Is this why some breach victims keep
silent?
If
There is Credit Card Fraud, There Must Have Been a Breach
May 31, 2012 by admin
Craig Hoffman writes:
As we reported
in December 2010, after an online merchant suffered chargeback losses
of almost $12,000 on nine fraudulent orders, it sued the bank that
issued the nine cards that were fraudulently used alleging that the
most likely cause of the fraud was a data security breach at the bank
that the bank ignored.
E-Shops Corp. v. U.S. Bank National
Association worked its way through the courts, but the merchant
found no joy. Read Hoffman’s discussion of the case and ruling on
Data
Privacy Monitor.
[From the article:
Rather, the court stated that the
merchant was required to describe the circumstances surrounding the
breach—“the who, what, when, where and how U.S. Bank’s conduct
amounted to false, deceptive, or misleading conduct.”
An exploration of the failure of
Universities to practice what they teach. Points to a few million
student victims to make the point...
New
Math, data breaches version
Wait till he finds out they can carry
weapons! (Is there such a thing as “manned drones?”
"During a radio interview,
Virginia governor Bob McDonnell suggested that using
unmanned
drones to assist police would be 'great' and 'the
right thing to do.' 'Increased safety and reduced
manpower are among the reasons the U.S. military and intelligence
community use drones on the battlefield, which is why it should be
considered in Virginia, he says. ... McDonnell added Tuesday it will
prove important to ensure the state maintains Americans' civil
liberties, such as privacy, if it adds drones to its law enforcement
arsenal.' Is this the next step toward militarizing our law
enforcement agencies? How exactly can they ensure our privacy, when
even
the Air Force can't?"
Amazing what the founding fathers
foretold...
Sex
offenders battle state courts for Facebook accounts
Tens of thousands of registered sex
offenders have been purged
from social networks like Facebook and MySpace over the past
several years -- banned by state laws prohibiting them from using
chat rooms, social networks, or instant messaging.
However, some of these registered sex
offenders are now trying to turn the tables in state courts. Legal
battles over the right to use social networks have ensued across the
U.S., from Indiana to Nebraska to Louisiana, according
to the Associated Press.
The position of the registered sex
offenders and civil liberties groups is that the state bans violate
free speech and the individual right to join in online discussions,
according to the Associated Press. Civil liberties advocates argue
that the Internet and social networking is now so widespread that
using it has become necessary for free speech.
[Blogs ain't speech? Bob]
Rather than assume I want no data
collection, how about letting me decide how much to collect, how long
to keep it, and where I want it stored?
Consumer
group says self-driving cars pose privacy risk
May 30, 2012 by Dissent
Jerry Hirsch reports:
A consumer group
says a bill that would allow self-driving cars on California’s
roads does not do enough to protect privacy.
The bill, SB 1298,
sponsored by Sen. Alex Padilla (D-Pacoima), has passed the California
Senate and is awaiting Assembly consideration in June. It
establishes guidelines for “autonomous vehicles” to be tested and
operated in California.
It has flown
through the Legislature, passing the Senate unanimously.
Read more on The
Los Angeles Times.
[From the article:
“Without appropriate regulations,
Google’s vehicles will be able to gather unprecedented amounts of
information about the use of those vehicles. How will it be used?
Just as Google tracks us around the Information Superhighway, it will
now be looking over our shoulders on every highway and byway,”
Court said in a letter to Assembly Speaker John A. Perez (D-Los
Angeles).
“Clearly laws don't work. Let's pass
another law.” What's wrong with this logic?
By Dissent,
May 30, 2012
Associated Press reports:
U.S. Sen. Al
Franken said Wednesday he plans to pursue legislation or federal
regulations requiring encryption of all laptops containing private
medical information, after presiding over a hearing on aggressive
debt collection practices in several Minnesota hospitals.
Read more on Washington
Examiner.
Why stop at laptops? What about other
mobile devices? Security should be based on the type
and sensitivity of the data, not the type of mobile device.
If everyone agrees this is a problem,
why don't we have a national law?
Bill
banning warrantless cellphone tracking clears California Senate
May 30, 2012 by Dissent
Michelle Maltais reports:
California is one
step closer to banning law enforcement from tapping the data from the
tracking device in your palm, pocket or purse without a warrant.
The state Senate
passed a bill Wednesday that requires a warrant to seek access from
wireless carriers to the near-constant data stream coming from our
cellphones.
Read more on The
Los Angeles Times.
Bringing IP law into the 3D world...
Clive Thompson on 3-D
Printing’s Legal Morass
Last winter, Thomas Valenty bought a
MakerBot — an inexpensive 3-D printer that lets you quickly create
plastic objects. His brother had some Imperial Guards from the
tabletop game Warhammer, so Valenty decided to design a couple of his
own Warhammer-style figurines: a two-legged war mecha and a tank.
He tweaked the designs for a week until
he was happy. “I put a lot of work into them,” he says. Then he
posted the files for free downloading on Thingiverse, a site that
lets you share instructions for printing 3-D objects. Soon other
fans were outputting their own copies.
Until the lawyers showed up.
(Related) Extending IP law into the
Outer Limits
"Simply giving
your mother an e-book for her birthday could constitute patent
infringement now that the USPTO's gone and awarded
Amazon.com a patent on the 'Electronic Gifting' of items such as
music, movies, television programs, games, or books. BusinessInsider
speculates that the patent may
be of concern to Facebook, which just dropped a reported $80
million on social gift-giving app maker Karma Science."
For my overwhelmed students. (Worth
reading just for the quotable numbers.)
Information
Overload Is Not a New Problem
There is a wonderful essay
in The
Hedgehog Review about the promise and perils of information
overload. Titled Why
Google Isn’t Making Us Stupid…or Smart, this essay written by
Chad Ellmon
explores the history of information overload and explores its
implications. But Ellmon also spends some time demonstrating that
information overload is far from a new problem:
These complaints
have their biblical antecedents: Ecclesiastes 12:12, “Of making
books there is no end”; their classical ones: Seneca, “the
abundance of books is a distraction”; and their early modern ones:
Leibniz, the “horrible mass of books keeps growing.”
Why students should bathe...
Indication of a new tool for biometrics?
Age
can be detected by smell, study finds
Catching a whiff of someone's body
odour is enough to tell you whether they are young, middle aged or
elderly without having seen them, researchers found.
Elderly people's smell was the most
distinctive but contrary but was also judged by volunteers to be less
intense and unpleasant than that of younger people.
What to do if your thumbs are in a
cast?
Twitter Voice is a handy Android
application for Twitter users who want to tweet quickly without
having to type anything. A great application for people on the move,
for example, people who want to tweet as they drive
the car. [“I'm driving” “I'm turning right” “I'm Okay,
but the other guy may need an ambulance” Bob]
I wonder what the equivalent was in my
day...
… For those of you who don’t know
what this is (but it’s pretty obvious from the word itself), it’s
when you send a text message to someone with either sexually explicit
text, a sexually explicit picture, or both.
… According to today’s
infographic, two-thirds of US students have sent
sexually suggestive messages via their mobile phone.
Might make an interesting project for
my Intro to Computing class...
Windows PCs are notoriously junk-filled
out-of-the-box. Buy a Microsoft Signature PC from a Microsoft Store
(yes, Microsoft has a handful of stores across the US) and you’ll
find it free of the usual junk. Soon, Microsoft will offer to turn
any PC into a Microsoft Signature PC with its “Signature Upgrade”
service – as long as you pay $99.
A typical PC might come with a pile of
additional desktop shortcuts, system tray applications, and other
bloatware. Software developers pay computer manufacturers to preload
their software, reducing the price of the computer by a few dollars.
Microsoft realizes that this makes Windows look bad and their
response is Microsoft
Signature, a fancy name for PCs without the junk. But there are
steps you can take yourself that will save you from paying that $99.
Free is good. Granted the target
audience is K-12 students, but there are many useful thingies here.
Blank Music sheets, Free e-Books, create your own comics (useful for
presentations to the CEO), etc.
One of the common obstacles to using
many Web 2.0 tools in elementary school and middle school classrooms
is the registration requirement that those tools have. Fortunately,
there are many good Web 2.0 tools that do not require registration.
Nathan
Hall has started to put together a Diigo
list of Web 2.0 tools that do not require registration. When I
saw the list yesterday it had 60 items. When I looked at the list
this morning there were 101 items on the list. Take a look at
Nathan's list and I think you'll find some new-to-you tools, I did.
No comments:
Post a Comment