Definitions
Sorry, no definitions found. Check out and contribute to the discussion of this word!
Etymologies
Sorry, no etymologies found.
Support
Help support Wordnik (and make this page ad-free) by adopting the word privacy-enhancing.
Examples
-
The commissioner's idea about "privacy by design" — building privacy-enhancing technologies into products and services — is particularly encouraging.
Ahead in the Clouds 2011
-
There has already been considerable work on privacy-enhancing technologies for electronic transactions.
-
The hardest work, will involve finding ways to apply privacy-enhancing technologies to those transactions that are not naturally suited to them.
-
Images.com/Corbis One idea is "privacy by design" — building privacy-enhancing technologies into products and services.
The Digital Forecast Is Cloudy Viviane Reding 2011
-
So it fits into this category of privacy-enhancing technology which I get excited about.
IBM's Analytical Ways Kym McNicholas 2010
-
So it fits into this category of privacy-enhancing technology which I get excited about.
IBM's Analytical Ways Kym McNicholas 2010
-
Through the strategy we seek to enable a future where individuals can voluntarily choose to obtain a secure, interoperable, and privacy-enhancing credential (e.g., a smart identity card, a digital certificate on their cell phone, etc) from a variety of service providers - both public and private - to authenticate themselves online for different types of transactions (e.g., online banking, accessing electronic health records, sending email, etc.).
-
Although the law imposes few if any legal obstacles to the domestic use of privacy-enhancing technology such as encryption it also requires little more than truth in advertising for most privacy destroying technologies.
-
They are one of the key reasons our engineers have worked on new privacy-enhancing initiatives and features like the Google Dashboard, the Ads Preferences Manager and the Data Liberation Front.
-
If the administration's intentions prove honorable, and companies can export the privacy-enhancing programs that will be produced in the next century, we can finally begin securing the leaky vehicle of the Internet.
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.