July 29, 2005

What's going on? Niger & Mali Epidemics

Because we are in XXI century and all human beings must have food & education.
NO FUTURE = NO EDUCATION


WHO Warns of Epidemics in Niger By Lisa Schlein Geneva 29 July 2005 in VOANEWS.COM

World Health Organization (WHO) warns the food crisis affecting Niger is putting people at greater risk of epidemics. The health agency has sent medical experts to the country to help head-off deadly outbreaks of communicable diseases.

The World Health Organization says Niger's food shortages have weakened peoples' resistance to disease. As a consequence, it says it expects an increase in the number of communicable diseases and deaths.

WHO Emergency Medical Expert, Pinot Annunziata, says many of these diseases will result from poor water and sanitation. He says people will die from diarrhea, malaria or measles. He says some parts of Niger already are gripped by cholera, and 49 people have been reported sick.

"And, we have already five deaths which means, in our language, a case fatality rate that is particularly high, which is more than 10 percent," he said. "You are expecting one, two percent of number of deaths versus the number of cases. In this case, it is already 10 and this is already an indicator that those diseases are affecting very weak human bodies, basically."

Full article

Food crisis could affect Mali

Niger y Mali: La vergüenza del slilencio en Ayuda contra el hambre "en la zona norte de Malí y en las regiones de Tahoua y Maradi en Níger, más de uno de cada tres niños menores de cinco años sufre desnutrición aguda."

July 28, 2005

RFID in human beings for patient care

Implantable chips bear promise, but privacy standards needed
Published in Beth Israel Deaconess Medical Center 7/27/2005 By Jerry Berger jberger@bidmc.harvard.edu

Radio frequency identification (RFID) chips implanted into human beings hold the promise of improving patient care, particularly in emergency settings, but only after privacy questions are addressed, according to a Beth Israel Deaconess Medical Center (BIDMC) physician who has a chip implanted in his arm.

Writing in the July 28 edition of the New England Journal of Medicine, John Halamka, MD, chief information officer at BIDMC and Harvard Medical School and an emergency room physician, says the chip implanted in his upper right arm would allow anyone with a handheld RFID reader to scan his arm and obtain his 16-digit medical identifier.

The chip, which consists of several small components encased in an unbreakable glass capsule, was implanted in his arm in December 2004 with only a local anesthetic. Any authorized health care worker can visit a secure web site hosted by the chip manufacturer and retrieve information about his identity, and that of his primary care physician, who could provide medical history details.

Recalling his experience as an emergency medicine resident who could spend hours trying to determine the identify of John or Jane Doe patient, Halamka believes properly encrypted technology could prove to be a boon in helping to avoid unwanted medical interventions.
“For patients with Alzheimer’s disease who wander away from home, an identifier that enables caregivers to identify non-verbal or confused patients and determine their health care preferences could be very desirable,” he says.

But a number of significant legal, ethical and technological hurdles need to be overcome first.
“Since my chip contains only my medical identifier, unauthorized reading would not disclose health information,” says Halamka. “But nothing is simple,” noting current technology and lack of specific privacy policy could enable spammers to track him in a manner similar to computer “spyware” that infests computers after visits to certain Internet sites. There are significant ethical questions about inserting chips in patients incapable of proving informed consent.
Technology “hackers” continue to be one step ahead of developers and have shown the ability to break the encryption of existing chips used to purchase gasoline and provide automobile security. And the technology is not cheap: each chips costs $200 and a reader costs $650, raising the question of whether it is a practical investment for caregivers.
While Halamka reports the chip has resulted in no discomfort, even as he has maintained an active lifestyle that has included extremes of temperature, wind and water while rock and ice climbing. If he wishes to upgrade the chip, it would require minor surgery. Otherwise, it is expected to last at least 10 years, can safely undergo magnetic resonance imaging and passes through airport security systems without incident.

But one of the greatest potential hurdles to widespread adoption may be psychological.
“It is clear there are philosophical consequences to having a lifelong implanted identifier. Friends and associates have commented that I am now ‘marked’ and lost my anonymity. Several colleagues find the notice of a device implanted under the skins to be dehumanizing. I have not investigated these or other moral, religious or political implications.

“On the basis or my unscientific study with a sample of one, I conclude that there may be appropriate uses, that there are privacy concerns that must be accepted by the implantee and that we need to establish standards that permit seamless, secure access to information,” he says.

Beth Israel Deaconess Medical Center is a patient care, teaching and research affiliate of Harvard Medical School, and ranks third in National Institutes of Health funding among independent hospitals nationwide. BIDMC is clinically affiliated with the Joslin Diabetes Center and is a research partner of Dana-Farber/Harvard Cancer Center. BIDMC is the official hospital of the Boston Red Sox.
For more information, visit www.bidmc.harvard.edu.

July 27, 2005

Top 100 Global Brands

Interbrand and Businessweek rank the Best Global Brands by value for 2005.

Business week article.
Interbrand best brands 2005.

And I recommend you take a look at BrandChannel (Interbrand magazine). When, by the way I found a paper about Trust & Brands. "Building confidence in your brand" by Randall Frost.

July 22, 2005

Use of RFID in libraries

I have found this report "Personal Privacy and Use of RFID Technology in Libraries" by Vinod Chachra, CEO VTLS Inc and Daniel McPherson, FASTRAC Project Manager VTLS Inc.


7. Conclusion

The RFID tags in libraries offer the possibility of great increases in productivity and hold a promise of better service for the patrons. The tags are "powerless", have a very small read range, store a minimum amount of data and carry no patron data on the tags. All these actors make privacy concerns almost non-existent at this time. However, it is possible that in the future the tags will have a larger range and more data will be stored on them. This is a direction that should be avoided. The library should always exercise the option to not store any data considered "risky" for its patrons. Through the creation of standards and implementation guidelines, this is possible.

The greater danger to patron privacy comes from an improperly designed or implemented ILS. It is therefore important to work with a vendor that understands patron privacy concerns and builds systems that will minimize the risk for the patrons.

About VTLS Inc.
VTLS Inc. (www.vtls.com) is a leading global company that creates and provides visionary technology in library solutions. We have three distinctive divisions that provide these solutions to a diverse customer base of more than 900 libraries in over 32 countries. Our VIRTUA division remains focused on ILS solutions, our VTRAX division focuses on RFID type technologies, and our Digital Asset Creation & Management division provides cutting edge software and services for Digital Libraries. VTLS is also one of the few ISO 9001:2000 quality certified companies within the library industry.
VTLS Inc. is based in Blacksburg, Virginia, USA. VTLS Inc. also has offices in Brazil, Canada, France, India, Malaysia, Spain and Switzerland.

July 20, 2005

A Pass on Privacy?

A Pass on Privacy? is an article By CHRISTOPHER CALDWELL Published: July 17, 2005 in NYTimes.

"Anyone making long drives this summer will notice a new dimension to contemporary inequality: a widening gap between the users of automatic toll-paying devices and those who pay cash. The E-ZPass system, as it is called on the East Coast, seemed like idle gadgetry when it was introduced a decade ago. Drivers who acquired the passes had to nose their way across traffic to reach specially equipped tollbooths -- and slow to a crawl while the machinery worked its magic. But now the sensors are sophisticated enough for you to whiz past them. As more lanes are dedicated to E-ZPass, lines lengthen for the saps paying cash.

.....

-ZPass is one of many innovations that give you the option of trading a bit of privacy for a load of convenience. You can get deep discounts by ordering your books from Amazon.com or joining a supermarket ''club.'' In return, you surrender information about your purchasing habits. Some people see a bait-and-switch here. Over time, the data you are required to hand over become more and more personal, and such handovers cease to be optional. Neato data gathering is making society less free and less human. The people who issue such warnings -- whether you call them paranoids or libertarians -- are among those you see stuck in the rippling heat, 73 cars away from the ''Cash Only'' sign at the Tappan Zee Bridge.

Paying your tolls electronically raises two worries. The first is that personal information will be used illegitimately. The computer system to which you have surrendered your payment information also records data about your movements and habits. It can be hacked into. Earlier this year, as many as half a million customers had their identities ''compromised'' by cyber-break-ins at Seisint and ChoicePoint, two companies that gather consumer records

......

In October, the F.D.A. approved, for medical use, the VeriChip, a device the size of a grain of rice. It can be implanted under a patient's skin and activated to permit emergency personnel to gain access to personal medical records. It's extremely useful when patients are unconscious, but there is a suspicion that the real application lies elsewhere."

Full article in NYTimes

July 19, 2005

Sensor Networks

A year ago was the Privacy Symposium Securing Privacy in the Internet Age, in Stanford.

One of the speakers was Pamela Samuelson, Professor of Law, Boalt Hall, UC Berkeley

And she talk about Sensor networks


"Considerable amount of R&D underway to develop tiny computers equipped with radio capabilities to sense physical phenomena and transmit data to processing points

Wide array of application domains: smart buildings that can detect internal structural damage or adjust light & heat settings, measuring weather/water info on GG Bridge/redwood trees, monitoring activities of the elderly, sensing for bioterrorism weapons"


And she talks too about CITRIS (Center for Information Technology Research in the Interests of Society at UC Berkeley)

"Technologists designing sensor and sensor network technologies are aware that deployment of such technologies raise privacy and other policy concerns

Deirdre Mulligan & I have begun work with EECS Professors David Culler, Joe Hellerstein, & David Wagner on privacy & sensor network issues"



At CITRIS web site we can see the Foundational studies address difficult common problems faced by Societal-Scale IT System (SIS) designers. These foundations include the reliability and availabilty of information systems, the privacy and security of personal data, and the underlying algorithmic problems inherent in large-scale data analysis.

Security, Privacy & Policy members:

Manuel Castells, Env. Design, UCB (and the amazing trilogy “The Information Age: Economy, Society, and Culture “:)

Pamela Samuelson, Law/SIMS, UCB, Samuelson Law, Technology and Public Policy Clinic

Doug Tygar, EECS/SIMS, UCB (with fantastic papers and books about privacy, security and trust such as this one “Privacy in Sensor Webs”)

Hal Varian, SIMS, UCB (web page) (Information Rules: A Strategic Guide to the Network Economy)with C.Shapiro

Karl Levitt, CS, UCD

And also available CITRIS events:

CITRIS 02
CITRIS 03
CITRIS 04

July 18, 2005

Control frente a privacidad

Después de los atentados sufridos en Nueva York el 11M, Madrid el año pasado y los recientes atentados de Londres el 7 de Julio, se vuelve a debatir la relación entre Privacidad y Seguridad.

Ayer se publica en El Pais, el artículo Control frente a privacidad.por Charo Nogueira.


La polémica está servida. Como arma contra el terrorismo, los ministros del Interior de la Unión Europea han acordado aprobar, en octubre, una norma comunitaria que obligue a las operadoras telefónicas y a los servidores de Internet a almacenar los datos (no los contenidos) de todas las comunicaciones telefónicas y electrónicas durante un año de media. Algunos expertos muestran recelos o cautelas ante esta iniciativa que va en la línea de la vigente Ley de Servicios de la Sociedad de la Información (LSSI). Temen que se pueda abrir la puerta a la vulneración de derechos fundamentales. Frente a ello, las palabras tranquilizadoras del ministro del Interior, José Antonio Alonso. En el trasfondo, el viejo debate entre libertad y seguridad.

En el artículo 7 expertos analizan la cuestion:

JOSÉ ANTONIO ALONSO Ministro del Interior

JOSÉ LUIS PIÑAR Director de la Agencia de Protección de Datos

MARC CARRILLO Catedrático de Derecho Constitucional

ANTONIO TRONCOSO Director de la Agencia de Protección de Datos de la Comunidad de Madrid

PABLO LUCAS MURILLO Magistrado del Supremo y catedrático de Derecho Constitucional

JOSÉ LUIS MAZÓN Abogado especializado en los derechos fundamentales

VÍCTOR DOMINGO Presidente de la Asociación de Internautas

Artículo competo en El PAIS

July 15, 2005

Biometrics ID system debuts at Orlando Airport

Article Published in USA TODAY.COM 2005-06-21

ORLANDO (AP) — Brigitte Goersch placed her hand on a screen that copied her fingerprints, and she then stood in front of an ATM-like machine that captured an image of her eye's iris.
A private company hopes as many as 30,000 other people this year will follow the lead of the security chief at Orlando International Airport by offering up their biometric information for a program guaranteeing travelers an exclusive security line, and the promise of no random secondary pat-downs, in exchange for a background check by the Department of Homeland Security.

The privately run program debuted Tuesday at Orlando, the first and so far only airport that is trying it out.

Those passengers who pay $80 a year to join the traveler pilot program called "Clear" register by computer either at home or at the airport and give their biometric data at an airport kiosk resembling an oversize ATM machine. The information is then submitted to the Transportation Security Administration. If the passengers are approved, they get a baby blue translucent card that holds a computer chip containing their fingerprints and iris image for quick identity verification. They also earn the right to go through a separate, quicker security lane as soon as July, although they still will need to pass shoeless through an airport metal detector.

Full article in USA TODAY

More links about Biometrics & Privacy.

Biomet: The biometric resource center
BiometricWatch
IBIA: International Biometric Industry Association
EPIC: Biometrics Identifiers
IBG Bioprivacy Initiative

July 14, 2005

2005 Deloitte Global Security Survey

Now is available the 2005 Global Security Survey by Deloitte.

Pages 34-35 talks about privacy.

Still less than half (49%) of respondents have established the role of the
Chief Privacy Officer

July 13, 2005

Customized

When experts talks about the future, we can hear words like customized, personal marketing, unique experience, and if companys are going to be closer to customers how are they going to manage privacy? Where are the borders between privacy & customized? Trust?

So to have an answer we can take a look at ECR ("Efficient Consumer Response") Europe web site.

ECR Europe took place The 10th Anniversary ECR Europe Conference & Marketplace last April in the Palais des Congrès in Paris. More than 200 speakers, including the CEO’s of leading companies from across Europe and the United States, discussed their experience of ECR in practice and the benefits for their bottom line. The theme this year was ‘Better Consumer Value – Growing the Cake Together’. The context was an increasingly price-driven market.

Presentation are available in ECR Europe web site.

July 12, 2005

Technology & Privacy

Critics say technology raises privacy concerns
By Francine Brevetti, BUSINESS WRITER


PETER M. STANWYCK figures he uses the popular search engine, Google, at least 10 times a day. He's sure he must have used other search engines before Google was introduced to the Internet but can't remember what they were.

The Oakland attorney is enchanted with the beta site maps.google.com.

Stanwyck knows there are other online sites that will give him the same information, but he reasons, "If you know where it is, why go to another place?"

Stanwyck's point of view is typical of most Internet users today toward the giant search engine Google. With its whimsical, stripped-down homepage, Google crept into the Internet in 1998 as a "pure" search engine with no news, no chat rooms, no weather or stock quotes or any of the other accoutrements of most search engines.

But times have changed. Google now rivals Microsoft in its ambition to gain Internet real estate. This would be of no concern to the user if it were not for the fact that Google is sitting on so much private information. Information for which the government regularly subpoenas it, according to the Electronic FrontierFoundation.

And according to EFF and others in the search business, there is nothing protecting us from Google's misconduct other than Google's word that it will never hurt us. Google officials declined to answer questions for this story.

The company, whose name is based on a mathematical term (googol, 10 to the power of 100, in essence an infinite number), has become a friendly tool to most Internet users. New online users especially appreciate it. They may not know the intricacies of search or all the other search options online, but they know Google.

And they know how "to Google." We've become so dependent on it that the name has become a verb and entered into our lexicon.

Privacy advocates say this dependency is a cause for concern.

Chris Sherman, president of Searchwise LLC and author of "Google Power," says there are major privacy concerns with the way Google accumulates personal information, but he believes Google is sensitive to those concerns.

"It tries to do the right thing," said Sherman, a longtime acquaintance of Google founders Larry Page and Sergey Brin who praised their benevolence

Full article in Inside Bay Area

July 11, 2005

Politics of Privacy

I´ve found this blog Politics of Privacy by Andreas Busch, who is a political scientist who teaches at the University of Oxford, member of The Centre for the Study of Democratic Government areas of interest are Comparative Public Policy and Political Economy.

He is presently working on a research project on the politics of privacy.

The Politics of Privacy (2004- )


Revolutionary technical innovations in the areas of telecommunication, data transmission and computerisation have changed the availability of data fundamentally. Today, any sort of data is in principle available anywhere and at anytime. At the same time the capacity for storing data has grown tremendously, and the fact that stored data can be digitally processed and linked to each other means that new data can be generated from very diverse sources of information, giving them a new quality.

How do different states and societies deal with this new situation? Who controls these data, who has access to them, what purpose can they be used for? What role do policy legacies, be they in the form of data protection laws or institutionalisation of privacy agencies, play? Do parties make a difference? And does the fight against terrorism after 9/11 mean that security has to take precedence over privacy?These are just some of the questions that I aim to deal with in my comparative study of the politics of privacy. As an experiment, I have started a weblog in which I present and discuss some of my ideas and findings. You're invited to visit it and comment!

July 08, 2005

Internet use in Europe: Security and Trust

European Commission has just realeased this report

Statistic in focus - Internet use in Europe: security and trust


Security and trust in Internet usage is difficult to quantify as it has a highly subjective component. In this publication, security and trust is indirectly measured through an analysis of behaviour and use. Furthermore, the figures presented in this publication (survey-based, see Methodological Notes) may be biased due to a low awareness of the respondents with regards to the risks of certain Internet usage aspects.


Reports' Highlights

• Buying over the Internet is perceived as relatively safe: most ‘e-shoppers’
didn’t report any problems. Those who did mostly mentioned ‘uncertainty
concerning guarantees’ and ‘speed of delivery longer than indicated’ as the
problem.

• Among those who never bought via the Internet, 42% (at EU-15 level)
mentioned security concerns and worries about giving credit card details
over the Internet; 60% prefer to shop in person.

• ‘Spam’ was a widespread problem in 2004: between 25% (Portugal) and
58% (Germany) of Internet users have experienced unsolicited e-mail;
fraudulent payment card use was reported by less than 2% of Internet
users, except for the United Kingdom.

• Virus checking software was used in virtually all enterprises, regardless of
their size; more sophisticated security devices are more common in larger
companies.

• Certain countries have a surprisingly high proportion of enterprises that are
still without any computer and network security devices.

• A fairly high proportion of enterprises reported virus attacks; the situation
differs by country rather than by economic activity.

July 07, 2005

Privacy as a Intangible Asset?

Today I was thinking about Privacy & Intangible Assets (IA).

What's Intangible Assets (IA)? Intangible assets are defined as assets that are not physical in nature.

The most common form of intangible asset for a business is goodwill. This is the customer base that the business has built up and is the principal reason that a business might sell for more than the value of the tangible assets.

And Privacy? Privacy is the ability of an individual or group to stop information about themselves from becoming known to people other than those they choose to give the information to. Privacy is sometimes related to anonymity although it is often most highly valued by people who are publicly known. Privacy can be seen as an aspect of security—one in which trade-offs between the interests of one group and another can become particularly clear.

By the way a fantastic article about Privacy in Wikipedia.

So if brands, patents, IP law are IA why not Privacy?

In this article published in New Straits Times on September 16, 2003

Important for companies to protect digital assets

There are three types of digital assets in a typical enterprise or organisation:

- Data (for example, customer information, equity and market index data online and other proprietary data);
- Applications or software which run corporate IT systems and its workflow (for example, an enterprise resource planning software); and
- Intellectual property rights that are in digitised form (for example, copyrights in e-books, movies, musical recordings or trade secrets which are in a stored in a digital format).

RISK EXPOSURES

Digital assets of most enterprises are exposed to a wide range of risks and these include:

- Security intrusions
- Piracy of digital assets
- Improper use of proprietary content.
- Invasion of privacy in contravention of privacy laws.

Another interesting article about Knowledge Management and Privacy.

Privacy and Security: a challenge for KM
published in Knowledge Board.

The problem of protecting data and documents from being corrupted or stolen has become critical for many companies and organisations due to the great spread of the Internet and Internet-related networks, and the huge amounts of information that is continuously shared and exchanged over them. In this sense, important knowledge assets (data, intellectual property, hardware and software systems, documents etc.) must be protected from external and internal violations to avoid unexpected loss of data or unauthorised access.

......

Privacy

Privacy is an important issue (above all) for email services offered by free providers (e.g. Yahoo, AOL, Hotmail, MSN and now also Google). These services use automated text scanning to detect virii and spam. Google is also now offering its indexing service to facilitate and fasten information retrievals.

The amount of personal data that can be gather from e-mails is so significant that some providers use them to send targeted advertisements or to personalise services. For this reason many users complain about it, while at the same time asking for faster search engines and for more storage space to keep their mail.

Another problem not only users, but also software houses have to face is 'Spyware' and its variant 'Adware'. Spywares are programs that hide themselves in users’ computers and start taking up computer resources or stealing information including visited websites, email addresses and even credit card numbers. Adwares are less malicious. Their main goal is to advertise, so they work by randomly popping-up browser windows, changing homepages, adding search bars and other irritating but not critical actions.

July 06, 2005

Microsoft DRM and IE 7

Microsoft bangs the privacy DRM
Document-level digital rights management in the pipeline
Article published by Iain Thomson at TechEd in Amsterdam, vnunet.com 06 Jul 2005


Microsoft has detailed its forthcoming privacy and security plans, which include enhancements to Internet Explorer 7 and the addition of digital rights management software into applications at document level.

Despite earlier plans not to do a browser update until Longhorn's release in 2006, Microsoft chairman Bill Gates confirmed that code for IE 7 will be available this summer in beta and in full by Christmas.

Full article (in Vnunet)

July 05, 2005

White & Case

Few days ago we talk about 5TH ANNUAL GLOBAL PRIVACY SYMPOSIUM hold in London in April, Presented by the White & Case LLP Global Privacy Practice Group.

For example Julia Barceló talk about the EU Data Protection transfer from Internal Market DG to Justice, Liberty And Security DG.

White & Case has just published another article originally appeared in the June 30, 2005 issue of New York Law Journal.

NEW DATA SECURITIES LAWS PUT COMPANIES AT RISK

June 30, 2005, New York Law Journal
Robert L. Raskopf , David Bender New York

From LexisNexis and Ameritrade to the FDIC and Boston College, the growing number of recent headlines announcing data security breaches ostensibly suggests a burgeoning problem. But in reality, the computer security industry's "dirty little secret" is that breaches have been occurring on a large-scale basis for many years. What has undoubtedly increased markedly is not the number of breaches, but rather the likelihood that a breach will be made public.

The force driving these disclosures is new data privacy laws in California and elsewhere that now, for the first time, prevent companies from keeping certain security breaches secret, and require them to notify individuals that the security of their personal information has been compromised. And the new laws allow (and many similar proposed laws would allow) government enforcers to impose stiff fines on companies that fail to handle disclosure properly or to take reasonable steps to protect personal data in the first place.1 Indeed, in some situations, failure to disclose a privacy breach might trigger liability under the securities laws, and even possibly spark an investigation by the SEC if, for example, management continued trading in a company's stock after knowing of the breach. And in practical terms, for some businesses the public relations ramifications of such a disclosure may dwarf the legal consequences. Full article at : White & Case

July 04, 2005

UK ID Card Bill struggles over first hurdle

UK ID Card Bill struggles over first hurdle by Privacy International

In a close vote 28th June, the Government succeeds in getting the biometric-ID card bill into the next stage of the Parliamentary process.

The Government promised concessions on costs, satisfying some of the Labour rebels. The backbench rebellion was larger than expected, however, and the Government won the vote by a majority of 31, despite a Parliamentary majority of 66.

The debate in the House of Commons included over thirty speeches, with at least 25 of these speakers expressing their oppositition to the Bill for a variety of reasons. Predominant amongst those reasons were costs, civil liberties, race relations, the lack of necessity, the divide between civil law countries (with ID cards) and common law countries (usually without), and the card's likely failure as a large-scale computing project, including the fallibility of technology.

The Government continued to insist that the card was a result of international obligations on biometric passports, would combat identity theft and serious organised crime.

The rebellion is expected to grow as public support continues to fall and as the MPs look into the bill in greater detail. The bill now goes to Committee Stage, with a number of sittings between next week and the 19th of July, before Parliament breaks for the summer.

The full debate is available on Theyworkforyou.com.

Privacy saved my life

Labels

Contact Me

Creative Commons License
Esta obra está bajo una licencia de Creative Commons.