Thursday, November 01, 2007

Large lists of applicants are important recruiting tools because...

http://www.pogowasright.org/article.php?story=20071031125308365

MI: Ferris applicants' information on stolen laptop

Wednesday, October 31 2007 @ 12:53 PM EDT Contributed by: PrivacyNews News Section: Breaches

A laptop holding some personal information of 18,000 applicants to Ferris State University was stolen from an admissions officer's car in the Chicago area, the school revealed today.

... The laptop included applicants' names, addresses, telephone numbers, dates of birth, e-mail addresses and academic information. The computer did not have financial information, social security numbers, driver's license data or credit card numbers, the school said.

The computer was stolen from a locked car used by an admissions official who was in Chicago for student recruiting events, according to the school.

Source - mLive

Related - Ferris State University incident web site



Ohio follow-up “We lost your data. Pay us!”

http://www.pogowasright.org/article.php?story=2007103114485933

(update) OH: Contractor agrees to pay part of state data-theft cost

Wednesday, October 31 2007 @ 02:48 PM EDT Contributed by: PrivacyNews News Section: Breaches

A state contractor has agreed to paid $300,000 to help defray the estimated $3 million cost related to the theft of a computer-back-up tape containing Social Security numbers and other sensitive information.

Compuware Corp., which worked on the state’s new payroll and accounting system, is making the payment in part in response to the theft from a state intern’s car and for ongoing support of project, according to an Oct. 18 agreement released today.

Source - The Columbus Dispatch



I doubt this will gain any traction...

http://www.pogowasright.org/article.php?story=20071031145027887

Banks neglect responsibility for data breaches, some say

Wednesday, October 31 2007 @ 02:50 PM EDT Contributed by: PrivacyNews News Section: Breaches

Security experts say banks that are suing TJX Cos. Inc. over the data breach that compromised more than 94 million credit card accounts should accept more of the blame for what happened. By requiring that merchants store credit card transaction records for up to 18 months, they say, banks are putting companies like TJX at heightened risk of attack.

Others debunk that assessment, saying there's confusion over the storage rules and that TJX and other merchants opened themselves up to network break-ins by failing to institute well-rounded security policies.

Source - SearchSecurity.com



Let the government show you how they don't do it...

http://www.pogowasright.org/article.php?story=20071031083009980

Guides on Sharing Information Released

Wednesday, October 31 2007 @ 08:30 AM EDT Contributed by: PrivacyNews News Section: Minors & Students

U.S. Education Secretary Margaret Spellings yesterday released what she called "user-friendly" guidelines to help educators and parents interpret federal privacy laws in an initiative prompted by the mass shooting at Virginia Tech.

... The Education Department released three brochures on the law: one for K-12 educators, one for colleges and one for parents. ['cause different ages got different rights. Bob] They will be sent to schools, school boards and education associations.

Lawmakers are also considering revising the privacy law. Rep. Tim Murphy (R-Pa.) has introduced legislation to allow school officials to contact parents if a student is considered suicidal or a threat to attack someone.

Source - Washington Post



Since all email involves a third party (who can read the email) is email automatically bad for lawyer-client communications? Does that change if you encrypt?

http://www.pogowasright.org/article.php?story=20071031120458699

Email Security and Privacy: NY Hospital Retention Ruling Points Out Importance of Policies and Awareness

Wednesday, October 31 2007 @ 12:04 PM EDT Contributed by: PrivacyNews News Section: In the Courts

On October 17, 2007, there was a very interesting ruling regarding a doctor's email communications sent to an attorney and the associated attorney privilege. In the matter of Scott v Beth Israel Med. Ctr. Inc. the New York Supreme Court found that the doctor's email messages to his attorneys using the hospital network were not privileged and could be retained by the hospital even though the doctor wanted the hospital to stop retaining his messages and delete all emails related to his communications with his lawyers.

Source - Realtime IT Compliance (blog)



Everything you ever wanted to know about privacy?

http://www.news.com/8301-10784_3-9808540-7.html

October 31, 2007 2:22 PM PDT

Google launches privacy channel on YouTube

Posted by Elinor Mills

Google launched a privacy channel on YouTube Wednesday with videos explaining its privacy policies. The move comes on the eve of a two-day Federal Trade Commission-hosted town hall event on behavioral ad targeting to be held in Washington, D.C.



Yeah, but what if...

http://www.infoworld.com/article/07/10/31/Experts-skeptical-of-alleged-November-11-cyber-jihad_1.html?source=rss&url=http://www.infoworld.com/article/07/10/31/Experts-skeptical-of-alleged-November-11-cyber-jihad_1.html

Experts skeptical of alleged Nov. 11 cyber jihad

DEBKAfile is reporting that numerous al-Qaeda-affiliated hackers are planning a massive DDOS-style attack for November 11, but security experts are unconvinced

By Robert McMillan, IDG News Service October 31, 2007

Security experts are saying that a reported al-Qaeda cyber jihad attack planned against Western institutions should be treated with skepticism.



Still going...

http://www.freedom-to-tinker.com/?p=1214#comments

Grokster Case Lumbers On; Judge To Issue Permanent Injunction

October 17th, 2007 by Ed Felten

Remember the Grokster case? In which the Supreme Court found the filesharing companies Grokster and StreamCast liable for indirect copyright infringement, for “inducing” infringement by their users? You might have thought that case ended back in 2005. But it’s still going on, and the original judge just issued an interesting ruling. (Jason Schultz has a two part summary of the ruling.)



Normalizing infringement?

http://www.news.com/8301-10784_3-9808457-7.html?part=rss&subj=news&tag=2547-1023_3-0-5

EFF: Copyright owners think twice before pulling YouTube clips

Posted by Greg Sandoval October 31, 2007 11:43 AM PDT

Everybody knows that copyright owners can demand that YouTube and other Web sites remove unauthorized copies of their work under the law. But what happens when the owners of intellectual property err in their claims?

On Wednesday, the Electronic Frontier Foundation (EFF), a group that advocates for the rights of Internet users, issued six principles that copyright holders should consider before trying to remove a piece of content.



Do you see any value to this approach?

http://www.news.com/How-we-went-wrong-on-identity/2010-1029_3-6216333.html?part=rss&tag=2547-1_3-0-5&subj=news

Perspective: How we went wrong on identity

Steven Gal says the current ID infrastructure has left consumers annoyed and feeling victimized, and needs to be completely re-engineered.

By Steven Gal Published: November 1, 2007, 4:00 AM PDT

After years working on identity and its protection, I've concluded that our identity infrastructure is fundamentally broken--and the Web is what ultimately broke it.



Always some good stuff...

http://www.bespacific.com/mt/archives/016385.html

October 31, 2007

New on LLRX.com for October 2007



Should be interesting.

http://politics.slashdot.org/article.pl?sid=07/10/31/2332216&from=rss

US Voting Machines Standards Open To Public

Posted by samzenpus on Wednesday October 31, @11:29PM from the now-you-can-see-it-coming dept. United States Politics

Online Voting writes "The U.S. Election Assistance Commission has published new voting systems testing and certification standards for 190 days of public comment. For all the critics of electronic voting, this is your opportunity to improve the process. This will be the second version of the federal voting system standards (the first version is the VVSG 05). To learn more about these Voluntary Voting System Standards see this FAQ."



Reputation Repair will be a profitable consultancy...

http://www.marketingpilgrim.com/2007/10/google-reputation-management.html

Ten Ways to Avoid a Google Reputation Management Nightmare

Wednesday, October 31st, 2007; -- Andy Beal |

Google is no longer just a search engine. With your potential customers, future employers, and members of the media turning to Google for information about your business, Google has become a reputation engine.



Amusing, but some interesting comments on the Conference.

http://ralphlosey.wordpress.com/2007/10/29/whats-wrong-with-this-picture-lessons-of-star-trek-for-e-discovery/

What’s Wrong With This Picture? Star Trek Lessons for e-Discovery

... According to Dan Regard, one of the keynote speakers at the Masters e-Discovery Conference in Washington D.C. last week, Star Trek has an important lesson to teach to e-discovery: bring the engineers onto the bridge and make IT an integral part of your core e-discovery team.



Just a thought. If you are serious, shouldn't you be trying any/all ways to win? (Strategy 101)

http://www.physorg.com/news113030015.html

Published: 06:13 EST, October 31, 2007

Scientists treat cancer as an infectious disease -- with promising results

Researchers at the Albert Einstein College of Medicine of Yeshiva University have shown for the first time that cancers can be successfully treated by targeting the viruses that cause them. The findings, published in the October 31 issue of PloS One, also raise the possibility of preventing cancer by destroying virus-infected cells before they turn cancerous.



A look-alike competitor for ZamZar

http://online.movavi.com/

Movavi Online

Movavi Online is a mutli-feature online video conversion tool.

No comments: