Wednesday, February 24, 2010

♫ LasT aSsignmenT in FinaLs ♫


♫summaRy oF The 1980 OECD pRivacy guidLines♫

The OECD organised several events at the IGF in Sharm el-Sheikh, Egypt, including workshops on 'Global ICT services sourcing post-crisis, on 'Expanding access to the Internet and broadband for development' and on 'Using ICTs and the Internet to meet environmental challenges', as well as an open forum on 'The importance of Internet Access and Openness for a sustainable economic recovery.
  • Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.
  • Ministerial Declaration on the Protection of Privacy of Global Networks.
  • Inventory of Instruments and Mechanisms Contributing to the Implementation and Enforcement of the OECD Privacy Guidelines on Global Networks.
  • OECD Privacy Policy Statement Generator.
  • Building Trust in the Online Environment: Business-to-Consumer Dispute Resolution, Report of the December 2000 OECD Conference.
  • Legal Provisions Related to Business-to-Consumer Alternative Dispute Resolution in Relation to Privacy and Consumer Protection.
  • Resolving E-commerce Disputes Online: Asking the Right Questions About Alternative Dispute Resolution.
  • Report on Compliance with, and Enforcement of, Privacy Protection Online.
  • Inventory of Privacy-enhancing Technologies (PETs).
  • Privacy-Enhancing Technologies: Report on the OECD Forum Session.
  • Transborder Data Flow Contracts in the Wider Framework of Mechanisms for Privacy Protection on Global Networks.
key provision oF The USA paTRioT acT subJecT To sunseT♫


The clumsily-titled Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism act of 2001 (USA PATRIOT Act, or USAPA) introduced a plethora of legislative changes which significantly increased the surveillance and investigative powers of law enforcement agencies in the United States. The Act did not, however, provide for the system of checks and balances that traditionally safeguards civil liberties in the face of such legislation.

One of the most striking features of the USA PATRIOT Act is the lack of debate surrounding its introduction. Many of the provisions of the Act relating to electronic surveillance were proposed before September 11th, and were subject to much criticism and debate. John Podesta, White House Chief of Staff from 1998 - 2001, has questioned what has changed since then.

The events of September 11 convinced ... overwhelming majorities in Congress that law enforcement and national security officials need new legal tools to fight terrorism. But we should not forget what gave rise to the original opposition - many aspects of the bill increase the opportunity for law enforcement and the intelligence community to return to an era where they monitored and sometimes harassed individuals who were merely exercising their First Amendment rights. Nothing that occurred on September 11 mandates that we return to such an era.However, the USA PATRIOT Act retains provisions appreciably expanding government investigative authority, especially with respect to the Internet. Those provisions address issues that are complex and implicate fundamental constitutional protections of individual liberty, including the appropriate procedures for interception of information transmitted over the Internet and other rapidly evolving technologies.The USA PATRIOT does contain a provision requiring law enforcement to file under seal with the court a record of installations of pen register/trap and trace devices. This amendment may provide some measure of judicial oversight of the use of this enhanced surveillance authority.PATRIOT Act Renewal Bill Would Expand FBI Powers . Reuters reportsthat Senate Intelligence Committee Chairman Pat Roberts (R-KS) plans to introduce legislation that would not only reauthorize sunsetting provisions of the USA PATRIOT Act, but also expand the government's investigative powers to permit the FBI to demand health, library, and tax records in intelligence investigations without judicial approva

Wednesday, January 27, 2010

♫ LasT quiZ in midTeRm ♫

Privacy

Is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security— one in which trade-offs between the interests of one group and another can become particularly clear.


Privacy Protection and the Law

Is the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. These concerns include whether email can be stored or read by third parties without consent, or whether third parties can track the web sites someone has visited. Another concern is whether web sites which are visited collect, store, and possibly share personally identifiable information about users.

The relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

While currently there is no national law to protect the privacy of the information you share online, federal law and state law do offer some protection to various kinds of personal information collected about you. At the national level, Congress has enacted laws as it perceived the need to arise. Therefore, you will see from the list below that you have privacy rights in specific kinds of information—information maintained about you in the health care system, your education records, the record of your video rentals, to name a few.

Wednesday, January 6, 2010

♫my midTeRm quiZ♫

4. Your friend just told you that he is developing a worm to attack the administrative systems at your collage. The worm is "harmless" and will simply cause a message - "Let's party!" - to be displayed on all workstations on Friday afternoon at 3 p.m. by 4 p.m., the virus will erase itself and destroy all evidence of its presence. What would you say or do?

answer:

The first thing I can do is to get his attention and I will explain what happens to the administrative systems if he continue his plan. Second is to stop my friend to continue his plan so that it can't destroy the administrative systems. Lastly to thank my friend because, he told me about his plan.

--------------------------------------------------------------------

1. You are the CEO of a three-year-old softare manufacturer that has several products and annual revenues in excess of 500 mollion dollars You've just recieved a recommendation from the manager of software development to hire three notorious crackers to probe your software products in an attempt to identify any vulnerabilities. The reasoning is that if anyone can find a vulnerability in your software, they can. This will give your firm a head start on developing parches to fix the problems before anyone can exploit them. You're not sure, and feel uneasy about hiring people with criminal records and connections to unsavory members of the hacker/cracker community. What would you do?

answer:


I can hire the best and popular hacker/cracker that there is no criminal records to test my product and I strongly disagree that hacker/cracker that has criminal records can test my product because, i have no trust to them that test my products...


!!THATS ALL!!
THANK YOU FOR THE QUESTIONS MA'AM