Virtual Private Networks (VPNs) let you establish a secure communications channel between your computing device and a server. After connecting to the server, you could gain access to a private network that has work files or applications, or use the server as a relay point to then access Internet content when browsing from a public network.
Canadians’ mobile devices are filled with applications that collect personal information, including identifiers that are engrained into different parts of the devices. But what exactly are these identifiers, and how are they used?
Our Office recently concluded an investigation that has resulted in two important firsts along with some key lessons learned for businesses conducting e-mail marketing.
We all encounter scores of user agreements when we go online. Do you read the full terms and conditions governing your use of a site, or do you just hit the "I accept" button and surf on?
"You are, without doubt, the worst pirate I've ever heard of," sneers Commodore Norrington, the local military boss, in a scene from Pirates of the Caribbean.