&quot; href=&quot;http://nnedv.org/&quot; target=&quot;_blank&quot;&gt;National Network to End Domestic Violence&lt;/a&gt;&amp;nbsp;(NNEDV).&amp;nbsp; Working with NNEDV, we developed a suppression feature in&amp;nbsp;&lt;a title=&quot;http://TrueRep.com&quot; href=&quot;http://truerep.com/&quot; target=&quot;_blank&quot;&gt;TrueRep&lt;/a&gt;&amp;nbsp;which offers users the opportunity to block their most recent contact information (&lt;a title=&quot;http://jimadler.me/post/13438945247/truerep-why-its-important&quot; href=&quot;http://jimadler.me/post/13438945247/truerep-why-its-important&quot; target=&quot;_blank&quot;&gt;my take here&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Self-regulation fits with Privacy-by-Design (PbD)&lt;br /&gt;&lt;/strong&gt;By accommodating for privacy early in the design process, users can have just-in-time controls over their data.&amp;nbsp;&lt;a title=&quot;http://privacybydesign.ca/&quot; href=&quot;http://privacybydesign.ca/&quot; target=&quot;_blank&quot;&gt;PbD&lt;/a&gt;&amp;nbsp;was one of the driving forces for our&amp;nbsp;TrueRep&amp;nbsp;product where users have access and control of their own public profile.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Self-regulation addresses data abuses&lt;br /&gt;&lt;/strong&gt;The fiercest enemy of consumer privacy is data abuse. Sure, data abuse can’t be accomplished without access to the data. But where data is already public, it shouldn’t be used for harm. That’s the wisdom of the&amp;nbsp;&lt;a title=&quot;http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CIMBEBYwAA&amp;amp;url=http%3A%2F%2Fwww.ftc.gov%2Fos%2Fstatutes%2F031224fcra.pdf&amp;amp;ei=LArNT9_dHoX4gAfvl63eBg&amp;amp;usg=AFQjCNFuAtXmfAcFofNRWi5MCc_SOoE32A&amp;amp;sig2=gS72kgSMIh47MVpOVm1B_g&quot; href=&quot;http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CIMBEBYwAA&amp;amp;url=http%3A%2F%2Fwww.ftc.gov%2Fos%2Fstatutes%2F031224fcra.pdf&amp;amp;ei=LArNT9_dHoX4gAfvl63eBg&amp;amp;usg=AFQjCNFuAtXmfAcFofNRWi5MCc_SOoE32A&amp;amp;sig2=gS72kgSMIh47MVpOVm1B_g&quot; target=&quot;_blank&quot;&gt;Fair Credit Reporting Act&lt;/a&gt;. No matter how the data is accessed, businesses must tread carefully when it’s used for sensitive purposes like hiring or&amp;nbsp;housing.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;We humans are complex. As we map our complex society online, getting privacy right will take some time. Self-regulation is a key ingredient to responsible, fast-paced innovation. Give it a&amp;nbsp;chance.&lt;/p&gt;&lt;p&gt;&lt;a title=&quot;More from Jim Adler&quot; href=&quot;http://jimadler.me/&quot;&gt;More from Jim Adler&lt;/a&gt; &lt;br /&gt;Chief Privacy Officer, Intelius&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/when-self-regulation-works-your-privacy-good-hands#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/when-self-regulation-works-your-privacy-good-hands#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/when-self-regulation-works-your-privacy-good-hands#comments</comments>
 <pubDate>Mon, 13 Aug 2012 20:42:48 +0000</pubDate>
 <dc:creator>dstewart</dc:creator>
 <guid isPermaLink="false">324 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>Privacy Identity Innovation Conference 2012: The Emergent Privacy Industrial Complex</title>
    <link>http://blog.intelius.com/privacy-identity-innovation-conference-2012-emergent-privacy-industrial-complex</link>
    <description>&lt;p&gt;The &lt;a title=&quot;http://www.privacyidentityinnovation.com/events/pii2012-seattle&quot; href=&quot;http://www.privacyidentityinnovation.com/events/pii2012-seattle&quot; target=&quot;_blank&quot;&gt;Privacy Identity Innovation&lt;/a&gt; (pii) conference is THE eclectic gathering of wonks, geeks, and suits. Seattle was lucky to host the third pii&amp;nbsp;&lt;span class=&quot;float-right&quot;&gt;&lt;/span&gt;
 event last week. pii was lucky to score the most beautiful weather 
Seattle has offered since last September. I was lucky enough to attend 
and participate.&amp;nbsp;Win-win-win.
&lt;/p&gt;&lt;p&gt;I’ll be recapping the pii 2012 conference with &lt;a title=&quot;http://hibe.com&quot; href=&quot;http://hibe.com&quot; target=&quot;_blank&quot;&gt;Hibe’s&lt;/a&gt; &lt;a title=&quot;https://twitter.com/#%21/Brendan_Charles&quot; href=&quot;https://twitter.com/#%21/Brendan_Charles&quot; target=&quot;_blank&quot;&gt;Brendan Charles&lt;/a&gt; on Tuesday’s &lt;a title=&quot;http://twitter.com/#%21/search/privchat&quot; href=&quot;http://twitter.com/#%21/search/privchat&quot; target=&quot;_blank&quot;&gt;#PrivChat&lt;/a&gt; (topics &lt;a title=&quot;http://privacycamp.posterous.com/privchat-topics-for-522-debrief-on-pii2012-wi&quot; href=&quot;http://privacycamp.posterous.com/privchat-topics-for-522-debrief-on-pii2012-wi&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;) at 12&amp;nbsp;pm EDT/9 am PDT. Please&amp;nbsp;join.&lt;/p&gt;
&lt;h2&gt;A Growing Privacy-Industrial Complex&lt;/h2&gt;
&lt;p&gt;The theme of my pii &lt;a title=&quot;http://en.wikipedia.org/wiki/Lightning_talk&quot; href=&quot;http://en.wikipedia.org/wiki/Lightning_talk&quot; target=&quot;_blank&quot;&gt;lightning talk&lt;/a&gt; was a call for balance amidst a growing privacy-industrial complex (&lt;a title=&quot;http://www.slideshare.net/pii2011/pii2012-jim-adlermay15lightningtalk&quot; href=&quot;http://www.slideshare.net/pii2011/pii2012-jim-adlermay15lightningtalk&quot; target=&quot;_blank&quot;&gt;slides&lt;/a&gt;, &lt;a title=&quot;http://vimeo.com/42475309&quot; href=&quot;http://vimeo.com/42475309&quot; target=&quot;_blank&quot;&gt;video&lt;/a&gt;) — a &lt;a title=&quot;http://www.huffingtonpost.com/jeff-jarvis/privacy-inc-scare-and-sel_b_825069.html&quot; href=&quot;http://www.huffingtonpost.com/jeff-jarvis/privacy-inc-scare-and-sel_b_825069.html&quot; target=&quot;_blank&quot;&gt;term first coined&lt;/a&gt; by &lt;a title=&quot;http://buzzmachine.com/&quot; href=&quot;http://buzzmachine.com/&quot; target=&quot;_blank&quot;&gt;Jeff Jarvis&lt;/a&gt;
 last year. The privacy industry is comprised of professionals from 
legal, compliance, risk, ethics, audit, security, and operations. Since 
2000, it has been growing at nearly 50% annually; growth that would make
 any CEO&amp;nbsp;blush.&lt;/p&gt;
&lt;p&gt;Sure, privacy professionals are certainly necessary but hardly 
sufficient to guide us through this burgeoning era of social media. 
Their background is often too specialized and too isolated from where 
technical innovation occurs. Privacy professionals need to be agile 
across the entire organization and have a strong voice throughout the 
product lifecycle. Archimedes said, “Give me a place to stand and I will
 move the earth.” That stand can’t only be in the General 
Counsel’s&amp;nbsp;office.&lt;/p&gt;
&lt;p&gt;Also, as President Eisenhower warned with regard to the &lt;a title=&quot;http://en.wikipedia.org/wiki/Military%E2%80%93industrial_complex&quot; href=&quot;http://en.wikipedia.org/wiki/Military%E2%80%93industrial_complex&quot; target=&quot;_blank&quot;&gt;military-industrial complex&lt;/a&gt;,
 there’s a risk of survival bias. So, as privacy regulations grow in 
complexity, more privacy professionals will be needed. For example, how 
much work has been created to understand and comply with the new &lt;a title=&quot;http://eucookiedirective.com/&quot; href=&quot;http://eucookiedirective.com/&quot; target=&quot;_blank&quot;&gt;E.U. Cookie Directive&lt;/a&gt; that can be enforced starting May 26? Why must every privacy nail be hit with a regulatory hammer?&lt;/p&gt;
&lt;h2&gt;The Pursuit of Balance&lt;/h2&gt;
&lt;p&gt;&lt;span class=&quot;float-left&quot;&gt;&lt;/span&gt;The metaphor for my talk, was Da Vinci’s iconic &lt;a title=&quot;http://en.wikipedia.org/wiki/Vitruvian_Man&quot; href=&quot;http://en.wikipedia.org/wiki/Vitruvian_Man&quot; target=&quot;_blank&quot;&gt;Vitruvian Man&lt;/a&gt;. The proportioned body, tender heart, and insightful mind of &lt;a title=&quot;Vitruvius&quot; rel=&quot;wikipedia&quot; href=&quot;http://en.wikipedia.org/wiki/Vitruvius&quot; target=&quot;_blank&quot;&gt;Vitruvius&lt;/a&gt; offers interesting parallels into the struggles we’re facing in the privacy world&amp;nbsp;today.&lt;/p&gt;
&lt;p&gt;The technologist is the forceful arms and legs that drive innovation.
 The humanitarian — philosopher, journalist, economist, anthropologist, 
economist, and historian — is the heart that tempers the restless drive 
to innovate. And, it is the mind, which must balance the body and the 
heart. But balance is not a condition, it’s a pursuit like the one we 
know from that peculiar &lt;a title=&quot;http://en.wikipedia.org/wiki/Epicurian&quot; href=&quot;http://en.wikipedia.org/wiki/Epicurian&quot; target=&quot;_blank&quot;&gt;Epicurean&lt;/a&gt; phrase in the Declaration of Independence: &lt;a title=&quot;http://en.wikipedia.org/wiki/Life,_liberty_and_the_pursuit_of_happiness&quot; href=&quot;http://en.wikipedia.org/wiki/Life,_liberty_and_the_pursuit_of_happiness&quot; target=&quot;_blank&quot;&gt;“pursuit of&amp;nbsp;happiness”&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In his 1967 treatise &lt;a title=&quot;http://www.amazon.com/Privacy-Freedom-Alan-F-Westin/dp/0370013255&quot; href=&quot;http://www.amazon.com/Privacy-Freedom-Alan-F-Westin/dp/0370013255&quot; target=&quot;_blank&quot;&gt;Privacy and Freedom&lt;/a&gt;, &lt;a title=&quot;Alan Westin&quot; rel=&quot;wikipedia&quot; href=&quot;http://en.wikipedia.org/wiki/Alan_Westin&quot; target=&quot;_blank&quot;&gt;Alan Westin&lt;/a&gt;
 said: “Each individual is continually engaged in a personal adjustment 
process in which he balances the desire for privacy with the desire for 
disclosure and communication of himself to others.”&amp;nbsp;Prescient.&lt;/p&gt;
&lt;h2&gt;A Balanced Discourse…&lt;/h2&gt;
&lt;p&gt;Preceding my pii talk was &lt;a title=&quot;http://ajkeen.com&quot; href=&quot;http://ajkeen.com&quot; target=&quot;_blank&quot;&gt;Andrew Keen&lt;/a&gt;, whose new book &lt;a title=&quot;http://www.amazon.com/Digital-Vertigo-Revolution-Diminishing-Disorienting/dp/0312624980/&quot; href=&quot;http://www.amazon.com/Digital-Vertigo-Revolution-Diminishing-Disorienting/dp/0312624980/&quot; target=&quot;_blank&quot;&gt;Digital Vertigo&lt;/a&gt;, strikes just such a humanitarian chord. Andrew, in his interview with &lt;a title=&quot;http://larrydownes.com/&quot; href=&quot;http://larrydownes.com/&quot; target=&quot;_blank&quot;&gt;Larry Downes&lt;/a&gt;, described today’s technology as a &lt;em&gt;&lt;a title=&quot;http://en.wikipedia.org/wiki/MacGuffin&quot; href=&quot;http://en.wikipedia.org/wiki/MacGuffin&quot; target=&quot;_blank&quot;&gt;MacGuffin&lt;/a&gt;&lt;/em&gt;
 — a literary device that drives the characters but not the plot. He 
argues that technology is driving us but we need to look through it in 
order to see where this plot is really&amp;nbsp;going.&lt;/p&gt;
&lt;p&gt;The following day, Microsoft’s &lt;a title=&quot;http://marcdavis.me/&quot; href=&quot;http://marcdavis.me/&quot; target=&quot;_blank&quot;&gt;Marc Davis&lt;/a&gt;
 talked about how we might move from digital feudalism to enlightenment 
by wrapping personal information in metadata to better control it within
 the public, joint, and private spheres — a subject I’ve written about &lt;a title=&quot;http://jimadler.me/post/14171086020/creepy-is-as-creepy-does&quot; href=&quot;http://jimadler.me/post/14171086020/creepy-is-as-creepy-does&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. Marc has proposed an information metadata system to move us into such a digital enlightenment. Might &lt;a title=&quot;http://jimadler.me/post/13438945247/truerep-why-its-important&quot; href=&quot;http://jimadler.me/post/13438945247/truerep-why-its-important&quot; target=&quot;_blank&quot;&gt;this&lt;/a&gt; be a step in the right direction?&lt;/p&gt;
&lt;p&gt;Marc challenged my contention that privacy might never be solved (see my comments on the &lt;a title=&quot;http://vimeo.com/42479729&quot; href=&quot;http://vimeo.com/42479729&quot; target=&quot;_blank&quot;&gt;Data Protection panel&lt;/a&gt; at ~10:12). Well, even though no one has proven that privacy is an &lt;a title=&quot;http://en.wikipedia.org/wiki/NP-hard&quot; href=&quot;http://en.wikipedia.org/wiki/NP-hard&quot; target=&quot;_blank&quot;&gt;NP-hard problem&lt;/a&gt;, I stand by my statement that privacy is very complex because people are complex (and their &lt;a title=&quot;http://noisesociety.com/nicklaslundblad.se/wp-content/uploads/2012/05/lundblad_grammarofprivacy.pdf&quot; href=&quot;http://noisesociety.com/nicklaslundblad.se/wp-content/uploads/2012/05/lundblad_grammarofprivacy.pdf&quot; target=&quot;_blank&quot;&gt;language is, too&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;The discourse also included a lively exchange on Twitter at &lt;a title=&quot;http://twitter.com/#%21/search/pii2012&quot; href=&quot;http://twitter.com/#%21/search/pii2012&quot; target=&quot;_blank&quot;&gt;#pii2012&lt;/a&gt;. Check it&amp;nbsp;out.&lt;/p&gt;
&lt;h2&gt;#pii2012 Final Thoughts&lt;/h2&gt;
&lt;p&gt;As &lt;a title=&quot;http://twitter.com/lessig&quot; href=&quot;http://twitter.com/lessig&quot; target=&quot;_blank&quot;&gt;Larry Lessig&lt;/a&gt; taught us, &lt;a title=&quot;http://en.wikipedia.org/wiki/Lawrence_Lessig#.22Code_is_law.22&quot; href=&quot;http://en.wikipedia.org/wiki/Lawrence_Lessig#.22Code_is_law.22&quot; target=&quot;_blank&quot;&gt;“Code is Law”&lt;/a&gt;. And since the law encodes our &lt;a title=&quot;http://jimadler.me/post/22382770205/privacy-a-transatlantic-culture-clash&quot; href=&quot;http://jimadler.me/post/22382770205/privacy-a-transatlantic-culture-clash&quot; target=&quot;_blank&quot;&gt;society’s values&lt;/a&gt;,
 technology’s code and humanity’s values are deeply intertwined. We 
can’t separate them any more than we can separate our body from our mind
 from our&amp;nbsp;heart.&lt;/p&gt;
&lt;p&gt;pii has proven a great venue for spirited, informed, and respectful 
debate. Too often, we fall into this gotcha, zero-sum game of ad hominem
 attacks and scare tactics that does a disservice to the profound 
journey we’re on. Impassioned argument is the friction that sharpens the
 ax of progress. If we are to find a wise path forward, this discourse 
between technologists and humanitarians must&amp;nbsp;continue.&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;a href=&quot;http://jimadler.me/&quot;&gt;More from Jim Adler&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;Chief Privacy Officer, Intelius&lt;/em&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/privacy-identity-innovation-conference-2012-emergent-privacy-industrial-complex#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/privacy-identity-innovation-conference-2012-emergent-privacy-industrial-complex#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/privacy-identity-innovation-conference-2012-emergent-privacy-industrial-complex#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/privacy">Privacy</category>
 <pubDate>Tue, 22 May 2012 16:56:49 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">323 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>Privacy: A Transatlantic Culture Clash</title>
    <link>http://blog.intelius.com/privacy-transatlantic-culture-clash</link>
    <description>&lt;p&gt;The difference between European and American privacy approaches is typically framed as E.U. aspiration versus U.S. pragmatism:
&lt;/p&gt;&lt;blockquote&gt;
&lt;ul&gt;&lt;li&gt;The E.U. views privacy as a source “&lt;a title=&quot;http://en.wikipedia.org/wiki/Personality_rights&quot; href=&quot;http://en.wikipedia.org/wiki/Personality_rights&quot; target=&quot;_blank&quot;&gt;right of personality&lt;/a&gt;” versus the U.S. mosaic of &lt;a title=&quot;http://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States#Modern_tort_law&quot; href=&quot;http://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States#Modern_tort_law&quot; target=&quot;_blank&quot;&gt;privacy torts&lt;/a&gt;;&lt;/li&gt;&lt;li&gt;the E.U. has comprehensive, federal law versus U.S. spotty, &lt;a title=&quot;http://en.wikipedia.org/wiki/Data_Protection_Directive#Comparison_with_US_data_protection_law&quot; href=&quot;http://en.wikipedia.org/wiki/Data_Protection_Directive#Comparison_with_US_data_protection_law&quot; target=&quot;_blank&quot;&gt;sectoral statutes&lt;/a&gt;;&amp;nbsp;and&lt;/li&gt;&lt;li&gt;the E.U. has spotty enforcement at the nation-state level versus 
U.S. rigorous enforcement through private right of action, state 
enforcement through attorneys general, and federal regulation through 
the Federal Trade Commission.&lt;/li&gt;&lt;/ul&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;span class=&quot;float-right&quot;&gt;&lt;img src=&quot;https://s3.amazonaws.com/jim-adler/tumblr/img/transatlantic-policy-flows.jpg&quot; width=&quot;200&quot; class=&quot;rounded-corners&quot; /&gt;&lt;/span&gt;As &lt;a title=&quot;ttp://www.linkedin.com/pub/donald-cohn/0/88b/29a&quot; href=&quot;ttp://www.linkedin.com/pub/donald-cohn/0/88b/29a&quot; target=&quot;_blank&quot;&gt;Don Cohn&lt;/a&gt;
 has said, “hell on earth is E.U. law and U.S. enforcement.” There’s 
some truth to these characterizations, but they miss the point. The E.U.
 and U.S. simply disagree on the priority of two key cultural values, &lt;a title=&quot;http://jimadler.me/post/7227294258/what-would-the-founding-fathers-do-in-the-age-of-social&quot; href=&quot;http://jimadler.me/post/7227294258/what-would-the-founding-fathers-do-in-the-age-of-social&quot; target=&quot;_blank&quot;&gt;disclosure and discretion&lt;/a&gt;
 — that is, freedoms of the public (i.e., speech, press, assembly) and 
freedoms of the person (i.e., equal treatment, privacy). We get mired in
 technocratic detail without recognizing this fundamental 
cultural&amp;nbsp;difference.&lt;/p&gt;
&lt;p&gt;Last week, the European data protection authorities came to Silicon 
Valley to discuss access and use of online personal data. The clash of 
values, between rights of the public and rights of the private, could 
not be more clear. At the &lt;a title=&quot;http://www.law.berkeley.edu/13046.htm&quot; href=&quot;http://www.law.berkeley.edu/13046.htm&quot; target=&quot;_blank&quot;&gt;Berkeley Law Privacy Forum&lt;/a&gt;, &lt;a title=&quot;http://www.law.berkeley.edu/files/bclt_Peter_Hustinix_Biography.pdf&quot; href=&quot;http://www.law.berkeley.edu/files/bclt_Peter_Hustinix_Biography.pdf&quot; target=&quot;_blank&quot;&gt;Peter Hustinx&lt;/a&gt; (European Data Protection Supervisor) &lt;a title=&quot;http://bits.blogs.nytimes.com/2012/04/26/european-regulator-warns-siliconvalley-about-privacy/&quot; href=&quot;http://bits.blogs.nytimes.com/2012/04/26/european-regulator-warns-siliconvalley-about-privacy/&quot; target=&quot;_blank&quot;&gt;said&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“When data have been published or have been shared and it is within 
your [company’s] power to get them back, you have to make reasonable 
effort to get the spirit back in the&amp;nbsp;bottle.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Mr. Hustinx seems to be saying that even if information is published,
 there’s an obligation to re-cloak it. For example, if two Twitter users
 get into a heated fight (hey, it happens), and both agree to delete 
their exchange, Twitter should make “reasonable effort to get the spirit
 back in the bottle” and delete the tweets. But what if these public 
tweets are retweeted far and wide? Does Twitter have the obligation to 
delete them, too? I don’t think&amp;nbsp;so.&lt;/p&gt;
&lt;p&gt;What is noticeably absent from this point of view is the public’s 
right to history, knowledge, and lessons learned. Sure, a public fight 
often results in public humiliation of the combatants (or at least the 
loser), and they want to erase the experience from the public record. 
That’s a mistake. Many of life’s lessons have been learned by witnessing
 (or sometimes engaging in) playground, barroom, and online&amp;nbsp;fights.&lt;/p&gt;
&lt;p&gt;What’s more, the duty to have our &lt;a title=&quot;http://jimadler.me/post/18381612999/the-duty-not-to-be-forgotten-tales-from-my-sons&quot; href=&quot;http://jimadler.me/post/18381612999/the-duty-not-to-be-forgotten-tales-from-my-sons&quot; target=&quot;_blank&quot;&gt;public mistakes remembered&lt;/a&gt;
 isn’t just important to our social fabric, it’s a key ingredient to 
technology innovation. Entrepreneurs aren’t deterred by risking the 
embarrassment that comes with public failure. To paraphrase famed 
marketer &lt;a title=&quot;http://en.wikipedia.org/wiki/Geoffrey_Moore&quot; href=&quot;http://en.wikipedia.org/wiki/Geoffrey_Moore&quot; target=&quot;_blank&quot;&gt;Geoffrey Moore&lt;/a&gt;, please fail publicly so we can learn from your humiliation. We’ll forgive you and thank&amp;nbsp;you.&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;a href=&quot;http://jimadler.me/&quot;&gt;More from Jim Adler&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;Chief Privacy Officer, Intelius&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/privacy-transatlantic-culture-clash#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/privacy-transatlantic-culture-clash#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/privacy-transatlantic-culture-clash#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/data">data</category>
 <category domain="http://blog.intelius.com/category/tags/privacy">Privacy</category>
 <category domain="http://blog.intelius.com/category/tags/technology">technology</category>
 <pubDate>Fri, 04 May 2012 16:26:13 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">322 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>Strata 2012: Is Privacy a Big Data Prison?</title>
    <link>http://blog.intelius.com/strata-2012-privacy-big-data-prison</link>
    <description>&lt;div class=&quot;content&quot; title=&quot;Strata 2012: Is Privacy a Big Data Prison?&quot;&gt;
               &lt;p class=&quot;fixcap&quot;&gt;I just &lt;span class=&quot;float-right&quot;&gt;&amp;nbsp;&lt;/span&gt;returned from O’Reilly Media’s latest soiree, &lt;a title=&quot;http://strataconf.com/strata2012&quot; href=&quot;http://strataconf.com/strata2012&quot; target=&quot;_blank&quot;&gt;StrataConf 2012: Making Data Work&lt;/a&gt;. My panel, &lt;a title=&quot;http://strataconf.com/strata2012/public/schedule/detail/22613&quot; href=&quot;http://strataconf.com/strata2012/public/schedule/detail/22613&quot; target=&quot;_blank&quot;&gt;If Data Wants to Be Free, is Privacy a Prison?&lt;/a&gt;
 focused on design frameworks for “responsible innovation” to guide data
 professionals through the perilous territory of data collection, 
access, and usage. Yeah, I know, ambitious&amp;nbsp;…&lt;/p&gt;
&lt;p&gt;I was joined by privacy researcher and NYU doctoral student &lt;a title=&quot;http://www.nyu.edu/ipk/people/solon-barocas&quot; href=&quot;http://www.nyu.edu/ipk/people/solon-barocas&quot; target=&quot;_blank&quot;&gt;Solon Barocas&lt;/a&gt;&amp;nbsp;[BTW,&amp;nbsp;can’t help but plug Solon’s doctoral chair, &lt;a title=&quot;http://www.nyu.edu/projects/nissenbaum/&quot; href=&quot;http://www.nyu.edu/projects/nissenbaum/&quot; target=&quot;_blank&quot;&gt;Helen Nissenbaum&lt;/a&gt;, who had a significant influence on the recent &lt;a title=&quot;http://www.whitehouse.gov/sites/default/files/email-files/privacy_white_paper.pdf&quot; href=&quot;http://www.whitehouse.gov/sites/default/files/email-files/privacy_white_paper.pdf&quot; target=&quot;_blank&quot;&gt;White House Privacy Framework&lt;/a&gt;].&amp;nbsp;Solon
 tempered my pragmatic, more libertarian perspective with deep 
thinking—a good combo I think. The session was moderated by the 
multi-tasker &lt;a title=&quot;https://twitter.com/#%21/digiphile&quot; href=&quot;https://twitter.com/#%21/digiphile&quot; target=&quot;_blank&quot;&gt;Alex Howard&lt;/a&gt;
 of O’Reilly Media, who was able to keep Solon and I on task and take 
audience questions from Twitter. Impresssive. You can see the real-time 
audience discussion on the Twitter &lt;a title=&quot;http://twitter.com/search/strataprivacy&quot; href=&quot;http://twitter.com/search/strataprivacy&quot; target=&quot;_blank&quot;&gt;#strataprivacy&lt;/a&gt;&amp;nbsp;hashtag.&lt;/p&gt;
&lt;div class=&quot;float-left&quot;&gt;&lt;img src=&quot;http://s3.amazonaws.com/jim-adler/tumblr/img/places-players-perils.png&quot; width=&quot;200&quot; /&gt;&lt;/div&gt;
&lt;p&gt;In an effort to steer the privacy conversation away from its 
predominant (though distracting) themes of data collection and access, 
fears of a future dystopia, and the complexities of law, our discussion 
began by examining the implications of big data gaffes through 
real-world use-cases. Using the &lt;a title=&quot;http://jimadler.me/post/14171086020/creepy-is-as-creepy-does&quot; href=&quot;http://jimadler.me/post/14171086020/creepy-is-as-creepy-does&quot; target=&quot;_blank&quot;&gt;Places-Players-Perils Framework&lt;/a&gt;&amp;nbsp;lens to focus the cases, we discussed how societal norms should be mapped to the growing power of big&amp;nbsp;data.&lt;/p&gt;
&lt;p&gt;And boy, did we have a bunch of recent gaffes, flubs and faux pas to choose from. Take for example, the case of the two cheeky &lt;a title=&quot;http://newsfeed.time.com/2012/01/31/british-tourists-tweets-get-them-denied-entry-to-the-u-s/?iid=ent-main-mostpop2&quot; href=&quot;http://newsfeed.time.com/2012/01/31/british-tourists-tweets-get-them-denied-entry-to-the-u-s/?iid=ent-main-mostpop2&quot; target=&quot;_blank&quot;&gt;British tourists who were denied entrance into the U.S.&lt;/a&gt; for (if only in jest) threats. Or, the &lt;a title=&quot;http://www.usatoday.com/news/washington/story/2012-02-03/fbi-gps-surveillance-supreme-court-ruling/52992842/1&quot; href=&quot;http://www.usatoday.com/news/washington/story/2012-02-03/fbi-gps-surveillance-supreme-court-ruling/52992842/1&quot; target=&quot;_blank&quot;&gt;FBI cutting back GPS surveillance&lt;/a&gt; in the wake of the Supreme Court’s &lt;a title=&quot;http://en.wikipedia.org/wiki/United_States_v._Antoine_Jones&quot; href=&quot;http://en.wikipedia.org/wiki/United_States_v._Antoine_Jones&quot; target=&quot;_blank&quot;&gt;US v Jones&lt;/a&gt; decision. Or, that &lt;a title=&quot;http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/&quot; href=&quot;http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/&quot; target=&quot;_blank&quot;&gt;Target knows a teen is pregnant&lt;/a&gt; before her parents do. Or, the &lt;a title=&quot;http://www.google.com/hostednews/afp/article/ALeqM5ip-cz4mF_UePtGrJ-0Wq8wZ9ykPw?docId=CNG.8abfa4ded5eb5eee2471754a734dee2b.1b1&quot; href=&quot;http://www.google.com/hostednews/afp/article/ALeqM5ip-cz4mF_UePtGrJ-0Wq8wZ9ykPw?docId=CNG.8abfa4ded5eb5eee2471754a734dee2b.1b1&quot; target=&quot;_blank&quot;&gt;unification of Google’s services&lt;/a&gt; which links all user information across all accounts. Is this 2012 or 1984?&lt;/p&gt;
&lt;p class=&quot;center&quot;&gt;&lt;a title=&quot;http://s3.amazonaws.com/jim-adler/tumblr/img/strata2012-places-players-perils-cases.png&quot; href=&quot;http://s3.amazonaws.com/jim-adler/tumblr/img/strata2012-places-players-perils-cases.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;http://s3.amazonaws.com/jim-adler/tumblr/img/strata2012-places-players-perils-cases.png&quot; width=&quot;500&quot; border=&quot;0&quot; class=&quot;rounded-corners&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In all seriousness, big data pros can stay off privacy third rails 
and out of the headlines with a little thought and sensitivity. For 
example, in the Target teen pregnancy case, Solon made the point that 
Target could have just &lt;span&gt;asked&lt;/span&gt; customers if they wanted 
coupons during their pregnancy. If the data analysts would have thought 
about how personal pregnancy is, they simply would have asked. After 
all, targeted coupons when expecting a kitchen remodel is bit less 
sensitive than when expecting expecting.&amp;nbsp;Duh.&lt;/p&gt;
&lt;p&gt;Even processing of public data can lead to discovery of private information. In fact, from the audience, &lt;a title=&quot;http://twitter.com/dtunkelang&quot; href=&quot;http://twitter.com/dtunkelang&quot; target=&quot;_blank&quot;&gt;Daniel Tunkelang&lt;/a&gt; asked the provocative question whether the inference of private facts from public data is a new definition of &lt;a title=&quot;http://en.wikipedia.org/wiki/Thoughtcrime&quot; href=&quot;http://en.wikipedia.org/wiki/Thoughtcrime&quot; target=&quot;_blank&quot;&gt;thoughtcrime&lt;/a&gt;? BTW, Daniel has a good Strata wrap up today on his &lt;a title=&quot;http://thenoisychannel.com/2012/03/02/strata-2012-big-data-is-bigger-than-ever/&quot; href=&quot;http://thenoisychannel.com/2012/03/02/strata-2012-big-data-is-bigger-than-ever/&quot;&gt;blog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The spontaneous emergence of these weighty issues is why data 
professionals need shorthand ways to easily think about the societal 
impact of their work. Such a &lt;a title=&quot;http://jimadler.me/post/14171086020/creepy-is-as-creepy-does&quot; href=&quot;http://jimadler.me/post/14171086020/creepy-is-as-creepy-does&quot; target=&quot;_blank&quot;&gt;framework&lt;/a&gt; would need to go beyond default “procedural protections” (like the &lt;a title=&quot;http://www.ftc.gov/reports/privacy3/fairinfo.shtm&quot; href=&quot;http://www.ftc.gov/reports/privacy3/fairinfo.shtm&quot; target=&quot;_blank&quot;&gt;Fair Information Practice Principles&lt;/a&gt;)
 to “substantive protections” that evaluate possible product impact at 
design-time and track actual impact as the product moves into 
the&amp;nbsp;market.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a href=&quot;http://jimadler.me/&quot;&gt;More from Jim Adler&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;Chief Privacy Officer&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
               
            &lt;/div&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/strata-2012-privacy-big-data-prison#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/strata-2012-privacy-big-data-prison#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/strata-2012-privacy-big-data-prison#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/privacy">Privacy</category>
 <pubDate>Fri, 16 Mar 2012 20:38:06 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">320 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>A New Era of Giving Back: Skills Based Volunteering</title>
    <link>http://blog.intelius.com/new-era-giving-back-skills-based-volunteering</link>
    <description>&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;In today’s difficult economy, charitable giving is a reduced
priority for people, some of whom are struggling to pay their own bills. As an alternative,
some are choosing to volunteer their &lt;em&gt;time&lt;/em&gt;
instead of giving cash. Taking this concept a step further is the explosive
growth of &lt;strong&gt;skills-based volunteering&lt;/strong&gt;,
that is, leveraging one’s specialized skills and talents to help nonprofits
achieve their missions.&lt;/p&gt;



&lt;p&gt;Examples of skills-based volunteering include teaching a
class, painting a mural, designing a website, financial advising, and so on.
Volunteers provide&amp;nbsp;free work-related knowledge and expertise in skills
they would normally receive compensation for.&lt;/p&gt;



&lt;p&gt;At the forefront of the skills-based volunteering movement
are organizations like Points of Light Institute and &lt;a href=&quot;http://www.taprootfoundation.org/&quot;&gt;Taproot Foundation&lt;/a&gt;. These
organizations lead, mobilize and engage professionals in pro bono s&lt;strong&gt;&lt;/strong&gt;ervice that
drives social change.&amp;nbsp; They encourage professionals skilled in design,
technology, marketing, human resources and strategy to donate their skills and
help out nonprofits at no cost.&lt;/p&gt;



&lt;p&gt;If you’re looking for more reasons to put your skills to use
for a good cause, take this into consideration:&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;While the average hour of traditional
volunteering is valued by the independent sector at between $18–20 an hour,
skills-based volunteering is valued at $40–500 an hour depending on the market
value of the time. &lt;/li&gt;&lt;li&gt;The down economy means nonprofits are stretched
thin and hard-pressed for much needed specific expertise. Skilled volunteers are
needed more than ever.&lt;/li&gt;&lt;li&gt;It’s a great way to develop workplace skills and
gain experience in other industries.&lt;/li&gt;&lt;/ul&gt;





&lt;p&gt;
This growing trend is being especially embraced in corporate America, where
employee volunteer programs have been a part of corporate culture for decades.
Skills based volunteering is an innovative concept, and we at Intelius plan to
jump on the bandwagon of this new era of giving back!&lt;/p&gt;



&lt;p&gt;Let us know about your experience with skills based
volunteering by visiting our Facebook page: &lt;a href=&quot;http://www.facebook.com/intelius&quot;&gt;http://www.facebook.com/intelius&lt;/a&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;Gina Lynch&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;em&gt;&lt;br /&gt;Community Relations&lt;/em&gt;&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;/corp/files/corp/Intelius_LiveToGive.jpg&quot; alt=&quot;Intelius Live to Give&quot; width=&quot;133&quot; height=&quot;95&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/new-era-giving-back-skills-based-volunteering#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/new-era-giving-back-skills-based-volunteering#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/new-era-giving-back-skills-based-volunteering#comments</comments>
 <category domain="http://blog.intelius.com/taxonomy/term/160">charity</category>
 <category domain="http://blog.intelius.com/category/tags/community-relations">community relations</category>
 <category domain="http://blog.intelius.com/category/tags/giving">giving</category>
 <category domain="http://blog.intelius.com/category/tags/volunteering">volunteering</category>
 <pubDate>Fri, 09 Mar 2012 19:21:21 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">318 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>Know What Online Safety Means to You</title>
    <link>http://blog.intelius.com/know-what-online-safety-means-you</link>
    <description>&lt;p&gt;You hear it all the time – “Online Security” and “Staying safe on-line” –
but what does it mean beyond the headline? Well, the truth is that the answer
is varied and complex. For companies, it means huge budgets, teams of dedicated
professionals, and high-tech security devices to protect their (and in many
cases your own) data. For individuals it can mean anything from running the
latest spyware hunters, advanced and intensive anti-virus, or even alternative
operating systems to simply keeping your computer updated and knowing what to
avoid.&lt;/p&gt;

&lt;p&gt;Where
you are in this spectrum is a decision that only you can make, but there are
some things you can do to ensure that you are staying safe no matter where you are.
Below is a list of several things that are important for even the most
security-minded among us do well to remember and practice. Sometimes we’re even
the ones who need to be reminded of these basics the most!&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Know your anti-virus solution&lt;/strong&gt;. While it’s still critical
     to have anti-virus on your computer, it is now more important than ever to
     be familiar with your particular anti-virus. Anti-virus programs range in
     cost, effectiveness, and features. The purposes of this post is not to
     analyze or evaluate these different solutions (there is already a plethora
     of articles on the Internet evaluating all of these factors) but to stress
     the importance of knowing what &lt;strong&gt;your&lt;/strong&gt;
     program looks like. One of the most common (and effective) infection
     methods today is to present you with a fake anti-virus console. These
     “Fake AV” programs typically present themselves as your anti-virus (or
     sometimes a “better” AV program) claiming to have found a number of&amp;nbsp; infections on your system and offering
     to clean them for you if you install them. They sometimes only hope to
     charge you to download their program, but others will infect your computer
     and refuse to return control until you pay them. Some of these fake
     programs are so highly polished that they look as good (or better!) than
     real anti-virus solutions. Make sure you know what the interface of &lt;strong&gt;&lt;em&gt;your&lt;/em&gt;&lt;/strong&gt;
     AV looks like so that you can spot fakes!&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Patch it like it’s a quilt!&lt;/strong&gt; This may seem obvious –
     updates are good, right? They also happen &lt;em&gt;so&lt;/em&gt; often these days that they can interrupt your work flow.
     Whether it’s your browser (Firefox, Chrome, IE, etc.), your operating
     systems (Windows, Mac, Ubuntu, so on), or regular applications like Adobe
     or Java, the correct answer to “Would you like to apply these updates?” is
     &lt;strong&gt;always&lt;/strong&gt; yes! And the most
     appropriate time to do them is &lt;em&gt;right
     away&lt;/em&gt;. This may seem reactionary, but it’s important to remember that
     there is a thriving market for unpatched vulnerabilities. By the time a
     vendor (Microsoft, Adobe, Mozilla, etc.) has issued the patch that you’re being
     nagged about the weakness or flaw that it fixes has probably been known
     about by the bad guys for weeks (or in some cases months) before. It
     interrupts your e-mail, surfing, and even work sometimes but it’s a
     negligible interruption when compared to the impact of a real infection or
     attack.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Ben Sauls&lt;br /&gt;&lt;em&gt;Senior Information Security Engineer&lt;/em&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/know-what-online-safety-means-you#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/know-what-online-safety-means-you#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/know-what-online-safety-means-you#comments</comments>
 <category domain="http://blog.intelius.com/taxonomy/term/162">online security</category>
 <pubDate>Fri, 17 Feb 2012 22:50:33 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">317 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>Our Online Footprint</title>
    <link>http://blog.intelius.com/our-online-footprint</link>
    <description>&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;A buzz-worthy phrase of late has been ‘Your online
footprint.’&amp;nbsp; Google alerts are filled
with this concept and hit our inbox each afternoon with new information on the
implications of our ‘online footprint.’&amp;nbsp;
But do consumers really have an understanding of how much of their
information is available online?&amp;nbsp; Or for
that matter do they know how to manage it?&lt;/p&gt;

&lt;p&gt;Imagine this, as a teenager in early-2000 you signed up for
MySpace.&amp;nbsp; You added all your friends,
interests and information to this page.&amp;nbsp;
When you got into college you were over the moon that Facebook would be
available to you.&amp;nbsp; Even before moving
into your dorm you have your contact information, friends list and personal
information stocked and your wall is full of friends posting about the most
personal details.&amp;nbsp; &lt;/p&gt;

&lt;p&gt;Late in college and in your early career you’d like a place
for your professional information (LinkedIn), a place to share your interests
(Pinterest), a place to share your most embarrassing music interests (Spotify),
a place to show what place you’re at (Foursquare) and heck how about a place to
update people on what you’re doing at the place you’re at (Twitter.)&amp;nbsp; It is not uncommon for a normal twenty
something to have their information plastered on 7-8 massive social networks. &lt;/p&gt;

&lt;p&gt;A common misconception online is that this information is
protected.&amp;nbsp; The problem is with many of
these networks it’s easy to miss or simply forget about the basic privacy
settings provided which can allow any stranger to see any information you’ve
provided.&amp;nbsp; This is a can of worms we’d
prefer to remain closed.&lt;/p&gt;

&lt;p&gt;With this and many other thoughts in mind Intelius has
developed TrueRep.&amp;nbsp; TrueRep is a unique,
innovative new product that helps answer the question, how do I manage my
‘online footprint?’&lt;/p&gt;

&lt;p&gt;TrueRep is designed to help you:&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;Learn what information is available about you
online.&lt;/li&gt;&lt;li&gt;Control your privacy by giving you the option to
suppress your most recent contact information from appearing on Intelius
websites.&lt;/li&gt;&lt;li&gt;Track and manage your online reputation through
TrueRep&#039;s proprietary Reputation Score.&lt;/li&gt;&lt;li&gt;Add explanatory comments to background checks
that others may order on you from Intelius websites.&lt;/li&gt;&lt;/ul&gt;







&lt;p&gt;It’s a reality that our
information is spread throughout the web and it’s up to us to corral it,
understand and control it.&amp;nbsp; TrueRep for
the first time allows users to have access to their information in one central
location.&amp;nbsp; Your ‘online footprint’
suddenly doesn’t seem so daunting.&lt;/p&gt;&lt;p&gt;-Ian Dinsmore&lt;em&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/our-online-footprint#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/our-online-footprint#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/our-online-footprint#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/social-media">Social Media</category>
 <category domain="http://blog.intelius.com/category/tags/truerep">TrueRep</category>
 <pubDate>Mon, 13 Feb 2012 20:55:09 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">316 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>The Good, The Bad, and The Unknown: Data Privacy Day 2012 at the Churchill Club</title>
    <link>http://blog.intelius.com/good-bad-and-unknown-data-privacy-day-2012-churchill-club</link>
    <description>&lt;p&gt;This year, &lt;a title=&quot;http://en.wikipedia.org/wiki/Data_Privacy_Day&quot; href=&quot;http://en.wikipedia.org/wiki/Data_Privacy_Day&quot; target=&quot;_blank&quot;&gt;Data Privacy Day&lt;/a&gt; &lt;span class=&quot;float-right&quot;&gt;&lt;/span&gt;stretched into Data Privacy Week. I celebrated by participating in a Churchill Club panel on &lt;a title=&quot;http://transition.churchillclub.org/eventDetail.jsp?EVT_ID=931&quot; href=&quot;http://transition.churchillclub.org/eventDetail.jsp?EVT_ID=931&quot; target=&quot;_blank&quot;&gt;The Collection of Online Consumer Data: The Good, The Bad, and The Unknown&lt;/a&gt;.
 The discussion centered on consumer interest in protecting personal 
data and the importance of striking the right balance between regulation
 and innovation.  January has been such a busy month for data privacy 
issues that we had several recent events to&amp;nbsp;noodle…
&lt;/p&gt;&lt;p&gt;First, there was the &lt;a title=&quot;http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act&quot; href=&quot;http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act&quot; target=&quot;_blank&quot;&gt;SOPA&lt;/a&gt; kerfuffle which resulted in the &lt;a title=&quot;http://www.huffingtonpost.com/2012/01/20/sopa-withdrawn-lamar-smith_n_1219250.html&quot; href=&quot;http://www.huffingtonpost.com/2012/01/20/sopa-withdrawn-lamar-smith_n_1219250.html&quot; target=&quot;_blank&quot;&gt;withdrawl of the legislation&lt;/a&gt;. My take &lt;a title=&quot;http://jimadler.me/post/16145554162/censor-this&quot; href=&quot;http://jimadler.me/post/16145554162/censor-this&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Then, in &lt;a title=&quot;http://en.wikipedia.org/wiki/United_States_v._Antoine_Jones&quot; href=&quot;http://en.wikipedia.org/wiki/United_States_v._Antoine_Jones&quot; target=&quot;_blank&quot;&gt;U.S. v Jones&lt;/a&gt;, the Supreme Court of the United States &lt;a title=&quot;http://www.supremecourt.gov/opinions/11pdf/10-1259.pdf&quot; href=&quot;http://www.supremecourt.gov/opinions/11pdf/10-1259.pdf&quot; target=&quot;_blank&quot;&gt;decided&lt;/a&gt;
 that the government cannot attach tracking devices to your personal 
effects, like your car. Expect more privacy cases given the concurrences
 by Justice Sotomayor and Justice Alito on the reasonable expectation of
 privacy when third-parties handle your&amp;nbsp;data.&lt;/p&gt;
&lt;p&gt;Then,&amp;nbsp;&lt;a title=&quot;http://googleblog.blogspot.com/2012/01/updating-our-privacy-policies-and-terms.html&quot; href=&quot;http://googleblog.blogspot.com/2012/01/updating-our-privacy-policies-and-terms.html&quot; target=&quot;_blank&quot;&gt;Google announced&lt;/a&gt;
 a new privacy policy which says they’ll be&amp;nbsp;unifying&amp;nbsp;all your 
information across all Google services, including search, emails, and 
calendars to deliver more “intuitive” results.&amp;nbsp;The automatic opt-in 
feature means that the cost of non-participation means dragging yourself
 back to Yahoo!, bing or *gasp* AOL for email and search.&amp;nbsp;Needless to 
say, the announcement is causing &lt;a title=&quot;http://www.pcmag.com/article2/0,2817,2399435,00.asp&quot; href=&quot;http://www.pcmag.com/article2/0,2817,2399435,00.asp&quot; target=&quot;_blank&quot;&gt;quite a&amp;nbsp;stir&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;span class=&quot;float-left&quot;&gt;&lt;/span&gt;Then, as if Microsoft and Google were &lt;a title=&quot;http://en.wikipedia.org/wiki/Political_action_committee&quot; href=&quot;http://en.wikipedia.org/wiki/Political_action_committee&quot; target=&quot;_blank&quot;&gt;coordinating&lt;/a&gt;, &lt;a title=&quot;http://www.microsoft.com/about/twc&quot; href=&quot;http://www.microsoft.com/about/twc&quot; target=&quot;_blank&quot;&gt;Microsoft Trustworthy Computing&lt;/a&gt;
 released survey data saying that everything you do online from 
“responding to emails and texts to clicking the ‘like’ and ‘retweet’ 
buttons on favorite Web pages, uploading photos and making purchases 
online” contributes to the creation of your online&amp;nbsp;reputation.&lt;/p&gt;
&lt;p&gt;Then, the EU proposed a &lt;a title=&quot;http://ec.europa.eu/justice/newsroom/data-protection/news/120125_en.htm&quot; href=&quot;http://ec.europa.eu/justice/newsroom/data-protection/news/120125_en.htm&quot; target=&quot;_blank&quot;&gt;massive overhaul&lt;/a&gt;
 of their data protection laws, which is troubling for a number of 
reasons. Chief among my concerns is the oversimplification of privacy 
policies; an attempt to export their privacy regime outside the EU; and 
their attempt to create a &lt;em&gt;right to be forgotten&lt;/em&gt;&amp;nbsp;which could collide with our &lt;em&gt;right to know&lt;/em&gt;. The tension between competing values, like&amp;nbsp;disclosure and discretion is something I &lt;a title=&quot;http://jimadler.me/post/7227294258/what-would-the-founding-fathers-do-in-the-age-of-social&quot; href=&quot;http://jimadler.me/post/7227294258/what-would-the-founding-fathers-do-in-the-age-of-social&quot; target=&quot;_blank&quot;&gt;discussed&lt;/a&gt; last&amp;nbsp;summer.&lt;/p&gt;
&lt;p&gt;Then, the &lt;a title=&quot;http://www.nationaljournal.com/tech/even-without-legislation-privacy-will-be-a-hot-issue-in-2012-20120105&quot; href=&quot;http://www.nationaljournal.com/tech/even-without-legislation-privacy-will-be-a-hot-issue-in-2012-20120105&quot; target=&quot;_blank&quot;&gt;U.S. Commerce Department&lt;/a&gt;
 and FTC promised two separate communiqués on U.S. privacy policy before
 February 1st. FTC Commissioner Julie Brill participated in Facebook’s 
Privacy Day webcast and noted the agency’s continued interest in privacy
 audits for &lt;a title=&quot;http://idealab.talkingpointsmemo.com/2012/01/ftc-commissioner-takes-aim-at-facebook-google-privacy-flubs.php&quot; href=&quot;http://idealab.talkingpointsmemo.com/2012/01/ftc-commissioner-takes-aim-at-facebook-google-privacy-flubs.php&quot; target=&quot;_blank&quot;&gt;past offenders like Google and Facebook&lt;/a&gt;. Commissioner Brill also &lt;a title=&quot;http://www.nationaljournal.com/tech/ftc-official-calls-on-data-brokers-to-provide-more-info-20120126&quot; href=&quot;http://www.nationaljournal.com/tech/ftc-official-calls-on-data-brokers-to-provide-more-info-20120126&quot; target=&quot;_blank&quot;&gt;called&lt;/a&gt;
 upon data brokers to share personal, public data with consumers and 
offer them an opportunity to correct or amend inaccurate information. &lt;a title=&quot;http://truerep.com&quot; href=&quot;http://truerep.com/&quot; target=&quot;_blank&quot;&gt;TrueRep&lt;/a&gt;, an &lt;a title=&quot;http://intelius.com&quot; href=&quot;http://intelius.com/&quot; target=&quot;_blank&quot;&gt;Intelius&lt;/a&gt; service, allows just that—awareness and control of your own public information (more &lt;a title=&quot;http://jimadler.me/post/13438945247/truerep-why-its-important&quot; href=&quot;http://jimadler.me/post/13438945247/truerep-why-its-important&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;So, we had much to chew on at the Churchill Club event. Check out the video:&lt;/p&gt;
&lt;iframe width=&quot;640&quot; height=&quot;360&quot; src=&quot;http://www.youtube.com/embed/9dEmHZjRLrU?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;p&gt;The panel was moderated by &lt;a title=&quot;http://www.futureofprivacy.org/about/about-jules-polonetsky/&quot; href=&quot;http://www.futureofprivacy.org/about/about-jules-polonetsky/&quot; target=&quot;_blank&quot;&gt;Jules Polonetsky&lt;/a&gt; (Co-chair and Director, Future of Privacy Forum) and featured &lt;a title=&quot;http://www.echoecho.me/&quot; href=&quot;http://www.echoecho.me/&quot; target=&quot;_blank&quot;&gt;Nick Bicanic&lt;/a&gt; (CEO and Founder, Echoecho Media), Jules Cohen (Director of Online Privacy, Microsoft), &lt;a title=&quot;http://www.aclu.org/blog/author/Nicole%20Ozer%2C%20Technology%20and%20Civil%20Liberties%20Policy%20Director%2C%20ACLU%20of%20Northern%20California%20&quot; href=&quot;http://www.aclu.org/blog/author/Nicole%20Ozer%2C%20Technology%20and%20Civil%20Liberties%20Policy%20Director%2C%20ACLU%20of%20Northern%20California%20&quot; target=&quot;_blank&quot;&gt;Nicole Ozer&lt;/a&gt; (Technology and Civil Liberties Policy Director, ACLU of Northern California),&amp;nbsp;&lt;a title=&quot;http://www.paulschwartz.net/&quot; href=&quot;http://www.paulschwartz.net/&quot; target=&quot;_blank&quot;&gt;Paul Schwartz&lt;/a&gt; (Faculty Director, Berkeley Center for Law &amp;amp; Technology, UC Berkeley).&lt;/p&gt;&lt;p&gt; &lt;em&gt;&lt;a href=&quot;http://jimadler.me/&quot;&gt;More from Jim Adler&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;Chief Privacy Officer&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/good-bad-and-unknown-data-privacy-day-2012-churchill-club#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/good-bad-and-unknown-data-privacy-day-2012-churchill-club#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/good-bad-and-unknown-data-privacy-day-2012-churchill-club#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/privacy">Privacy</category>
 <pubDate>Fri, 27 Jan 2012 18:22:29 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">315 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>The Importance of Living in the Know</title>
    <link>http://blog.intelius.com/importance-living-know</link>
    <description>&lt;p&gt;I made a small but embarrassing mistake recently. I wasn’t
sure about the correct use of an uncommon pronoun, so I looked it up on a major
search engine. The first result was from a reliable website, and it showed a
definition that supported my use of the pronoun. It wasn’t until later, when my
manager questioned the usage, that I actually went to the website and saw what
hadn’t been visible in search results: that pronoun had been obsolete for
almost &lt;em&gt;five hundred years.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Oops.&lt;/p&gt;

&lt;p&gt;This anecdote illustrates one of the dangers we all face
online: as we navigate the Internet superhighway faster and faster, often
paying less and less attention to the details of the information we encounter,
it is all too easy to miss critical &lt;em&gt;context&lt;/em&gt;.&amp;nbsp; &lt;/p&gt;

&lt;p&gt;For me, the cost of doing this was a small error as a
communications professional. But what if I’d been searching for a person,
glanced at a search result from a credible source, and leapt to a conclusion
about that individual? Or what if someone had done that to me? And what if the
decision involved had potentially significant consequences—for example, whether
or not to connect for professional networking or go out on a date?&lt;/p&gt;

&lt;p&gt;You’ve read in recent posts about TrueRep, our new online
reputation management service. My pitfall with the pronoun reinforced in my own
mind the TrueRep message:&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;Know what others can find about you online.&lt;/li&gt;&lt;li&gt;Know what perception that information is likely
to create.&lt;/li&gt;&lt;li&gt;Know how to manage that information and perception.&lt;/li&gt;&lt;/ul&gt;





&lt;p&gt;With TrueRep, we’ve not only given you unique and powerful
tools to achieve these three goals, but we’ve taken it one industry-leading
step further, and given VIP subscribers the capability to add remarks to
background checks on themselves that others purchase from Intelius. These
remarks offer the chance to provide context that can significantly alter how
information is perceived—just as finding out that a word is obsolete provides important
context.&lt;/p&gt;

&lt;p&gt;Our message with TrueRep is really the same one that we’ve
chosen for Intelius: &lt;em&gt;Live in the Know&lt;/em&gt;.
Because you never know when someone may glance at a search result, or a people
search or background check report, and leap to an erroneous conclusion. And the
consequences of doing so may be far greater than using a Shakespearean pronoun
during the Information Age.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Elisabeth
DeVos&lt;/em&gt;&lt;br /&gt;&lt;em&gt;Marketing
Communications Manager&lt;/em&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/importance-living-know#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/importance-living-know#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/importance-living-know#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/truerep">TrueRep</category>
 <pubDate>Thu, 15 Dec 2011 23:40:22 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">314 at http://blog.intelius.com</guid>
  </item>
  <item>
    <title>TrueRep: Why It’s Important</title>
    <link>http://blog.intelius.com/truerep-why-it%E2%80%99s-important</link>
    <description>&lt;p&gt;TrueRep represents a new category of personal analytics
within online reputation management. It aims to give you fine-grained awareness
and control of public information about you. Your reputation lies at the
intersection of the public information available about you and how others
perceive that information. You have little say over the latter. But you should
be the first to know about your own public information, not the last. The idea
behind TrueRep is to give you this awareness and&amp;nbsp;control.

&lt;/p&gt;&lt;p&gt;Beyond
just detailing the virtues of TrueRep, I thought it might be interesting, for
the more privacy wonkish among us, to discuss a de facto stab at&amp;nbsp;&lt;a href=&quot;http://www.privacybydesign.ca/&quot; target=&quot;_blank&quot;&gt;Privacy by Design&lt;/a&gt;. It
turns out that “the community” both inside and outside Intelius had (and is
having) a profound influence on TrueRep. So, here’s a glimpse of the TrueRep
story so far.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;I Can See Myself&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A key
confirmation of the TrueRep vision came while I was attending a &lt;a href=&quot;http://privacycamp.wordpress.com/&quot; target=&quot;_blank&quot;&gt;PrivacyCamp&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Unconference&quot; target=&quot;_blank&quot;&gt;unconference&lt;/a&gt;
in May 2010. After the &lt;a href=&quot;http://privacycamp.wordpress.com/2010/05/07/sessions-for-todays-privacy-camp/&quot; target=&quot;_blank&quot;&gt;day’s work&lt;/a&gt; of exploring privacy technology, data
portability, and privacy rights, we adjourned for happy hour (and more
discussion of privacy technology, data portability, and privacy rights).&lt;/p&gt;

&lt;p&gt;Over a
happy hour beer, I got to talking to &lt;a href=&quot;http://sally.com/&quot; target=&quot;_blank&quot;&gt;Sally
Applin&lt;/a&gt;, a senior UX designer and social anthropologist. Years ago,
Sally&amp;nbsp;&lt;a href=&quot;https://trends.wordpress.com/2009/10/&quot; target=&quot;_blank&quot;&gt;noticed&lt;/a&gt;
that successful software products seemed to contain a combination of “voyeurism
and narcissism,” as people not only liked to look at others, but at themselves
as well. As she explained this to me, Sally observed that the products from
Intelius seemed to be more voyeuristic — and had little appeal to those who
were narcissistic and wanted to look at their own data. I think her comment ran
along the lines of (and I’m paraphrasing), “Why does it cost me 50 bucks to see
my own background check?” Touché, point&amp;nbsp;taken.&lt;/p&gt;

&lt;p&gt;Self-awareness
of your own information is important. TrueRep offers a look at your own
background check summary including address history, criminal records, and
civil&amp;nbsp;suits.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Control Yourself&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When I
joined Intelius in September 2008, I went on a listening tour of some privacy
advocates to better understand their concerns. One of those privacy advocates
was &lt;a href=&quot;http://nnedv.org/about/staff/65-staff/31-cs.html&quot; target=&quot;_blank&quot;&gt;Cindy
Southworth&lt;/a&gt;, Vice President of Development &amp;amp; Innovation at the &lt;a href=&quot;http://nnedv.org/&quot; target=&quot;_blank&quot;&gt;National Network to End
Domestic&amp;nbsp;Violence&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In
discussing what Intelius could do to better serve Cindy’s at-risk community,
she pointedly asked “How about getting my women out of your data?” Point taken,
and we got to work on Cindy’s&amp;nbsp;request.&lt;/p&gt;

&lt;p&gt;As we
began to work through the details, challenges emerged. Victims of domestic
violence generally don’t like to be on any list for any reason, and
distribution of login PIN codes proved unwieldy to a network of hundreds of
local shelters.&amp;nbsp;Cindy suggested that it would be best to simply allow
removal of the latest contact information with, of course, no indication that
anything was removed. &lt;strong&gt;Quite&amp;nbsp;brilliant.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The latest
contact suppression feature has three advantages. First and foremost, it
provides more safety because, without the latest contact info, the address
trail runs cold, frustrating any stalking offender. Second, a full opt-out
removal from the Intelius people search results would just force the offender
to a competitive website to satisfy their search. Lastly (which elated the
product guys), since this feature is offered to all users, it lives within the
main product roadmap and doesn’t require any special product maintenance. The latest
contact suppression feature is now offered to all TrueRep users and available
under the TrueRep Privacy&amp;nbsp;tab.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A Voice in the Wilderness&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A
friend of mine has a “criminal tresspassing” charge on his background check. He
asked me if we could modify the offense description on his background check
because it sounds pretty bad. It could be interpreted as something quite
serious, like breaking-and-entering. As it turns out, he hopped the fence at a
Rolling Stones show in the mid eighties. I told him we couldn’t change the
description from how the county reports it. In exasperation he said, “It’s my
report. Why can’t I have my side of the story heard?” Point&amp;nbsp;taken.&lt;/p&gt;

&lt;p&gt;TrueRep
Remarks lets you weigh in on the records in your background check. So, when
anyone pulls my friend’s rap sheet they’ll also see his take on a regrettable,
but teachable moment, from his adolescent past. We’ve all got&amp;nbsp;‘em.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaways&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I
think a key lesson to be drawn from the TrueRep product arc is that you can
learn from everyone — your customers, colleagues, friends, academics,
advocates, regulators, and even your toughest critics. On the frontier where
social media meets real life, you grab wisdom wherever you can find&amp;nbsp;it.&lt;/p&gt;

&lt;p&gt;TrueRep
is just getting started, but this 360-degree, personal analytics view of your
own public information is profoundly important. It gives you a view on how
others view you. It forms the basis of reputation. It’s the reality check we’ve
used for millennia to build trusted relationships. In many ways, it’s what
makes us&amp;nbsp;human&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;em&gt;&lt;a href=&quot;http://jimadler.me/&quot;&gt;More from Jim Adler&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/truerep-why-it%E2%80%99s-important#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/truerep-why-it%E2%80%99s-important#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;</description>
     <comments>http://blog.intelius.com/truerep-why-it%E2%80%99s-important#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/true-rep">True Rep</category>
 <pubDate>Mon, 12 Dec 2011 20:09:59 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">313 at http://blog.intelius.com</guid>
  </item>
  </channel>
</rss>