My Photo

Your email address:


Powered by FeedBlitz

January 2015

Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Blog powered by Typepad

Become a Fan

« Out-bound Record-level Accountability in Information Sharing Systems | Main | Data Decommissioning – Destruction of Accountability »

January 02, 2008

TrackBack

TrackBack URL for this entry:
http://www.typepad.com/services/trackback/6a00d83452946769e200e55072cec58833

Listed below are links to weblogs that reference Information Incontinence:

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Jim Harper

You must have listened to my podcast yesterday. Nice work, Grasshopper.

http://www.cato.org/dailypodcast/jimharper_oncemoreintoabreach_20080102.mp3

Carl Kessler

Is it feasible to have a pool of "throwaway" cellphone numbers (or at least a couple) that map to a single cellphone, but which you can control (e.g., time out or cycle through)?

The analogy is my home alarm system. There's a master code, but my cleaning person has a throwaway code. It let's them in, but allows me to track their entry separately and turn off whenever I like.

The same for cellphones would be great - I could cycle through 2 or 3 throwaway numbers and know that my primary cell number isn't out there...

Mad_tony

bit like throwaway email addresses but some last longer than others for some reasons. Some sites have better spam traps :-)

The comments to this entry are closed.