Abstract:
Systems, methods, and non-transitory computer-readable media can determine that a content item has been shared by a first user through a computing system, wherein the shared content item is distributed to one or more other users of the computing system through respective news feeds corresponding to the one or more other users. A determination can be made that the shared content item has been selected for isolation by at least one second user. The content item can be isolated from the respective news feeds corresponding to the one or more other users, wherein the isolated content item is removed from the respective news feeds.
Abstract:
The disclosed techniques provide systems and methods for anonymizing various portions of information, action logs, end-user information, and/or other data sets that are stored in non-indexed storage systems. More specifically, various anonymization procedures are described for redacting UII and/or replacing UII in raw data with randomly generated information (RGI). The anonymization process is performed on a rolling basis as raw data is received. An anonymization mapping table maps (or associates) the replaced UII in the anonymized data to the RGI, and eventually all raw data can be deleted.
Abstract:
The disclosed techniques provide systems and methods for anonymizing various portions of information, action logs, end-user information, and/or other data sets that are stored in non-indexed storage systems. More specifically, various anonymization procedures are described for redacting UII and/or replacing UII in raw data with randomly generated information (RGI). The anonymization process is performed on a rolling basis as raw data is received. An anonymization mapping table maps (or associates) the replaced UII in the anonymized data to the RGI, and eventually all raw data can be deleted.
Abstract:
Systems, methods, and non-transitory computer-readable media can provide a set of security features capable of being enabled by a user associated with an online service. In some implementations, it can be determined that at least one security feature in the set has yet to be enabled by the user. A communication can be provided to the user. In some instances, the communication can indicate that a quantity of social connections associated with the user has already enabled the at least one security feature. One or more options to enable the at least one security feature can be provided to the user.
Abstract:
The disclosed techniques provide systems and methods for anonymizing various portions of information, action logs, end-user information, and/or other data sets that are stored in non-indexed storage systems. More specifically, various anonymization procedures are described for redacting UII and/or replacing UII in raw data with randomly generated information (RGI). The anonymization process is performed on a rolling basis as raw data is received. An anonymization mapping table maps (or associates) the replaced UII in the anonymized data to the RGI, and eventually all raw data can be deleted.
Abstract:
Systems, methods, and non-transitory computer-readable media can provide a set of security features capable of being enabled by a user associated with an online service. In some implementations, it can be determined that at least one security feature in the set has yet to be enabled by the user. A communication can be provided to the user. In some instances, the communication can indicate that a quantity of social connections associated with the user has already enabled the at least one security feature. One or more options to enable the at least one security feature can be provided to the user.