PRIVACY FROM THE JUDICIAL PERSPECTIVE
Morning/Lunch Seminar FRIDAY, MARCH 20, 2008
For Reservations Contact: Diane Bales at dbales@law.du.edu
Registration Fee: Seminar and Lunch ($20) Lunch with CLE Credit ($40)
[See the flyer at: http://law.du.edu/documents/privacy-foundation/Privacy-Brochure-March-20-09-Revised-Mar2.pdf
I would answer this question: “Yes, please!”
http://www.pogowasright.org/article.php?story=20090311115352284
Security vs. privacy? Reinterpreting the Fourth Amendment
Wednesday, March 11 2009 @ 11:53 AM EDT Contributed by: PrivacyNews
If you devote a sizable chunk of your time to writing about surveillance, you see grim predictions about "the end of privacy" bandied about with a numbing regularity—hell, I've got at least two books by that title on my shelf right now. Which may be why it took me a while to get around to Yale law prof Jed Rubenfeld's recent article "The End of Privacy" in the Stanford Law Review. Well, mea maxima culpa: Rubenfeld's essay is not another catalog of privacy threats, but rather a provocative reexamination of the meaning of the Fourth Amendment—one that manages to be simultaneously radical (in the sense of "going to the root"), novel, and plausible in a way I would not have thought possible so late in the game.
Source - Ars Technica
[Link to The Law Review: http://lawreview.stanford.edu/content/vol61/issue1/Rubenfeld.pdf
Refine or repeal?
http://www.bespacific.com/mt/archives/020816.html
March 11, 2009
ACLU Releases Report On Patriot Act Abuses
News release: "The American Civil Liberties Union released a comprehensive report today examining widespread abuses that have occurred under the USA Patriot Act, a law that was rushed through Congress just 45 days after September 11. In the almost eight years since the passage of the controversial national security law, the Patriot Act has led to egregious government misconduct."
Reclaiming Patriotism: A Call to Reconsider the Patriot Act, Published March 2009
See? You can reverse a Big Brother order, all you need to do is spend big bucks taking it to court (or in this case to the Information Commissioner's Office.
http://www.pogowasright.org/article.php?story=20090311181530121
UK: Pub landlord wins right not to fit CCTV cameras
Wednesday, March 11 2009 @ 06:15 PM EDT Contributed by: PrivacyNews
A prospective landlord has won his fight not to install CCTV cameras in his pub after the case was taken up by the information commissioner.
Nick Gibson said police insistence that he set up cameras to film every customer entering and leaving the premises would threaten drinkers' civil liberties.
Source - Guardian
[From the article:
The Information Commissioner's Office intervened, writing to the Metropolitan police to warn that the blanket introduction of CCTV in pubs "raised serious privacy concerns".
Good luck! Is dealing with Bill Gates adequate preparation?
http://news.slashdot.org/article.pl?sid=09/03/12/0243242&from=rss
Microsoft Executive Tapped For Top DHS Cyber Post
Posted by samzenpus on Thursday March 12, @03:31AM from the reboot-to-be-safe dept. United States Security
krebsatwpost writes
"The Department of Homeland Security has named Microsoft's "chief trustworthy infrastructure strategist" Phil Reitinger to be its top cyber security official. Many in the security industry praised him as a smart pick, but said he will need to confront a culture of political infighting and leadership failures at DHS. From the story: 'Reitinger comes to the position with cyber experience in both the public and private sectors. Prior to joining Microsoft in 2003, he was executive director of the Defense Department's Computer Forensics Lab. Before that, he was deputy chief of the Justice Department's Computer Crimes and Intellectual Property section, where he worked under Scott Charney, who is currently corporate vice president for trustworthy computing at Microsoft.'"
Suspicions confirmed!
http://tech.slashdot.org/article.pl?sid=09/03/11/1946206&from=rss
Kremlin-Backed Nashi Admits Cyberattacking Estonia
Posted by timothy on Wednesday March 11, @04:20PM from the please-send-me-some-polonium-antidote dept. The Internet Security Politics
An anonymous reader writes
"Russia's Kremlin-based youth movement Nashi admits being responsible for 2007 cyberattacks against Estonia. An interesting point is that when you DDoS the systems, it's not the fault of some people who want to crash it but instead the systems' for blocking their users due to technical limitations. So if I shot someone to death it's not my fault for shooting them, but theirs instead because of technical limitations of their body."
Big isn't always best...
http://www.bespacific.com/mt/archives/020810.html
March 11, 2009
Bank of America Tops List of Largest U.S. Banks
Houston Business Journal: "Bank of America Corp. now ranks as the largest U.S. bank ranked by assets, according to a study by SNL Financial. Charlotte, N.C.-based BofA had total assets of almost $2.5 trillion as of Dec. 31. Prior to its recent acquisition of Merrill Lynch & Co. Inc., BofA would have been ranked third at the end of 2008. The gargantuan financial services mergers that grabbed headlines last year have shaken up the Big 5 rankings, with JPMorgan Chase & Co. of New York — which acquired Washington Mutual Inc. — now second on the list with $2.17 trillion in assets."
Related postings on financial system
...and best isn't always big.
http://www.bespacific.com/mt/archives/020812.html
March 11, 2009
Global Finance Lists World’s 50 Safest Banks
News release: "The World’s 50 Safest Banks 2009 were selected through a comparison of the long-term credit ratings and total assets of the 500 largest banks around the world. Ratings from Moody’s, Standard & Poor’s and Fitch were used." [Note: only two U.S. banks on this list - 26. US Bancorp and 47. JPMorgan Chase]
Related postings on financial system
Interesting, but I haven't chased down all the links yet.
http://news.slashdot.org/article.pl?sid=09/03/12/0238252&from=rss
VoIP Legal Status Worldwide
Posted by samzenpus on Thursday March 12, @12:36AM from the free-for-all dept. Government The Internet
Cigarra writes
"There was much public debate going on during the last several months here in Paraguay, regarding the "liberation of Internet", that is, the lifting of the restriction on ISPs to connect directly to international carriers. Up until this week, they were forced to hire wholesale service from the State run telco, Copaco. During the last month, when the new regulation was almost ready, the real reason supporting the monopoly made it to the headlines: Copaco would fight for the monopoly, fearing VoIP based telephony. Finally, the regulator Conatel resolved today to end the monopoly, but a ruling on VoIP legal status was postponed for "further study". I guess this kind of "problem" arised almost everywhere else in the world, so I ask the international slashdotters' crowd: what is VoIP legal status in your country / state / region? How well did incumbent telcos adapt to it, and overall, just how disruptive was this technology to established operators?"
Geek Alert! Professor Soma reports:
New York Considers Tax Credit for Open Source Development
Legislation was introduced March 3 in the New York Assembly that would create a $200 state income tax credit against expenses incurred in the development of free software. The credit is available for 20 percent of the taxpayer-developer's expenses, up to $200 each year. In order to qualify, the taxpayer-developer must release the source code to the public and must license the software under a license approved by the Free Software Foundation. Not all open source licenses will meet this criteria. According to Section 1(QQ)(2), “For the purposes of this subsection, a program shall qualify for the credit provided by this subsection if the code for such program has been released under an open source license recognized by the open source initiative, or has been released under a free software license recognized by the Free Software Foundation.”
The bill, A.B. 6380, was referred to the Assembly Committee on Ways and Means.
Table updated March 3, 2009.
Perhaps a step toward guidelines. Something for my Computer Security class to consider.
http://www.pogowasright.org/article.php?story=20090311114411721
GERMANY: Rules for Social Networks Agreed by Data Protection Authorities in Germany
Wednesday, March 11 2009 @ 11:44 AM EDT Contributed by: PrivacyNews
The German Düsseldorfer Kreis (GDK), a panel gathering all German data protection authorities, has sent a clear message to social networks on the mandatory respect of the data protection legal framework and highlighted eight central requirements to respect.
Source - iBLS
Note: the summary of the eight principles is worth reading as they seem more stringent than what we have in the U.S. -- Dissent [Do any social networks follow these principles? Bob]
[From the article:
GDK"s decision also points out different risks associated to the use of social networks, inter alia: virtual undeletable personal data once entered, misleading suggestion of friendship that may lead to incautious disclosing of personal data, close monitoring of users by operators, possible use of the information by HR specialist in the future and that a too generous provision of data within the social networks might spur identity theft.
Related. Call it the “Anti-Social Network?” Part of America's fear of sex?
http://www.pogowasright.org/article.php?story=20090312080332331
Teens caught 'sexting' face porn charges
Thursday, March 12 2009 @ 08:03 AM EDT Contributed by: PrivacyNews
A growing number of teens are ending up in serious trouble for sending racy photos with their cellphones.
Police have investigated more than two dozen teens in at least six states this year for sending nude images of themselves in cellphone text messages, which can bring a charge of distributing child pornography. Authorities typically are notified by parents or schools about so-called "sexting."
Source - USA Today
Related? Social Networks providing a “the cop was in a bad mood” defense?
http://news.slashdot.org/article.pl?sid=09/03/11/2235202&from=rss
Suspect Freed After Exposing Cop's Facebook Status
Posted by samzenpus on Wednesday March 11, @10:40PM from the goblin-tossed-out-of-court dept. thumbnail
longacre writes
"A man on trial in New York for possession of a weapon has been acquitted after subpoenaing his arresting officer's Facebook and MySpace accounts. His defense: Officer Vaughan Ettienne's MySpace "mood" was set to "devious" on the day of the arrest, and one day a few weeks before the trial, his Facebook status read "Vaughan is watching 'Training Day' to brush up on proper police procedure. From the article,'You have your Internet persona, and you have what you actually do on the street," Officer Ettienne said on Tuesday. "What you say on the Internet is all bravado talk, like what you say in a locker room." Except that trash talk in locker rooms almost never winds up preserved on a digital server somewhere, available for subpoena.'"
I'd love to know how they calculate the premium.
http://in.sys-con.com/node/871228
The Hartford Introduces Data Privacy Coverage For Technology Companies
By: Business Wire Mar. 10, 2009 10:22 AM
... The Hartford’s Data Privacy Expense coverage pays for actual expenses incurred as a result of a policyholder’s negligent acts, errors or omissions that result in the improper dissemination of non-public personal information, or a breach or violation of data privacy laws. Specific components of the coverage may include:
1. Notification expenses incurred to comply with notification laws.
2. Crisis management expenses incurred for fees and costs associated with hiring a crisis management firm to perform services that minimize potential harm and maintain or restore confidence in the policyholder.
3. Data privacy regulatory and credit monitoring expenses incurred in connection with a statutory mandate requiring credit monitoring for third parties in compliance with data privacy laws, legal expenses in defense of a data privacy regulation proceeding, and certain fines or penalties, where insurable, in connection with a data privacy regulation proceeding.
4. Cyber investigation expenses incurred to have a third party investigate the policyholder’s computer system to determine the source of a data privacy breach.
This looks interesting, but I'll need to fiddle with it a bit more.
http://www.bespacific.com/mt/archives/020811.html
March 11, 2009
New Open Source Project Monitors Flows of Media
"Media Cloud is a system that lets you see the flow of the media. The Internet is fundamentally altering the way that news is produced and distributed, but there are few comprehensive approaches to understanding the nature of these changes. Media Cloud automatically builds an archive of news stories and blog posts from the web, applies language processing, and gives you ways to analyze and visualize the data. The system is still in early development, but we invite you to explore our current data and suggest research ideas. This is an open-source project, and we will be releasing all of the code soon. You can read more background on the project or just get started: Visualizations / What Are Your Research Ideas? / Keep Up-To-Date with Media Cloud."
Google is everywhere. Perhaps Google is Elvish for “Big Brother?”
http://news.cnet.com/8301-17939_109-10194446-2.html?part=rss&subj=news&tag=2547-1_3-0-5
Google Voice: A push to rewire your phone service
by Stephen Shankland March 11, 2009 9:00 PM PDT
SAN FRANCISCO--Google plans to unveil a service called Google Voice on Thursday that indicates Google wants to do with your telephone communications what companies such as Yahoo have done with e-mail.
Google Voice, the new version of the GrandCentral technology Google acquired in July 2007, has the potential to make the search giant a middleman in an important part of people's lives, telephone communications. With the service, people can pick a new phone number from Google Voice; when others call it, Google can ring all the actual phones a person uses and handle voice mail.
The old version could let people centralize telephone services, screen their calls, and listen to voice mail over the Web. But the new version offers several significant new features, though. Google now uses its speech-to-text technology to transcribe voice mail, making it possible to search for particular words. Gmail's contacts now is used to instruct Google Voice how to treat various callers. And Google Voice now can send and receive SMS text messages and set up conference calls.
For those Visual Communications students with more artistig ability than me (i.e. All of them)
http://www.killerstartups.com/Search/vunkysearch-net-access-photoshop-gimp-tutorials
VunkySearch.net - Access Photoshop & Gimp Tutorials
There are a lot of sites where you can find Photoshop tutorials. In actuality, there are so many of these that choosing which one to head to can turn into a difficult decision. To further aggravate matters, not all of these are impeccable when it comes to the actual layout and the way the information is presented. It is not uncommon to visit one of these sites and end up reading something which had nothing to do with the topic you wanted to learn about because it was all thrown together.
This site intends to overcome these shortcomings. It does not contain any tutorial per se, but it links to tutorials on different websites, emphasizing accuracy and the relevancy of contents.
What’s more, the site has recently branched out and started including Gimp tutorials. These are accessible from a link provided on the opening screen, and you can also find them by setting your browser to gimp.vunkysearch.net. Any way or the other, those that have a soft spot for image processing will find something to keep them entertained on the site.
Another way to tap into twitter. Amazing how many more twits there are about“American Idol” than Privacy.
http://news.cnet.com/8301-17939_109-10194386-2.html?part=rss&subj=news&tag=2547-1_3-0-5
PR firm launches Twendz: A Twitter trend analyzer
by Josh Lowensohn March 11, 2009 5:42 PM PDT
Normally, PR firms are pitching us start-ups, not creating them. That's not the case with Twendz, a new Twitter tool from the folks at Waggener Edstrom. It pulls in the latest tweets on any given topic, and shows you what the overall user sentiment is, be it positive or negative.
A simpler business model might work...
http://tech.blorge.com/Structure:%20/2009/03/10/why-your-online-passwords-can-outlive-you/
Why your online passwords can outlive you
By John Lister March 10, 2009 |
Why your online passwords can outlive youA new company is offering a service to pass on your internet passwords to next of kin after your death. It’s a creative solution to a genuine problem, but the pricing makes it extremely unlikely to succeed.
… Legacy Locker aims to solve the problem of people dying and their loved ones being unable to access their online accounts and services without having their passwords. In some cases this can be awkward: what happens to your Facebook account after you die?
In other cases, there may be a legal need to access an account, for example to get to e-mails which aren’t stored on a computer such as those in a Gmail or Hotmail account. And there are also cases where somebody dies leaving a tidy wedge of cash in a PayPal account which the next of kin might need in a hurry.
No comments:
Post a Comment