Skip to main content

Home/ beyondwebct/ Group items tagged security

Rss Feed Group items tagged

Barbara Lindsey

How QR codes hide privacy, security risks - Technology & science - Security - msnbc.com - 0 views

  •  
    Some good information about security and privacy risks associated with qrcodes. As with many online sites, it pays to think first and consider who is sending out that qr code.
Barbara Lindsey

TSA: Privacy - 0 views

  • The officer who views the image is remotely located in a secure resolution room and never sees the passenger.
  • To further protect passenger privacy, millimeter wave technology blurs all facial features and backscatter technology has an algorithm applied to the entire image.
  • Advanced imaging technology cannot store, print, transmit or save the image, and the image is automatically deleted from the system after it is cleared by the remotely located security officer. Officers evaluating images are not permitted to take cameras, cell phones or photo-enabled devices into the resolution room.
  • ...2 more annotations...
  • TSA recently new software on all millimeter wave imaging technology machines – upgrades designed to enhance privacy by eliminating passenger-specific images and instead auto-detecting potential threats and indicating their location on a generic outline of a person.
  • For units that do not yet have the new software, TSA has taken all efforts to ensure passenger privacy. To that end, the officer who assists the passenger never sees the image the technology produces and the officer who views the image is remotely located in a secure resolution room and never sees the passenger. The two officers communicate via wireless headset.
Barbara Lindsey

IBM Addresses Web 2.0 Security Concerns With 'SMash' - 0 views

  • "Web 2.0 is fundamentally about empowering people, and has created a societal shift in the way we organize, access, and use information," said Rod Smith, IBM Fellow and vice president.
  • SMash addresses a part of the browser mashup security issue by keeping code and data from each of the sources separated, while allowing controlled sharing of the data through a secure communication channel.
Chenwen Hong

11 More U.S. Airports Get Body Scanners | Threat Level | Wired.com - 0 views

  •  
    the issue of privacy versus security regarding body scanning
  •  
    This is the issue of privacy versus security that we discussed on Friday.
Barbara Lindsey

Athabasca Landing (beta) - 0 views

  •  
    Athabasca Landing is a secure, social networking system operated by Athabasca University, Canada's Open University. We invite you to explore the site. If you are a member of the AU community, please explore and discover the many tools and functions of this system. By adding content and inviting your colleagues to do so as well, our distributed learning community is enriched and enhanced.
Barbara Lindsey

Coca-Cola Security Cams - YouTube - 0 views

  •  
    fall 2012 syllabus?
Barbara Lindsey

SafeConnect › University of Connecticut - 0 views

  • SafeConnect continually assesses your computer to ensure it meets the minimum security standards established in accordance with the statement of intent.
  • You do not need to be connected to the University network to install the software
Barbara Lindsey

Tweeting the terror: How social media reacted to Mumbai - CNN.com - 0 views

  • One tweet from "Dupree" appeared to be coming from inside one of the hotels: "Mumbai terrorists are asking hotel reception for rooms of American citizens and holding them hostage on one floor." A group of Mumbai-based bloggers turned their Metroblog into a news wire service, while the blog MumbaiHelp offered to help users get through to their family and friends in the city, or to get information about them, and has had a number of successes. Flickr also proved a useful source of haunting images chronicling the aftermath of the attacks. Journalist Vinukumar Ranganathan's stream of photos were published by CNN and other major broadcasters. iReport.com: Are you there? Share your photos, videos and stories A Google Map showing the key locations and buildings with links to news stories and eyewitness accounts, and CNN's iReporters flooded the site with their videos and images of the terror attacks.
  • However, as is the case with such widespread dissemination of information, a vast number of the posts on Twitter amounted to unsubstantiated rumors and wild inaccuracies. For example, a rumor that the Indian government was asking tweeters to stop live updates to avoid compromising its security efforts was published and republished on the site.
  • As blogger Tim Mallon put it, "I started to see and (sic) ugly side to Twitter, far from being a crowd-sourced version of the news it was actually an incoherent, rumour-fueled mob operating in a mad echo chamber of tweets, re-tweets and re-re-tweets.
  • ...1 more annotation...
  • What is clear that although Twitter remains a useful tool for mobilizing efforts and gaining eyewitness accounts during a disaster, the sourcing of most of the news cannot be trusted. A quick trawl through the enormous numbers of tweets showed that most were sourced from mainstream media. Someone tweets a news headline, their friends see it and retweet, prompting an endless circle of recycled information
  •  
    Neha Viswanathan, a former regional editor for Southeast Asia and a volunteer at Global Voices, told CNN, "Even before I actually heard of it on the news I saw stuff about this on Twitter.
Barbara Lindsey

HIPAA Information For Consumers - 0 views

  • To make sure that your health information is protected in a way that does not interfere with your health care, your information can be used and shared:For your treatment and care coordinationTo pay doctors and hospitals for your health care and to help run their businessesWith your family, relatives, friends, or others you identify who are involved with your health care or your health care bills, unless you objectTo make sure doctors give good care and nursing homes are clean and safeTo protect the public's health, such as by reporting when the flu is in your areaTo make required reports to the police, such as reporting gunshot wounds
  • generally cannot
  • Examples of organizations that do not have to follow the Privacy and Security Rules include:life insurers,employers,workers compensation carriers,many schools and school districts,many state agencies like child protective service agencies,many law enforcement agencies,many municipal offices.
Barbara Lindsey

American Express - Hong Kong - Personal Information Collection Statement - 0 views

  • When you give us information about you we are collecting it in order to review your application for products and services this applies to both existing and potentially new customers. We will use information for operation of your account, provision of products and services and for marketing purposes. Please note that if you do not provide the information required in the mandatory fields we may be unable to process your request. Security
  • In all other cases we will not disclose customer information unless we have previously informed the customer, have been authorized by the customer, or are required to do so by law or other regulatory authority. In particular, when a court order or subpoena requires us to disclose information, we notify the customer promptly to provide an opportunity to exercise his or her legal rights. The only exceptions to this policy are when court order or law prohibits us from notifying the customer, or in cases in which fraud and/or criminal activity is suspected. Further, we will not use medical information for marketing purposes or to provide credit.
  • Please do keep in mind that if you take advantage of an offer from an American Express business partner and become their customer, they may independently wish to send offers to you. In this case, you will need to inform them separately if you do not wish to receive future offers from them.
  • ...1 more annotation...
  • We do share information about you within the American Express Group of Companies so we can provide you with products and services and bring you information about other American Express products and services. All American Express Companies comply with The American Express Privacy Principles.  
Barbara Lindsey

Next Generation Learning Challenges - 0 views

  • What if there was a way to make world-class, interactive learning materials available to those students and faculty in these high-demand, low-success courses, for free? Perhaps more students would succeed in these early “gatekeeper” courses, go on to graduate college, and realize the possibility of achieving the dream of future economic success and security.
Barbara Lindsey

Are Schools Inhibiting 21st Century Learning? : April 2008 : THE Journal - 0 views

  • a large portion of students say teachers and school IT departments are doing just that: throwing up barriers to learning with the very technology that's supposed to facilitate it. And teachers, administrators, and parents seem to be largely unaware of this, according to the results of the 2007 Speak Up survey released Tuesday by Project Tomorrow.
  • Among middle and high school students, 40 percent indicated that teachers are limiting their use of technology in schools, and 45 percent said that school "security" practices, such as Web filtering, were limiting their ability to take advantage of technology for learning
Barbara Lindsey

Web 2.0 wanted by kids but not teachers | 5 Sep 2008 | ComputerWeekly.com - 0 views

  • Parents that understand technology see the value of Web 2.0 in the classroom, but teachers are less certain according to research.
  • Security and a lack of understanding are the major obstacles for teachers accepting Web 2.0, said the report.
  • In contrast two thirds of parents questioned said Web 2.0 is a positive addition to the classroom. And children themselves are already using the technologies.
Barbara Lindsey

The TWiT Netcast Network with Leo Laporte - 0 views

  •  
    31 minutes in and Boy van Amstel of Please Rob Me talks about their site and its significance.
Celeste Arrieta

Edmodo | Secure Social Learning Network for Teachers and Students - 0 views

shared by Celeste Arrieta on 15 Mar 10 - Cached
  •  
    Edmodo is a private microblogging platform that teachers and students can use to send notes, links, files, alerts, assignments, and events to each other. Great for districts where twitter is blocked according to Cindy Kendall.
1 - 20 of 24 Next ›
Showing 20 items per page