CaseGuard Resources

Find helpful resources with our smart search tool. Simply run a search to find useful articles, videos, documentation, and more.

Personal Data Breaches & Your Smart Home
January 08, 2021 | 9 minutes read
Personal Data Breaches & Your Smart Home

Stepping into 2021, home automation is becoming more common in our lives. It is the automated control over electronic devices in your home. These can be the small things that you may have come accustomed to or still seem relatively new and exciting. Alexa, can you turn on the lights? Alexa, can you lock the front door? The automatic control of electronic devices in your home is designed to make your life easier.

Learn More »
Protecting National Security Off and On the Battlefield with Metadata
January 05, 2021 | 8 minutes read
Protecting National Security Off and On the Battlefield with Metadata

Metadata, or data about data, has been in existence for hundreds of years. When ancient scholars placed tags with necessary details of the contents on the attached scrolls to organize the library, they created a metadata type. The tag contained data, such as author, date published, content description – all details that described the scroll and its contents.

Learn More »
What is the Meaning of Data Privacy?
January 04, 2021 | 8 minutes read
What is the Meaning of Data Privacy?

In 2020, many legislative changes are happening to privacy laws on a global scale. Some older individuals might remember what ‘privacy’ really means. Younger generations have not known privacy. In just a few short generations, privacy has become an invaluable commodity. As a commodity, this means that your privacy is also for sale. Corporations, government, law enforcement, even private citizens can sell your personal information.

Learn More »
Using Differential Privacy to Conceal Data
December 31, 2020 | 7 minutes read
Using Differential Privacy to Conceal Data

As big data corporations continue to soak up data sets like a dry sponge to water, privacy activists are re-thinking anonymization. The realization that de-identification can be reversed, proponents of a new cybersecurity model known as differential privacy have come forward. It has become apparent with the advent of big data, machine learning, and data science advances that today necessitates a reconsideration of previous privacy methods.

Learn More »
Protecting Against Re-Identification, New Techniques
December 30, 2020 | 7 minutes read
Protecting Against Re-Identification, New Techniques

One method many companies use to store data with less risk is by using data anonymization. Data anonymization is similar to redaction. It is a type of data sanitization. With the intent of privacy protection, it is a term used to remove PII from stored data. This is done so that the individuals’ data is now ‘anonymous.’

Learn More »
Phenotyping and Privacy
December 29, 2020 | 7 minutes read
Phenotyping and Privacy

Digital Phenotyping is an advancing multidisciplinary field of science. It was described by Jukka-Pekka Onnela, an Associate Professor of Biostatistics at the Harvard T.H. Chan School of Public Health and Director of the Health Data Science Program in Finland, as the “moment-by-moment quantification of the individual-level human phenotype in situ using data from personal digital devices.”

Learn More »
The Impact of Redaction on Our Everyday Lives
December 25, 2020 | 8 minutes read
The Impact of Redaction on Our Everyday Lives

Redaction has been a popular topic recently, but what is it? Redaction is the removal of some document content, typically replacing it with black rectangles to indicate that it has been removed. In order to protect identity, privacy, investigations, or even national security, there is some information that legally cannot be released.

Learn More »
Metadata and Signals intelligence (SIGINT)
December 24, 2020 | 8 minutes read
Metadata and Signals intelligence (SIGINT)

The basic definition that is given for metadata is that it is “data about data.” In other words, for every data file created, such as an image, in the background is information or ‘metadata’ about the picture. The user generally sees the image, and the metadata is the hidden data. In the case of a snapshot, it can contain details such as the GPS location of where the picture was taken, the date, time, user information, and even camera settings.

Learn More »
Genetic Tests and Your Privacy
December 21, 2020 | 8 minutes read
Genetic Tests and Your Privacy

Deoxyribonucleic acid or DNA is the basis of life. It is a molecule that consists of polynucleotide chains that form a double helix and carries genetic instruction. The instructions include information for the development, functioning, growth, and reproduction of all organisms and most viruses found on earth. Using the information found inside DNA, individuals can now send off to get the detailed information regarding their health and genetics. It can be used in healthcare to diagnose or rule out genetic disorders. It can also be used to predict future health conditions or customize medical treatments. Genetic testing can be used to determine biological relationships, such as a paternity test to determine parentage.

Learn More »
Privacy Updates for 2021
December 17, 2020 | 7 minutes read
Privacy Updates for 2021

If you thought 2020 was a challenging year for privacy solutions given the pandemic, just wait until 2021, which is expected to be filled with turmoil and upheaval. Businesses around the world will have to prepare for changes to current legislation, as well as new federal laws coming into effect all over the globe. There are many battles to come between privacy advocates and national demands. By 2021, companies can expect an onslaught of rapid changes, compliance dates, and penalties if unable to meet the new needs.

Learn More »
U.S. Government Process of Redaction for Transparency or FOIA Requests
December 10, 2020 | 7 minutes read
U.S. Government Process of Redaction for Transparency or FOIA Requests

For many years there has been an ongoing debate about the public demanding more transparency in how the government spends its budgets. The government has had the issue of balancing the idea of transparency to keep things under wraps for government security. One method of releasing some documentation to the public regarding contracts or other areas through FOIA requests without releasing restricted information is through the redaction process.

Learn More »
Privacy First on Social Media? Is it Possible?
December 08, 2020 | 8 minutes read
Privacy First on Social Media? Is it Possible?

Privacy is a new luxury. In the same way that consumers have come to appreciate specific labels, such as ‘organic,’ ‘cruelty-free,’ or ‘low-fat,’ for products that are good for their health, these same consumers are becoming more aware of the term ‘privacy’ when purchasing or using products. People have become tired of privacy abuses and are coming together to stand up for privacy protections.

Learn More »
111111111111