Tuesday, October 12, 2010

Cases on Internet privacy.

Bipolar disorder no excuse for email hacker 

 Leor Exploration v. Aguiar, 2010 WL 3782195 (S.D. Fla. September 28, 2010)

Plaintiffs claimed that defendant hacked into one of the plaintiffs’ email accounts during the litigation to get an advantage in the case. The court entered severe sanctions against defendant for doing this — it struck his answer. In litigation, that is like declaring plaintiffs the winners. 

Defendant had argued to the magistrate judge that his mental illness (bipolar disorder) caused him to hack plaintiff’s email account out of fear for his security. Defendant even presented expert testimony from a psychiatrist to support the claim that he lacked the mental state to act in bad faith.
In adopting the magistrate’s findings, the district judge found defendant’s psychiatric expert’s testimony unmoving. (Mainly because defendant’s lawyers limited what the expert could say.) So the court relied on other evidence that showed defendant’s bad faith intent in accessing the email. The novel theory of “not guilty of email hacking by reason of insanity” failed in this case. 

Thompson v. Ross, 2010 WL 3896533 (W.D. Pa. September 30, 2010)

Messages from Yahoo and AOL email accounts saved on laptop computer were not in “electronic storage” as defined by Stored Communications Act.

Plaintiff’s ex-girlfriend kept his laptop computer after the two of them broke up. The ex-girlfriend let two of her co-workers access some email messages stored on the computer. Plaintiff filed suit under the Stored Communications Act. Defendants moved to dismiss. The court granted the motion.
Under the Stored Communications Act (at 18 U.S.C. 2701), one is liable if he or she accesses without authorization a facility through which an electronic communication service is provided and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system.
The court held that the Stored Communications Act did not cover the email messages because they were not in “electronic storage” as defined at 18 U.S.C. 2510(17)(B). In relevant part, that section defines “electronic storage” as “any storage of such communication by an electronic communication service for purposes of backup protection of such communication.”
The court looked to the plain language of the statute, finding that the definition was not met because the messages were not stored by an electronic communication service. It rejected plaintiff’s arguments that the fact the messages were in “backup storage” extended the scope of the definition.


Workplace email policy destroyed attorney-client privilege

Scott v. Beth Israel Medical Center, — N.Y.S.2d —-, 2007 WL 3053351 (N.Y. Sup. October 17, 2007).

Dr. Scott, who used to work for Beth Israel Medical Center in New York, sued his former employer for breach of contract and a number of other different things. Before he was terminated, however, he had used his work email account to send messages to his attorneys, discussing potential litigation against Beth Israel.
When Dr. Scott found out that Beth Israel was in possession of these email messages, he asked the court to order that those messages be returned to him. He argued that they were protected from disclosure to Beth Israel under the attorney client privilege.
Beth Israel argued that they were not subject to the privilege because they were not made “in confidence.” There was an email policy in place that provided, among other things, that the computers were to be used for business purposes only, that employees had no personal right of privacy in the material they create or receive through Beth Israel’s computer systems, and that Beth Israel had the right to access and disclose material on its system.
Dr. Scott argued that New York law [CPLR 4548] protected the confidentiality. Simply stated, CPLR 4548 provides that a communication shouldn’t lose its privileged character just because it’s transmitted electronically.
The court denied Dr. Scott’s motion for a protective order, finding that the messages were not protected by the attorney client privilege.
It looked to the case of In re Asia Global Crossing, 322 B.R. 247 (S.D.N.Y. 2005) to conclude that the presence of the email policy destroyed the confidential nature of the communications. The policy banned personal use, the hospital had the right to review the email messages (despite Scott’s unsuccessful HIPAA argument), and Dr. Scott had notice of the policy.
 
The decision has implications for both individuals and the attorneys who represent them. Employees should be aware that when they are sending messages through their employer’s system, they may not be communicating in confidence. And attorneys sending email messages to their clients’ work email accounts, on matters not relating to the representation of the employer, must be careful not to unwittingly violate the attorney client privilege.
What’s more, although the decision is based on email communications, it could affect the results of any case involving instant messaging or text messaging through the company’s server.

Privacy Today : A Review of Current Issues

  1. Biometrics Technologies
    1. Biometric Encryption
  2. Video Surveillance
  3. Online Privacy and E-commerce
  4. Workplace Monitoring
  5. Wireless Communications and Location Tracking
  6. Data Profiling
  7. Criminal Identity Theft
  8. Background Checks
  9. Information Broker Industry
  10. Public Records on the Internet
  11. Financial Privacy
  12. Medical Records Confidentiality
    1. Genetic Privacy
    2. Direct to Consumer (DTC) Genetic Testing
  13. Wiretapping and Electronic Communications
  14. Youth Privacy Issues
  15. Digital Rights Management
  16. Digital Television and Broadband Cable TV
  17. Radio Frequency Identification (RFID)
  18. Real ID
  19. Absence of Federal-Level Privacy Protection Law
  20. Behavioral Targeting
  21. Cloud Computing
  22. Intelligent Billboards
  23. Smart Grid
  24. Data Anonymization
    Appendix: Nonprofit public interest groups working on these issues

Online privacy: You need to work harder for that!





The cries for the right to privacy online grow louder each day, as do the harrowing tales regarding our loose grip on our ability to own our own data. But if a recent poll on Internet Evolution is any indication, we're not working all that hard to defend ourselves.
Responding to the question, "Do you think you do enough to protect your privacy online (e.g., disabling cookies, private browsing, etc.)?" here's how more than 150 Internet Evolutionaries responded:
While there were a fair amount of confident "Yesses" among the crowd (39 percent), the more-confident "No" crowd still took the plurality with 46 percent. Falling behind were those who aren't sure (12 percent), as well as those who don't seem to believe there's such a thing as online privacy (3 percent).
Last I checked, this privacy stuff was a big deal. Consumer groups are rushing to stand up for Web users; attorneys general are falling all over themselves to make sure we're protected; The Wall Street Journal recently published a worrying series about how much we're really giving away here; and even our own Steve Saunders tried to scare everyone with his report, Superhighway to Hell, about the rise of an identity-driven Web based on your data.

So why aren't we doing all we can to make sure we're protected? Is it laziness? A lack of knowledge as to how to protect our privacy, perhaps?

Or maybe the real problem is that there's no real adequate way to do "enough."
At least one reader, nathanwosnack, offered that up as a suggestion in a message board post: "Privacy is about managing the risks the best you can. Realizing you will never fully have it."

A Case in Malaysia :Breach of Personal Data — Telco was Sued for Leak of Communications Data

i know that this has nothing to do with internet privacy, but it reflects generally on how the Personal Data Protection Act 2010 was made.




What would you do when you realised an unknown has in his/her possession records of your SMS exchanges and a the actual recordings of your telephone conversations and sent them to your own desktop? Shocked, fear, terrorised, humiliated (somehow), and so on, you name it. But yes, it’s a nightmare! A lady who experienced this had brought a lawsuit against her telecommunication provider for allegedly revealing the content of her private communication to a third party.


the news,u can read http://thestar.com.my/news/story.asp?file=/2010/8/29/nation/20100829195911&sec=nation


This particular lawsuit is the first that could trigger the provisions of Personal Data Protection Act 2010. Since the case proceeding has not started yet, nothing much can be heard from the case. Hopefully we can hear more updates in near future.


Meanwhile, the telecommunications company involved had issued a statement that they would carry out an investigation relating to the said allegation.
read, http://thestar.com.my/news/story.asp?file=/2010/8/31/nation/6950456&sec=nation

Everyone Knows Your Name - Online Safety Commercial

Play safe on the internet. "Wrap yourself"!

30 Ways to Stay Safe on the Internet




  1. Establish guidelines for Internet use with your parents or another adult. Before you go online, decide how much time is okay for you to spend on the Internet each day and figure out what you can and cannot do. After you get more familiar with the Internet, you and your parents can talk again and change the guidelines. Post them next to the computer for easy reference.
  2. Don't share your password with anyone else.
  3. Before you share any information about yourself on the Internet, get your parents' permission.
  4. Double-check the URL (the address of the Web site) before hitting the Enter key. Make sure the spelling is right. This will help ensure you go to the site you want, and not some other place.
  5. Check with your parents or another adult you trust before going into a chat room. Different chat rooms have different rules and different types of people going to them. You and your parents want to make sure it is an appropriate place for you before you enter.
  6. If something you see or read online makes you uncomfortable, leave the site. Tell a parent or a teacher right away.
  7. Never send a picture of yourself (or anything else) to someone in e-mail unless your parents say it is okay.
  8. If you receive unwanted, offensive, mean, threatening, or harassing e-mail, do not respond to it. Tell your parents or another adult right away.
  9. Remember: not everything you read on the Internet is true.
  10. Don't give out your age without checking with your parents first.
  11. Never give out your full name (first and last). Don't give out your first name without checking with your parents or another adult first.
  12. Never give out your home address over the Internet.
  13. Ask your parents or an adult before signing up for anything online.
  14. Don't give out your credit card number (or anyone else's) without permission from a parent.
  15. Remember, when you are online, what you do is up to you. Don't do anything you don't want to do.
  16. Don't open files or e-mail from someone you don't know. You don't know what might be inside—the files could contain a computer virus or offensive material.
  17. Keep the computer in a common space, like the family room, den, or living room.
  18. Never agree to meet someone you met on the Internet in person without your parents' permission. You should never meet someone you met online alone. If you do set up a meeting with an online friend, meet in a public place and go with your parent or guardian.
  19. Remember that any information you share about yourself can be seen by anyone who is online.
  20. Don't give out your phone number.
  21. Talk to your parents (or your teacher or another adult) about the kinds of places you go and things you do and see when you are online.
  22. Pick a name—different from your real name—to use online.
  23. Before you go into a public area, like a chat room or discussion forum, decide with your parents if it is okay to give out your e-mail address.
  24. If someone online asks you too many personal questions, be suspicious. Stop talking with them.
  25. Don't give out the name of your school.
  26. Always remember that people online may not be who they say they are. It is very easy for people to pretend to be someone they are not.
  27. Don't do things online that you wouldn't do in real life.
  28. Be careful when someone offers you something for free, like gifts or money. You don't know what their motives are. Decline the offer and tell your parents.
  29. Treat other people as you'd like to be treated. Never use bad language or send mean messages online.
  30. The "off" button is always there. Use it if you need to. You don't have to stay online if you don't want to.

Installing Firewalls, Antivirus Programmes, and Anti-malware Programmes can help securing internet privacy?

Keeping your computer secure is important in order for you to protect your privacy and to reduce the possibility of identity theft.  Unfortunately, maintaining the security of a computer can be a challenging task. 

How much of your daily life relies on computers?  How much of your personal information is stored either on your own computer or on someone else's system?
Computer security involves protecting that information by preventing, detecting, and responding to a wide variety of attacks.
Installing Firewalls, Anti-virus programs, and Anti-malware programs.
  • Firewalls, anti-virus programs, and anti-malware programs are important elements to protecting your information.  However, none of these are guaranteed to protect you from an attack. Combining these technologies with good security habits is the best way to reduce your risk.
  • According to Consumer Reports (June 2010 issue), free programs should adequately protect all but the most at-risk Internet users from malware—viruses, spyware, and other online threats.  Consider paying for software mostly for convenience and some extra features. 
Firewalls.  A firewall helps to prevent data from entering or leaving your computer without your permission.  A firewall helps make you invisible on the Internet and blocks communications from unauthorized sources. Some operating systems have built-in firewalls.
Every computer that is connected to the Internet should run a firewall at all times.  There are two types of firewalls—software and hardware.  You can run both simultaneously.  But never run two software firewalls simultaneously.  An example of a software firewall is the one built into most new Windows operating systems.  Other software firewalls are supplied by outside vendors, or may be part of a commercial security suite. A software firewall must be properly configured in order to be effective. 
A hardware firewall typically refers to a router having firewall features.  A router sits between your modem and your computer or your network.  It is hard to hack your computer or a network when it is hidden behind a hardware firewall box.  However, it is important to properly configure your router, particularly by changing the default password to one that is difficult to crack.
more information of firewalls, read http://www.us-cert.gov/cas/tips/ST04-004.html

Anti-virus programs.  Anti-virus software helps to protect your computer from viruses that can destroy your data, slow your computer's performance, or cause your computer to crash.  Anti-virus software scans your computer for patterns that may indicate an infection.  The patterns it looks for are based on the signatures, or definitions, of known viruses. Virus authors are continually releasing new and updated viruses, so it is important that you have the latest definitions installed on your computer. There are many companies that produce anti-virus software.  Your decision as to which program to use may be driven by user recommendations, features, or price (many programs are available at no cost).  In a June 2010 study by AV Comparatives, a non-profit independent testing organization, Microsoft Security Essentials (http://www.microsoft.com/security_essentials/) was ranked as the highest-rated free anti-virus product.  


You should not have two anti-virus programs actively running resident on your computer at the same time.  Be sure to fully disable or remove any anti-virus programs that yoare no longer using or which are not currently being updated with new definitions.  On the other hand, it is permissable to run a periodic scan with a second anti-virus program (such as an online virus scanner) as long as the program is not actively running resident on your computer.


Anti-malware (anti-spyware) programs.  Malware is a broad category of computer threats including spyware, adware, Trojan horses, and other unwanted programs that may be installed without your knowledge or consent. Spyware can secretly gather your information through your Internet connection without your knowledge.  Once spyware is installed. it may deploy numerous files onto your system. Some of these files are so well hidden that they are difficult to find and remove.
Spyware programs may be included with other software you want.  When you consent to download a program, such as a music sharing program, may also be consenting to download spyware.  You might not be aware that you agreed to the spyware installation because your consent is buried in an end-user-license agreement (EULA).
Be cautious about clicking on pop-up boxes. Spyware programs may create a pop-up box where you can click “yes” or “no” to a particular question.  If you click on either choice your browser may be tricked into thinking you initiated a download of spyware.
Anti-malware and anti-spyware programs can help to eliminate many of these threats. Security experts recommend that you use at least two, and preferably three anti-malware/anti-spyware programs on your computer, as no one program has been found to be fully effective at detecting and removing these threats.
read, http://www.us-cert.gov/cas/tips/ST04-016.html for further information regarding spyware and malware.

So i hope after reading this, we will be aware of the importance of protecting our computer in order to protect our internet privacy as well..sometimes we just ignore those little steps which eventually can lead to more serious problems..who says installing spyware, antivirus and firewall is necessary o protect our computers for viruses only? in fact, we can help protect our internet privacy from being hacked and all..


criminal court case on internet privacy: State v. Reid

 
Shirley Reid, an employee of Jersey Diesel, had been away from her job on disability leave. Reid returned to work on the morning of August 24, 2004 and had an argument with Timothy Wilson, the company’s owner, about her temporary light duty assignment. At 9.57 a.m., someone accessed Jersey Diesel’s account on website of its supplier Donaldson Company, Inc..  At 10:07 a.m., that person changed the account’s password and changed the shipping address to a non-existent address.

Donaldson contacted Wilson to notify him of the change made to his company’s account. The supplier provided Wilson with the IP address of the user who accessed Jersey Diesel’s account. Wilson then contacted the ISP, Comcast, who refused to disclose the identity of the user without a subpoena. Suspecting Reid because she was the only employee who knew the company’s username and password, Wilson reported the occurrence to the Lower Township Police Department on August 27.

Comcast revealed Reid to be the subscriber a week after being served with a subpoena duces tecum by the Lower Township Municipal Court on September 7. On the basis of that information, Reid was arrested on October 9 and indicted for second-degree computer theft on February 22, 2005.


The New Jersey Supreme Court has issued an opinion on the privacy rights of computer users, holding in State v. Reid that computer users have a reasonable expectation of privacy concerning the personal information they give to their ISPs

-hanis-

the concept of internet privacy is a fallacy upon which no one should rely??

"the concept of internet privacy is a fallacy upon which no one should rely" says judge. this statement was made by a judge in the case of People v. Klapper. in this case, 
the defendant-boss was alleged to have installed keylogging software on his employee’s work-issued computer. Through those means he acquired the password for the employee’s “personal” email account, and copied some messages from that account.
The court dismissed the case, finding that the prosecution had not alleged that defendant, the computer owner, had notice of any limited access to the computer or the email account. (After all, it was the employer’s computer.) The allegations further failed to allege that the employee had installed a security device to prevent unauthorized access or use.

That last part is a bit puzzling (wouldn’t the password protection on the “personal” email account satisfy that point?). But the real puzzling part of the opinion is how the court essentially destroyed the idea that there’s any hope for an expectation of privacy in internet communications. 

Here’s the first paragraph of the opinion:
In this day of wide dissemination of thoughts and messages through transmissions which are vulnerable to interception and readable by unintended parties, armed with software, spyware, viruses and cookies spreading capacity; the concept of internet privacy is a fallacy upon which no one should rely.

-hanis-

Monday, October 11, 2010

facebook privacy problem >> video

 

Sophos discovers flaw which could lead to identity theft. Even if you had told Facebook to make your date of birth secret, it could still be viewed because of a security hole.

Experts at SophosLabs say that Facebook appears to have now fixed the security hole.

Privacy Issues and Cloud Computing Discussed Again!!

Howbeit a late comer to the fray, the Office of the Privacy Commissioner of Canada(as an example if compared with Malaysian Government) recently joined the growing list of officials expressing concerns about the shift to cloud hosting. Their paper, titled “Privacy Issues related to Cloud Computing”, was an abbreviated rehash of readily available information from many other papers on the same subject.

Definition of cloud computing :

Cloud computing is a paradigm shift following the shift from mainframe to client server in the early 1980s. Details are abstracted from the users, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them. Cloud computing describes a new supplement, consumption, and delivery model for IT services based on the Internet, and it typically involves over the Internet provision of dynamically scalable and often virtualized resources.


The copyrighted paper (illustrated in the Canadian Government) in my opinion, misses the mark. The paper's introduction gives a broad overview of cloud computing, providing some Pew Internet Survey statistics to suggest why there is a shift to the cloud. The paper then continues to provide us with all the reasons why we should be concerned in what appears to be a copy and paste manner from countless other papers issued by various governments on the same subject.

In short, there is a lot of "what if" speculating without any clear basis in fact or practicality. Things like unintended intrusion, inappropriate use of data, or any number of the other issues pointed out by the paper are possible, but they are also possible in the current model of co-located, managed, or shared hosting environments.

The average client wishing to host their latest web offerings, mostly concern themselves only with the likes of page load speeds, and website uptime. If Pew were to survey this same “crowd”, likely many respondants would express concern over intrusion and spying by the same powers that are issuing these papers.

Protection of personal data is a growing concern with the advancement of technology. Cloud computing does present unique consideration that go beyond the current model as the data uploaded will cross various jurisdictional boundaries. Individuals and businesses will need to consider the implications and especially the legal issues that may surround their particular circumstances. Users will need to ensure that they comply with the legal requirements of the data they collect and retain possession of.

The better approach for the privacy commissioner would be to remind, and ensure that the business practices and policies of companies are sound regardless of the location or type of technological platform used to power the site. This is NOT a technology issue, rather a business privacy and ethics issue.

Basically, there is an intensive application which can be apply directly in our country. As i mention above, this is not involving with the current technology or any other other related issues, however it more on how we could apply those particular area in current situation in Malaysia. Should it be consider??

 Cloud computing is internet based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid.

Friday, September 17, 2010

why we say internet privacy is important...

some people just doesn't understand the significance of internet privacy and why is it so important in our daily lives..well here's an easy way to illustrate it..(ofcourse it's an example of case, what were you expecting?)..ok in the case of Robbins v. Lower Merion School District, the federal trial court issued an injunction against the school district after plaintiffs charged two suburban Philadelphia high schools violated the privacy of students and others when they secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms. wow imagine something like that happenning to you now wouldn't that spook you out? and that's not all. there are various other similar cases . just a little hint on the necessity of internet privacy. ^_^
by : hanis

Wednesday, August 18, 2010

Take a break guys...!!!

HOW TO HIDE YOUR PASSWORD!!!!!!!!!!!!!

No one can see your passwords or whatever you're typing
 
No one can see whatever you're typing or which website you're surfing
And the Ultimate is... 
HAHAHAHAAA ...... DONT DO THAT AT HOME

Saturday, August 14, 2010

Internet Privacy Software Reviews- Are They Enough To Keep Your Personal...

Introduction to Internet Privacy.



What is Internet?
Internet sometimes called simply "the Net," is a worldwide system of computer networks that use the standardized Internet Protocol Suite to serve and cater billions of users worldwide.


What is Privacy?
The right of being concealed from the presence or view of others or the right of an individual to be secure from unauthorized disclosure of information about oneself that is contained in documents.


What is Internet Privacy?
Internet privacy is a vast term referring to the mixture concerns, technologies, and strategies for protecting and shielding information, databases, communications, and choices that are meant to be private and confidential. 

The significance of Internet Privacy.
The growing apprehension regarding privacy on the Internet is expanding, becoming an issue of international dispute. The internet users are becoming alarmed that the most intimate details of their daily lives are being monitored, searched and recorded. According to the Encyclopedia Britannica, 81 percent of internet users are concerned about the risks and threats to their privacy while they get connected online. Furthermore, with today’s mounting use of computers and the internet a whole new world know has cyberspace has taken shape and can take its toll on us. 

People nowadays have the chances to access an infinite range of information or to communicate and keep connected with people on earth or in outer space. The technology has progressively grown at an overwhelming pace and it seems as if something revolutionary is being implemented all the time. But along with this innovative technology, in a world of few regulations, come many opportunities for violation upon user’s rights that were implemented in the real world. Computers and the internet are merely tools and instruments to access this median between users and the massive amounts of information available online.

Many debates have risen pertaining to the personal aspects of the Internet. Should you have privacy on the Internet? Or should companies have the privilege to gather information about you? It is believed that your privacy and personal security should be prioritized on the Internet. Companies should not be able to invade or raid your private life simply because you visited their company website. Nevertheless, privacy invasion has been universally linked with Internet use. Many companies are able to gather personal information on those visiting their website, and also selling such information to others for profit and revenues. As extremely daunting as this may sound, this has become a constant trend online.
 
There are many ways that internet consumers can collect and steal information about you. For instance, is through e-mail scams. E-mail scams are largely similar to those that one receives over postal mail. They both promise and assure some big reward and in order to induce the public to enter  in this "contest" by sending in your personal information. Others e-mail schemes include subject like "Get rich quick!" and "You just won RM 1000,000!" which only promise money, but end up being scams.
 
Another type of tool companies use to obtain your personal information is something called a cookie. A cookie gathers information on the most frequently visited websites and what your favorites are.This can be a power tool for consumers, but it gravely invades your personal privacy.
On the Internet, your personal life is purely marketable data which somehow disrupts people's security. Some people feel threatened and even intimidated by every move they make on the web. They almost feel like one wrong step on the net can vastly ruin their social and personal lives. 

Presently, Microsoft and other businesses are using a developed form of technology to gather your personal information. Instead of having to input your name, age, ZIP code, and other facts, this information will now be stored on your hard drive. If any company decides to explore more about the visitor to their site, they simply can access this personal information. This kind of technology could infuriate people and absolutely infringes people's privacy online. 

On top of that, using today's technology, people have a diverse access to one's personal information via the Internet. This kind of information is readily available through certain websites. Social networking sites, such as Facebook, Twitter, and MySpace are mainly used to get connected globally are often misused by the public that caused many harms to their personal life and also resulting in identity theft as well. The Internet also makes it possible to type in a persons name and find their address. In return, this could be a potential tool in encouraging cyber stalking crimes thus creating more fear and anxiety in the minds of people. Despite that this tool could be used as a measure of finding an old friend, it can also result in negative consequences. 

New laws are being passed and implemented in order to bring personal security on the net. Penal Code and Cyber Crimes Act 1997 are among of the laws in Malaysia that govern the crimes activities occurred online as well as maintaining the privacy of the internet consumers locally from the cyber criminals. Without these laws, the future of privacy invasion could be disturbing. For example, you go apply for a job and you get rejected simply because you visited a pornographic site within the last year. This example might sound extremely indecent, but it could happen if the rules are not changed and the concerns about internet privacy is continuously escalating.The people themselves have to be aware of the risks of using the internet, by practicing a safe measure in order to protect their privacy from being viewed publicly without their consent.