Open in app

Sign In

Write

Sign In

Edward W. Hood
Edward W. Hood

17 Followers

Home

About

Apr 3, 2022

How to end digital identity theft

I no longer write on Medium since they demonetized my account for having less than 100 followers. Visit massaddress.news Here is an image from the article I posted this morning.

Identity

1 min read

How to end digital identity theft
How to end digital identity theft
Identity

1 min read


Nov 2, 2021

Could You Be Arrested For What You Searched On Google Last Week?
868
11

Grant Piper

If you give the Government an inch, they will take a mile.

If you give the Government an inch, they will take a mile. So many rights are hinged on privacy. If you take away the privacy, you can take away the rights.

1 min read

1 min read


Sep 14, 2021

What is Citizen Identity Management™(CIM)?

Have you ever called into customer service, and the representative asked you to verify your personal information? The reason for this is because your data is stored in something called Customer Relationship Management (CRM) software. A CRM can contain hundreds of millions of identities. These identities change at least 95,000…

Startup

4 min read

What is Citizen Identity Management™(CIM)?
What is Citizen Identity Management™(CIM)?
Startup

4 min read


May 10, 2021

General Privacy VS Explicit Privacy

General Privacy VS Explicit Privacy In order to explain the difference between GP and EP, I will use a toll road as an example. General privacy is like buying a pass for a toll road. You can pay the fee in either cash or credit but some measure of identity…

Identity

2 min read

General Privacy VS Explicit Privacy
General Privacy VS Explicit Privacy
Identity

2 min read


Feb 19, 2021

Roadmap for Information Security & IT Operations

BUSINESS OPERATIONS SUPPORT — Compliance🧐 Intellectual Property Protection Independent Audits Third-Party Audits Regulatory Mapping Contract Maintenance — Data Governance🗄️ 1. Data Ownership 2. Data Classification 3. Data Retention 4. Data Disposal 5. Data Handling 6. Data Loss Prevention — Human Resources Security👥 Employee Awareness Employee Termination Employee Agreements Background Screening

Information Technology

2 min read

Roadmap for Information Security & IT Operations
Roadmap for Information Security & IT Operations
Information Technology

2 min read


Feb 17, 2021

Why don’t we protect identity like Top Secret information?

Do you know how many spies the United States has inside Iran right now? I don’t know the answer either. The reason for this is because the number and names are classified Top Secret at the highest levels of the US Government. So I’ll ask the question again. …

Privacy

5 min read

Why don’t we protect identity like Top Secret information?
Why don’t we protect identity like Top Secret information?
Privacy

5 min read


Feb 14, 2021

How the US Postal Service fuels identity theft.

This might come as a surprise, but if you have never changed your address with the US Postal Service(USPS) before, they do not know where you live. You read that right. Before you ask, “Then how do I get my mail?” Let me explain. The USPS delivers the mail based…

Privacy

5 min read

How the US Postal Service fuels identity theft.
How the US Postal Service fuels identity theft.
Privacy

5 min read

Edward W. Hood

Edward W. Hood

17 Followers

Third Generation Warfighter🇦🇫Husband📜Father👶Entrepreneur💡

Following
  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • DC Palter

    DC Palter

  • Aaron Dinin, PhD

    Aaron Dinin, PhD

  • Founder Collective

    Founder Collective

  • Adrien Book

    Adrien Book

See all (22)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams