Tuesday, April 19, 2011

Texas A&M University for Internet Privacy & Security

Universities and colleges around the world house personal information for their students, faculty, and staff. It is their duty to protect their information from those wanting to harm them with intention of fruadulant activity. Texas A&M is a division one school in southern Texas who is taking a stand for internet privacy and security.

Texas A&M provides a privacy and security statement available to all 24/7. It lists its uses of their different websites available for their student and faculty use. The statement says: Texas A&M websites do not make use of 'cookies' or files containing unique personal information. They do collect and store technical information about students visits to their server logs. This helps technicians to evaluate popularity of specific features on their sites; which is used for statistics, technical design, and system information issues. Texas A&M does allow general information to be collected by Google Anayltics. They also give way for students to release their own personal information to departments to further answer questions, etc. Texas A&M can also release information when authorized, to help law enforcement investigations, legal proceedings, and internal investigations at the university when rule and regulation violations are pursued by a student.

In order to instore faithfulness in this system, the university lists each server log and Google Analytic used.
This information is given with regard to the Texas Public Information Act; which states that students and parents have the right to be informed about their personal/general information being collected on certain university websites and they have the ability to see their information collected by requesting the information through the TAMU Public Information Officer or TAMU Office of Open Records.

To instill even more trust in the privacy system and security measures, the university includes the statement of them undergoing an annual security risk assessment through the ISAAC, also known as Information Awareness Assessment and Compliance system.

I'm proud to be part of Texas A&M University and their fight against internet hackers and fraud. I respect the institution for their availability to see my information if needed and their security measures to ensure the safety of my personal information. I hope other universities have instilled the same security measures or will do so in the near future.

-C

More information about the Texas A&M University Privacy & Security Statement, courtesy of Texas A&M Office of the Registrar.
Links are available to other sources used by the university on this web page.

Monday, April 18, 2011

Stealth iPhone App vs. Invasion of Privacy

When interested in a topic, usually one 'googles' it, so that is exactly what I did. I googled tracking devices just to see what would emerge and interestingly enough, an application for the new iPhone 4 caught my eye. Two companies promoting their product of a hidden spy application to another's phone allows you to track their phone's content including:

GPS tracking and a link to a map to the phone's location, call logs (incoming and outgoing), text messages (incoming and outgoing), contacts (saved and deleted), read emails (read, replied, and deleted), browser logs, and photos (uploaded, taken, and deleted).

The company then goes on to elaborate on the pro's of buying their product, such as: being able to locate their kids if in an emergency, monitoring their children's behavior and use of their phone, used against theft or loss of the phone, can make your phone a spy gadget, and finally the reason I thought most humorous, catching a cheating spouse, which they promote is cheaper than hiring a private detective or installing a GPS tracking device on their spouses car.

These two companies promote invasion of privacy through which they record/upload information wanted by the customer to a server into the companies system which can be accessed at any time. They also add the consumer can conveniently chose which tracking they would like to be turned 'on' and 'off' by a press of their finger on their iPhone.

I found this increasingly disturbing as I kept reading their website/ sales pitch. Their entire business revolves around 'hidden' personal invasion. In my last few posts are rebuttals saying this kind of activity is breaking the law, or trying to emphasize voters to enact a law against these types of devices. How do you know this information is only being used for the consumers eyes only? Is this information being uploaded into the companies system able to be hijacked? These questions are should be answered by the company. If a small application business can hack into a smartphone and have it's contents uploaded onto another server, who else can hack with out authorization? The company did note that Apple was independent of their business and did not promote the application. I believe this to be a smart move for their major corporation against many civil suits that could be connected to these spy applications. How these companies are still in business is beyond me and violates the online Commercial Privacy Bill of Rights of 2011. I would love to know other's thoughts on pro's and con's of these types of businesses.

-C

Stealth iPhone App Website
Commercial Privacy Bill of Rights 2011

Tracking Smartphones

To continue the talk about tracking devices, I've noticed that most are only interested on what's being tracked on their computer but completly neglect the capability of third parties tracking their smartphones and other devices such as the iPad.

I came across an article that emphasized this topic and thought it would be of interest to share the plot. The author explains in detail that this is the age of new technology, smartphones and all. Those with smartphones can contain too much personal data, even including the apps an owner decides to download can lead to digital footprints for strangers to gain access to personal information. Fortunately, there for smartphone owners there is an option to disengage the ability for companies to track their personal data.

Sharon Nissim says, "I'm glad ... consumers are ealking up to the tracking going on with  computer[s], but ... thtere's an extreme lack of knowledge about tracking on your iPhone or iPad." Sharon Nissim is part of the privacy counsel of the Electronic Privacy Information Center.

The author then goes on to inform the readers of a civil suit being processed against Apple and other companies like Pandora and Dictionary.com for violating the Computer Fraud & Abuse Act by accessing consumer information without authorization. There were even civil suits against major corporation Telecom for tracking a German Politician 35,000 in less than a year without authorization.

I believe then though companies and the government can use personal information for the public good, it does not give them the right to meddle through people's information. If they would like authorization, then contacting that individual is the best way without violating individual rights. The moral of the story is protect yourself and your information. Some can use the data for good, but most will not.

The link to the article: iPhone or iSpy? By: Brian X. Chen, April 12, 2011.

-C

Friday, April 15, 2011

Visual Rhetoric Pertaining to Cyber Safety

I was scrolling through articles about cyber safety and I came across one with a picture that illustrated what most people may assume why we need digital safety down to a 't'. The article/ photo is located on the Teacher's Hub website. It's target audience are students, educators, and parents. The picture has a little girl with a shocked look on her face as she's gazing at a laptop screen. The article focuses on the need to make online usage for teens safe. This article and photo appeals to parents and educators. It can evoke fear and worry in parents for their child's safety. This type of ethos is used to emphasize action to be taken by parents and care givers to children.

A big safety issue isn't about using a computer but the use of online resources or social websites such as Facebook and MySpace. Internet predators are a huge and disturbing issue for parents. The photo and article emphasizes the need to educate online safety to students. A teen can think "oh this is just for fun" when talking to someone they don't know but it could end in a tragedy. This is a parents number one fear, kidnapping or death of their child.

The photo doesn't change my perception of safety on the internet. It just makes my choice more clear to others. Most parents where I live, Bryan/College Station are agree that cyber safety is an issue and should be implemented in schools and day cares with internet access. For more information about cyber safety go to: Cyber-Safety.com

-C

Tuesday, April 12, 2011

Do Not Track Devices

I was scrolling through different news articles dealing with new legislative laws and a particular story pertaining to privacy and safety on the internet emerged.

Senators John Kerry and John McCain are opting for a "Bill of Rights" for the internet. They are voting for internet users, internet businesses, etc, to increase their safety regulations by mandating a "Do Not Track" device. The big machines of the internet: eBay, Microsoft, Intel, and Firefox have already agreed and installed these devices for their customers. The senators, internet corporations, and users a like have all agreed it should be implimented for every user and business to install this device.

I am an internet user that believes this should be implimented. I do not like the idea that department stores, online stores, etc, ask me for information they do not need. I know it's for advertisement purposes and collected data for research purposes but there should be a line drawn. Businesses collect your debit card and credit card numbers, phone numbers, etc. This isn't information I want others to know. They can also ask for your drivers license numbers for checks. All of this information adds up into their internet databases. In this day and age, it could be easily stolen by hackers.

All in all, I think this new law should be enacted and under strict rule. I would not want my personal information out for all to know.

For reference of this new bill: Internet Privacy Bill by Washington Post

-C

Tuesday, March 1, 2011

Rhetorical Analysis of Bloggers

Earlier today I searched for a couple different blogs pertaining to my field of interest for my own (Identity, Privacy, and Safety). I found a blogs called Kim Cameron's Identity Blog and Yes 2 Privacy & Identity Blog and conducted a rhetorical analysis of both; this is what I found:

Kim Cameron's blog focuses on the particular blogger's opinion on certain identity and privacy issues they want to discuss. The few blogs that I read discussed digital identity framework and other types of safety for identity like giving out certain personal information. Cameron used links as informal references like most people do for blogs. This helps with establishing author credibility and evidence to prove the opinion or point being made. She uses spacing, capitalization, and italics to anunciate the point she's trying to introduce to her readers. She uses expert references like Microsoft, the Burton Group, and CNN.  Her diction is one of the elite and educated and not necessarily easy for the general public to understand. This limits her audience. She doesn't touch on balance, so her overall purpose is to state her opinion on different subjects.

Yes 2 Privacy & Identity Blog is more of an informal blog.  The writer touches on subjects like Google Earth adn their street view application affecting privacy. The blogger uses links to certain Google Earth examples for readers to see for themselves. The author doesn't use expert references to state credibility or evidence. Balance isn't discussed or really any type of rhetorical devises.  Overall the purpose of the blog is to express opinion lightly on subjects pertaining to identity and privacy on the internet.

Honestly, if I were to read now a days it is to read for education but sometimes people like to read for entertainment. I believe blogs can both be educational and entertaining, but if one is looking for more on the educational scale, be sure to look for rhetorical devises to establish the blogger's intended purpose.

-C

Monday, February 28, 2011

False Online Relationship

I heard this story on the radio this morning on the way to class and thought it was a joke, so I had to investigate...

This story involves a 48 year old man (before the digital generation) from Illinios who invested two and half years of his life to an online girlfriend who was supposedly kidnapped in England on vacation. When the man called authorities to help investigate and return his girlfriend to safe keeping, he was then informed that his girlfriend was not real. He rebuted saying he wired over $200,000 to help her in times of need to accounts in Nigeria, Malaysia, US, and England. He provided identification of his 'lover' to the authorities just to be told it was a sample ID for the state of Florida.

I'm shocked that a man of mature age during a technological boom with known risks of identity theft or fallacy could be so blind and idiotic to the extent of sending $200,000 to a faceless person! This news article just goes to show one must be cautious about who you THINK you know and trust. Everyone should be aware of fallacy on the internet by now, especially a 48 year old. I believe the older generation is a little naiive when it pertains to the internet. They inform and moderate their kids' internet use to protect them but sometimes don't understand that age doesn't matter to someone like the one on the benefitting end in this article. Wake up parents, it can happen to you too!

-C

Here's the link to this ridiculour story: Fake Kidnapped Girlfriend

Pediatric Patient Privacy & The Social Network

In this blog we are supposed to locate and analyze a scholarly article related to my inquiry area. I found this article using the world wide search engine: Google. To confirm that this is in fact a scholarly article, I had to investigate it's origin, content, and purpose.

The reasons that I was able to categorize this article as scholarly include: the article was found within "The Journal of Pediatric Psychology," written by Rachel Tunick of Boston's Children's Hospital and Lauren Mednick of Harvard Medical School, published on behalf of The Society of Pediatric Psychology, content was lengthy and used medical jargon of that particular field, and included references at the end of the article.

The main points of this article is to inform the reader about the risks of posting private health information on a blog or social website.

1. Privacy and Confidentiality of Patients: Whether it be a parent or patient, when using a blog, either could raise reference towards another patient's scenario without their consent which compromises their protected health information.
2. If a patient or parent includes references towards their child's or their own medical staff, it could compromise the team's professionalism  and potentially make them reluctant to continue treating their child or them self.
3. Some blogs or personal websites have protection measures for users to implement at their own discretion, however some do not. The audience of a person's personal site is pretty much impossible to measure. Therefore confidentiality of a child and their family using their OWN website could be compromised. Parents using these online sites have not grown up in the technological generation so they may be unaware or naiive about the inappropriate personal information they could be disclosing for everyone to see.
4. Finally, physicians may read the parent of a patient's blog and gain information that would usually not be disclosed in an appointment. This could alter their viewpoint and treatment of that particular patient.

In conclusion, clinicians should consider both pro's and con's before reading a patient's or parent's blog. They should examine if it would provide clinical benefit or if its just out of curiosity. If chosen yes, the family should be notified before the action occurs. Physicians should also warn patients and parents about electronic privacy risks to minimize personal information from being breached.

I'm including a link if anyone in interested in this topic or just wants to read the article themselves. It also includes a links to the journal if one wanted more information about the Pediatric Psychology Society.

Scholar's Article

Thursday, February 24, 2011

Identity & Privacy of A Teacher

A few years ago an elementary school teacher from Fort Bend independent school district was selected to be one of the twenty five young women featured on the show The Bachelor. She signed a confidentiality agreement with ABC, meaning she could not release any information about what was going on during the tapings as well as letting outside sources know what she was participating in. She took a leave of absense for 22 days, 10 of which are paid. She signed off for a leave of absence due to a 'personal issue' with her residing principal and went to persue love on the show. The principal aquired an exceptional alternate to continue teaching the the teacher's 4th grade class. When parents found out about her 'intended' reason for absence all hell broke loose with accusations and biased opinions. One parent stated she was appalled by the teacher's actions because the program "does not promote family values, moral values, or appreciate the 'normal' dating process." She went on to complain that the teacher's absence disruppted her child's learning abilities and negatively affected his scores on the TAKS test. The teacher and principal were later asked to resign.

Does anyone else feel these parents in total outrage are outdated to the extent that a beloved teacher and principal were fired over the subject? If one is bound by a contract, one must abide by that contract, yes? When is a one's personal life ever going to be separate from their professional career? Will the general public allow those with a career to have a private life without ridicule or will all of us have choose a job over love? From another stand point, why is it that only ONE teacher can educate a certain student? If so, then that student will untimately fail. One must be able to adapt.

I feel that parents who held objection to the teacher's actions do not demonstrate any type of logos, pathos, or ethos. They do not separate the identity of the teacher without her appearance on The Bachelor, and they will not allow her or any other to maintain a private life.

Teacher Featured On The Bachelor Fired

Thursday, February 3, 2011

Identity, Privacy, & Safety Within the Cyber World

Everyone has that one friend that posts their entire life on Facebook, MySpace, Twitter, or another conversational site.  They inform you about their day, where they are, who infatuates them this week, and who is currently on their hate list.  I wonder if these people ever watch the news about cyber predators...

My decision was quick when looking at the topics of which to chose.  Identity, Privacy, and Safety within the cyber world is something most of the population dismisses. Of course, you hear every now and then two strangers meet up from chatting online and the end result is a criminal case of assualt or some other offense. But does the population really understand that anything posted on the internet can be seen by ALL even if they click 'private' or 'only visible to me'? I'm sure most of you (who own a television) have read or listened to the story of The Craigslist Killer. Anything you post you should expect the general public, future employers, Forbes 500 Companies, predators, and your parents will be subject to viewing. This new option (tag where you are) for mobile Facebook users can be easily used to track your comings and goings into patterns, making it easier for predators to find you. So please, think before you post.

-C