Changes

no edit summary
Line 14: Line 14:  
==Means and Methods==
 
==Means and Methods==
 
===Privacy Automation===
 
===Privacy Automation===
===[[Virtual Private Network]]==
+
===Virtual Private Network==
 +
A [[Virtual Private Network]] (VPN) creates an encrypted tunnel between the user and a remote server operated by the VPN service. All of that user's internet traffic and data are routed through this tunnel. As the traffic exits the VPN server, the true IP address is hidden, masking the user's identity and location.<ref>[https://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one What is a VPN and Why you need one, PC Magazine]</ref>
 +
===Tor Project===
 +
The Onion Router ([[Tor Network|Tor]]) is a network of volunteer-operated servers that enables people to use the Internet without compromising their privacy. This network connects through a series of virtual tunnels rather than direct connections, also allowing people to reach blocked sites or content.<ref>[https://2019.www.torproject.org/about/overview.html.en#overview Overview, Tor Project]</ref>
    
==Organizations & Groups==
 
==Organizations & Groups==
Line 30: Line 33:  
* [[Californians for Consumer Privacy]]
 
* [[Californians for Consumer Privacy]]
   −
==Overlaps with Cybersecurity==
+
==Overlaps with [[Cybersecurity]]==
Data security is a central theme of privacy regulations. In addition to codifying an expectation of privacy, most regulations set minimum standards for the treatment, uses, and protection of personal information. Many regulations also specify how companies and organizations should deal with data breaches. Personal information, particularly personally identifying information or financial information is a prime target of cyber criminals.  
+
Data security is a central theme of privacy regulations. In addition to codifying an expectation of privacy, most regulations set minimum standards for the treatment, uses, and protection of personal information. Many regulations also specify how companies and organizations should deal with data breaches. Personal information, particularly personally identifying information or financial information is a prime target of cybercriminals.  
    
==References==
 
==References==
 
{{reflist}}
 
{{reflist}}
 
[[Category:Concepts]]
 
[[Category:Concepts]]
Bureaucrats, Check users, lookupuser, Administrators, translator
14,952

edits