|
1. |
Privacy Survival Guide: Take Control of Your Personal Information |
|
2. |
Wireless Communications: Voice and Data Privacy |
|
2a. |
Hang Up on Harassment: Dealing with Cellular Phone Abuse |
|
2b. |
Privacy in the Age of the Smartphone |
|
3. |
How to Put an End to Unwanted or Harassing Phone Calls |
|
4. |
Junk Mail: How Did They All Get My Address? |
|
4a. |
"Shine the Light" on Marketers: Find Out How They Know Your Name |
|
4b. |
Junk Mail FAQ |
|
5. |
Telemarketing: How to Have a Quiet Evening at Home |
|
5a. |
Junk Faxes: No Relief in Sight |
|
5b. |
Frequently Asked Questions about Telemarketing |
|
6. |
Credit Reporting Basics: How Private Is My Credit Report? |
|
6a. |
Facts on FACTA, the Fair and Accurate Credit Transactions Act |
|
6b. |
"Other" Consumer Reports: What You Should Know about "Specialty" Reports |
|
6c. |
Your Credit Score: How It All Adds Up |
|
7. |
Workplace Privacy and Employee Monitoring |
|
8. |
Introduction to Health and Medical Information Privacy |
|
8a. |
Health Privacy: HIPAA Basics |
|
8b. |
The HIPAA Privacy Rule: How May Covered Entities Use and Disclose Health Information |
|
8c. |
The HIPAA Privacy Rule: Patients' Rights |
|
8d. |
Protecting Health Information: the HIPAA Security and Breach Notification Rules |
|
8e. |
Health Privacy outside the Healthcare Environment: Health Records on the Job, Available to the Government, and in Credit Reports |
|
9. |
Wiretapping and Eavesdropping on Telephone Calls |
|
10. |
My Social Security Number - How Secure Is It? |
|
10a. |
Social Security Numbers FAQ |
|
11. |
From Cradle to Grave: Government Records and Your Privacy |
|
12. |
Checklist of Responsible Information-Handling Practices |
|
12a. |
Personal Data Retention and Destruction Plan |
|
14. |
Are You Being Stalked? |
|
14a. |
Security Recommendations For Stalking Victims |
|
15. |
What Personal Information Should You Give to Merchants? |
|
16. |
Employment Background Checks: A Jobseeker's Guide |
|
16a. |
Employment Background Checks in California: A Focus on Accuracy |
|
16b. |
Small Business Owner Background Check Guide |
|
16c. |
FAQ on Employment Background Checks |
|
16d. |
Volunteer Background Checks: Giving Back Without Giving Up on Privacy |
|
17. |
Coping with Identity Theft: Reducing the Risk of Fraud |
|
17a. |
Identity Theft: What to Do if It Happens to You |
|
17b. |
How to Deal with a Security Breach |
|
17d. |
Frequently Asked Questions about Identity Theft |
|
17g. |
Criminal Identity Theft: What to Do if It Happens to You |
|
18. |
Online Privacy: Using the Internet Safely |
|
18a. |
Online Privacy FAQ |
|
19. |
Caller ID and My Privacy |
|
20. |
Anti-Spam Resources |
|
21. |
Children’s Online Privacy: A Resource Guide for Parents |
|
21a. |
Children's Safety on the Internet |
|
22. |
Electricity and Your Privacy: Deregulation in California |
|
23. |
Online Shopping Tips: E-Commerce and You |
|
24. |
Protecting Financial Privacy: The Burden Is on You |
|
24a. |
Financial Privacy: How to Read Your "Opt-Out" Notices |
|
24d. |
Financial Privacy FAQ |
|
24e. |
Is Your Financial Information Safe? |
|
25. |
Privacy Tips for Online Job Seekers |
|
25a. |
Avoiding Online Job Scams |
|
26. |
CLUE and You: How Insurers Size You Up |
|
27. |
Debt Collection Practices: When Hardball Tactics Go Too Far |
|
27a. |
Frequently Asked Questions about Debt Collection |
|
28. |
Online Privacy for Nonprofits |
|
29. |
Privacy in Education: Guide for Parents and Adult-Age Students |
|
30. |
Check 21: Paperless Banking |
|
31. |
Customer Identification Programs for Financial Transactions |
|
32. |
Paper or Plastic: What Have You Got to Lose? |
|
33. |
Identity Theft Monitoring Services |
|
34. |
Protecting Your Telephone Records: Does Your Carrier’s Privacy Policy Ring True? |
|
35. |
Social Networking Privacy: How to be Safe, Secure and Social |
|
36. |
Securing Your Computer to Maintain Your Privacy |
|
37. |
The Perils and Pitfalls of Online Dating: How to Protect Yourself |
|
38. |
A Renter’s Guide to Privacy: What to Know Before You Sign the Lease, While You Rent, and When You Move Out |
|
39. |
Mobile Health and Fitness Apps: What Are the Privacy Risks? |
|
40. |
Bring Your Own Device . . . at Your Own Risk |
|
41. |
Data Brokers and Your Privacy |