<$BlogRSDUrl$> Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
Internet Happenings, Events and Sources

Tuesday, April 21, 2015  

Privately - Swiss Privacy and Data Protection Solutions

Solutions for protecting user privacy online. Gives end users control over their content and personal data shared over social networks. Helping citizens reclaim their privacy! Secure Social Sharing ... Users choose who can see their posts and for how long. Telcos offering this service to end customer can securely store user data in their trusted network or with our network in Switzerland subject to Swiss privacy laws. The right to be forgotten ... Telecom service providers can offer their users a right to be forgotten on every post . User posts needn’t be on the net forever- help them communicate freely. Anti Snooping / Anti Surveillance ... Thanks to end to end encryption no human or machine has unauthorised access to unintended user posts. Removing metadata, and introducing content validity insulates user content from snooping and surveillance. Features include: a) Protected - Metadata removed; User privacy setting overrides social network settings; and Patent protected privacy architecture for social networks; b) Expressive - User can choose among privacy filters that express their mood; and Visual encryption can be deployed to create a surprise or a visual gift for the receiver; c) Data Privacy - Primary data storage in Switzerland governed by Swiss laws; No back door; and Possible to offer secure storage in another location/network; d) Right to be forgotten - User can choose who can see her social network post and for how long; and User post is auto deleted from the network after its validity is over; e) Encryption - End to end encryption; and Visual encryption suited for social networks; and f) Trusted Service - User data is handled in Switzerland according to Swiss privacy laws; Social Network has no access to the actual user post; and Low possibility of tagging, facial recognition and other intrusions by man or machine. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

posted by Marcus Zillman | 4:49 AM
subject tracers™