Thursday, May 28, 2009

This one might have some potential. You judge...

http://www.pogowasright.org/article.php?story=20090527115503875

Nominee Sotomayor on Privacy and Civil Liberties

Wednesday, May 27 2009 @ 11:55 AM EDT Contributed by: PrivacyNews

There have been a few references to Supreme Court nominee Sonia Sotomayor’s judicial records on privacy-related issues in the blogosphere and mainstream media today, and I thought I might take a more detailed look at her record. Here are some cases she ruled on, with summaries from lexisONE, where you can read the cases in more detail by signing up for a free account.

Source - Chronicles of Dissent



What were they thinking?

http://it.slashdot.org/article.pl?sid=09/05/27/2317213&from=rss

Data Breach Exposes RAF Staff To Blackmail

Posted by samzenpus on Thursday May 28, @01:02AM from the skeletons-in-the-closet dept. Security Privacy

Yehuda writes

"Wired reports, 'Yet another breach of sensitive, unencrypted data is making news in the United Kingdom. This time the breach puts Royal Air Force staff at serious risk of being targeted for blackmail by foreign intelligence services or others. The breach involves audio recordings with high-ranking air force officers who were being interviewed in-depth for a security clearance. In the interviews, the officers disclosed information about extra-marital affairs, drug abuse, visits to prostitutes, medical conditions, criminal convictions and debt histories — information the military needed to determine their security risk. The recordings were stored on three unencrypted hard drives that disappeared last year.'"



Before you write your security plan...

http://www.pogowasright.org/article.php?story=20090527042421992

Identity Theft from the Victim’s Perspective: Identity Theft: The Aftermath 2008 Released

Wednesday, May 27 2009 @ 10:30 AM EDT Contributed by: PrivacyNews

As it has done every year since 2004, the Identity Theft Resource Center (ITRC) has released a report on the impact of identity theft as reported by those who contacted ITRC for help during the past year.

The report, based on responses to 43 questions, covers 15 major aspects of victimization. Some of the key findings from the 2008 data:

  • Financial-only identity theft crimes were reported by 73% of the respondents, slightly less than in 2007.

  • More than 2/3 of those responding to questions about medical identity theft reported that medical providers billed for services received by an imposter. Another 56% were contacted by a collection agency or billing department for those services. One-third of the respondents said there is now another person’s information on their medical records and 11% were denied health or life insurance due to unexplained reasons. This was the first year that ITRC included questions specifically about medical identity theft. The report does not indicate what percent of all respondents responded to these questions, so their statistics are likely to be an overestimate for a general population of ID theft victims. Even so, the numbers may surprise those who have viewed medical identity theft as more of a rarity.

  • One of the most striking differences in this year's responses was that only 34% of respondents discovered identity theft due to an adverse situation. Last year, 82% of respondents had found out due to an adverse event such as being contacted by a creditor or collection agency demanding payment on a late bill or returned check, being notified about a warrant for an arrest; etc.. Proactive measures in discovering the crime, by both businesses and victims, increased from 2007 to 2008. More victims reported finding out about the identify theft from the business (21% in 2008 vs. 10% in 2007) or from self-protective measures such as checking credit reports (45% in 2008 vs. 8% in 2007).

In addition to other findings, the report also includes some data on the difficulty victims experienced in clearing their records. Some of the explanations given included faulty credit reports being reposted by credit agencies after being cleared or accounts being sold to new collection agencies even though they had been cleared.

The full report can be found on ITRC's web site.



You would think the President would be able to find a lawyer somewhere in Washington...

http://www.nytimes.com/2009/05/27/health/policy/27health.html?hp

Antitrust Laws a Hurdle to Health Care Overhaul

By ROBERT PEAR May 27, 2009

WASHINGTON — President Obama’s campaign to cut health costs by $2 trillion over the next decade, announced with fanfare two weeks ago, may have hit another snag: the nation’s antitrust laws.

Antitrust lawyers say doctors, hospitals, insurance companies and drug makers will be running huge legal risks if they get together and agree on a strategy to hold down prices and reduce the growth of health spending.

Robert F. Leibenluft, a former official at the Federal Trade Commission, said, “Any agreement among competitors with regard to prices or price increases — even if they set a maximum — would raise legal concerns.”



I don't think he likes them

http://www.zeropaid.com/news/86315/harvard-prof-calls-riaa-lawsuits-unconstitutional-abuse-of-law/

Harvard Prof Calls RIAA Lawsuits “Unconstitutional Abuse of Law”


Related

http://www.pogowasright.org/article.php?story=20090528054604264

Group calls for overhaul of privacy regulations

Thursday, May 28 2009 @ 05:46 AM EDT Contributed by: PrivacyNews

The United States' 35-year-old federal privacy law and related policies should be updated to reflect the realities of modern technologies and information systems, and account for more advanced threats to privacy and security, according to a report sent on Wednesday to Office of Management and Budget Director Peter Orszag.

In its 40-page paper, the National Institute of Standards and Technology's Information Security and Privacy Advisory Board calls for Congress to amend the 1974 Privacy Act and provisions of the 2002 E-Government Act to improve federal privacy notices; clearly cover commercial data sources; and update the definition of "system of records" to encompass relational and distributed systems based on government use of records, not just its possession of them. The panel included technology experts from industry and academia.

Source - GovExec.com Related - Letter (pdf)



Implementing a law firm wiki

http://www.bespacific.com/mt/archives/021454.html

May 27, 2009

New on LLRX.com: Navigating the Enterprise 2.0 Highway

Navigating the Enterprise 2.0 Highway: Heather Colman provides an overview of Hicks Morley's implementation of ThoughtFarmer, an Enterprise 2.0/wiki style intranet platform, one year ago. Despite a few growing pains, she describes how the application was successful at meeting the primary objectives to decentralize content updates and increase knowledge sharing and collaboration within the firm.



It's bad enough when they rig the Presidential elections, but this could cause riots!

http://tvdecoder.blogs.nytimes.com/2009/05/27/att-may-have-swayed-idol-results/

AT&T May Have Swayed ‘Idol’ Results

By The New York Times May 27, 2009, 2:08 pm

Edward Wyatt reports: AT&T, one of the biggest corporate sponsors of “American Idol,” may have influenced the outcome of this year’s competition by providing phones for free text-messaging services and lessons in casting blocks of votes at parties organized by fans of Kris Allen, the Arkansas singer who was the winner of the show last week . Read more in Wednesday’s New York Times …



For the Swiss Army folder (You never know when you might need to talk to your kids.)

http://www.makeuseof.com/dir/lgdtxtr-text-messaging-lingo-translator/

Lgdtxtr: Text Messaging Lingo Translator

Lgdtxtr is an online translator for translating teen text messaging lingo to regular English. The application is useful for parents to keep in the know of what kids are texting about or simply for those who wants to learn it.

Visit Lgdtxtr @ www.lgdtxtr.com Similar sites: Twonvert and 140it.



For my hacker/students

http://www.wired.com/threatlevel/2009/05/viral-video-hoax-or-proof-of-impending-cyber-apocalypse/

Viral Video Hoax, or Proof of Impending Cyber Apocalypse?

By Kevin Poulsen May 26, 2009 7:08 pm

No comments: