VPNs add a layer between your computer and the internet, forcing your connection to go through another server before going out onto the internet, and hide your browsing habits to your ISP.
Explains how VPN encryption and protocols work and how they can protect your internet connection. The Motherboard Guide to VPNs (Lorenzo Franceschi-Bicchierai, Motherboard, 3-24-17) The easiest way to hide your internet browsing from your to use a commercial Virtual Private Network or VPN.
Consumer protection laws and internet dating sites Free teen porn dating websites
Axis Pro's Loss Prevention Guide (this PDF booklet provides basic info on defamation, defamation, invasion of privacy (more complex than you might expect), trademark infringement, and copyright infringement).
Online privacy for journalists by Michael Dagan (PDF) How to safeguard your communications, browsing, and data, from any unwanted "big brother" or intruder--indirectly how to protect a source. Schulz from the Center for Investigative Reporting.
Your Digital Trail, And How It Can Be Used Against You (Daniel Zwerdling, All Tech Considered, NPR, 9-30-13) NPR and the Center for Investigative Reporting are documenting just how vivid the typical person's digital picture has become and how easy it can be to access it. This is first part of a four-part series examining your digital trail and who potentially has access to it.
Your Digital Trail: Private Company Access (Daniel Zwerdling, NPR, 10-1-13) Data we voluntarily provide online such as on dating websites may not stay with that site.
Using bits of data from social network sites, researchers gleaned names, ages and even Social Security numbers. Judge Rules That Protester Cant Oppose Twitter Subpoena (Colin Moynihan, City Room, NY Times 4-24-12).