Thursday, June 25, 2009

At some point, management should realize that computers store data and that some data should actually be protected. Perhaps using day-glow orange laptops with “Sensitive data” stickers and motion detecting chips that set off an alarm if the computer is moved more than 10 feet would be the minimum allowable protection?

http://www.databreaches.net/?p=5695

Ca: Laptops with patient information stolen from hospital

June 24, 2009 @ 2:46 pm by admin Filed under: Breach Incidents, Healthcare Sector, Non-U.S., Theft

The University of Alberta Hospital is reporting that a burglary occurred earlier this month resulting in two laptops containing patient information being stolen. Alberta Health Services said the theft happened on June 4th, in the hospital’s Provincial Lab Information Technology room.

Two laptops with health information of more than 300,000 people were stolen. Information on the laptops are said to include names, birth dates, personal health numbers and lab test results for communicable and reportable diseases.

The hospital said the laptops are protected by a security program that requires multiple passwords to be entered before information is made accessible.

Read more on CTV News.



We all assume that the thief is the only bad actor in the story.

http://www.databreaches.net/?p=5717

Jp: Former securities company manager arrested over huge data leak

June 25, 2009 @ 5:52 am by admin Filed under: Breach Incidents, Financial Sector, Insider, Non-U.S.

Tokyo police Thursday arrested a former manager at a brokerage who was fired for stealing personal data on nearly 1.5 million customers and selling some of the information to mailing list companies.

Hideaki Kubo, 44, a former acting manager at Mitsubishi UFJ Securities Co.’s systems department, has admitted to the allegations of theft and illegal computer access, police said.

Police said they will investigate the sloppy handling of information at the company.

According to police, Kubo used the ID of a female temporary staff employee at a subsidiary to illegally access the customer database on Jan. 26.

[...]

Violators of the fraudulent access prevention law can be sentenced to a maximum one year in prison or a fine of up to 500,000 yen.

Police will also seek a theft charge against Kubo over the 65-yen [Roughly 65 cents Bob] CD taken from the company supplies.

A theft conviction can result in a 10-year prison term or a fine of up to 500,000 yen.

Read more in Asahi Shimbum. Previous coverage here.



Ooo! I feel safer already!

http://www.independent.co.uk/news/uk/home-news/new-cyber-chief-to-protect-against-computer-attacks-1715969.html

New cyber chief to protect against computer attacks

Prime Minister creates security post after warnings of electronic espionage

By Kim Sengupta and Nigel Morris Wednesday, 24 June 2009

Britain is to appoint its first national cyber security chief to protect the country from terrorist computer hackers and electronic espionage, Gordon Brown will announce tomorrow.



Comes up in my Computer Security class and in “Intro it IT”

http://news.cnet.com/8301-19518_3-10272311-238.html?part=rss&subj=news&tag=2547-1_3-0-5

Survey: Teens "sext" and post personal info

by Larry Magid June 24, 2009 3:54 PM PDT

An Internet safety study (PDF) just released by Cox Communications shows that teens may be a bit more safety conscious than previously thought.

The survey, which was done by Harris Interactive, asked 655 13- to 18-year-olds about their online and cell phone behavior, specifically addressing issues of cyberbullying and sexting. The study was in partnership with the National Center for Missing & Exploited Children and "America's Most Wanted Host" John Walsh.

For the purposes of the study, cyberbullying was defined as "harassment, embarrassment, or threats online or by text message," while sexting referred to "sending sexually suggestive text or e-mails with nude or nearly-nude photos."



There is something to this...

http://it.slashdot.org/story/09/06/25/0228217/IT-and-Health-Care?from=rss

IT and Health Care

Posted by samzenpus on Thursday June 25, @02:36AM from the broken-by-design dept. database medicine it

Punk CPA writes

"Technology Review has some thoughts about why the health care industry has been so slow to adopt IT, while quick to embrace high technology in care and diagnosis. Hypothesis: making medical records available for data analysis might expose redundancy, over-testing, and other methods of extracting profits from the fee-for-service model. My take is that it might also make it much easier to gather and evaluate quality of care information. That would be chum in the water for malpractice suits."



Probably not related to the story above, but the strategic goals are identical

http://www.ft.com/cms/s/0/8e4ccdce-60cf-11de-aa12-00144feabdc0,dwp_uuid=9c33700c-4c86-11da-89df-0000779e2340.html?nclick_check=1

China blocks Google website

By Kathrin Hille in Beijing and Richard Waters in San Francisco Published: June 24 2009 16:22 | Last updated: June 25 2009 05:57

Google’s global website was blocked in China on Wednesday night, marking an escalation in Beijing’s unprecedented crackdown on the world’s leading search engine company.

Attempts to access Google.com and Gmail from different computers in Beijing started failing after 9pm local time, but the websites could be accessed through proxy servers – normally a sign that a website is being blocked by internet censors. The service in Beijing at least was back after two hours.



This is the opposite of the “DNA extracted after tasering a suspect” reported earlier this month.

http://www.pogowasright.org/?p=787

Forcible DNA extraction violated the Constitution

A Las Vegas detective violated an inmate’s constitutional rights by “forcibly extracting” his DNA without a warrant while he was shackled and chained to a bench, the 9th Circuit ruled on a 2-1 vote.

The extraction was requested by Deputy District Attorney Elissa Luzaich, who wanted to put Kenneth Friedman’s DNA sample into a cold-case data bank.

[...]

On appeal, the defendants cited a Montana law that purportedly allowed them to take the DNA swab. Friedman had previously pleaded guilty to a sex crime in Montana, served his time and was released before moving to Las Vegas.

But the Montana statute doesn’t apply across state lines, the San Francisco-based federal appeals court noted in tossing this argument.

The court similarly rejected the claim that the swab search was “reasonable.”

“The warrantless, suspicionless, forcible extraction of a DNA sample from a private citizen violates the Fourth Amendment,” Judge Thomas wrote. “The actions of the officers were not justified under the ’special needs’ exception, reliance on an extraterritorial statute, or on general Fourth Amendment principles.”

Read more on Courthouse News.



Could this be another definition of Privacy? (If not, why not?)

http://www.pogowasright.org/?p=731

EU Commission investigates right to ‘chip silence’

The European Commission is to investigate whether or not people have the right to disappear from the ever-more pervasive digital networks that surround them.

The Commission has expressed concern about the privacy implications of personally-identifying technologies such as radio frequency identification (RFID) chips. It said that it is important to discuss whether or not people should be able to disappear from networks.

“The Commission will launch a debate on the technical and legal aspects of the ‘right to silence of the chips’, which has been referred to under different names by different authors and expresses the idea that individuals should be able to disconnect from their networked environment at any time,” said a Commission consultation paper.

Read more on Out-Law.com. The report, Internet of Things — An action plan for Europe, can be found here (pdf)


(Related) Why is disconnecting important?

http://www.pogowasright.org/?p=758

Chipped phones can track consumers

RFID stories seem to come in threes. This one, from Threat Level, is about how mobile phones will be chipped — for better or worse:

An Ericsson executive says all new mobile phones sold in 2010 will include an RFID chip that will allow owners to open their car or house door with their phone. A handy feature, no doubt, for some people. But the executive says the chip might also be used by credit card companies to track the location of cardholders to cut down on fraud.

HÃ¥kan Djuphammar, vice president of systems architecture for Ericsson, speaking at a conference in Stockholm this week, said credit card companies could make use of mobile user location data and IP mapping to determine if the owner of a card is in the same location where a card transaction is taking place.

Read more on Threat Level.



I use video a lot in my classes, so easy search is important.

http://youflow.finnrudolph.de/

YouFlow

Online service that lets search and browse YouTube with a stylish image flow interface and most importantly, play multiple videos in one browser. You can open and play as many videos as you like and easily scale them to your desired size



When you need information in real time...

http://news.cnet.com/8301-17939_109-10272370-2.html?part=rss&subj=news&tag=2547-1_3-0-5

Twitter search sites: The three best, and all the rest

by Rafe Needleman June 25, 2009 4:00 AM PDT



For my hackers... Several sites listed...

http://www.makeuseof.com/tag/how-to-get-free-internet-service-almost-anywhere/

Find Totally Free Unlimited Internet Access Almost Anywhere

Jun. 24th, 2009 By Guy McDowell

This is no joke. There are still Internet Service Providers (ISPs) out there offering free service. We’re going to look at a few ways to find totally free unlimited Internet access, legitimately and legally.

No comments: