Lower Merion must pay $260k to student’s lawyer in webcam case
August 31, 2010 by Dissent
John P. Martin reports:
A federal judge Monday ordered the Lower Merion School District to pay about $260,000 now – and potentially much more later – to the lawyer who brought the lawsuit over the district’s webcam monitoring.
In a 14-page opinion, Senior U.S. District Judge Jan E. DuBois said Mark S. Haltzman deserved to be paid for work that led to a preliminary injunction against the district in May. And he said Haltzman could submit the rest of his bills when the case ended.
Read more on Philly.com.
It’s not clear to me whether the district will actually be stuck with the bill because back in April, the district’s insurance carrier, Graphic Arts Mutual, had sued in federal court for injunctive relief, claiming that it was not responsible for any costs involved in defending the district in this matter. That matter has not yet been decided by the court.
This sounds like an ill-informed overreaction. Why limit access to voice? (Would they recognize encrypted voice or simply consider it some kind of document?)
India Threatens Ban On Google, Skype
August 31, 2010 by Dissent
Paul McDougall reports:
Having given RIM a 60-day reprieve from a ban on Blackberry messaging traffic, Indian authorities have now set their sites on Google and Skype.
As they did with RIM, authorities in the country are demanding access to data that flows across Google’s and Skype’s servers.
“The notices to these entities will be issued beginning Tuesday and all of them will be asked to comply with the directive or else they will have to close down their networks,” a senior government official said, according to The Times of India.
Read more on InformationWeek.
[From the article:
Indian officials insist they need the ability to intercept mobile data in cases where they suspect the devices are being used to plot terror attacks or other crimes.
Is this practicing law without a license or is it merely providing a “Best Practices” checklist?
GeneratePrivacyPolicy.com - Generating Privacy Policies
For the Network Security class
Misconfigured Networks Main Cause of Breaches
Posted by CmdrTaco on Tuesday August 31, @05:54PM
"Responses to a survey from attendees of the DEFCON 18 conference revealed that 73% came across a misconfigured network more than three quarters of the time – which, according to 76% of the sample, was the easiest IT resource to exploit. Results revealed that 18% of professionals believe misconfigured networks are the result of insufficient time or money for audits. 14% felt that compliance audits that don't always capture security best practices are a factor and 11% felt that threat vectors that change faster than they can be addressed play a key role."
For my Geeks...
Top 5 Free Computer Maintenance Tools You Should Know About
A hot new business area?
Textbook Rentals Go Into Hypergrowth: Bookrenter Says Revenues Are Growing 725 Percent