Saturday, July 25, 2015

The National Cybersecurity Center of Excellence (NCCoE) is taking a stab at Best Practices.
NIST – Securing Electronic Health Records on Mobile Devices
by Sabrina I. Pacifici on Jul 24, 2015
“Stolen personal information can have negative financial impacts, but stolen medical information cuts to the very core of personal privacy. Medical identity theft already costs billions of dollars each year, and altered medical information can put a person’s health at risk through misdiagnosis, delayed treatment or incorrect prescriptions. Yet, the use of mobile devices to store, access, and transmit electronic health care records is outpacing the privacy and security protections on those devices.”
The NCCoE has released a draft of its first cybersecurity practice guide, “Securing Electronic Health Records on Mobile Devices,” and invites you to download the draft and provide feedback. For ease of use, the draft guide is available to download in sections:
Or you can get a .zip file of all volumes, plus manifest and template files referred to in SP 1800-1c (4.82 MB).”




Has anyone collected Best Practices here?
I wish every local community had the kind of detailed reporting on student privacy issues that Melinda J. Overstreet provides in her coverage of a change in Glasgow Independent Schools’ policies. From the newly drafted policies:
“In the school environment, a search is permissible where a school official has reasonable grounds, a ‘suspicion,’ based upon the totality of the circumstances, for suspecting that the search will reveal evidence that the student has violated either the law, district policy, or rules of the school. Reasonable suspicion must be based on ‘individualized suspicion of wrongdoing,’” the policy says.
The revised policy also covers canine searches:
“School premises may be randomly monitored with a trained canine for contraband, including but not limited to weapons, firearms, alcohol, drugs and drug paraphernalia. Canine monitoring does not constitute a search.”
The policy cites a federal case immediately after that statement.
Read more on Glasgow Daily Times. The revised policies seems pretty consistent with what we’ve seen in other districts. What the reporting doesn’t mention, though, and I don’t know if it’s handled in the existing policies, is the search of electronic devices or demands that students turn over their passwords for a search. I don’t see the student conduct handbook on the district’s web site (maybe I missed it?), so I don’t know if the district’s policy is that it can and will search student electronics if they suspect cyberbullying or any other undesirable behavior committed from the student’s home on their own time.




Is there an assumption that social media contains what amounts to a confession before the event? If so, can we be far from “pre-crime” arrests as in the movie “Minority Report?”
Oklahoma police search social media to find motive behind 5 deadly stabbings




The US is beginning to notice that we have an old and poorly maintained infrastructure. OR do we face a bunch of want-to-be terrorists cutting power lines or committing other less-than-catastrophic acts that are getting lost in the failures due to neglect? OR is that my professional paranoia showing through?
NJ Transit Apologizes After Power Woes Cause 3 Days of Suspensions, Delays


(Related)
Flight Cancellations Follow Power Outage at New York City’s La Guardia Airport




You know (and Hillary should have known) that this is going to be “discussed” throughout the campaign. What seems to have been lost is that no one has identified a secure communications channel that was used to keep classified information out of these emails. (I'd also mention that failure to mark an email as classified does not make that email unclassified.)
Criminal Inquiry Sought in Hillary Clinton’s Use of Email
Two inspectors general have asked the Justice Department to open a criminal investigation into whether sensitive government information was mishandled in connection with the personal email account Hillary Rodham Clinton used as secretary of state, senior government officials said Thursday.
… It is not clear if any of the information in the emails was marked as classified by the State Department when Mrs. Clinton sent or received them.




Perspective. Apparently, we would rather watch a “How to” video than read a book.
Video based search makes YouTube second largest search engine
by Sabrina I. Pacifici on Jul 24, 2015
Search Engine Land: “YouTube is arguably the second largest search engine on the Web. It is the third most visited site on the Web, according to Alexa and SimilarWeb. Recent information released by Google has shown that more and more users are using YouTube as a search engine. Searches related to “how to” on YouTube are growing 70% year over year. It is also no secret that video content is more engaging than a page of text and can be much more informative. YouTube’s popularity and reach are also expanded by its inclusion in both Google Web and Video search.”




For my students. (I'm please to find that I'm not doing everything wrong.)
The Essential Guide to Crafting a Work Email




I'll past this article next to the library scanner.
What’s The Best Free OCR or ICR Program For Manuscript Transcription?




For all my students.
The Best Alternatives to Google News That Help You Stay Current
Mainstream: Bing News
Personalized: Flipboard
Tech: Techmeme
Politics: Memeorandum
Alternative: Digg




The Saturday funnies.
Hack Education Weekly News
… Oregon Governor Kate Brown has signed legislation creating a free community college program in the state. (Related: Who’s against tuition-free education?)
NSA summer camps: “More hacking than hiking.”


No comments: