http://www.databreaches.net/?p=6976
Vendor data on encrypted tapes falls off truck
August 30, 2009 by admin Filed under Breach Incidents, Government Sector, Lost or Missing, Subcontractor, U.S.
A box with encrypted tapes containing personal data fell off a truck…
Cuyahoga County officials are searching for a box that fell off a truck and contained personal information for 300 people.
The box was being moved Monday to a storage facility and held information, including Social Security numbers, for private vendors who provide services to the county. It did not contain personal information about county employees, officials said.
A driver for Iron Mountain, a company that stores and shreds documents, picked up two containers Monday from the county’s Information Services Center at East 13th Street and Chester Avenue. The driver left one box on a rear rack, and it fell off when the trucker pulled away, according to a police report. [What kind of truck does this bring to mind? A pick-up with no rear gate? Sounds as fishy to me as it does to the commenters. Bob]
Read more from The Plain Dealer.
Someone to explain Privacy to those charged with protecting it? What a concept!
http://www.pogowasright.org/?p=3316
Bell Canada ordered to inform customers about data gathering
August 30, 2009 by Dissent Filed under Businesses, Featured Headlines, Govt, Non-U.S.
Peter Nowak of CBC News reports:
Canada’s privacy commissioner, fresh off forcing Facebook to change how it handles users’ data, is ordering Bell Canada to change how it informs internet customers of its network-management practices.
In a report dated Aug. 13 and made public on Friday, assistant privacy commissioner Elizabeth Denham told the company it must change its service agreements and the Frequently Asked Questions section of its website to notify customers that it collects and retains their personal information through use of its deep-packet inspection technology.
[...]
The report was in response to a complaint by the Canadian Internet Policy and Public Interest Clinic, based at the University of Ottawa. The privacy commissioner rejected CIPPIC’s two other complaints about Bell’s DPI, that the company was collecting personal information about customers without their consent and that it is gathering more information than needed to manage its network.
Denham said the service agreements customers sign constitute their consent. She also said she had not found any evidence that Bell was using DPI to look at users’ internet traffic for purposes such as advertising or boosting its own services.
“I am unconvinced that, at date of issue of this report, Bell is collecting or using any personal information of individuals other than the IP addresses and subscriber IDs of Sympatico customers when it uses its DPI technology for the purpose of network traffic management,” she wrote.
Read more on CBC.ca
I wonder if all American privacy bloggers like me have Privacy Commissioner Envy. Maybe it should be a new diagnosis: “A disorder characterized by intense and persisting desire for a privacy commissioner to protect the citizens’ privacy.”
Maybe it is Nigerians. Or maybe it is Republicans pretending to be Nigerians. Or it could be Democrats pretending to be Republicans pretending to be Nigerians. (Ain't paranoia wonderful...)
Spammers Use Holes In Democrats.org Security
Posted by Soulskill on Sunday August 30, @09:17AM from the hello-sir-madam dept.
Attila Dimedici writes
"According to Cloudmark, 419 spammers are using the democrats.org website to relay email and bypass spam filters. 'The abuse, which dates back at least to the beginning of this month, helps evade filters that internet service providers employ to block the messages. ... The messages were sent courtesy of this page, which allows anyone with an internet connection to send emails. The PHP script employs no CAPTCHA [It does now. Bob] or other measure to help ensure there is a real human being behind each email that gets funneled through the service. The service allows messages to be sent to 10 addresses at a time and even provides a way for people to import contacts they have stored in their address book.'"
“We told you the old system wasn't adequate. Now we have to have National ID Cards.” Papers, Comrade Citizen!
http://www.theregister.co.uk/2009/08/27/crb_id/
CRB looks to ID cards to solve accuracy woes
One day, their prints may come
By Chris Williams Posted in Government, 27th August 2009 12:58 GMT
Millions could be asked to provide ID card and fingerprint data to get a job under new systems being developed by the Home Office following a collapse in the accuracy of background checks.
… In the 12 months to the end of March 2009, identity errors at the CRB more than doubled compared to the previous year. More than half of the 1,570 mistakes were made in just one month.
The CRB declined to offer a specific reason for its disastrously inaccurate month, saying it was reliant on the quality of data provided to it by police and employers. It added that plans to use ID card and biometric data were part of its policy response, however.
Phil Booth, national coordinator of the campaign group NO2ID, said that he was "not surprised by this."
He added: "This is entirely consistent with the various forms of coercion strategy they've been working on to create artificial 'volunteers' for ID cards.
When the facts don't support your position, try propaganda. After all, why else would the industry that supposedly represents musicians not want to hear what they think?
Musician Lobby Terms Balanced Copyright "Disgusting"
Posted by Soulskill on Sunday August 30, @10:35AM from the less-than-impressed dept.
An anonymous reader writes
"While most of the attention at Thursday's Canadian copyright town hall was on the recording industry's strategy to pack the room and exclude alternate voices, the most controversial activity took place outside the hall. It has now been revealed that security guards threatened students and a Member of Parliament for distributing leaflets, and the American Federation of Musicians termed the MP's leaflet, which called for balanced copyright, 'disgusting' and demanded a retraction and apology. At this point, such an admission seems unlikely."
(Related) A day for IP articles...
http://yro.slashdot.org/story/09/08/30/1948206/Cato-Institute-Critique-of-Software-Patents?from=rss
Cato Institute Critique of Software Patents
Posted by timothy on Sunday August 30, @04:16PM from the oprah-favre dept.
binarybits writes
"I've written an article for the free-market Cato Institute about how patents impede innovation in the software industry. It points out that people tend not to realize how vast the software industry is. It's not just Google and Microsoft; virtually every organization has an IT department producing potentially-infringing software. Organizations as diverse as J. Crew and the Green Bay Packers have been sued for patent infringement. It's crazy to expect all these organizations to worry about potential patent infringement. Hopefully the Supreme Court's Bilski decision will lead to new limits on software patents."
For my Disaster/Recovery students
http://www.bespacific.com/mt/archives/022192.html
August 30, 2009
FEMA Searchable Disaster Photo Library
Disaster Photo Library - FEMA: "The FEMA on line Photo Library contains more than 16,500 disaster related photographs made since 1989. The collection is composed almost entirely of declared disasters and there are also photographs from FEMA public events which have occurred in Washington, DC. The photographs are of Hurricanes, Tornadoes, Floods, Typhoons, Fires, Avalanches, Ice Storms, Blizzards, World Trade Center and Pentagon Terrorist Attacks, Earthquakes, and the Columbia Space Shuttle Disaster."
Tools & Techniques 'cause you never know when you'll need to be anonymous
http://www.makeuseof.com/tag/4-sites-that-give-you-a-free-updated-proxy-list/
4 Sites That Give You A Free Updated Proxy List
Aug. 30th, 2009 By Guy McDowell
Or, you can do it yourself!
http://www.makeuseof.com/tag/how-to-set-up-a-secure-free-proxy-server/
How To Set Up A Secure & Free Proxy Server
Aug. 31st, 2009 By Sharninder
...and if you can't protect your anonymity, you should be practicing...
http://www.reloadbench.com/pdf.html
The Reload Bench
No comments:
Post a Comment