Now Matt is a pretty sharp guy, but my textbooks say you do the risk analysis BEFORE you determine what level of security you need.
http://hosted.ap.org/dynamic/stories/D/DATA_THEFT?SITE=VALYD&SECTION=HOME&TEMPLATE=DEFAULT
Ohio Hires Expert to Review Data Theft
By MATT REED Associated Press Writer Jun 17, 10:38 PM EDT
COLUMBUS, Ohio (AP) -- The state has hired a computer security expert to determine the likelihood of someone getting access to the data on a stolen backup storage device, Gov. Ted Strickland said Sunday.
Matthew Curtin, the 34-year-old founder of Interhack Corp., will begin Monday reviewing what's already known is on the device, whose theft was revealed on Friday.
Also on Sunday, Strickland said the device contained the names and case numbers of the state's 84,000 welfare recipients, who face "a remote threat of identity theft," and the names and federal tax identification number of vendors that receive payroll deduction payments from the state - about 1,200 records. Sixteen of those records contain banking information, he said.
.... Strickland and Curtin said the analysis of what's on the device should be finished on Monday.
Very interesting. Send a copy to everyone who shops at TJX
http://www.pogowasright.org/article.php?story=20070617194025977
Article: Civil Actions for Privacy Violations 2007: Where Are We?
Sunday, June 17 2007 @ 07:47 PM CDT Contributed by: PrivacyNews
Two threads in civil litigation over security breaches and privacy violations have emerged over the past two years. One is that private rights of action in the federal courts, based upon federal statutes, face very significant obstacles. The major obstacles include the lack of any private right of action under federal privacy-oriented laws and inability under many theories to plead an acceptable basis for damages. A second thread is that state courts, addressing state based causes of action, can often provide a more appealing forum for plaintiffs. Litigators need to be aware that creativity in both forum selection and pleading have a great deal to do with viability of private actions. Following is a brief review of some of the important decisions affecting rights to recover for violations of the confidentiality of personal data.
Source - HowardRice.com [pdf]
Looks like Bill wants to be Governor of New York!
http://politics.slashdot.org/article.pl?sid=07/06/17/2011226&from=rss
Microsoft Moves To Change NY State Election Law
Posted by kdawson on Sunday June 17, @04:54PM from the taking-a-page-from-the-telcos dept.
myspace-cn sends us to Bo Lipari's blog where it is revealed that Microsoft has moved forcefully into New York State with proposed changes to NY state election law drafted by Microsoft attorneys. A document has been circulating (PDF) among the legislators for a while now. The proposed changes would gut the source-code escrow and review provisions in current law that were hard-fought-for and passed in New York in 2005. Microsoft is siding with the makers of voting machines that run on Windows — the company doesn't want its code inspected by outsiders. From the article: "Now the software giant has gone a step further, not just saying 'we won't comply with your law' but actively trying to change state law to serve their corporate interests... Adding insult to injury, these changes are being slipped into a bill that may be voted on Monday or Tuesday, June 18 or 19."
One for the e-Discovery folks to follow. How much will they find?
http://www.bespacific.com/mt/archives/015160.html
June 17, 2007
Office of Special Counsel Directs 18 Agencies to Preserve E-Mail for Investigation
Daniel Pulliam at Govexec.com reportd, "Eighteen agencies have been asked by the Office of Special Counsel to preserve electronic information dating back to January 2001 as part of its governmentwide investigation into alleged violations of the law that limits political activity in federal agencies. The OSC task force investigating the claims has asked agencies, including the General Services Administration, to preserve all e-mail records, calendar information, phone logs and hard drives going back to the beginning of the Bush administration."
Privacy stands... Interesting.
http://www.iht.com/articles/2007/06/17/bloomberg/bxswift.php
Swift must defend itself in case about violation of privacy
By Andrew Harris Bloomberg News Monday, June 18, 2007
CHICAGO: Swift, the banking cooperative based in Belgium that has aided U.S. government efforts to trace terrorist financing, must defend a lawsuit accusing it of violating the privacy rights of U.S. citizens, a judge has ruled.
... Judge James Holderman of the U.S. District Court in Chicago said that the complaint brought by two bank customers contained sufficient allegations to support a claim that Swift had violated the U.S. Right to Financial Privacy Act, a law limiting the right of the government to view bank customers' records.
... The suit was filed last June, after The New York Times reported Swift's cooperation with the U.S. government.
... Holderman issued the ruling June 12. The judge dismissed claims that Swift's disclosures violated constitutional free speech guarantees or Illinois consumer fraud laws. He allowed the suit to go forward on the privacy claim and the accusation that Swift violated the Fourth Amendment of the U.S. Constitution, barring unlawful search and seizure.
Good technology does not guarantee good users...
N.S. family inadvertently got spied upon
Updated Sat. Jun. 16 2007 9:29 PM ET CTV.ca News Staff
A Nova Scotia family has inadvertently been on Internet "candid camera" for months without their knowledge.
Dale Gass became their peeping tom by accident.
"It is kind of disturbing these videos are being sent to me. It's an invasion of privacy," he said.
Gass used to own a wireless security camera. Unfortunately, it is now installed in the family's house, and no one seemed to have a clue where they lived.
"Thankfully they are a nice wholesome family, not doing anything too shocking," he said.
Gass's former camera sends an e-mail image every time it senses motion.
He was unsatisfied by the product and returned it to the retailer, but forgot to remove his e-mail address from its software.
Someone else bought the camera, but apparently didn't put in their own e-mail address, so now the camera is sending him images from their house.
"I received them at the rate of two to 10 a day," Gass said.
Staples Canada said it warns stores to make sure this particular model of camera is fully erased before resale.
However, retailer Tim Walker pointed the finger at Gass. "The onus is on him to make sure that camera had been reset," Walker said.
No matter who's to blame, one privacy expert said the case is yet another cautionary tale for consumers.
"It also raises the question of how many other cases are happening without other people know about it," said Philippa Lawson of the University of Ottawa's Canadian Internet Policy and Public Interest Clinic.
Gass eventually put out a public appeal and located the family.
Related... Frequently the only concern expressed is “they have a database” -- another perspective is: What controls are placed on the users of that database?
http://politics.guardian.co.uk/homeaffairs/story/0,,2105272,00.html
330,000 users to have access to database on England's children
Monday, June 18 2007 @ 06:34 AM CDT Contributed by: PrivacyNews
A giant electronic database containing sensitive information on all 11 million children in England will be open to at least 330,000 users when it launches next year, according to government guidance.
A final consultation on the plan reveals that the index, intended to help children's services work together more effectively following the death of Victoria ClimbiƩ, will be accessible through any computer linked to the internet, [let's hope it is only 330,000 Bob] whether at work or at home, providing users have the correct two-part security authentication.
Source - Guardian
Perhaps it could also mark those locations where using free wifi is illegal?
http://www.techcrunch.com/2007/06/17/wefi-an-easier-way-of-finding-wifi/
WeFi: An Easier Way Of Finding WiFi
Duncan Riley June 17 2007
WeFi is aiming to deliver a better outside internet experience by making WiFi as easy to use as a cell phone.
... The WeFi client replaces the Windows connection manager and finds and connects to free WiFi hotspots. The location of free hotspots is displayed on a map that also shows the location of other WeFi users. [Attention stalkers? Bob] The maps are regularly updated as users discover and connect to WiFi. This is delivered without changing or modifying access points, delivering a complementary service to other WiFi sharing initiatives such as fon.
... The service is currently in private beta and will be opened to the public Wednesday.
A video (of a slide show) I can use in my Statistics class, my Intro to Technology class, etc. etc. and so forth.
http://www.youtube.com/watch?v=1RXNWwGUsBU
future of technology
Added: February 19, 2007 From: tanjentsdotcom
No comments:
Post a Comment