Callisto (organization)
   HOME
*





Callisto (organization)
Callisto is a nonprofit US organization, created by Jess Ladd, aimed at supporting survivors of sexual assault and privately identifying repeat perpetrators. The organization has developed a series of tools, first "Callisto Campus", followed by "Callisto Expansion", and later "Callisto Vault". "Callisto Vault" allows users to (1) save a private time-stamped record of their assault, or (2) enter into the Callisto "matching escrow", a secure and private serial offender detection system. Users of the matching escrow enter information about their assailant, and if another user enters information about the same perpetrator, both users are connected to a pro bono attorney to help them decide what to do next. According to a 2022 report, a match triggers only emails to two lawyers, each with the contact details of one survivor but not naming the alleged perpetrator; the lawyers then contact the survivors to inform them of the match and offer assistance for any action they wish to take. Call ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Sexual Assault
Sexual assault is an act in which one intentionally sexually touches another person without that person's consent, or coerces or physically forces a person to engage in a sexual act against their will. It is a form of sexual violence, which includes child sexual abuse, groping, rape (forced vaginal, anal, or oral penetration or a drug facilitated sexual assault), or the torture of the person in a sexual manner. Definition Generally, sexual assault is defined as unwanted sexual contact. The National Center for Victims of Crime states: In the United States, the definition of sexual assault varies widely among the individual states. However, in most states sexual assault occurs when there is lack of consent from one of the individuals involved. Consent must take place between two adults who are not incapacitated and consent may change, by being withdrawn, at any time during the sexual act. Types Child sexual abuse Child sexual abuse is a form of child abuse in wh ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Protection
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection. Data privacy is challenging since attempts to use data while protecting an individual's privacy preferences and personally identifiable information. The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue. Authorities Laws Authorities by country Information types Various types of personal information often come under privacy concerns. Cable television This describes the ability to control what information one reveals about oneself over cable television, and who can access that information. For example, third parties can track IP TV programs someone has watched at any given time. "The addition of any informati ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Privacy-enhancing Technologies
Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their personally identifiable information (PII), which is often provided to and handled by services or applications. PETs use techniques to minimize an information system's possession of personal data without losing functionality. Generally speaking, PETs can be categorized as hard and soft privacy technologies. Goals of PETs The objective of PETs is to protect personal data and assure technology users of two key privacy points: their own information is kept confidential, and management of data protection is a priority to the organizations who hold responsibility for any PII. PETs allow users to take one or more of the following actions related to personal data that is sent to and used by online service providers, merchants or other users ( ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]