Friday, March 08, 2019

Should make an interesting discussion case.
Joseph Lazzarotti of Jackson Lewis writes:
According to reports, bank customers in Australia (yes, data breach notification requirements exist down under) have been affected by “an industry-wide” data breach experienced by a third-party service provider to the banks – property valuation firm, LandMark White. As expected, the banks are investigating and in some cases notifying customers about the incident. However, there are reports that some of the affected banks are suspending this vendor from the group of valuation firms they use. This is not an unusual reaction by organizations whose third party service providers have or are believed to have caused a data breach affecting the organization’s customers, patients, students, employees, etc. But, it is worth thinking about whether that is the best course of action.
Read more on JDSupra.




GDPA inspired? More specific Privacy requirements, now more specific Security requirements.
Mike Nonaka, Libbie Canter, David Stein and Sam Adriance of Covington & Burling write:
On March 5, 2019 the Federal Trade Commission (“FTC”) published requests for comment on proposed amendments to two key rules under the Gramm-Leach-Bliley Act (“GLBA”). Most significantly, the FTC is proposing to add more detailed requirements to the Safeguards Rule, which governs the information security programs financial institutions must implement to protect customer data.
In addition, the FTC is proposing to expand the definition of “financial institution” under the Safeguards Rule and the Privacy Rule to include “finders.” Finally, the FTC is proposing to amend the Privacy Rule to make technical and conforming changes resulting from legislative amendments to GLBA in the Dodd-Frank Act and FAST Act of 2015.
Read more on Inside Privacy.
[From the article:
Some of the specific proposed changes include:
  • Revising the requirement to designate an “employee or employees to coordinate [the] information security program” to require designation of a single individual, referred to as a Chief Information Security Officer (“CISO”), as responsible for overseeing and implementing the program;
  • Requiring financial institutions to implement access controls on information systems, as well as restrict access to physical locations containing customer information only to authorized individuals;
  • Requiring customer information to be encrypted, both in transit and at rest;
  • Requiring information systems to include audit trails designed to detect and respond to security events;
  • Requiring financial institutions to develop procedures for the secure disposal of customer information in any format that is no longer necessary for their business operations or other legitimate business purposes;
  • Requiring financial institutions to implement policies and procedures “to monitor the activity of authorized users and detect unauthorized access or use of, or tampering with, customer information by such users;”




A perspective on propaganda.
Beyond Hybrid War: How China Exploits Social Media to Sway American Opinion
… our research demonstrates that social media influence campaigns are not a one-size-fits-all technique. We studied Chinese state-run social media influence operations and concluded that the Chinese state utilized techniques different from the Russian state. These differences in technique are driven by dissimilar foreign policy and strategic goals.
… We believe that the Chinese state has employed a plethora of state-run media to exploit the openness of American democratic society in an effort to insert an intentionally distorted and biased narrative portraying a utopian view of the Chinese government and party.
… According to the French researchers, nation-state information manipulation includes three criteria:
  1. A coordinated campaign
  2. The diffusion of false information or information that is consciously distorted
  3. The political intention to cause harm




Perspective.
Nearly one-in-five Americans now listen to audiobooks
“Americans are spreading their book consumption across several formats, and the use of audiobooks is rising. About three-quarters (74%) of Americans have read a book in the past 12 months in any format, a figure that has remained largely unchanged since 2012, according to a Pew Research Center survey conducted in January. Print books remain the most popular format for reading, with 67% of Americans having read a print book in the past year. And while shares of print and e-book readers are similar to those from a survey conducted in 2016, there has been a modest but statistically significant increase in the share of Americans who read audiobooks, from 14% to 18%. Overall, Americans read an average (mean) of 12 books per year, while the typical (median) American has read four books in the past 12 months. Each of these figures is largely unchanged since 2011, when the Center first began conducting the surveys of Americans’ book reading habits…”




Sound trivial?
How Frito-Lay Applies Machine Learning
… “One of my first projects at the company involved building systems that could sense the texture of chips without destroying them,” said Mirza. For this project, he was capturing acoustic data and manually processing it.
“It's a system that hits the chip with lasers, listens to the sound coming off them, and then uses that data to correlate the sound into texture,” Mirza said. This system could provide an automated quality check for the company’s chip processing systems.
… Mirza said this project, which is still in process, is estimated to save the company over a million dollars a year based on its ability to optimize the potato peeling process in the U.S. alone. With a global deployment, additional savings are expected.




Just because we use it…
Turnitin to Be Acquired by Advance Publications for $1.75B
… Founded in 1998 by four university students, iParadigms, Turnitin’s previous parent company, launched with a vision to offer tools across different industries, from law to education and technology. Over the years, it saw the most success in education and the company shifted to focus specifically on that market.




An idea I missed.
Agri-tech startup Hello Tractor to expand across Nigeria, Kenya
Hello Tractor connects tractor owners to farmers through an Internet of Things (IoT)-enabled digital solution that bridges the gap between manual and mechanised farming.
The startup, which last year entered into a partnership with IBM Research to pilot a new tool for farmers, enables farmers to request affordable tractor services, while providing enhanced security to tractor owners through remote asset tracking and virtual monitoring.


No comments: