THE LIBERTARIAN ENTERPRISE Number 640, October 9, 2011 "What is Western Civilization? The undeniable triumph of the individual" Special to L. Neil Smith's The Libertarian Enterprise Recently, I was informed by an e-mail to the address I used with the now-defunct Borders book stores that my data and personal purchasing information was being transferred from Borders to Barnes and Noble as a result of a sale of Borders's customer information that was approved by the bankruptcy court overseeing their dissolution. There was an opt-out choice, which I thought would un-subscribe me from further Barnes and Noble e-mail. On clicking that choice, I was subsequently presented with an e-mail which allowed me to confirm the choice. On clicking to confirm, I was presented with a screen that informs me that my data will not be transferred from Borders to Barnes and Noble. Now, as it happens, I don't believe that's really true. And I believe that national government already has several copies of that database. But it does seem like worth doing, since it only took a few clicks. And it might be true. Another recent event upset me very much. I was at Fedex Office, which is what Kinko's have become, owing to an urgent late evening printing obligation. So while I was awaiting service, a lady who had come in for some urgent copies, evidently for a job application, asked for her originals back, including all of her photo ID and socialist insecurity cards and the like. She also asked for the remaining copies. Without asking her approval, the clerk shredded the remaining copies. Why does this fact upset me? Because shredding does not destroy the information. All shredding does is slightly randomise the data. It can still be re-assembled. And you have no idea what happens to Fedex shredded documentsfor all you know they are reproduced by the FBI before being burned. Or never burned. I suppose I could look up what Fedex says they do, but I won't bother, since I won't trust their word. How do you destroy the data? You shred, you burn, and you stir the ashes. This last step is essential because even paper ash contains readable words. Shred, burn, and stir, or have it done where you can see it being done. Until those three things are done, your data is vulnerable.
TLE AFFILIATE
|