Just a couple observations: There is nothing in
metadata that flags a particular communication as attorney-client.
After all, if I call a lawyer that does not mean I've hired him. On
the other hand, it has been my experience that what one intelligence
agency does they all do. But that does not mean they share those
conversations with the local prosecutor.
The District Court of The Hague has ruled that surveillance of lawyers by intelligence agencies constitutes an infringement of fundamental rights and orders the State to stop all surveillance of lawyers’ communications.
The Court was questioned on the legality of eavesdropping on lawyers’ calls and communications by domestic intelligence agencies in a challenge brought against the Dutch State by the law firm Prakken d’Oliveira, the Dutch Association of Criminal Defence Lawyers (NVSA), and the Council of Bars and Law Societies of Europe (CCBE). In its verdict, the Court recognised that the ability to communicate confidentially with a lawyer is a fundamental right which is currently being breached by Dutch surveillance policy.
Read more on Global
Legal Post.
Is it a cultural
thing or a bureaucratic thing?
Yomiuri Shimbun reports:
An investigation into the recent unauthorized access of personal information from the Japan Pension Service found that 99 percent of the files accessed were not protected by passwords, sources said.
This contrasts with multiple reports issued since 2013 by all JPS offices nationwide claiming full compliance on password rules. If the files accessed were not protected by passwords, it would suggest that most of these reports were false.
Read more on The
Japan News.
“So, what did you learn in school today?”
Steven Ertelt and Rebecca Downs write:
Earlier this month, LifeNews.com reported on a high school in Seattle, Washington that is now implanting intrauterine devices (IUD), as well as other forms of birth control and doing so without parental knowledge or permission.
The high school, Chief Sealth International, a public school, began offering the devices in 2010, made possible by a Medicaid program known as Take Charge and a non-profit, Neighborcare. Students can receive the device or other method free of cost and without their parent’s insurance. And while it’s lauded that the contraception is confidential, how can it be beneficial for a parent-child relationship when the parents don’t even know the devices or medication their daughter is using?
Read more on LifeNews.
Confidential health care provided by schools has
always been a hot-button issue (this blogger happens to support it),
and it’s not surprising an anti-abortion site would try to call
attention to this issue, but it does provide food for thought for
parents.
An article for my IT Governance students. How
should IT learn about this law (before the security breach)?
Linn Freedman writes:
On June 26, 2015, Rhode Island Governor Gina Raimondo signed Senate Bill S0134, the Rhode Island Identity Theft Protection Act of 2015, which substantially revises the old law, including breach notification.
Specifically, the new law requires municipal agencies, state agencies and any “person” that “stores, collects, processes, maintains, acquires, uses, owns or licenses personal information about a Rhode Island resident” to implement “a risk-based information security program” which “contains reasonable security procedures and practices…in order to protect the personal information from unauthorized access, use, modification, destruction or disclosure…”
Read more on JDSupra.
Is this supposed to be one of those deep ethical
conundrums? Why would you recommend telling a searcher only what he
wants to hear?
Should
Google Always Tell the Truth?
What is Google’s responsibility to its
searchers? In a Thursday panel at the Aspen Ideas Festival, Ashkan
Soltani, the Federal Trade Commission’s chief technologist, offered
a hypothetical that captured why that question is so difficult to
answer.
Do they think this stuff up in a Finance class or
in a bar, you be the judge.
MasterCard
app plans to let you pay for things with a selfie
… The credit card company is experimenting
with a mobile app that uses facial recognition to verify your
identity. After downloading the app, you pay for things by simply
looking at your phone and blinking once. The blink prevents thieves
from showing the app a picture of your face in an attempt to fool it.
Alternatively, the app can read your fingerprint.
… The new biometric methods for verifying your
identity could replace passwords or PIN codes. MasterCard currently
asks for a password to verify purchases with its SecureCode system.
The company is also experimenting with voice
recognition and even a method of verifying your identity by reading
your heartbeat.
Boy, that Capitalism thing is sure confusing.
China
brokerages pledge to buy $19.3 billion in shares to steady plunging
market
China's top securities brokerages said on Saturday that they would
collectively buy at least 120 billion yuan
($19.3 billion of shares in a bid to stabilize the country's stock
markets after a slump of nearly 30 percent since mid-June.
The pledge follows
near-daily official policy moves over the past week, including an
interest rate cut and a relaxation of margin lending rules, that have
so far failed to arrest the sell-off, which some market watchers fear
could turn into a full-blown crash.
… China stocks had
more than doubled over the past year, fueled in large part by
investors using borrowed money to speculate on further gains.
… Just a few months
ago, state media had been exhorting the market's rise, saying China's
bull market had just begun and denying that it was in a bubble.
Investors big and small took that as a government signal to buy.
Now, Beijing is
struggling to find a policy formula to restore confidence in the
market before too much damage is done to the world's second-largest
economy.
I think this is a bit behind the times, but my
students might find some value here.
Digital
Tools to Make Your Next Meeting More Productive
Good to see the old Alma Mater isn't standing
still.
ICS-ISAC
Merges With Webster University
The
Industrial Control System Information Sharing and Analysis Center
(ICS-ISAC) announced this week that it would merge with Webster
University's Cyberspace
Research Institute (CRI).
The
non-profit ICS-ISAC is a knowledge sharing center established to help
facilities develop situational awareness in support of local,
national and international security.
The
ICS-ISAC
creates and maintains the Situational Awareness Reference
Architecture (SARA) to foster knowledge sharing capabilities. SARA
is a compilation of industry standards, technical practices and
processes designed to enable situational awareness both at industrial
facilities as well as across shared infrastructure.
Something for my students who want to be
considered “experts.”
5 Sites to
Easily Start Your Blog Using Evernote, Trello or WordPress
Something to start the new Quarter with.
Hack
Education Weekly News
… The University of Phoenix is making
massive layoffs and cutting degree programs. It let go 600
people on Monday, after revealing that it had already laid off 900
employees this year. MindWires
Consulting’s Phil Hill also observes that the university is
“Losing hundreds of millions of dollars on adaptive-learning LMS
bet.”