Wednesday, February 24, 2010

MY FINAL ASSIGNMENT . . .

2.) Key provisions of the USA Patriot act subject to sunset.

By John Podesta

Recent tragic events have brought about a rapid reconsideration of the legal restrictions placed on law enforcement and the intelligence communities. On October 26, President Bush signed into law the USA Patriot Act (Patriot Act), which makes significant changes in the legal structure within which the law enforcement and intelligence communities operate. This article focuses on the key provisions of the Patriot Act that pertain to electronic surveillance and intelligence gathering. Notwithstanding the haste with which Congress acted, the provisions of the new law relating to electronic surveillance, for the most part, are a sound effort to provide new tools for law enforcement and intelligence agencies to combat terrorism while preserving the civil liberties of individual Americans. Some changes simply update our surveillance laws to reflect the fact that we live in a digital age. Other sections expand the surveillance powers of our law enforcement and intelligence communities in ways that make sense in light of the new threats facing our country.

When we decide, however, to expand surveillance powers to track terrorists, all residents, not just the terrorists, are affected. A common problem running through many of the new authorities contained in the Patriot Act is the reliance on executive branch supervision rather than meaningful review by a neutral magistrate of the potentially highly intrusive surveillance techniques that are authorized. There are several common sense changes that could be made to the new law that would provide better protections for civil liberties without sacrificing security. Because of the rapidity with which the law was enacted, Congress, wisely, included a four-year sunset of many of the provisions of the new Act. That sunset will allow Congress to make some needed adjustments, hopefully in a calmer climate, and strengthen the protections for civil liberties without sacrificing security.


Many of the electronic surveillance provisions in the Patriot Act faced serious opposition prior to September 11 from a coalition of privacy advocates, computer users, and elements of high-tech industry. The events of September 11 convinced many in that coalition and overwhelming majorities in Congress that law enforcement and national security officials need new legal tools to fight terrorism. But we should not forget what gave rise to the original opposition—many aspects of the bill increase the opportunity for law enforcement and the intelligence community to return to an era where they monitored and sometimes harassed individuals who were merely exercising their First Amendment rights. Nothing that occurred on September 11 mandates that we return to such an era. If anything, the events of September 11 should redouble our resolve to protect the rights we as Americans cherish. Therefore, as the new powers granted under the Patriot Act begin to be exercised, we should not only feel more confident that our country has the tools to be safe but we should be ever vigilant that these new tools are not abused.

1.) Summary of the 1980 OECD privacy guidelines.

The Honorable Michael Kirby has been selected by EPIC as the 2010 recipient of the International Privacy Champion Award. Justice Kirby was recognized for his leading role in the development of the OECD Privacy Guidelines in 1980. This year the OECD is marking the 30th Anniversary of the Guidelines with a series of events, in preparation for a review in 2011 to assess whether the Guidelines need to be revised. The award was announced on 28 January - a key day in the privacy calendar for raising awareness about privacy issues with events held throughout Europe and North America.

The OECD organised several events at the IGF in Sharm el-Sheikh, Egypt, including workshops on 'Global ICT services sourcing post-crisis', on 'Expanding access to the Internet and broadband for development' and on 'Using ICTs and the Internet to meet environmental challenges', as well as an open forum on 'The importance of Internet Access and Openness for a sustainable economic recovery'.
























































































Wednesday, January 27, 2010

LAST QUIZ IN MIDTERM


Privacy-
has been used to describe many concerns. It is a complex concept with it. The concept of "privacy" deserves to be carefully examined. It defies easy and many proposals to protect privacy have gone forward without a clear articulation of what privacy really is.

The right to privacy in Internet activity is a serious issue facing society. Some users of the 'net wish to shield their identities while participating in frank discussions of sensitive topics. Others fulfill fantasies and harmlessly role play under the cover of a false identity in chat rooms,But there are the eternal "bad apples," and on the Internet, they are the people who use anonymous servers as more than a way to avoid responsibility for controversial remarks. Cases of harassment and abuse have become increasingly frequent, aided by a cloak of anonymity. There are also problems with frauds and scam artists who elude law enforcement authorities through anonymous mailings and postings. Other users are concerned about the proliferation of information on the Internet. Databases of court records are now available for free over the World Wide Web.

While privacy is held up as one of our highest values, people also constantly share information about themselves by allowing others to see their faces, learn their names, learn what they own, and learn what they think. In fact, it is a desirable lack of privacy that allows people to interact with one another socially and in business. This does not mean that people should lose control over the information they want to keep private. It means that generalizations about privacy are almost always wrong.


Wednesday, January 6, 2010

My MidTeRm QuiZ

2. You have just been hired as an IT security consultant to "fix the security problem" at Acme United Global Manufacturing. The company has been hacked mercilessly over the last six months, with three of the attacks making headlines for the negative impact they have had on the firm and its customers. You have been given 90 days and budget of 1 million dollars. Where would you begin, and what steps would you take to fix the problem?

Answer: I'm just been hired as an IT security consultant to "fix the security problem" at Acme United Global Manufacturing. The company has been hacked mercilessly over the last six months, so that the company will be a difficult problem that can I get the solution how to prove it. For the three of the attacks making headlines for the negative impact that they have had on the firm and its customers. I have been given 90 days and budget of 1 million dollars. I'm so happy because I can help others that I need.


4. Your friend just told you that he is developing a worm to attack the administrative systems at your college. The worm is "harmless" and will simply cause a message - "Let's party!" - to be displayed on all workstations on Friday afternoon at 3 p.m. By 4 p. m., the virus will erase itself and destroy all evidence of its presence. What would you say or do?

Answer: For me, if my friend that developing a worm to attack the administrative systems at my college, I will tell him/her that things is not him/her so that I can do anything to solve the problem how to avoid the tragedy. And then I just told my friend can protect something that can had not dangerous.

Wednesday, December 2, 2009

Are IT workers professional? Yes or No and Why?

Are IT Workers Professional? Yes or No and Why?

Yes, because if I.T. workers professional can demonstrate they behave more like a workers professionals, executives will become dependent on them and will be less likely to outsource their jobs. Ideally, you want to hear executives say, "I can't live without these guys (the I.T. department)." But if executives perceive you, the I.T. worker, as nothing more than a worker, than your experience of your life so that you really how to know what is the purpose of the I.T workers professional.

Wednesday, November 25, 2009

FIRST ASSIGNMENT IN IT 104


"HOW TO BE A GOOD A SINGER"

The next step to sing better is to put emotion into your lyrics. Good singing is not just simply remembering the lyrics and belting it out as if you are reading the lyrics with a tune. The singer is telling a story and just like a good story teller, the singer must be able to deliver to the audience and essence or emotions of the song such as suspense, joy, sadness, delights, mystery, relief etc

Therefore the singer must workout the phrasing of the song, practice it to perfection before performing on stage. By working the phrasing, the singer must first determine for example where to pause, where to join sentences, where to sing out loud or soft, where to sustain a little longer etc

Once that is done, then the singer may then practice singing out the song with the predetermined phrasing and make adjustments wherever is necessary. One way to know if the song can be well delivered and be well received is your own emotion. If you can't feel for the song, your audience probably won't.