O'Reilly logo

88 Privacy Breaches to Beware Of by Lyn Boxall, William Hioe, Kevin Shepherdson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

illustration 03 Designing privacy into information systems and processes

Case A

A bank implemented a personalised service for its customers a few years ago. There was no special announcement or fanfare, and no one was the wiser.

I discovered this new service by chance when I inserted my automated teller machine (ATM) card into the bank’s machine and a welcome message in big letters greeted me on the display screen: “Welcome <My name in full>“.

I felt that this was an invasion of my privacy because even up to the fourth person in the queue could see my name clearly. (How did I know this despite my short-sightedness? I could see the name of the person four places ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required