Privacy Awareness Week 2012
Privacy Awareness Week 2012
Do you ever wonder how you can you protect your privacy rights as an individual? Or consider your privacy responsibilities when you handle the personal information of others?
Privacy Awareness Week 2012 runs from 29 April to 5 May and is all about promoting awareness about privacy rights and responsibilities in the community.
Privacy Awareness Week is a jointly promoted annual event of the members of the Asia Pacific Privacy Authorities forum.
Privacy resources for young people
Young people are net savvy and heavy users of social media, but how much do they know about their privacy rights? There’s lots of information out there about protecting privacy, but sometimes it’s hard for students, parents and teachers to find what they need, when they need it.
Read more here
ISSA-LA Donates $20,000 for Nonprofits to Attend the Fourth Annual Information Security Summit on Cybercrime
The Los Angeles Chapter of the Information Systems Security Association’s (ISSA-LA) has created a donation fund of up to $20,000 to IT employees and executives of nonprofits to attend, at no charge to the attendees, the fourth annual Information Security Summit on Wednesday, May 16, 2012 at Hilton Universal City Hotel in Los Angeles. The theme of the one-day Summit is The Growing Cyber Threat: Protect Your Business, which includes the business of operating nonprofits.
“We are offering 100 free registrations to our nonprofit friends because we know how important it is that the critical work of nonprofits move forward unimpeded by criminal attacks,” said ISSA-LA President Stan Stahl, PhD. “Nonprofits are prime targets of cybercriminals who steal personal identities and bank funds. Additionally, nonprofits typically have thousands upon thousands of individual pieces of data, sensitive data that belongs to the people in our community, and which cannot be secured if staff members and executives are not aware of how to deal with the danger they face. The idea of extending a hand to nonprofits is in line with ISSA-LA’s credo that ‘It takes the village to secure the village’ SM.”
According to a new study by the Center for Civil Society at the UCLA’s Luskin School of Public Affairs, in September 2011, the latest date for which data is available, there were 31,600 registered 501(c)(3) public charities in Los Angeles County, generating more than $35 billion in economic activity and employing over 230,000 people. At least 10% have budgets over $1 million. A significant number of large nonprofits have budgets of more than $10 million. Most of the donations today are made over the Internet and kept on the organizations’ databases. This information needs to be properly protected and secured.
The Summit is the only educational forum in Los Angeles specifically designed to encourage participation and interaction among all three vital information security constituencies: (1) business and organization executives, senior business managers, and their trusted advisors; (2) technical IT personnel with responsibility for information systems and the data they contain; and (3) information security practitioners with responsibility for ensuring the security of sensitive information.
Registration is open to anyone interested in learning more about information security but is particularly recommended for business and nonprofit executives and senior managers; business professionals in law, accounting, insurance and banking; technical IT personnel; and information security practitioners.
The Information Security Summit is part of ISSA-LA’s important community outreach program. The goal of the program is to help the community stay safe from cybercrime by enabling the necessary collaboration between business, nonprofit and community leaders, technical IT professionals and the information security community.
Nonprofits interested in registering for the event should e-mail vp@issa-la.org to receive the appropriate registration codes.
About the LA Chapter of the Information Systems Security Association (ISSA-LA)
The Los Angeles Chapter is the founding Chapter of the Information Systems Security Association, an international not-for-profit organization of information security professionals and practitioners. ISSA-LA is the premier catalyst and information source in Los Angeles for improving the practice of information security. The Chapter conducts outreach programs to business, nonprofits, government and consumers. For more information or to register for ISSA-LA’s 4th Annual Information Security Summit, please visit: www.issa-la.org.
Defcon17 – Jailbreaking and the Law of Reversing
Using jailbreaking of the iPhone as a primary example, the presentation will be an overview of the laws relating to reverse engineering of hardware and software.
Developers who rely on reverse engineering face a thicket of potential legal obstacles, including license agreements, copyright, the Digital Millennium Copyright Act (DMCA), and the Computer Fraud and Abuse Act (CFAA). Taking iPhone jailbreaking as real-world example, we will review the legal theories Apple has asserted, shedding light on the major legal pitfalls that developers face, and what they can do to avoid them and minimize risks. We will also examine the additional legal issues raised by reverse engineering networked code, such as online video games.
The presentation stems from the presenters’ experience as attorneys with EFF’s Coder’s Rights Project, as well as their efforts to persuade the U.S. Copyright Office to grant a DMCA exemption for removing application locks on smartphones (including the iPhone and Android G1).
DNSChanger Malware: Produced by US-CERT
US-CERT encourages users and administrators to ensure their systems are not infected with the DNSChanger malware by utilizing tools and resources available at the DNS Changer Working Group (DCWG) website.
Computers testing positive for infection of DNSChanger malware will need to be cleaned of the malware in order to maintain continued internet connectivity beyond July 9, 2012.
On November 8, 2011, the FBI, NASA-OIG, and Estonian police arrested several cyber criminals in “Operation Ghost Click.” The criminals operated under the company name “Rove Digital,” and distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ, and TDL4 viruses.
Additional information about Operation Ghost Click and the DNSChanger malware is available at the FBI website.
Relevant Url(s):
<http://www.fbi.gov/news/stories/2011/november/malware_110911>
This document can also be found at
http://www.us-cert.gov/current/#dnschanger_malware
Splunk Live! 2012 in Washington, DC
Make Sense of Your Data with Splunk
Why do over 3,700 companies, including more than half of the Fortune 100, use Splunk to gain new levels of visibility and insight from their machine data? It’s because Splunk is the fastest, easiest way to put your machine data to work.
Join us Tuesday, May 15 for SplunkLive! – and learn how our customers are using Splunk to harness their machine data for:
- Application management
- IT operations and infrastructure management
- Cybersecurity
- Continuous monitoring and compliance
- Web and digital intelligence
- Business analytics… and more
With Splunk, they can correlate and analyze complex events spanning multiple systems–any amount, any location, any source. Splunk breaks down traditional data silos, achieves new levels of operational intelligence and delivers insights that benefit IT and the business.
Why should you attend?
- Learn how organizations use Splunk to expand IT and business opportunities
- Join our workshops check them out here
Swap best practices with other IT leaders at SplunkLive! Tuesday, May 15, 2012 in Washington DC.
Register Now.
Speakers
- Godfrey Sullivan, CEO Splunk
- Bob Gourley, CTO Vision
- Cisco Systems
- FDA
- Defpoint
Venue
Ronald Reagan Trade Center
1300 Pennsylvania Avenue Northwest Washington, DC 20004 USA
Agenda
- 8:30am to 9:00am – Registration
- 9:00am to 12:00pm – General Session
- 12:00pm to 1:00pm – Lunch
- 1:00pm to 3:00pm – Break-out Sessions
- 3:00 pm to 4.:30 pm – Happy Hour at Partner Pavilion
CES on the Hill: Online Infringement & Privacy and Electronic Data Collection
CES on the Hill comes to the nation’s capital this spring, bringing together Members of Congress, their staff and the Washington press to mingle with executives from the CE Industry and get a chance to interact with companies producing innovative technologies that are changing the way we live and work. The next evening CEA hosts its annual Digital Patriots Dinner honoring government officials and technology leaders for their positive influence on both technology and the industry.
CES on the Hill will showcase and demonstrate the top policy issues and challenges affecting the CE industry:
SPECTRUM & MOBILE BROADBAND: CEA believes that in the 21st century economy, spectrum is the oxygen of innovation. We strongly supported legislative efforts to authorize the FCC to conduct voluntary incentive auctions in order to secure 500 MHz of additional spectrum for broadband services and address the looming spectrum shortfall. More, CEA believes that any additional spectrum should be available for both licensed and unlicensed use.
eCYCLING LEADERSHIP INITIATIVE: CEA and consumer electronics industry leaders have launched the eCycling Leadership Initiative. The initiative includes an industry-wide electronics recycling commitment to recycle 1 billion pounds of electronics annually by 2016, a more than a threefold increase over 2010. The eCycling Leadership Initiative also seeks to improve consumer awareness of the more than 5,000 collection sites currently sponsored by industry; increase the amount of electronics recycled responsibly; increase the number of collection opportunities available; and provide transparent metrics on eCycling efforts.
FREE TRADE: CEA strongly supports a more comprehensive approach to the Information Technology Agreement (ITA) and urges USTR to undertake negotiations to expand product coverage in the agreement. CEA also supports legislation that will repeal the Jackson-Vanik Amendment and establish Permanent Normal Trade Relations (PNTR) with Russia.
ENERGY EFFICIENCY: CEA favors voluntary, market-oriented programs and initiatives, including industry-led standards. Experience shows that such market-driven programs are a proven and successful approach to advancing energy efficiency in consumer electronics. CEA works cooperatively with governments in the development of energy efficiency initiatives and opposes mandates that stifle innovation, reduce consumer choice, and limit product features and services.
ENERGY STAR PROGRAM: CEA has long supported ENERGY STAR as the most effective and proactive program to encourage consumers to make more energy-conscious choices. Home electronics were responsible for 59 percent of the energy savings achieved by the program for residential products in 2008, according a recent report by the U.S. Environmental Protection Agency (EPA). CEA is concerned, however, that EPA’s recently-mandated changes to ENERGY STAR are creating unreasonable burdens for partners and harming international expansion of the program.
ONLINE INFRINGEMENT: CEA supports strong intellectual property enforcement, and balanced intellectual property law that protects the rights of authors and inventors while preserving and encouraging innovation. CEA members share concerns about theft of intellectual property, including trademarks, patents and copyrights. However, we must ensure that anti-infringement efforts do not inadvertently ensnare legitimate manufacturers, retailers and online service providers
ACCESSIBILITY: CEA supports industry-driven solutions to ensure innovative technologies and services are accessible to persons with disabilities.
SAFE DRIVING: CEA is completely committed to the principle that safety is paramount and a driver’s highest priority must be safe control of the vehicle at all times. CEA has supported state legislation imposing limits on the use of in-vehicle electronics to ensure driver safety. At the same time, however, policy-makers must recognize that many in-vehicle electronics can contribute significantly to driver and roadway safety.
PRIVACY AND ELECTRONIC DATA COLLECTION: CEA companies deeply understand that respect for consumer privacy is an important and necessary business practice. They have and continue to develop, implement and enforce robust industry self-regulation and apply best business practices in a variety of areas related to consumer privacy. But as new regulations and legislation concerning privacy and electronic data collection issues are considered, CEA strongly holds that a definitive, clear and data-based conclusion must first be agreed to regarding what issue, if any, we seek to solve. CEA takes the position that data collected electronically provides enormous consumer benefits and services. As such, we believe that any discussion of the supposed harm must also be measured alongside the advantages afforded by the rich and often-times free innovations available online.
2012 CES on the Hill Exhibitors:
Audiovox Electronic Corp.
Best Buy
CEA
desktopFab, Inc.
DISH Network
Ford Motor Company
Google
HTC, Inc.
Intel Corporation
KlearScreen / iKlear
Livio Radio
Mobileye, Inc.
Panasonic
Pandora Internet Radio
Qualcomm
Samsung Information Systems America, Inc.
Syncbak, Inc.
Verizon Communications
Event Schedule
| Tuesday, April 24, 2012 | |
| 5:30 – 6 p.m. | CES on the Hill – Press Preview Rayburn House Office Building Cafeteria(B-357 ) |
| 6 – 8 p.m. | CES on the Hill Rayburn House Office Building Cafeteria (B-357 ) |
| Wednesday, April 25, 2012 | |
| 6:30 – 7:30 p.m. | Digital Patriots Reception Newseum |
| 7:30 – 9:30 p.m | Digital Patriots Dinner Newseum |
| 9:30 -10:30 p.m. | Dessert Reception Newseum |
