California Strides toward Internet User

California Strides toward Internet User's Privacy with New Law

The twists and turns of long-winded privacy policies from Internet businesses can be quite confusing and very frustrating to consumers, especially when dealing with the collection of a user’s personal information and the reasoning behind this collection of data.California Strides toward Internet User's Privacy with New Law

The state of California is taking action. Attorney General Kamala D. Harris released a guide, “Making Your Privacy Practices Public,” encouraging businesses to comply with this state’s privacy law that went into effect on January 1st of this year. This law recommends that businesses use straightforward, easy-to-understand language, avoid legal jargon and provide full disclosure about who’s collecting what data and why.

California’s new privacy law states that sites are required to disclose their response to “do not track” requests, a feature allowing users to opt out of having their movements tracked on the Internet. However, companies are not obligated to comply.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.