Subscribe with Bloglines The Privacy Lawyer: 08/01/2004 - 09/01/2004

Saturday, August 28, 2004

CNN.com - Keeping name private can be crime, court rules - Jun 21, 2004

CNN.com - Keeping name private can be crime, court rules - Jun 21, 2004 This U.S. Supreme Court decision upheld a Nevada law that permitted someone to be arrested for failing to provide their name and identification in an unprovoked stop by law enforcement. It means that in the states with similar laws, or the states that will adopt such laws, you have to provide ID if the law enforcement officer asks you for it, even if you haven't done anything wrong.
At least one Supreme Court Justice saw this as violating the person's civil rights. But in a post-September 11th world, requiring people to prove who they are is more acceptable than it might otherwise be.
It's the law now, so arguing won't make much of a difference. And if not abused and used only within its correct boundaries, this may not be a problem. But what if it's misused or abused?

that worries me.
Parry

CNN.com - Keeping name private can be crime, court rules - Jun 21, 2004

CNN.com - Keeping name private can be crime, court rules - Jun 21, 2004 This U.S. Supreme Court decision upheld a Nevada law that permitted someone to be arrested for failing to provide their name and identification in an unprovoked stop by law enforcement. It means that in the states with similar laws, or the states that will adopt such laws, you have to provide ID if the law enforcement officer asks you for it, even if you haven't done anything wrong.
At least one Supreme Court Justice saw this as violating the person's civil rights. But in a post-September 11th world, requiring people to prove who they are is more acceptable than it might otherwise be.
It's the law now, so arguing won't make much of a difference. And if not abused and used only within its correct boundaries, this may not be a problem. But what if it's misused or abused?

that worries me.
Parry

my response to Ed on datamapping and privilege

Thanks Charlie.
Privilege issues arise when someone tries to subpoena or use certain information or compilations of information from a litigant. If something is privileged, it cannot ever be collected in discovery. It’s not just harder to get, it can’t be gotten at all. But privilege issues are very tricky here. You would have to prove that the information was gathered just for the lawyer, in anticipation of litigation. If the information otherwise exists in another form, or somehow privilege is negated (a third party is also privy to the information) or it doesn’t comply with all requisite requirements, it can be obtained in most discovery requests, governmental or private litigation.

I agree that this is an ongoing issue, but the audit starts the process, letting people know what they need to look at to spot where information is stored, accessed and originates. This is the first of three articles. The next one deals with what you do once the initial audit is compiled. Perhaps you and others in this group can help me with real life suggestions. Lawyers, even tech-savvy ones, are just that, “layers.” You and others like you are the real experts. Teach me what I need to know. J

Thanks,
Parry
The Privacy Lawyer,
Aftab.com and theprivacylawyer.blogspot.com

data mapping...a comment from a fellow blogger and tech-expert.

(Parry is "The Privacy Lawyer" for Information Week and has called for the creation of a "Data Map" to manage privacy.)
Hi Parry,
I enjoyed your article "It's time to build a data map." I have referenced it favorably on my weblog www.erp4it.com.
My perspective is that what you call for should not be done episodically (e.g. through a periodic audit process) but rather should be intrinsic in how the IT organization is managed...
Doing this requires sophisticated systems and processes to get it right and keep it up to date, and the irony is that IT tends to be the "cobbler's barefoot child" -- building and running powerful systems for its clients, while struggling along with spreadsheets and undocumented, easily-abused processes to run its own business. This is an increasing topic of conversation in large IT shops as the dot com hangover wears off and enterprises start to face the reality of managing complex application portfolios.
My day job is working for a Fortune 100 electronics specialty retailer, where I head a capability called the Metadata Management Office. I don't know if you have ever heard the term "metadata," but it is the core of what you are talking about. It means data about data, and data about the systems that process the data. It's a longstanding concept in large scale IT; in earlier years it was called the "data dictionary" which became the "metadata repository" and now there is a related concept called a "configuration management database." Supporting process frameworks have emerged in ITIL and COBIT. Other relevant concepts are enterprise architecture, systems management frameworks, and portfolio management; tools marketed under these categories would cover large sections of the problem (but by no means all of what you call for). One key thesis of mine is that all of these tools are inexorably converging into a generalized "ERP for IT" domain.
One question I have as a non-lawyer is what is meant by "privileged" information. I assume this means that if the information were captured as part of an audit done under certain protocols, it would be harder to subpoena in a court case?
I can't speak to whether this is a significant risk, but I do know that your "data map" is information generally hard to come by in most large IT shops, and eagerly sought whenever it is compiled. It has day to day value in planning, building, and running IT systems, and it would be unfortunate if this complex and hard to inventory data were locked away once compiled; it's just too useful. It's also information not easily represented in the tools I imagine an external audit team would use: spreadsheets, Word documents, and so forth. Kind of like trying to "audit" an Intel microprocessor; you need specialized tools just to handle the complexity.
All for now; very interested in your perspectives.
Charlie Betz

Friday, August 27, 2004

The Power of One, a new book about community involvement

Trafford Publishing: Item 6246 PageThis book contains the history of how I became involved with protecting others online. Debra Schweiger is a wonderful woman and has written this as her first book.

Thursday, August 26, 2004

Get a Life...Parry's Blog comments on how she spends way too much time online :-)

Parry's BlogParry says she needs ot get a life, and if you read her columns, so do you :-)

IHT: Internet lets teen bullies inflict suffering from afar

IHT: Internet lets teen bullies inflict suffering from afar International Herald tribune's article on cyberbullying
, featuring Parry.

The New York Times > Education > Internet Gives Teenage Bullies Weapons to Wound From Afar

The New York Times > Education > Internet Gives Teenage Bullies Weapons to Wound From Afar

Wednesday, August 25, 2004

Google yourself! Finding information about yourself before other s do- Cyberbullying, Flaming and Cyberstalking

Internet Super Heroes - Cyberbullying, Flaming and Cyberstalking for Parents, Educators and Law Enforcement

When kids act out violent fantasies online -Internet Super Heroes - Cyberbullying, Flaming and Cyberstalking [CFC] for Kids, Tweens and Teens

Internet Super Heroes - Cyberbullying, Flaming and Cyberstalking [CFC] for Kids, Tweens and TeensKids confess the darnedest things to me when I sit and chat with them about what they do online. This includes confessions of cyberstalking and sending death threats to strangers online.

Internet Super Heroes - How you can avoid being a victim of Cyberbullying, Flaming and Cyberstalking [CFC] for Kids, Tweens and Teens

Internet Super Heroes - Cyberbullying, Flaming and Cyberstalking [CFC] for Kids, Tweens and Teens

Internet Super Heroes - How not to become a cyberbully

Internet Super Heroes - Cyberbullying, Flaming and Cyberstalking [CFC]for Kids, Tweens and TeensIt's so easy to say things online in anger, or click send before you have thought through the consequences of what you are saying. There are some tips we have developed over the years that help avoid the post-click remorse. Think before you click.

The Interactive Contract for parents and kids...setting the rules and why

The Interactive ContractParry's Safe Surfing Contract, with a cheat sheet for parents on why you need to set the rules and how.

Internet Super Heroes - Telling the difference between Cyberbullying, Flaming and Cyberstalking for Parents, Educators and Law Enforcement

Internet Super Heroes - Cyberbullying, Flaming and Cyberstalking for Parents, Educators and Law EnforcementCan you tell the difference? some tips to knowing when you should just ignore a communication, and when you need to do more.

How do you report a terms of service violation?

Internet Super Heroes - Cyberbullying, Flaming and Cyberstalking for Parents, Educators and Law EnforcementReporting terms of service violations. What you need ot know, when things go wrong and you want them to stop.

WiredKids: Parents, Parenting Online

WiredKids: Parents, Parenting OnlineA simple guide to help parents understand the basics about kids online and how to keep them safe.

Internet Super Heroes - Cyberbullying, Flaming and Cyberstalking

Internet Super Heroes - Cyberbullying, Flaming and CyberstalkingCan you tell the difference between flaiming, cyberbullying and harassment and cyberstalking? It's not always easy. This series of articles helps you know everything you need ot know to handle cyberbullying.

Internet Super Heroes - Using Marvel's superheroes and supervillians to help stop cybercrime and abuse and teach responsible Internet use

Internet Super HeroesAlthough the site doesn't officially launch until September 15th, the cyberbullying information is up in advance to deliver help in coordination with the NY Times piece today.

The New York Times > Education > Internet Gives Teenage Bullies Weapons to Wound From Afar

The New York Times > Education > Internet Gives Teenage Bullies Weapons to Wound From AfarCyberbullying is a bigger problem than most people realize. We spend so much time protecting children from predators online and forget we need to protect others from our kids at least as often.
Amy Harmon has written a great article about cyberbullying, how it works and how hurtful it can be.

Tuesday, August 24, 2004

Parry's latest article: Don't Wait Until An Employee Is Cyberstalked Before You Act

InformationWeek %3E Security %3E The Privacy Lawyer%3A Don%27t Wait Until An Employee Is Cyberstalked Before You Act %3E August 23%2C 2004Cyberstalking in the workplace is a rising problem. I advise companies ot think about it before it occurs. FAQs and prevention tips are provided from our WiredSafety.org cyberstalking and harassment help division.

Thursday, August 19, 2004

In re PayPal Litigation Settlement Website

In re PayPal Litigation Settlement WebsiteThis is where you can file your claim in the PayPal class action case.

The PayPal class action settlement e-mails

We have received many e-mails from people who received notice of a class action settlement from PayPal. Many thought it was a scam, but it isn't. Several years ago, prior to eBay's purchase of PayPal, PayPal had frozen some of their customer's accounts.
The case was just settled and those who can prove their having been damaged can participate in the settlement. Don't expect to get rich from the settlement, but you may be entitled to some kind of recovery.
You can submit your claim entirely online, and I have included the link at the next posting in this blog.

good luck,
Parry

Friday, August 13, 2004

Protecting Your Personal Information Online, Spyware

Safety, Protecting Your Personal Information Online, SpywareA new article at wiredsafety.org written by our security experts.

InformationWeek > Tracking Information > The Privacy Lawyer: It's Time To Build A Data Map > August 9, 2004

InformationWeek > Tracking Information > The Privacy Lawyer: It's Time To Build A Data Map > August 9, 2004What do you know about what information you are collecting and how it is collected and stored? Part one of Parry's "how to" guide for building a data map and audit.

Friday, August 06, 2004

Scams and fraud online...suspending all sense of reality

what is it about something typed into an e-mail or on a website that causes people to suspend all sense of reality and believe anything they read online?

Thousands of people have lost their life savings to the Nigerian scams, when they are promised a piece of the multi-million dollar action because a complete stranger tells them they were selected for their trustworthiness. I recently received an e-mail from a young woman in India who told me that a complete stranger contacted her to give her a piece of his business. She gave him lots of personal information about herself, believing that he was going to give her this business.

I think that when we are online, we forget that we don't really know those we read about, or hear from. And when something comes to us, and it touches us in some way...by telling us that our bank account has been compromised, or that we will lose our paypal privileges or no be able to bid on ebay anymore, we react before we think. We give out our passwords and logins by accessing the linked site, thinking we are logging into Citibank, or Paypal, or eBay. Instead we are giving away our information to scam artists and fraudsters.

And if someone posts something on a website that doesn't make sense, and the pieces of the puzzle don't fit together, if they say things that make us angry, or make us want to defend them, we forget to use our heads. Instead of reading things completely, we react. Insteading of questioning the credibility of someone you don't know, who hasn't earned the trust of others you trust, we entrust people who are not worthy of your trust.

The best way to protect yourself online is by using your head. If something appears too good to be true, it's not true. If something doesn't make sense, don't take it at face value. Good judgment should apply online as much as offline, perhaps even more so.

think before you click "send".

Parry