Saturday, July 04, 2015

Just a couple observations: There is nothing in metadata that flags a particular communication as attorney-client. After all, if I call a lawyer that does not mean I've hired him. On the other hand, it has been my experience that what one intelligence agency does they all do. But that does not mean they share those conversations with the local prosecutor.
Global Legal Post reports:
The District Court of The Hague has ruled that surveillance of lawyers by intelligence agencies constitutes an infringement of fundamental rights and orders the State to stop all surveillance of lawyers’ communications.
The Court was questioned on the legality of eavesdropping on lawyers’ calls and communications by domestic intelligence agencies in a challenge brought against the Dutch State by the law firm Prakken d’Oliveira, the Dutch Association of Criminal Defence Lawyers (NVSA), and the Council of Bars and Law Societies of Europe (CCBE). In its verdict, the Court recognised that the ability to communicate confidentially with a lawyer is a fundamental right which is currently being breached by Dutch surveillance policy.
Read more on Global Legal Post.

Is it a cultural thing or a bureaucratic thing?
Yomiuri Shimbun reports:
An investigation into the recent unauthorized access of personal information from the Japan Pension Service found that 99 percent of the files accessed were not protected by passwords, sources said.
This contrasts with multiple reports issued since 2013 by all JPS offices nationwide claiming full compliance on password rules. If the files accessed were not protected by passwords, it would suggest that most of these reports were false.
Read more on The Japan News.

“So, what did you learn in school today?”
Steven Ertelt and Rebecca Downs write:
Earlier this month, reported on a high school in Seattle, Washington that is now implanting intrauterine devices (IUD), as well as other forms of birth control and doing so without parental knowledge or permission.
The high school, Chief Sealth International, a public school, began offering the devices in 2010, made possible by a Medicaid program known as Take Charge and a non-profit, Neighborcare. Students can receive the device or other method free of cost and without their parent’s insurance. And while it’s lauded that the contraception is confidential, how can it be beneficial for a parent-child relationship when the parents don’t even know the devices or medication their daughter is using?
Read more on LifeNews.
Confidential health care provided by schools has always been a hot-button issue (this blogger happens to support it), and it’s not surprising an anti-abortion site would try to call attention to this issue, but it does provide food for thought for parents.

An article for my IT Governance students. How should IT learn about this law (before the security breach)?
Linn Freedman writes:
On June 26, 2015, Rhode Island Governor Gina Raimondo signed Senate Bill S0134, the Rhode Island Identity Theft Protection Act of 2015, which substantially revises the old law, including breach notification.
Specifically, the new law requires municipal agencies, state agencies and any “person” that “stores, collects, processes, maintains, acquires, uses, owns or licenses personal information about a Rhode Island resident” to implement “a risk-based information security program” which “contains reasonable security procedures and practices…in order to protect the personal information from unauthorized access, use, modification, destruction or disclosure…”
Read more on JDSupra.

Is this supposed to be one of those deep ethical conundrums? Why would you recommend telling a searcher only what he wants to hear?
Should Google Always Tell the Truth?
What is Google’s responsibility to its searchers? In a Thursday panel at the Aspen Ideas Festival, Ashkan Soltani, the Federal Trade Commission’s chief technologist, offered a hypothetical that captured why that question is so difficult to answer.

Do they think this stuff up in a Finance class or in a bar, you be the judge.
MasterCard app plans to let you pay for things with a selfie
… The credit card company is experimenting with a mobile app that uses facial recognition to verify your identity. After downloading the app, you pay for things by simply looking at your phone and blinking once. The blink prevents thieves from showing the app a picture of your face in an attempt to fool it. Alternatively, the app can read your fingerprint.
… The new biometric methods for verifying your identity could replace passwords or PIN codes. MasterCard currently asks for a password to verify purchases with its SecureCode system.
The company is also experimenting with voice recognition and even a method of verifying your identity by reading your heartbeat.

Boy, that Capitalism thing is sure confusing.
China brokerages pledge to buy $19.3 billion in shares to steady plunging market
China's top securities brokerages said on Saturday that they would collectively buy at least 120 billion yuan ($19.3 billion of shares in a bid to stabilize the country's stock markets after a slump of nearly 30 percent since mid-June.
The pledge follows near-daily official policy moves over the past week, including an interest rate cut and a relaxation of margin lending rules, that have so far failed to arrest the sell-off, which some market watchers fear could turn into a full-blown crash.
… China stocks had more than doubled over the past year, fueled in large part by investors using borrowed money to speculate on further gains.
… Just a few months ago, state media had been exhorting the market's rise, saying China's bull market had just begun and denying that it was in a bubble. Investors big and small took that as a government signal to buy.
Now, Beijing is struggling to find a policy formula to restore confidence in the market before too much damage is done to the world's second-largest economy.

I think this is a bit behind the times, but my students might find some value here.
Digital Tools to Make Your Next Meeting More Productive

Good to see the old Alma Mater isn't standing still.
ICS-ISAC Merges With Webster University
The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) announced this week that it would merge with Webster University's Cyberspace Research Institute (CRI).
The non-profit ICS-ISAC is a knowledge sharing center established to help facilities develop situational awareness in support of local, national and international security.
The ICS-ISAC creates and maintains the Situational Awareness Reference Architecture (SARA) to foster knowledge sharing capabilities. SARA is a compilation of industry standards, technical practices and processes designed to enable situational awareness both at industrial facilities as well as across shared infrastructure.

Something for my students who want to be considered “experts.”
5 Sites to Easily Start Your Blog Using Evernote, Trello or WordPress

Something to start the new Quarter with.
Hack Education Weekly News
… The University of Phoenix is making massive layoffs and cutting degree programs. It let go 600 people on Monday, after revealing that it had already laid off 900 employees this year. MindWires Consulting’s Phil Hill also observes that the university is “Losing hundreds of millions of dollars on adaptive-learning LMS bet.”

No comments: