Case study :
Privacy-enhancing technologies can do much to protect a user’s information and/or maintain anonymity when using the Web. Research onion routing and the Tor project. What do these things do? How do they work? Type a one page (minimum) paper describing your findings. Please double space your paper and cite your sources.
•Personal Information Protection and Electronic Data Act (PIPEDA)
•Personally identifiable information (PII)
•Privacy Act of 1974
•Privacy-enhancing technology (PET)
•Privacy impact assessment (PIA)