Any clarification is
welcome...
The
Southern District of Florida Weighs In On Data Breach Lawsuits
October 22, 2012 by admin
A few months ago, I noted
a lawsuit by a former Winn-Dixie employee against Purchasing
Power. The complaint
in Burrows v. Purchasing Power alleged that Winn-Dixie
shared employee data with Purchasing Power to administer its employee
benefits program, but also sent them data on employees not enrolled
in the program. The complaint also alleged that although Purchasing
Power became an insider breach in October 2011, Winn-Dixie employees
were not notified until January 27, 2012.
Today, Al Saikali writes:
Late last week,
another Federal District Court (the Southern District of Florida)
weighed in on the circumstances under which a plaintiff may sue a
breached entity civilly for damages when the plaintiff’s personally
identifiable information (PII) is inappropriately accessed or
acquired. The Court allowed the case to proceed with counts for
violation of Florida’s Unfair and Deceptive Trade Practices Act and
negligence (assuming Plaintiff can clarify the damages he is
seeking).
Read more on Data
Security Law Journal.
Build your own Drone! (Apparently,
they 'printed' an engine too)
In an effort that took four months and
$2000, instead of the quarter million dollars and two years they
estimate it would have using conventional design methods, a group of
University of Virginia engineering students has built
and flown an airplane of parts created on a 3-D printer. The
plane is 6.5 feet in wingspan, and cruises at 45 mph. I only wish
this had been sponsored by Estes or Makerbot rather than the MITRE
Corporation; it would be great for every high school or hobbyist
group that can scrape together the printing time to have one of these
on demand. (HT to Gaƫl
Duval.)
Yes, Microsoft could have an answer
here... (Also, it might be an interesting project for students of
Contract Law to try drafting “Model Contract Language”)
Outsourcing
Privacy in Higher Education
October 22, 2012 by Dissent
Steve Kolowich reports:
After several
years of negotiating, a dozen colleges have reached an agreement with
Microsoft that could inspire more institutions to outsource their
internal communications and data storage systems to the company and
its far-flung servers — even when those systems hold sensitive
student and research data.
Since 2010
Microsoft
had been in talks with a dozen universities about drawing up a
standard contract that would address colleges universities’
obligations to federal privacy laws such at the Family Education
Rights and Privacy Act (FERPA), and the Health Insurance Portability
and Accountability Act (HIPAA). The idea was to eliminate
the tedium and expense of negotiating around these compliance issues
with each and every university client.
Read more on Inside
Higher Ed.
If Microsoft really adheres to FERPA
and HIPAA requirements with the status of “school official,” and
agrees not to data mine or use the data for other purposes, what
risks, if any, do readers see in this arrangement? While the idea of
outsourcing might make people uncomfortable, this might actually
improve data security and protection of student records, as the firm
presumably invests much more in security than some institutions
might.
(Related) ...but I'd be very careful.
What they don't have is a great track record.
Thundering
silence when Microsoft changes services agreement – do the changes
affect privacy?
October 21, 2012 by Dissent
Edward Wyatt and Nick Wingfield report:
Microsoft
instituted a policy on Friday that gives the company broad leeway
over how it gathers and uses personal information from consumers of
its free, Web-based products like e-mail, search and instant
messaging.
Almost no one
noticed, however, even though Microsoft’s policy changes are much
the same as those that Google made to its privacy rules this year.
Read more on New
York Times. Does changing the Services Agreement significantly
change the Privacy Policy even if that policy is not changed on
paper? Microsoft does not see the changes as impact consumer
privacy, but it will be interesting to read analyses of the changes
by privacy advocates.
Did someone finally get it right?
October 21, 2012
IBM
- Smart policies for Smartphones: Acceptable Online Activities During
Work Hours
How
(and why) agencies should develop an explicit policy for employees'
online activities even on their own devices, by Gadi Ben-Yehuda.
- "IBM has published a social media policy that I think is exemplary for any organization that wants to pursue the dual goals of encouraging employees to engage in social media and protecting the organization's reputation."
Another good news/bad news
kind of thing. Might make for a more interesting debate that a
couple of presidential candidates...
October 21, 2012
Pew
- Social Media and Political Engagement
Social
Media and Political Engagement, by Lee Rainie, Aaron Smith, Kay
Lehman Schlozman, Henry Brady, Sidney Verba. Oct 19, 2012
- "The use of social media is becoming a feature of political and civic engagement for many Americans. Some 60% of American adults use either social networking sites like Facebook or Twitter, and a new survey by the Pew Research Center’s Internet & American Life Project finds that 66% of those social media users—or 39% of all American adults—have done at least one of eight civic or political activities with social media. 66% of social media users have employed the platforms to post their thoughts about civic and political issues, react to others’ postings, press friends to act on issues and vote, follow candidates, ‘like’ and link to others’ content, and belong to groups formed on social networking sites."
(Related) ...but it's for your own
good!
"Mother Jones reports on
Obama's
Digital Gurus, the top-secret team of analytics engineers and
scientists led by hipster CTO Harper Reed who work on text analytics,
social network/media analysis, web personalization, computational
advertising, and online experiments & testing from the campaign's
Chicago HQ and satellite offices. For OFA (Obama for America),
writes Tim Murphy, there is no
such thing as Too Much Information. 'In terms of just the sheer
amount of data that political candidates have on you,' says UNC Prof
Daniel Kreiss, 'I think everyone finds it creepy.' Still playing
catch-up to OFA in its data efforts is Team Romney, which reportedly
hired
former employees from places like Google Analytics, Apple, Ominture,
and Overstock.com in an attempt to reverse engineer the Obama
campaign's strategy."
It's probably not just for
lawyers... I probably won't get sued for reading these article...
October 21, 2012
New
on LLRX - Reference apps for the mobile lawyer
Via LLRX.com
- Reference
apps for the mobile lawyer - For mobile lawyers, tech savvy
attorney Nicole Black
recommends a range of topical, go-to reference apps that will save
you time and effort while providing reliable, high quality
information. Most of the apps are free or very low cost, and include
Wolfram Alpha Lawyer’s Professional Assistant, iThesaurus, Recalls
app, and the Wikipanion app.
(Related) Tip #1: Make
sure your links work...
October 21, 2012
New
on LLRX - Internet research tips and tricks for lawyers
Via LLRX.com
- Internet
research tips and tricks for lawyers - This is attorney Nicole
Black's review of The Cybersleuth’s Guide to the Internet,
12th edition, a book that helps lawyers learn how to use the Internet
to conduct effective and free investigative and legal research.
[The
correct link:
http://www.llrx.com/features/researchtipsforlawyers.htm
Seems line a day for
lawyer stuff...
October 21, 2012
JAG
- The Operational Law Handbook
"The
Operational Law Handbook is a “how to” guide for Judge
Advocates practicing operational law. It provides references and
describes tactics and techniques for the practice of operational law.
The Operational Law Handbook is not a substitute for official
references. Like operational law itself, the Handbook is a focused
collection of diverse legal and practical information. The handbook
is not intended to provide “the school solution” to a particular
problem, but to help Judge Advocates recognize, analyze, and resolve
problems they will encounter in the operational context. Similarly,
the Handbook is not intended to represent official U.S. policy
regarding the binding application of varied sources of law, though it
may reference source documents which themselves do so. The Handbook
was designed and written for Judge Advocates practicing operational
law. The size and contents of the Handbook are controlled by this
focus. Frequently, the authors were forced to strike a balance
between the temptation to include more information and the need to
retain the Handbook in its current size and configuration. Simply
put, the Handbook is made for the Soldiers, Marines, Sailors, Airmen,
and Coast Guardsmen of the military Judge Advocate General’s Corps,
who serve alongside their clients in the operational context.
Accordingly, the Operational Law Handbook is compatible with current
joint and combined doctrine."
In addition to encryption, this would
allow you to “randomly” switch frequencies to avoid interception,
increasing security of communications even more. Besides, thinkof
the applications for my Ethical Hackers!
"Over the weekend at the
ToorCon hacker conference in San Diego, Michael Ossmann of Great
Scott Gadgets revealed
a beta version of the HackRF Jawbreaker, the latest model of the
wireless Swiss-army knife tools known as 'software-defined radios.'
Like any software-defined radio, the HackRF can shift between
different frequencies as easily as a computer switches between
applications–It can both read and transmit signals from 100
megahertz to 6 gigahertz, intercepting or reproducing frequencies
used by everything from FM radios to police communications to garage
door openers to WiFi and GSM to next-generation
air traffic control system messages. At Ossmann's
target price of $300, the versatile, open-source devices would cost
less than half as much as currently existing software-defined radios
with the same capabilities. And to fund the beta testing phase of
HackRF, the Department of Defense research arm known as the Defense
Advanced Research Projects Agency (DARPA) pitched in $200,000 last
February as part of its Cyber Fast Track program."
Worth looking at...
Below are the notes from my workshop at
this weekend's THATCamp
Hybrid Pedagogy, along with a Storify of notes and tweets from
the entire unconference.
Workshop Description:
Although many traditional academic presses are struggling to stay
afloat, it’s actually easier than ever for academics themselves to
publish their work — outside the academy, that is. This
workshop will address how and why scholars should write for
publications outside “traditional” academic ones. This
can include both writing about one’s scholarly research as well as
writing about the academy itself. We’ll discuss some of the
practicalities of doing so — blogging versus freelancing versus
self-publishing, for example — and the technical, financial,
rhetorical, political and licensing questions these raise. The
workshop will also talk about promoting your work through various
social networks (again, academic and otherwise).
No comments:
Post a Comment