Tuesday, October 12, 2010

Cases on Internet privacy.

Bipolar disorder no excuse for email hacker 

 Leor Exploration v. Aguiar, 2010 WL 3782195 (S.D. Fla. September 28, 2010)

Plaintiffs claimed that defendant hacked into one of the plaintiffs’ email accounts during the litigation to get an advantage in the case. The court entered severe sanctions against defendant for doing this — it struck his answer. In litigation, that is like declaring plaintiffs the winners. 

Defendant had argued to the magistrate judge that his mental illness (bipolar disorder) caused him to hack plaintiff’s email account out of fear for his security. Defendant even presented expert testimony from a psychiatrist to support the claim that he lacked the mental state to act in bad faith.
In adopting the magistrate’s findings, the district judge found defendant’s psychiatric expert’s testimony unmoving. (Mainly because defendant’s lawyers limited what the expert could say.) So the court relied on other evidence that showed defendant’s bad faith intent in accessing the email. The novel theory of “not guilty of email hacking by reason of insanity” failed in this case. 

Thompson v. Ross, 2010 WL 3896533 (W.D. Pa. September 30, 2010)

Messages from Yahoo and AOL email accounts saved on laptop computer were not in “electronic storage” as defined by Stored Communications Act.

Plaintiff’s ex-girlfriend kept his laptop computer after the two of them broke up. The ex-girlfriend let two of her co-workers access some email messages stored on the computer. Plaintiff filed suit under the Stored Communications Act. Defendants moved to dismiss. The court granted the motion.
Under the Stored Communications Act (at 18 U.S.C. 2701), one is liable if he or she accesses without authorization a facility through which an electronic communication service is provided and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system.
The court held that the Stored Communications Act did not cover the email messages because they were not in “electronic storage” as defined at 18 U.S.C. 2510(17)(B). In relevant part, that section defines “electronic storage” as “any storage of such communication by an electronic communication service for purposes of backup protection of such communication.”
The court looked to the plain language of the statute, finding that the definition was not met because the messages were not stored by an electronic communication service. It rejected plaintiff’s arguments that the fact the messages were in “backup storage” extended the scope of the definition.


Workplace email policy destroyed attorney-client privilege

Scott v. Beth Israel Medical Center, — N.Y.S.2d —-, 2007 WL 3053351 (N.Y. Sup. October 17, 2007).

Dr. Scott, who used to work for Beth Israel Medical Center in New York, sued his former employer for breach of contract and a number of other different things. Before he was terminated, however, he had used his work email account to send messages to his attorneys, discussing potential litigation against Beth Israel.
When Dr. Scott found out that Beth Israel was in possession of these email messages, he asked the court to order that those messages be returned to him. He argued that they were protected from disclosure to Beth Israel under the attorney client privilege.
Beth Israel argued that they were not subject to the privilege because they were not made “in confidence.” There was an email policy in place that provided, among other things, that the computers were to be used for business purposes only, that employees had no personal right of privacy in the material they create or receive through Beth Israel’s computer systems, and that Beth Israel had the right to access and disclose material on its system.
Dr. Scott argued that New York law [CPLR 4548] protected the confidentiality. Simply stated, CPLR 4548 provides that a communication shouldn’t lose its privileged character just because it’s transmitted electronically.
The court denied Dr. Scott’s motion for a protective order, finding that the messages were not protected by the attorney client privilege.
It looked to the case of In re Asia Global Crossing, 322 B.R. 247 (S.D.N.Y. 2005) to conclude that the presence of the email policy destroyed the confidential nature of the communications. The policy banned personal use, the hospital had the right to review the email messages (despite Scott’s unsuccessful HIPAA argument), and Dr. Scott had notice of the policy.
 
The decision has implications for both individuals and the attorneys who represent them. Employees should be aware that when they are sending messages through their employer’s system, they may not be communicating in confidence. And attorneys sending email messages to their clients’ work email accounts, on matters not relating to the representation of the employer, must be careful not to unwittingly violate the attorney client privilege.
What’s more, although the decision is based on email communications, it could affect the results of any case involving instant messaging or text messaging through the company’s server.

Privacy Today : A Review of Current Issues

  1. Biometrics Technologies
    1. Biometric Encryption
  2. Video Surveillance
  3. Online Privacy and E-commerce
  4. Workplace Monitoring
  5. Wireless Communications and Location Tracking
  6. Data Profiling
  7. Criminal Identity Theft
  8. Background Checks
  9. Information Broker Industry
  10. Public Records on the Internet
  11. Financial Privacy
  12. Medical Records Confidentiality
    1. Genetic Privacy
    2. Direct to Consumer (DTC) Genetic Testing
  13. Wiretapping and Electronic Communications
  14. Youth Privacy Issues
  15. Digital Rights Management
  16. Digital Television and Broadband Cable TV
  17. Radio Frequency Identification (RFID)
  18. Real ID
  19. Absence of Federal-Level Privacy Protection Law
  20. Behavioral Targeting
  21. Cloud Computing
  22. Intelligent Billboards
  23. Smart Grid
  24. Data Anonymization
    Appendix: Nonprofit public interest groups working on these issues

Online privacy: You need to work harder for that!





The cries for the right to privacy online grow louder each day, as do the harrowing tales regarding our loose grip on our ability to own our own data. But if a recent poll on Internet Evolution is any indication, we're not working all that hard to defend ourselves.
Responding to the question, "Do you think you do enough to protect your privacy online (e.g., disabling cookies, private browsing, etc.)?" here's how more than 150 Internet Evolutionaries responded:
While there were a fair amount of confident "Yesses" among the crowd (39 percent), the more-confident "No" crowd still took the plurality with 46 percent. Falling behind were those who aren't sure (12 percent), as well as those who don't seem to believe there's such a thing as online privacy (3 percent).
Last I checked, this privacy stuff was a big deal. Consumer groups are rushing to stand up for Web users; attorneys general are falling all over themselves to make sure we're protected; The Wall Street Journal recently published a worrying series about how much we're really giving away here; and even our own Steve Saunders tried to scare everyone with his report, Superhighway to Hell, about the rise of an identity-driven Web based on your data.

So why aren't we doing all we can to make sure we're protected? Is it laziness? A lack of knowledge as to how to protect our privacy, perhaps?

Or maybe the real problem is that there's no real adequate way to do "enough."
At least one reader, nathanwosnack, offered that up as a suggestion in a message board post: "Privacy is about managing the risks the best you can. Realizing you will never fully have it."

A Case in Malaysia :Breach of Personal Data — Telco was Sued for Leak of Communications Data

i know that this has nothing to do with internet privacy, but it reflects generally on how the Personal Data Protection Act 2010 was made.




What would you do when you realised an unknown has in his/her possession records of your SMS exchanges and a the actual recordings of your telephone conversations and sent them to your own desktop? Shocked, fear, terrorised, humiliated (somehow), and so on, you name it. But yes, it’s a nightmare! A lady who experienced this had brought a lawsuit against her telecommunication provider for allegedly revealing the content of her private communication to a third party.


the news,u can read http://thestar.com.my/news/story.asp?file=/2010/8/29/nation/20100829195911&sec=nation


This particular lawsuit is the first that could trigger the provisions of Personal Data Protection Act 2010. Since the case proceeding has not started yet, nothing much can be heard from the case. Hopefully we can hear more updates in near future.


Meanwhile, the telecommunications company involved had issued a statement that they would carry out an investigation relating to the said allegation.
read, http://thestar.com.my/news/story.asp?file=/2010/8/31/nation/6950456&sec=nation

Everyone Knows Your Name - Online Safety Commercial

Play safe on the internet. "Wrap yourself"!

30 Ways to Stay Safe on the Internet




  1. Establish guidelines for Internet use with your parents or another adult. Before you go online, decide how much time is okay for you to spend on the Internet each day and figure out what you can and cannot do. After you get more familiar with the Internet, you and your parents can talk again and change the guidelines. Post them next to the computer for easy reference.
  2. Don't share your password with anyone else.
  3. Before you share any information about yourself on the Internet, get your parents' permission.
  4. Double-check the URL (the address of the Web site) before hitting the Enter key. Make sure the spelling is right. This will help ensure you go to the site you want, and not some other place.
  5. Check with your parents or another adult you trust before going into a chat room. Different chat rooms have different rules and different types of people going to them. You and your parents want to make sure it is an appropriate place for you before you enter.
  6. If something you see or read online makes you uncomfortable, leave the site. Tell a parent or a teacher right away.
  7. Never send a picture of yourself (or anything else) to someone in e-mail unless your parents say it is okay.
  8. If you receive unwanted, offensive, mean, threatening, or harassing e-mail, do not respond to it. Tell your parents or another adult right away.
  9. Remember: not everything you read on the Internet is true.
  10. Don't give out your age without checking with your parents first.
  11. Never give out your full name (first and last). Don't give out your first name without checking with your parents or another adult first.
  12. Never give out your home address over the Internet.
  13. Ask your parents or an adult before signing up for anything online.
  14. Don't give out your credit card number (or anyone else's) without permission from a parent.
  15. Remember, when you are online, what you do is up to you. Don't do anything you don't want to do.
  16. Don't open files or e-mail from someone you don't know. You don't know what might be inside—the files could contain a computer virus or offensive material.
  17. Keep the computer in a common space, like the family room, den, or living room.
  18. Never agree to meet someone you met on the Internet in person without your parents' permission. You should never meet someone you met online alone. If you do set up a meeting with an online friend, meet in a public place and go with your parent or guardian.
  19. Remember that any information you share about yourself can be seen by anyone who is online.
  20. Don't give out your phone number.
  21. Talk to your parents (or your teacher or another adult) about the kinds of places you go and things you do and see when you are online.
  22. Pick a name—different from your real name—to use online.
  23. Before you go into a public area, like a chat room or discussion forum, decide with your parents if it is okay to give out your e-mail address.
  24. If someone online asks you too many personal questions, be suspicious. Stop talking with them.
  25. Don't give out the name of your school.
  26. Always remember that people online may not be who they say they are. It is very easy for people to pretend to be someone they are not.
  27. Don't do things online that you wouldn't do in real life.
  28. Be careful when someone offers you something for free, like gifts or money. You don't know what their motives are. Decline the offer and tell your parents.
  29. Treat other people as you'd like to be treated. Never use bad language or send mean messages online.
  30. The "off" button is always there. Use it if you need to. You don't have to stay online if you don't want to.

Installing Firewalls, Antivirus Programmes, and Anti-malware Programmes can help securing internet privacy?

Keeping your computer secure is important in order for you to protect your privacy and to reduce the possibility of identity theft.  Unfortunately, maintaining the security of a computer can be a challenging task. 

How much of your daily life relies on computers?  How much of your personal information is stored either on your own computer or on someone else's system?
Computer security involves protecting that information by preventing, detecting, and responding to a wide variety of attacks.
Installing Firewalls, Anti-virus programs, and Anti-malware programs.
  • Firewalls, anti-virus programs, and anti-malware programs are important elements to protecting your information.  However, none of these are guaranteed to protect you from an attack. Combining these technologies with good security habits is the best way to reduce your risk.
  • According to Consumer Reports (June 2010 issue), free programs should adequately protect all but the most at-risk Internet users from malware—viruses, spyware, and other online threats.  Consider paying for software mostly for convenience and some extra features. 
Firewalls.  A firewall helps to prevent data from entering or leaving your computer without your permission.  A firewall helps make you invisible on the Internet and blocks communications from unauthorized sources. Some operating systems have built-in firewalls.
Every computer that is connected to the Internet should run a firewall at all times.  There are two types of firewalls—software and hardware.  You can run both simultaneously.  But never run two software firewalls simultaneously.  An example of a software firewall is the one built into most new Windows operating systems.  Other software firewalls are supplied by outside vendors, or may be part of a commercial security suite. A software firewall must be properly configured in order to be effective. 
A hardware firewall typically refers to a router having firewall features.  A router sits between your modem and your computer or your network.  It is hard to hack your computer or a network when it is hidden behind a hardware firewall box.  However, it is important to properly configure your router, particularly by changing the default password to one that is difficult to crack.
more information of firewalls, read http://www.us-cert.gov/cas/tips/ST04-004.html

Anti-virus programs.  Anti-virus software helps to protect your computer from viruses that can destroy your data, slow your computer's performance, or cause your computer to crash.  Anti-virus software scans your computer for patterns that may indicate an infection.  The patterns it looks for are based on the signatures, or definitions, of known viruses. Virus authors are continually releasing new and updated viruses, so it is important that you have the latest definitions installed on your computer. There are many companies that produce anti-virus software.  Your decision as to which program to use may be driven by user recommendations, features, or price (many programs are available at no cost).  In a June 2010 study by AV Comparatives, a non-profit independent testing organization, Microsoft Security Essentials (http://www.microsoft.com/security_essentials/) was ranked as the highest-rated free anti-virus product.  


You should not have two anti-virus programs actively running resident on your computer at the same time.  Be sure to fully disable or remove any anti-virus programs that yoare no longer using or which are not currently being updated with new definitions.  On the other hand, it is permissable to run a periodic scan with a second anti-virus program (such as an online virus scanner) as long as the program is not actively running resident on your computer.


Anti-malware (anti-spyware) programs.  Malware is a broad category of computer threats including spyware, adware, Trojan horses, and other unwanted programs that may be installed without your knowledge or consent. Spyware can secretly gather your information through your Internet connection without your knowledge.  Once spyware is installed. it may deploy numerous files onto your system. Some of these files are so well hidden that they are difficult to find and remove.
Spyware programs may be included with other software you want.  When you consent to download a program, such as a music sharing program, may also be consenting to download spyware.  You might not be aware that you agreed to the spyware installation because your consent is buried in an end-user-license agreement (EULA).
Be cautious about clicking on pop-up boxes. Spyware programs may create a pop-up box where you can click “yes” or “no” to a particular question.  If you click on either choice your browser may be tricked into thinking you initiated a download of spyware.
Anti-malware and anti-spyware programs can help to eliminate many of these threats. Security experts recommend that you use at least two, and preferably three anti-malware/anti-spyware programs on your computer, as no one program has been found to be fully effective at detecting and removing these threats.
read, http://www.us-cert.gov/cas/tips/ST04-016.html for further information regarding spyware and malware.

So i hope after reading this, we will be aware of the importance of protecting our computer in order to protect our internet privacy as well..sometimes we just ignore those little steps which eventually can lead to more serious problems..who says installing spyware, antivirus and firewall is necessary o protect our computers for viruses only? in fact, we can help protect our internet privacy from being hacked and all..