Skip to main content

Home/ ITGSopedia/ Group items tagged security

Rss Feed Group items tagged

Barbara Stefanics

The Legal Implications of Surveillance Cameras | District Administration Magazine - 0 views

  •  
    "The Legal Implications of Surveillance Cameras District administrators need to know the law and make these policies clear. By: Amy M. Steketee District Administration, February 2012 undefined The nature of school security has changed dramatically over the last decade. Schools employ various measures, from metal detectors to identification badges to drug testing, to promote the safety and security of staff and students. One of the increasingly prevalent measures is the use of security cameras. In fact, the U.S. Department of Education reported that more than half of all public schools used security cameras during the 2007-2008 school year to monitor students, a 30 percent increase over eight years prior. While security cameras can be useful in addressing and deterring violence and other misconduct, they also raise several legal issues that can leave school administrators in a quandary. Does the use of surveillance cameras to capture images violate a student or staff member's right of privacy? If the images captured on a surveillance recording are of a student violating school rules, may district administrators use the recording in a disciplinary proceeding? If so, are parents of the accused student entitled to review the footage? What about parents of other students whose images are captured on the recording? How should schools handle inquiries from media about surveillance footage? Can administrators use surveillance cameras to monitor staff? I outline the overriding legal principles, common traps for the unwary and practical considerations. Advertisement Legal Principles Fourth Amendment to the U.S. Constitution. The Fourth Amendment prohibits the government, including public schools, from conducting unreasonable searches or seizures. Courts have generally held, however, that what an individual knowingly exposes in plain view to the public will not trigger Fourth Amendment protection because no search has occurred. Someone who is videotaped in public has n
Barbara Stefanics

BBC News - Snowden leaks: Google 'outraged' at alleged NSA hacking - 0 views

  • 31 October 2013 Last updated at 12:41 GMT Share this page Email Print Share this page4.1KShareFacebookTwitter Snowden leaks: Google 'outraged' at alleged NSA hacking Comments (764) Advertisement $render("advert-post-script-load"); A summary of US spying allegations brought about by Edward Snowden's leak of classified documents Continue reading the main story US spy leaks How intelligence is gathered NSA secrets failure 'Five eyes' club US revelations Google has expressed outrage following a report that the US National Security Agency (NSA) has hacked its data links.
  • 31 October 2013 Last updated at 12:41 GMT Share this page Email Print Share this page4.1KShareFacebookTwitter Snowden leaks: Google 'outraged' at alleged NSA hacking Comments (771) Advertisement $render("advert-post-script-load"); A summary of US spying allegations brought about by Edward Snowden's leak of classified documents Continue reading the main story US spy leaks How intelligence is gathered NSA secrets failure 'Five eyes' club US revelations Google has expressed outrage following a report that the US National Security Agency (NSA) has hacked its data links. An executive at Google said it was not aware of the alleged activity, adding there was an "urgent need for reform". The comments follow a Washington Post report based on leaks from Edward Snowden claiming that the NSA hacked links connecting data centres operated by Google and Yahoo.
  • The comments follow a Washington Post report based on leaks from Edward Snowden claiming that the NSA hacked links connecting data centres operated by Google and Yahoo.
  • ...1 more annotation...
  • Google has expressed outrage following a report that the US National Security Agency (NSA) has hacked its data links.
  •  
    "Google has expressed outrage following a report that the US National Security Agency (NSA) has hacked its data links."
Barbara Stefanics

Games - OnGuard Online - 0 views

  •  
    General website with games regarding Internet Auctions. Spyware, Online Safety, Online Health, Social Networking, Identity theft, Wireless Security, Online Investing, Computer Security, Online Shopping, P2P Security, Phishing and Email Scams.
Madeleine Brookes

IPad management, security crucial in hospital tablet roll out - PC Advisor - 1 views

  •  
    Uses many technical terms to help understand MAC address and security of wireless network
Barbara Stefanics

Secure Passwords - Explained by Common Craft - Common Craft - Our Product is Explanation - 0 views

  •  
    Selecting a secure password and then keeping it safe. Explained to the usual CommonCraft high standard.
  •  
    "Secure Passwords Explained by Common Craft trouble seeing this video? We recommend that you upgrade to the latest version of Flash Player-the upgrade process is quick, and it should solve the issue. If you're still having any trouble after you upgrade, please contact us and let us know. Thanks! hide ↑ This video is about understanding the risks, creating a password that can't be guessed and protecting it from criminals and wandering eyes."
Barbara Stefanics

Why Apple's Recent Security Flaw Is So Scary - 0 views

  •  
    "Why Apple's Recent Security Flaw Is So Scary"
samaraad

BBC News - Fraudsters 'copying online banking security' - 0 views

  •  
    "Online security systems designed to protect the confidential bank details of millions of people are being copied by fraudsters, experts say."
Barbara Stefanics

Securing Your Campus from the Inside Out | eSchoolNews.com - 1 views

  •  
    "Securing Your Campus from the Inside Out"
Barbara Stefanics

Security Topic Center - Computerworld - 0 views

  •  
    Security Topic Center
samaraad

BBC News - Facebook 'should mimic Apple security restrictions' - 0 views

  •  
    "Facebook should adopt tighter security measures to protect its users, according to a leading internet firm."
samaraad

BBC News - Anonymous hackers attack US security firm HBGary - 0 views

  •  
    "Online activist group Anonymous has targeted an American security firm that claimed to know the identities of its leaders."
Sandra Stark

BBC News - Cyber war threat exaggerated claims security expert - 0 views

  •  
    "The threat of cyber warfare is greatly exaggerated, according to a leading security expert."
  •  
    The threat of cyber warfare is greatly exaggerated, according to a leading security expert. Bruce Schneier claims that emotive rhetoric around the term does not match the reality.
Elizabeth Schloeffel

Backing Up Data on a Remote 'Cloud' Computer - NYTimes.com - 0 views

  • Even though a hard drive with a terabyte (or 1,000 gigabytes) of storage can hold thousands of photographs, songs and movies and costs less than $100, storing your files in a distant commercial data center, encrypted and secure, increasingly makes more sense. Cloud backups are appealing for another reason: as computing becomes more mobile — on laptops, tablets and smartphones — you need to have reliable access to the data anywhere over an Internet connection.
  • Even though a hard drive with a terabyte (or 1,000 gigabytes) of storage can hold thousands of photographs, songs and movies and costs less than $100, storing your files in a distant commercial data center, encrypted and secure, increasingly makes more sense. Cloud backups are appealing for another reason: as computing becomes more mobile — on laptops, tablets and smartphones — you need to have reliable access to the data anywhere over an Internet connection.
  •  
    "Even though a hard drive with a terabyte (or 1,000 gigabytes) of storage can hold thousands of photographs, songs and movies and costs less than $100, storing your files in a distant commercial data center, encrypted and secure, increasingly makes more sense. Cloud backups are appealing for another reason: as computing becomes more mobile - on laptops, tablets and smartphones - you need to have reliable access to the data anywhere over an Internet connection. "
Madeline Brownstone

Hackers Go After the Smartphone - NYTimes.com - 0 views

  •  
    He added that he expected mobile security to improve over time but that currently, "Most mobile app developers are not taking data security seriously enough and do not perform sufficient testing in the rush to launch or update an app."
Barbara Stefanics

The Free Encryption App That Wants to Replace Gmail, Dropbox, and HipChat | WIRED - 0 views

  •  
    Cryptographers devote their careers to the science of securing your communications. Twenty-four-year-old Nadim Kobeissi has devoted his to the art of making that security as easy as possible. His software creations like Cryptocat and Minilock are meant to encrypt instant messages or shared files with three-letter-agency-level protection, but with user interfaces that require Lincoln-Log-level skills. Now he's pulling elements of all his dead-simple apps into what he describes as his biggest release yet, a single platform designed to encrypt everything you and any group of collaborators do on the desktop.
Madeleine Brookes

Tor: anonymity online - 0 views

  •  
    Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens. (Note: sometimes ITGS students need to be able to access sites that are sometimes blocked)
Barbara Stefanics

Privacy and Security Protection - 1 views

  •  
    ""Why should I worry about privacy and security?"
Madeleine Brookes

Stanford Hospital Contractor Leaks 20,000 Patient Records to Public Website - Security ... - 1 views

  •  
    "Stanford Hospital discovered last month that a contractor had posted a private database containing medical records of 20,000 patients to a public homework assistance Website in search of help on how to create bar graphs."
  •  
    A number of issues are raised here: lack of policies, privacy, security. Also combines technologies: use of databases to create examples of charts in spreadsheets; medical records. It's a great article to build on some terms/technologies and introducing more.
1 - 20 of 109 Next › Last »
Showing 20 items per page