Skip to main content

Home/ Politically Minded/ Group items tagged required

Rss Feed Group items tagged

sonamp

ISO 9001 requirements - 0 views

  •  
    During an ISO audit, the auditor will be asking for records or evidence the quality System being audited has effectively maintained the records required. For example, when an auditor is reviewing the corrective and preventive action system, he or she will be looking for a CAPA Report to provide evidence that the CAPA system has met the requirements for section 8.52 Corrective Action and 8.5.3 Preventive Action.
sonamp

iso 9000 - 0 views

  •  
    ISO is Short form of International Organization for Standard. ISO 9001:2008 require an organization to develop a quality management system that fits the product & Process requirement as well as regulatory requirement AS an ISO 9001:2008 certified company,
sonamp

iso 9000 - 0 views

  •  
    ISO is Short form of International Organization for Standard. ISO 9001:2008 require an organization to develop a quality management system that fits the product & Process requirement as well as regulatory requirement AS an ISO 9001:2008 certified company, iso 9000
thinkahol *

Super Congress Debt Reduction Has Little Transparency - 0 views

  •  
    The text of the budget deal reached by President Barack Obama and congressional leaders contains few specific public disclosure provisions for the committee. The standing committees of Congress are allowed to send suggestions for ways to reduce the debt to the super committee members, but there is, as yet, no provision for the disclosure of those reports. The final report is required to be publicly disclosed upon completion, however there is no requirement that the report be placed online. There are also no official requirements for web-casting of committee meetings.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Joe La Fleur

Uh oh. Obama's literary agent required clients to write their own bios » The ... - 0 views

  •  
    THIS IS THE STANDARD PRACTICE
thinkahol *

The Pragmatist: Current Economic Depression Requires a Very Thoughtful Default by Next ... - 0 views

  •  
    The current high debt can only be resolved through a properly timed debt default, controlled bankruptcy, and mass restructuring in order to create: 1) an industrial base for post-default recovery2) aggressive drive to court foreign investment It is highly unlikely that American power elites will be able to successfully restructure while preserving large parts of both the political and economic architecture. That is due to 2009 economic foundations being drastically different than in 1870s, 1930s, or 1950s.
Muslim Academy

Work and Faith Relationship in Islam - 0 views

  •  
    In our current hyper-productive, "time-is-money" motivated community, the idea of a "9 to 5″ working hours doesn't really are available any longer. The time spent at work, whether at the office or any other place, often competing the time spent targeted on anything else in our lifestyle. With the convenience of technology, work has crept into the sides of our everyday living and essentially obliterated the stability between the public and private dichotomies that were once clearly separated. From Islamic Point of View As Muslims, the fact that Islam is a way of lifestyle and not just a perception, punches an even greater wrench into the frustrating complexness of keeping personal perception levels and discussing work circumstances. From arranged wishes and guidelines of modesty, to a month of going on a fast and limited sex connections, God-consciousness prevails in all that a exercising Islamic does. So, when work seems to leak over into lifestyle and individuals are frustrated from providing perception into the office, how does a Islamic reunite the requirements of the office without limiting his or her faith?
thinkahol *

The Moment When the Police Lost the Occupy Portland Narrative | Blogtown, PDX - 0 views

  •  
    Well, it turned. The police bureau is starting to crack after six weeks of Occupy Portland. And one picture, right here, crystallizes the precise moment when it happened. During a choreographed effort to pull a few dozen protesters out of the Chase bank branch outside Pioneer Square, part of today's hundreds-strong N17 day of action, Portland police officers resorted to a decidedly more muscular show of force in a clash watched by TV cameras and rush-hour commuters earlier this evening. Suddenly all the fun-the dance parties, the union songs, the peaceful arrests earlier on the Steel Bridge and at Wells Fargo-was for naught. Tromping in with mounted officers, they pushed marchers who had gathered on the sidewalks along SW Yamhill into the street-forcing them to block MAX trains, something no one was doing until the heavily armored riot squad showed up-and then poked and, for the first time, pepper-sprayed the marchers. Significantly, some of the spraying came after protesters had clearly retreated to the opposite sidewalk. (In another odd shift, there also was no federal-court-required verbal PA warning that chemical munitions would be deployed-a hallmark of every other mass police action to date.) Meanwhile, at almost the very same moment, Police Chief Mike Reese was on TV blaming Occupy Portland for his officers' inability to respond to a rape victim for three hours today. Consider that tantamount to a declaration of war. Reese's point? Officers are tired and have been too distracted to do their main jobs: responding to actual crimes. It was an attempt to spin sentiment against the movement, which seems to be attracting adherents. Even the O today said the movement is "building momentum" and said the average age of some 34 arrestees earlier today was 50-not a bunch of young, anarchists/punks/hoodlums/hippies/road warriors etc. But that might come back to haunt him, judging by a wave of outrage on Twitter and elsewhere among those who noted that it
Blane Beckwith

Petition | Registered California voters: Reject the SEIU-UHW ballot initiative requirin... - 0 views

  •  
    Stop SEIU from taking over the lives of California's disabled and seniors. We must be the ones to train and supervise the people who do care giving.
thinkahol *

Rules of America's rule of law - Glenn Greenwald - Salon.com - 0 views

  •  
    * If you torture people or eavesdrop on Americans without the warrants required by the criminal law, you receive Look-Forward Imperial Immunity. * If you shoot and kill unarmed rescuers of the wounded while occupying their country and severely wound their unarmed children sitting in a van -- or if you authorize that conduct -- your actions are commended. * If you help wreck the world economy with fraud and cause hundreds of millions of people untold suffering, you collect tens of millions of dollars in bonuses. * If you disclose to the world evidence of war crimes, government lawbreaking, or serious corruption, or otherwise embarrass the U.S., you will be swiftly prosecuted to the fullest extent of the law and face decades in prison.
thinkahol *

FDL Book Salon Welcomes Bruce Fein, American Empire Before the Fall | Book Salon - 0 views

  •  
    There's no doubting the conservative bona fides of Bruce Fein. A high-level Justice Department lawyer in the Reagan administration in the 1980s and previously a resident scholar with the Heritage Foundation, he is a long-time advocate for uncompromising right-wing political principles. Yet paradoxically, Fein has been, and remains, one of the most eloquent and incisive political voices over the last decade. He was one of the earliest and most emphatic critics of Bush and Cheney's radical abuses of executive power. Two weeks after The New York Times revealed in December, 2005, that Bush had ordered the NSA to illegally eavesdrop on Americans without the warrants required by law, Fein used his column in the right-wing Washington Times to warn that "Mr. Bush has adamantly refused to acknowledge any constitutional limitations on his power to wage war indefinitely"; to scorn as "war powers nonsense" the theories assembled "to defend Mr.
thinkahol *

How Corporations Buy Congress | BuzzFlash.org - 0 views

  •  
    With the November elections quickly approaching, the majority of  Americans will be thinking one thing: "Who cares?" This apathy isn't due  to ignorance, as some accuse. Rather, working people's disinterest in  the two party system implies intelligence: millions of people understand  that both the Democrats and Republicans will not represent their  interests in Congress.  This begs the question: Whom does the two party system work for? The  answer was recently given by the mainstream The New York Times, who  gave the nation an insiders peek on how corporations "lobby" (buy)  congressmen. The article explains how giant corporations - from  Wall-mart to weapons manufacturers - are planning on shifting their  hiring practices for lobbyists, from Democratic to Republican  ex-congressmen in preparation for the Republicans gaining seats in the  upcoming November elections: "Lobbyists, political consultants and recruiters all say that the  going rate for Republicans - particularly current and former House staff  members - has risen significantly in just the last few weeks, with  salaries beginning at $300,000 and going as high as $1million for  private sector [corporate lobbyist] positions." (September 9, 2010) Congressmen who have recently retired make the perfect lobbyists:  they still have good friends in Congress, with many of these friends  owing them political favors; they have connections to foreign Presidents  and Kings; and they also have celebrity status that gives good PR to  the corporations. Often, these congressmen have done favors for the corporation that  is now hiring them, meaning, that the corporations are rewarding the  congressmen for services rendered while in office, offering them million  dollar lobbyist jobs (or seats on the corporate board of directors)  that requires little to no work.  The same New York Times article revealed that the pay for 13,000  lobbyists currently bribing Congress is a combined $3.5 bil
thinkahol *

Robert Reich (The American Jobs Emergency Requires Action) - 0 views

  •  
    This is not a recovery. It's a continuing jobs emergency and it demands action.
alex thorn

Fingerprint Registry in Housing Bill!!! | OpenMarket.org - 0 views

  •  
    New bill would require millions present fingerprints to the FBI or other agencies in order to "conduct business transactions."
Skeptical Debunker

Piezo-rubber creates potential for wearable energy system - 0 views

  •  
    As we continue to carry around items that insist on requiring electricity to work, portable-even wearable-energy-generating systems are looking very attractive. A group of researchers has recently looked into the use of piezoelectric materials, which generate an electric field or potential when placed under mechanical stress. By placing these materials on a rubbery or flexible surface, they created a material that can generate the highest rate of energy conversion reported for similar systems. While these are still far from the market, the metrics of the flexible piezoelectrics so far are very promising.
Skeptical Debunker

Gripe site prevails in domain cybersquatting case - 0 views

  • In his decision, Judge Robert Cleland said that CAN's case "must fail" because the company did not provide evidence that White had intended to profit from the domains. He did acknowledge, however, that White made some attempt to damage CAN's business by climbing the search rankings, but that it was only to warn other potential customers—an action that is protected under the First Amendment. Because White's websites didn't represent themselves as the real company websites for CAN and they provided accurate contact information, they were clearly gripe sites and did not infringe on CAN's marks. As noted by TechLaw, the ruling included some extra details about what is required (or in this case, not required) to qualify as a "gripe site." careeragentsnetworks.biz did not include a disclaimer stating that it is not affiliated with CAN, for example—something that many gripe sites do for the explicit purpose of avoiding lawsuits like this—but that didn't make a difference in the ruling. The decision has been applauded as a victory for the First Amendment, but is a frustrating one for trademark holders. Companies have been notoriously unhappy with the existence of gripe sites, though not everyone gives into legal threats. In 2007, we covered a case involving an Ars reader who was fighting a legal battle against Lowe's over his site, lowes-sucks.com, and in 2009, Goldman Sachs made headlines for trying to bully the creator of Goldmansachs666.com into shutting the site down. When we spoke with EFF staff attorney Corynne McSherry in 2007, she told us that the courts have been clear that "gripe sites like this are protected—in fact, they want people to speak freely and share information about their experiences with various companies." As long as they don't represent themselves as the real company, it seems the courts are still on the side of dissatisfied consumers.
  •  
    A gripe site that incorporates a company's entire trademark into its domain is still protected under the First Amendment, a US District Judge has ruled. In the case of Career Agents Network v. careeragentsnetwork.biz, the judge said that the gripe site made no effort to bolster its own business and was noncommercial, therefore protecting it from Career Agents Network's trademark claims and cybersquatting accusations.
Skeptical Debunker

Big Content condemns foreign governments that endorse FOSS - 0 views

  • University of Edinburgh law lecturer Andres Guadamuz wrote a blog entry this week highlighting some particularly troubling aspects of the IIPA's 301 recommendations. The organization has condemned Indonesia and several other countries for encouraging government adoption of open source software. According to the IIPA, official government endorsements of open source software create "trade barriers" and restrict "equitable market access" for software companies. The profound absurdity of this accusation is exacerbated by the fact that Indonesia's move towards open source software was almost entirely motivated by a desire to eliminate the use of pirated software within the government IT infrastructure. It's important to understand that Indonesia has not mandated the adoption of open source software or barred government agencies from purchasing proprietary commercial software. The Indonesian government issued a statement in 2009 informing municipal governments that they had to stop using pirated software. The statement said that government agencies must either purchase legally licensed commercial software or switch to free and open source alternatives in order to comply with copyright law. This attempt by Indonesia to promote legal software procurement processes by endorsing the viability of open source software has apparently angered the IIPA. In its 301 recommendations for Indonesia, the IIPA demands that the government rescind its 2009 statement. According to the IIPA, Indonesia's policy "weakens the software industry and undermines its long-term competitiveness" because open source software "encourages a mindset that does not give due consideration to the value to intellectual creations [and] fails to build respect for intellectual property rights." The number of ways in which the IIPA's statements regarding open source software are egregiously misleading and dishonest are too numerous to count. The IIPA seems to have completely missed the fact that there is a very robust ecosystem of commercial software vendors in the open source software market and that open source software is at the heart of some of the most popular consumer electronics products that are sold in the United States. It has clearly become an important part of the US software economy and increasingly serves as an enabler of innovation and technological progress. In light of the profitability of Red Hat and other open source leaders, it seems absurd to contend that open source software adoption will weaken the software industry or reduce its competitiveness. In fact, the emergence of open source software has contributed to creating a more competitive landscape in the software industry by offering alternative business models that enable smaller companies to gain traction against the dominant incumbent players. The IIPA's position is profoundly hypocritical, because many parts of the US government, including the Department of Defense, have issued their own memos endorsing open source software adoption. The IIPA's disingenuous move to equate open source software with piracy reeks of desperation. The BSA and other IIPA members are likely losing sleep over open source software because that development model and approach to licensing will empower developing countries to build their own domestic IT industries, eliminating the need for them to tithe to American software giants. It's another failing of the 301 review, which Big Content wants used to coerce other countries into adopting ever-more-stringent copyright laws.
  •  
    In accordance with US trade law, the Office of the US Trade Representative (USTR) is required to conduct an annual review of the status of foreign intellectual property laws. This review, which is referred to as Special 301, is typically used to denounce countries that have less restrictive copyright policies than the United States. The review process is increasingly dominated by content industry lobbyists who want to subvert US trade policy and make it more favorable to their own interests. We have already noted the targeting of Canada for its supposedly lax copyright laws, but that is not the only nation drawing the ire of Big Content. One of the organizations that plays a key role in influencing the Special 301 review is the International Intellectual Property Alliance (IIPA), a powerful coalition that includes the RIAA, the MPAA, and the Business Software Alliance (BSA). The IIPA, which recently published its official recommendations to the USTR for the 2010 edition of the 301 review, has managed to achieve a whole new level of absurdity.
rich hilts

ABC, CBS Arrogance Warrants A Reply - Profit Backlash SHOULD Be Large - 0 views

shared by rich hilts on 03 Jan 11 - No Cached
  •  
    ".....But that would require responsibility to be taken, and we know how the left is about that. "No - I am just the Captain of the vessel, I don't know why there are icebergs coming at us instead of palm trees - it must be the first mates problem." We've talked about arrogance so much on here only because it is so true. But I don't want to be just a negative nelly. I don't want to be just a naysayer. My angle on the situation is becoming much more of an active, let's suggest a solution standpoint now......"
thinkahol *

YouTube - Sam Harris SALT - 0 views

  •  
    December 9th, 02005 - Sam Harris"The View From The End Of The World"This is an audio only presentation. This talk took place in the Conference Center Golden Gate Room, San Francisco. Quote: With gentle demeanor and tight argument, Sam Harris carried an overflow audience into the core of one of the crucial issues of our time: What makes some religions lethal? How do they employ aggressive irrationality to justify threatening and controlling non-believers as well as believers? What should be our response? Harris began with Christianity. In the US, Christians use irrational arguments about a soul in the 150 cells of a 3-day old human embryo to block stem cell research that might alleviate the suffering of millions. In Africa, Catholic doctrine uses tortured logic to actively discourage the use of condoms in countries ravaged by AIDS. "This is genocidal stupidity," Harris said. Faith trumps rational argument. Common-sense ethical intuition is blinded by religious metaphysics. In the US, 22% of the population are CERTAIN that Jesus is coming back in the next 50 years, and another 22% think that it's likely. The good news of Christ's return, though, can only occur following desperately bad news. Mushroom clouds would be welcomed. "End time thinking," Harris said, "is fundamentally hostile to creating a sustainable future." Harris was particularly critical of religious moderates who give cover to the fundamentalists by not challenging them. The moderates say that all is justified because religion gives people meaning in their life. "But what would they say to a guy who believes there's a diamond the size of a refrigerator buried in his backyard? The guy digs out there every Sunday with his family, cherishing the meaningthe quest gives them." "I've read the books," Harris said. "God is not a moderate." The Bible gives strict instructions to kill various kinds of sinners, and their relatives, and on occasion their entire towns. Yet slavery is challenged nowhere in the New or
1 - 20 of 50 Next › Last »
Showing 20 items per page