General Terms Lazarus Alliance, LLC (“Lazarus Alliance, LLC” or “we”) understands that your privacy is important to you. Lazarus Alliance, LLC is committed to protecting the privacy of your personally-identifiable information as you use this Site. The scope of Lazarus Alliance, LLC’s commitment is described in this Privacy Policy. By submitting information, you agree to… Read More
Usage Terms
MichaelPeters.org – Your Personal CXO and its affiliates (“MichaelPeters.org – Your Personal CXO” or “we”) provides its content on MichaelPeters.org (the “Site”) subject to the following terms and conditions (the “Terms”). We may periodically change the Terms, so please check back from time to time. These Terms were last updated on March 31, 2012. By… Read More
Would you buy a car without seat belts?
Recent headlines said, “Network ransacked in huge brute-force attack” (Source: The Register) and “Hackers break SSL encryption used by millions of sites” (Source: Huffington Post) among many other security and privacy news that fill the news outlets every time I look and listen. The problem is not some new phenomenon, but one that continues to… Read More
The Death of Privacy?
Today, I propose we declare the death of privacy. In our technically advancing world, our personal privacy expectations must be reconsidered, re-conceived and redefined. We all expose ourselves through swipes, transactions, likes and tweets. Through handsets, television sets and mindsets, we voluntarily add our behavioral attributes to the associated handlers of our digital DNA almost… Read More
FTC Proposes Significant Changes to the Online Collection of Information from Children rule
The Federal Trade Commission (“Commission”) released on September 15, 2011, its long-awaited proposed amendments to its rule implementing the Children’s Online Privacy Protection Act (“COPPA Rule”). They are accepting comments until November 28, 2011. The Commission is proposing modifications to the COPPA Rule in three key facets:
Weekly Digest for September 22nd
mdpeters posted Privacy: Statutory Protections. mdpeters posted Industry Self-Regulation. mdpeters posted User:Mdpeters. mdpeters posted 2 items. User:Lynneabt User:Kylegdgodi mdpeters posted 2 items. User:PashaZuck User:Jrbarney mdpeters posted 2 items. International Issues Directive 95/46/EC
Expanding Security Breach Notification Requirements in California
A new amendment to California’s security breach notification law will raise the stakes for businesses required to give notice of a data security breach affecting California residents. California Senate Bill 24 (“SB 24”), signed by Governor Brown on August 31, 2011, imposes detailed new requirements for the content of security breach notices. Significantly, SB 24… Read More
Geolocational Privacy and Surveillance Act – First Blush
The law does not lead, it follows. Our system is very reactive in nature. It tends to change, without my surprise, like people generally do as a direct result to negative events or influences. Smokers quit following the heart attack and our legal system create laws based upon past events. GPS technology has been around… Read More
Dropbox? More Like Dropball!
There has been a putative class action complaint filed on June 22, 2011, in the United States District Court, for the Northern District of California alleging that the popular cloud-based storage provider Dropbox, Inc. failed to secure its users’ private data or to notify the vast majority of them about a recent data breach. According… Read More
We Eat Our Own
Our reasonable expectation of privacy is an illusion similar to the “job security” myth perpetuated by so many workers. The power to control your identity, privacy and security has less and less to do with the individual and more to do with corporate honor or criminal intent both of which sometimes have blurry demarcation. We… Read More
Weapon of Mass Disruption (WMD)
Of all the attacks taking place on Web sites across the Internet today, and there have been some very high profile ones recently, SQL injection is making its mark as the cyber-criminal’s most effective weapon of mass disruption (WMD) into corporate data stores. In my opinion, this threat vector against the crown jewels is public… Read More
Weekly Digest for March 24th
mdpeters posted 4 items. HORSE – Holistic Operational Readiness Security Evaluation.:General disclaimer HORSE – Holistic Operational Readiness Security Evaluation.:Privacy policy Anti-cybersquatting Consumer Protection Act Anti-cybersquatting Consumer Protection Act mdpeters posted 3 items. Main Page Main Page HORSE – Holistic Operational Readiness Security Evaluation.:About mdpeters posted User:Ledelars.
Juris Doctor 118-119 of 161
While I was doing some research on consumer protections in my Cyberspace Law class, I encountered the following policy that is certainly on the horizon for consumer protections. You can find the original press release here: Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework, The Department of Commerce internet policy… Read More
Congratulations Your New Expinfo Account is Approved.
I received a confirmation message this morning though email from a company called Expinfo. Dear MICHAEL D, You have successfully registered with Expinfo Inc. Following are your Login details. I’ve never done business with, contacted, or knew these scoundrels existed but apparently, my alter impersonated expinfo-ego created an account and emailed me the credentials. This… Read More
Juris Doctor 117 of 161
I am definitely having fun with my Cyberspace Law class this term. The course concludes this December so I have the rest of the year to immerse myself into a synergistic subject area. It is widely held that in general, lawyer’s knowledge about computers, and predictions they make about new technology, are highly likely to… Read More
CISO FYI 2011021001
Security through Encryption Overview: As many companies begin the migration of their internally hosted email to cloud providers such as Google, several items that need to be discussed come to my mind to ensure your corporate privacy and security is maintained. There are plenty of crossover implications for personal privacy and security as well. Encryption… Read More
How E-Commerce Apps Are Putting Your Site at Risk
Article Reprint: http://www.ecommercetimes.com/story/How-E-Commerce-Apps-Are-Putting-Your-Site-at-Risk-70964.html?wlc=1286281687&wlc=1286300892 Many developers do not overlook security on purpose; it’s just that the focus is usually on feature and functionality, not the nuts and bolts of building a secure software application. These technical oversights can leave a relatively easy opening for attackers to leverage. Cross-site scripting or data source injection are the most… Read More
Juris Doctor 86 of 215
Anyone who knows me is aware of a penchant for surveillance technology that spans three decades now. I periodically refresh my legal knowledge in this space in an effort to keep abreast of State and Federal statues involving electronic surveillance. Recently, I added some updates to the HORSE Project Wiki located here: http://lazarusalliance.com/horsewiki/index.php/18_USC_2518, and http://lazarusalliance.com/horsewiki/index.php/USAM_9-7.200… Read More
Juris Doctor 85 of 215
So I’ve been spending a bit of time with the Federal Rules of Civil Procedure and I of course look for connections to the activities I’m involved in such as my day job as Chief Information Security Officer. A trend that I’ve commentated upon heavily over the past two years concentrates on what is being… Read More
Emerging trend or merging trend? I think so!
I’ve been conducting a new job search and what very is interesting to me, and should also be to any job seeker or person who is interested in maintaining their competitive edge, is a noticeable increase in the basic required qualifications and especially the preferred qualifications listed in most job postings. In part I am… Read More
Weekly Digest for March 18th
mdpeters New blog post: Weekly Digest for March 11th https://michaelpeters.org/?p=1338 [obDADkenobi]. mdpeters New blog post: Now Reading: Irrefutable Laws of Leadership – 2 https://michaelpeters.org/?p=1354 [obDADkenobi]. mdpeters New blog post: Juris Doctor 78 of 215 https://michaelpeters.org/?p=1359 [obDADkenobi]. mdpeters posted 12 items. File:Intelligent-File-Transfer.pdf Getting it Right in Records Management Legal-Technology White Papers Legal-Technology White Papers Manage Document… Read More
Juris Doctor 77 of 215
I’ve been examining the principles of criminal procedures today. Specifically arrest, search, and seizure. One of my favorite facets concerns what is known as “Protected Areas and Interests.” The reason for my fascination with this specifically concerns wiretapping and eavesdropping, the applicable laws, and court interpretations. Wiretapping or eavesdropping is the listening in on conversations… Read More
Daily Digest for November 18th
mdpeters posted 3 items. IR – Iran moves to silence opposition with internet crime unit Telephone tapping in Turkey; a measure to intimidate the judiciary? The Pirate Bay Trackers Go Offline Forever mdpeters posted 2 items. Facebook adopts new privacy policy UK: T-Mobile staff sold personal data
Daily Digest for November 17th
mdpeters posted 13 items. Terrorism chiefs don’t know what they’ve censored online CN – Chinas Censorship 2.0: How companies censor bloggers New Internet Treaty Alarms Online Freedom Advocates Home Office accused of sexing-up mobile phone rescue WTO May Challenge Internet Censorship ICO chastises NHS over data losses Swiss roll Street View into court IGF censors… Read More