This is the first instance where you actually must go and do a custom install to control them from installing other software, ... Most folks go to the default install and are not expecting to get a whole suite of unasked-for software. That's where the sneaky factor comes in. |
What this points out, what this highlights is just how complicated the privacy issue is for even very savvy, well-intentioned organizations. You can have the best privacy policy on Earth and still be subject to the problems of technology. |
With the current deployment of VOIP systems, you're not seeing nearly the risk of spam that you saw very quickly with the rise and popularity of e-mail. |
[Executives of public companies don't like to talk about spam, he says, because they don't want the world to know just how much it costs them.] When part of your IT budget depends on whether Billy Bob in accounting signed up for a pyramid scheme, that's not something they like to talk about, ... With spam, it's an ongoing guerrilla war. |
[Some comments called for the inclusion of an anti-skimming device that would block unauthorized connections with the readable chip to gain access to the data.] The doomsday scenario has been the ability for terrorist to drive by several cafés to find and target the most Americans in one place, ... I'm not sure how realistic that is, but when you work with these types of technologies you need to play out some of the possibilities to calm peoples' fears. |