Experts warned that the law would not fully protect anyone from dedicated hackers but acknowledged it could raise awareness of the vulnerabilities inherent in wireless technology.
http://entmag.com/news/rss.asp?editorialsid=7368
Security News Curated from across the world
Experts warned that the law would not fully protect anyone from dedicated hackers but acknowledged it could raise awareness of the vulnerabilities inherent in wireless technology.
http://entmag.com/news/rss.asp?editorialsid=7368
Any statewide policy, however, would not apply to the legislative and judicial branches or to the state’s constitutional officers, although they could adopt it, the executive order states.
Other state governments have enacted similar P2P use policies.
http://www.fcw.com/article94067-04-13-06-Web
Chinas Ministry of Information Industry has adopted the Measures for the Administration of Internet E-mails. The regulations, which took effect from 30 March 2006, are designed to apply to email service providers and apply to any person operating an email service for Internet users in Mainland China.
The regulations are as follows:
A provider is defined as any person in the service supply chain involved in delivering or helping users to receive email;
Service providers must register with the government and obtain a license before providing email services;
Violators face warnings or penalties of up to 30,000 yuan (approx. $3,700 US) and risk losing their license;
Firms are barred from sending unsolicited commercial messages without prior consent from recipients;
All commercial email must have a subject header of AD or the Chinese character for advertisement;
The rules only apply to email containing commercial advertisements;
The rules state that providers must stop delivery of any messages containing commercial advertisements even if a recipient first consents, but later changes his or her mind.
http://www.tid.gov.hk/english/aboutus/tradecircular/cic/asia/2006/files/ci200681a.pdf
“We’re pleased with the compromise ‘trigger’ language relating to when a business must notify individuals of a breach of their personal information,” said several privacy advocacy groups in a joint statement issued the day before the vote.
The Center for Democracy & Technology, the Privacy Rights Clearinghouse, and Consumers Union — the latter the publisher of the popular “Consumer Reports” magazine — urged the committee to approve H.R. 4127.
http://www.securitypipeline.com/news/184419781;jsessionid=AWJ3C5O30AOSKQSNDBOCKHSCJUMEKJVN
“There are few details of these leaks because credit-card companies do not want people to lose confidence in debit cards,” said Beth Givens, executive director of the consumer advocacy group Privacy Rights Clearinghouse. The mystery surrounding the data breaches underscores loopholes within the majority of state laws which aim to mandate the disclosure of security breaches. Moreover, the silence over responsibility for the breaches contrasts consumer advocates’ warnings that a federal law currently being considered by Congress will ironically roll back protections even further.
There are three cases in which a company suffering a breach can bypass most current notification laws, all of which have some basis in the legislation first drafted in California, security and legal experts told SecurityFocus. A company suffering a data breach can delay notification during a criminal investigation by law enforcement. If the stolen data includes identifiable information–such as debit card account numbers and PINs–but not the names of consumers, then a loophole in the law allows the company who failed to protect the data to also forego notification. Finally, if the database holding the personal information was encrypted but the encryption key was also stolen, then the company responsible for the data can again withhold its warning. In those cases, “they have no obligation to notify,” said Avivah Litan, vice president of security and privacy research for business analysis firm Gartner.
“The bottom line is that they escaped the disclosure law–at least for now.”
At least one state’s notification law has language that forces companies to disclose a breach even if the database records did not contain names or were encrypted and were stolen with the key. The state of New York’s Information Security Breach and Notification Act (S03492) passed in August 2005 does not contain the loopholes. A breach that includes any consumers from New York state would fall under the law’s jurisdiction.
Last June, Mastercard International published a statement warning that online attackers had breached the network of CardSystems Solutions and collected as many as 40 million credit-card accounts of various brands.
A rash of fraud that started in February was blamed on the leak, and media reports pointed at OfficeMax as the source.
“There is an ongoing federal investigation relating to ATM fraud involving legitimate debit card use at various retailers that was later tied to fraudulent transactions outside the U.S.,” the company stated in the filing to the Securities and Exchange Commission.
In the past month, law enforcement authorities in New Jersey and New York arrested more than a dozen people in connection with an organized identity theft operation, said Edward DeFazio, the prosecutor for Hudson County, New Jersey.
http://www.securityfocus.com/news/11381?ref=rss
“Living in the information age can be a boon to our prosperity and a bane to our privacy, but nothing says we have to take the bad along with the good,” House Commerce Committee Chairman Joe Barton (R-Texas) said.
Under the Telecommunications Act of 1996, telephone carriers are obligated to protect the Customer Proprietary Network Information (CPNI) of consumers, but last summer the privacy watchdog Electronic Privacy Information Center (EPIC) complained to the FCC that confidential phone records are readily available for sale on the Internet. The telephone carriers say their customer service representatives are being tricked out of the information through pretexting.
http://www.internetnews.com/bus-news/article.php/3590151