Shortly after the earthquake in Haiti last January, the FBI and the National Center for Disaster Fraud (NCDF) established a telephone hotline to report suspected fraud associated with relief efforts. That number, (866) 720-5721, was initially staffed for the purpose of reporting suspected scams being perpetrated by criminals in the aftermath of the Haitian earthquake.
Since then with the recent earthquake in Chile our efforts have expanded to identify similar fraud activity coming out of that disaster. Therefore the public is encouraged to call this same number (866) 720-5721 to report suspected fraud from either disaster. The telephone line is staffed by a live operator 24 hours a day, seven days a week. Additionally, e-mail information can be directly sent to disaster@leo.gov.
The National Center for Disaster Fraud was originally established by the Department of Justice to investigate, prosecute, and deter fraud in the wake of Hurricane Katrina, when billions of dollars in federal disaster relief poured into the Gulf Coast Region. Now, its mission has expanded to include suspected fraud from any natural or manmade disaster. More than 20 federal agencies, including the
FBI, participate in the NCDF, allowing the center to act as a centralized clearinghouse of information related to Haitian or Chilean Relief Fraud.
The FBI continues to remind the public to apply a critical eye and do their due diligence before giving contributions to anyone soliciting donations on behalf of Haitian or Chilean victims. Solicitations can originate from e-mails, websites, door-to-door collections, mailings and telephone calls, and similar methods.
Therefore, before making a donation of any kind, consumers should adhere to certain guidelines, including the following:
* Do not respond to unsolicited (spam) incoming e-mails, including clicking links
contained within those messages because they may contain computer viruses.
* Be skeptical of individuals representing themselves as surviving victims or officials
asking for donations via e-mail or social networking sites.
* Beware of organizations with copy-cat names similar to but not exactly the same
as those of reputable charities.
* Rather than following a purported link to a website, verify the legitimacy of non-profit
organizations by utilizing various Internet-based resources that may assist in confirming
the group's existence and its non-profit status.
* Be cautious of e-mails that claim to show pictures of the disaster areas in attached
files because the files may contain viruses. Only open attachments from known senders.
* To ensure contributions are received and used for intended purposes, make contributions
directly to known organizations rather than relying on others to make the donation
on your behalf.
* Do not be pressured into making contributions, as reputable charities do not use
such tactics.
* Do not give your personal or financial information to anyone who solicits contributions.
Providing such information may compromise your identity and make you vulnerable
to identity theft.
* Avoid cash donations if possible. Pay by debit or credit card, or write a check
directly to the charity. Do not make checks payable to individuals.
* Legitimate charities do not normally solicit donations via money transfer services.
* Most legitimate charities websites end in .org rather than .com.
* There are scams targeting Haitian immigrants and their families offering assistance
in getting family members and friends out of Haiti. These individuals charge a fee
and then claim they will provide the necessary immigration paperwork or an airline
ticket for disaster victims to leave Haiti. For official information pertaining
to immigration from Haiti to the U.S., visit the U.S. Citizenship and Immigration
Services (USCIS) website at www.USCIS.gov.
If you believe you have been a victim of fraud from someone or an organization soliciting
relief on behalf of Haitian or Chilean earthquake victims, contact the National Center for Disaster Fraud at (866) 720-5721. You can also fax information to fax (225) 334-4707 or e-mail it to disaster@leo.gov.
You can also report suspicious e-mail solicitations or fraudulent websites to the FBI's Internet Crime Complaint Center at www.ic3.gov.
------
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Friday, March 12, 2010
Twitter is watching you... New technology tells the world where you're tweeting from
Twitter already reveals to the rest of the world what you're doing and what you're thinking, and now the microblogging site can let everyone know where you are as well.
A new feature rolled out this week means Twitter users have the option of including their location when they tweet via a tracking tool they can turn on or off.
http://www.metro.co.uk/tech/817158-twitter-is-watching-you-new-technology-tells-the-world-where-youre-tweeting-from
---
Community News You Can Use
Click to read MORE news:
www.GeorgiaFrontPage.com
Twitter: @gafrontpage
www.ReadMyLipstickNetwork.com
Twitter: @readmylipstick
www.ArtsAcrossGeorgia.com
www.Hummingbird-Hollow.com
Twitter: @hhpotterystudio
---
A new feature rolled out this week means Twitter users have the option of including their location when they tweet via a tracking tool they can turn on or off.
http://www.metro.co.uk/tech/817158-twitter-is-watching-you-new-technology-tells-the-world-where-youre-tweeting-from
---
Community News You Can Use
Click to read MORE news:
www.GeorgiaFrontPage.com
Twitter: @gafrontpage
www.ReadMyLipstickNetwork.com
Twitter: @readmylipstick
www.ArtsAcrossGeorgia.com
www.Hummingbird-Hollow.com
Twitter: @hhpotterystudio
---
Wednesday, March 10, 2010
Rental and Real Estate Scams
Individuals need to be cautious when posting rental properties and real estate on-line.
The IC3 continues to receive numerous complaints from individuals who have fallen
victim to scams involving rentals of apartments and houses, as well as postings
of real estate on-line.
Rental scams occur when the victim has rental property advertised and is contacted
by an interested party. Once the rental price is agreed-upon, the scammer forwards
a check for the deposit on the rental property to the victim. The check is to cover
housing expenses and is, either written in excess of the amount required, with the
scammer asking for the remainder to be remitted back, or the check is written for
the correct amount, but the scammer backs out of the rental agreement and asks for
a refund. Since the banks do not usually place a hold on the funds, the victim has
immediate access to them and believes the check has cleared. In the end, the check
is found to be counterfeit and the victim is held responsible by the bank for all
losses.
Another type of scam involves real estate that is posted via classified advertisement
websites. The scammer duplicates postings from legitimate real estate websites and
reposts these ads, after altering them. Often, the scammers use the broker's real
name to create a fake email, which gives the fraud more legitimacy. When the victim
sends an email through the classified advertisement website inquiring about the
home, they receive a response from someone claiming to be the owner. The "owner"
claims he and his wife are currently on missionary work in a foreign country. Therefore,
he needs someone to rent their home while they are away. If the victim is interested
in renting the home, they are asked to send money to the owner in the foreign country.
If you have been a victim of Internet crime, please file a complaint at
http://www.IC3.gov/.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
The IC3 continues to receive numerous complaints from individuals who have fallen
victim to scams involving rentals of apartments and houses, as well as postings
of real estate on-line.
Rental scams occur when the victim has rental property advertised and is contacted
by an interested party. Once the rental price is agreed-upon, the scammer forwards
a check for the deposit on the rental property to the victim. The check is to cover
housing expenses and is, either written in excess of the amount required, with the
scammer asking for the remainder to be remitted back, or the check is written for
the correct amount, but the scammer backs out of the rental agreement and asks for
a refund. Since the banks do not usually place a hold on the funds, the victim has
immediate access to them and believes the check has cleared. In the end, the check
is found to be counterfeit and the victim is held responsible by the bank for all
losses.
Another type of scam involves real estate that is posted via classified advertisement
websites. The scammer duplicates postings from legitimate real estate websites and
reposts these ads, after altering them. Often, the scammers use the broker's real
name to create a fake email, which gives the fraud more legitimacy. When the victim
sends an email through the classified advertisement website inquiring about the
home, they receive a response from someone claiming to be the owner. The "owner"
claims he and his wife are currently on missionary work in a foreign country. Therefore,
he needs someone to rent their home while they are away. If the victim is interested
in renting the home, they are asked to send money to the owner in the foreign country.
If you have been a victim of Internet crime, please file a complaint at
http://www.IC3.gov/.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Saturday, March 6, 2010
Georgia Broadband Projects Receive $14.9 Million
Funding will expand high-speed internet access
Two broadband projects in Georgia are receiving $14.9 million in federal funding through the American Recovery and Reinvestment Act. The first project includes a 220-mile fiber network for high-speed Internet access in Columbia County. The second project will enable Level 3 EON to provide additional access points to its Internet backbone for last-mile service providers in underserved areas. Governor Perdue recommended both projects to officials with the National Telecommunications and Information Administration.
“Georgia has long recognized that broadband is the dial tone of the 21st century,” said Governor Sonny Perdue. “These projects will help our state grow economically and compete on the global market.”
The Columbia County Information Technology Department was awarded $13.5 million to build the Columbia County Community Broadband Network, which will:
create 60 free Wi-Fi hotspots in public locations to expand broadband Internet access for the public,
encourage economic development, job creation and education by enhancing broadband capabilities for critical community facilities in underserved areas of the county,
support a county-wide traffic and water control system,
enable the use of electronic health records for patients at the Medical College of Georgia, and
facilitate more affordable and accessible broadband service for an estimated 33,000 households and 2,400 businesses by allowing local Internet service providers to connect to the county’s open network.
The project also involves the construction of five wireless towers to enhance public safety communications. It is supported by more than 20 county, municipal and other organizations.
The Columbia County IT Department currently operates a network of nine sites linked to a newly completed data center.
In addition, Level 3 EON was awarded $1.4 million to build four new access points on its existing broadband network, including three between Atlanta and Savannah and one between Atlanta and the Georgia-South Carolina border. Similar to on-ramps to the interstate highway system, these access points will enable last-mile service providers to offer affordable Internet access. The project could enhance broadband capabilities for as many as 198,000 households, 13,000 businesses and 190 anchor institutions, including schools, government agencies and health care providers.
With these awards, Georgia is receiving almost $48 million in federal support to expand broadband Internet access throughout the state. Governor Perdue announced a $33 million award in December 2009 for a 260-mile fiber optic network serving eight North Georgia counties.
With the federal award Georgia continues its efforts to expand broadband access that it started with the Wireless Communities Georgia program. Georgia’s strategic approach to the issue of broadband access has made the state very competitive in the federal grant process.
Governor Perdue began working on bringing broadband to rural areas of the state in 2006 when the General Assembly, at the Governor’s request, appropriated funds to expand wireless broadband access. The OneGeorgia Authority, chaired by Governor Perdue, established a separate program to assist rural communities seeking to establish broadband networks of any kind.
---
Community News You Can Use
Click to read MORE news:
www.GeorgiaFrontPage.com
Twitter: @gafrontpage
www.ReadMyLipstickNetwork.com
Twitter: @readmylipstick
www.ArtsAcrossGeorgia.com
www.Hummingbird-Hollow.com
Twitter: @hhpotterystudio
---
Two broadband projects in Georgia are receiving $14.9 million in federal funding through the American Recovery and Reinvestment Act. The first project includes a 220-mile fiber network for high-speed Internet access in Columbia County. The second project will enable Level 3 EON to provide additional access points to its Internet backbone for last-mile service providers in underserved areas. Governor Perdue recommended both projects to officials with the National Telecommunications and Information Administration.
“Georgia has long recognized that broadband is the dial tone of the 21st century,” said Governor Sonny Perdue. “These projects will help our state grow economically and compete on the global market.”
The Columbia County Information Technology Department was awarded $13.5 million to build the Columbia County Community Broadband Network, which will:
create 60 free Wi-Fi hotspots in public locations to expand broadband Internet access for the public,
encourage economic development, job creation and education by enhancing broadband capabilities for critical community facilities in underserved areas of the county,
support a county-wide traffic and water control system,
enable the use of electronic health records for patients at the Medical College of Georgia, and
facilitate more affordable and accessible broadband service for an estimated 33,000 households and 2,400 businesses by allowing local Internet service providers to connect to the county’s open network.
The project also involves the construction of five wireless towers to enhance public safety communications. It is supported by more than 20 county, municipal and other organizations.
The Columbia County IT Department currently operates a network of nine sites linked to a newly completed data center.
In addition, Level 3 EON was awarded $1.4 million to build four new access points on its existing broadband network, including three between Atlanta and Savannah and one between Atlanta and the Georgia-South Carolina border. Similar to on-ramps to the interstate highway system, these access points will enable last-mile service providers to offer affordable Internet access. The project could enhance broadband capabilities for as many as 198,000 households, 13,000 businesses and 190 anchor institutions, including schools, government agencies and health care providers.
With these awards, Georgia is receiving almost $48 million in federal support to expand broadband Internet access throughout the state. Governor Perdue announced a $33 million award in December 2009 for a 260-mile fiber optic network serving eight North Georgia counties.
With the federal award Georgia continues its efforts to expand broadband access that it started with the Wireless Communities Georgia program. Georgia’s strategic approach to the issue of broadband access has made the state very competitive in the federal grant process.
Governor Perdue began working on bringing broadband to rural areas of the state in 2006 when the General Assembly, at the Governor’s request, appropriated funds to expand wireless broadband access. The OneGeorgia Authority, chaired by Governor Perdue, established a separate program to assist rural communities seeking to establish broadband networks of any kind.
---
Community News You Can Use
Click to read MORE news:
www.GeorgiaFrontPage.com
Twitter: @gafrontpage
www.ReadMyLipstickNetwork.com
Twitter: @readmylipstick
www.ArtsAcrossGeorgia.com
www.Hummingbird-Hollow.com
Twitter: @hhpotterystudio
---
Friday, February 12, 2010
FCC's Genachowski Promises He's Not Out to Regulate Net, New Media
We learned from The Wall Street Journal yesterday that "Federal Communications Commission Chairman Julius Genachowski gets a little peeved when people suggests that he wants to regulate the Internet." He told a group of Journalreporters and editors today that: "I don't see any circumstances where we'd take steps to regulate the Internet itself," and "I've been clear repeatedly that we're not going to regulate the Internet."We're thankful to hear Chairman Julius Genachowski to make that promise. We'll certainly hold him to it. But you will pardon us if we remain skeptical (and, in advance, if you hear a constant stream of "I told you so" from us in the months and years to come)...
http://blog.pff.org/archives/2010/02/fccs_genachowski_promises_hes_not_out_to_regulate.html
http://blog.pff.org/archives/2010/02/fccs_genachowski_promises_hes_not_out_to_regulate.html
Thursday, February 11, 2010
Microsoft's MultiPoint Threat -- Multiseat Linux Desktop Virtualization
Userful Corporation, the world leader in multiseat Linux, today announced the release of Userful Multiplier V.3.7, the latest version of their software which turns 1 PC into 10. Demand for its $69 virtual desktops (education pricing, includes the software and multiseat hardware) has accelerated as budget-strapped governments, educational organizations, and businesses turn to Userful to lower costs. The improvements brought with V.3.7 will bring the benefits of Userful's
desktop virtualization to even more users around the world.
Userful is one of the pioneers of multiseat virtual desktops having first launched their Userful Multiplier software in 2002. Userful's innovative Linux desktop virtualization paved the way for multiseat Windows solutions such as NComputing, and now Microsoft with their soon to be released Windows Multipoint Server 2010. Used in over 100 countries, Userful remains the top selling Linux multiseat solution worldwide, and has enjoyed particular success in the education
sector.
"By using Userful Multiplier in their K-12 classrooms, our customers have reported saving over 50% on their desktop hardware costs, an average of 62% on electricity costs, and additional savings on costly Internet drops, switches, network wiring and other infrastructure and
support costs." Said Sean Rousseau, Marketing Manager for Userful. "The multiseat Linux desktops allow our customers to stretch their limited IT budget and use those savings to provide better computer access for all students in their region."
Userful Multiplier lets a single PC support up to 10 independent users at the same time, each with their own monitor, keyboard, and mouse. Configuration is automated, and it provides phenomenal multimedia performance including full-screen/full-motion video. Userful provides better performance than thinclients or netbooks, and at a fraction of the costs.
Unlike Microsoft Windows based multiseat virtual desktop solutions which require the purchase of the server operating system, as well as the purchase of client access licenses (CALs) and application software licenses for every seat, Userful is Linux based, so the operating system, and all the application software is Free. This provides significant cost savings, while still providing all the features of a Windows environment through open source software such as the Firefox web browser, the OpenOffice office suite, and even education specific software such as the iTALC school computer management software for teachers. Linux is no longer just for IT professionals, as evidenced by the education ministries particularly in Europe and South America currently deploying large numbers of Linux desktops in K-12 schools. But Linux is still free.
New to version V.3.7, the Userful Multiplier user interface now includes additional internationalizations. Expanding the multilingual support makes it possible for even more countries to take advantage of the cost savings of Userful, and will make it possible for countries
with multiple official languages to provide computer access in all official languages using a single solution. In addition, V.3.7 brings improved USB device support, including hot-plugging of 2-way audio devices. This makes interactive remote teaching and learning easy for
rural and specialized classrooms. Userful Multiplier V.3.7 supports all major Linux distributions including Ubuntu 9.10, SLED 11, and Fedora 11. It is available in 64-bit and 32-bit packages in both RPM and DEB formats, making it compatible with virtually all open source software.
"Userful Multiplier truly redefines the cost of educational computing." Said Beverley Gallagher, VP of Strategic Partnership at Userful. "The upfront and ongoing cost savings of Userful have made it possible for tens of thousands of K-12 schools in both developed and developing regions to provide computer access to millions of children, many for the first time. The new features of version 3.7 will make it possible to provide computer access to even more children around the world."
A free 2-user version of Userful Multiplier V.3.7 that turns 1 computer into 2 for personal or trial use is available from:
http://userful.com/products/downloads/free-2-user
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
desktop virtualization to even more users around the world.
Userful is one of the pioneers of multiseat virtual desktops having first launched their Userful Multiplier software in 2002. Userful's innovative Linux desktop virtualization paved the way for multiseat Windows solutions such as NComputing, and now Microsoft with their soon to be released Windows Multipoint Server 2010. Used in over 100 countries, Userful remains the top selling Linux multiseat solution worldwide, and has enjoyed particular success in the education
sector.
"By using Userful Multiplier in their K-12 classrooms, our customers have reported saving over 50% on their desktop hardware costs, an average of 62% on electricity costs, and additional savings on costly Internet drops, switches, network wiring and other infrastructure and
support costs." Said Sean Rousseau, Marketing Manager for Userful. "The multiseat Linux desktops allow our customers to stretch their limited IT budget and use those savings to provide better computer access for all students in their region."
Userful Multiplier lets a single PC support up to 10 independent users at the same time, each with their own monitor, keyboard, and mouse. Configuration is automated, and it provides phenomenal multimedia performance including full-screen/full-motion video. Userful provides better performance than thinclients or netbooks, and at a fraction of the costs.
Unlike Microsoft Windows based multiseat virtual desktop solutions which require the purchase of the server operating system, as well as the purchase of client access licenses (CALs) and application software licenses for every seat, Userful is Linux based, so the operating system, and all the application software is Free. This provides significant cost savings, while still providing all the features of a Windows environment through open source software such as the Firefox web browser, the OpenOffice office suite, and even education specific software such as the iTALC school computer management software for teachers. Linux is no longer just for IT professionals, as evidenced by the education ministries particularly in Europe and South America currently deploying large numbers of Linux desktops in K-12 schools. But Linux is still free.
New to version V.3.7, the Userful Multiplier user interface now includes additional internationalizations. Expanding the multilingual support makes it possible for even more countries to take advantage of the cost savings of Userful, and will make it possible for countries
with multiple official languages to provide computer access in all official languages using a single solution. In addition, V.3.7 brings improved USB device support, including hot-plugging of 2-way audio devices. This makes interactive remote teaching and learning easy for
rural and specialized classrooms. Userful Multiplier V.3.7 supports all major Linux distributions including Ubuntu 9.10, SLED 11, and Fedora 11. It is available in 64-bit and 32-bit packages in both RPM and DEB formats, making it compatible with virtually all open source software.
"Userful Multiplier truly redefines the cost of educational computing." Said Beverley Gallagher, VP of Strategic Partnership at Userful. "The upfront and ongoing cost savings of Userful have made it possible for tens of thousands of K-12 schools in both developed and developing regions to provide computer access to millions of children, many for the first time. The new features of version 3.7 will make it possible to provide computer access to even more children around the world."
A free 2-user version of Userful Multiplier V.3.7 that turns 1 computer into 2 for personal or trial use is available from:
http://userful.com/products/downloads/free-2-user
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Labels:
computer,
desktop,
fayette,
fayette front page,
georgia,
georgia front page,
linux,
software,
userful,
virtual
Wednesday, January 27, 2010
Consumers Encouraged to Protect Their Privacy Online
/PRNewswire/ -- The Internet offers an exciting world of information and entertainment at the click of a mouse. Consumers are spending hours surfing, shopping, playing games and communicating online, but as with any activity, it is important to put security, privacy and safety first. As U.S. businesses and consumers mark tomorrow, January 28, 2010, as National Data Privacy Day, consumers are encouraged to examine how they currently protect themselves online, and what steps they can take to ensure their privacy is secure when connecting through a mobile device, home broadband or any other Internet connection.
"Technology is such an important part of our lives, and we must use it responsibly by protecting our personal information," said Florida Attorney General Bill McCollum. "Any information you post online can never fully be removed, so guard your information very carefully and never share it with strangers or enter into unfamiliar Web sites."
The Internet Keep Safe Coalition (iKeepSafe), Florida Attorney General Bill McCollum and AT&T offer the following important tips for consumers to protect their privacy online:
What happens online stays online...forever. The Internet helps us enhance our social and civic lives. As you post the picture from spring break, or share your most intimate details or views, remember many Web sites and social networks are public, and information posted online is often permanent and searchable.
Know with whom you are sharing information online. Social media sites, chat rooms and other online forums can be anonymous, and some people may be pretending to be someone they are not. Be as suspicious of a stranger online as you are of strangers in public places.
Review privacy policies, privacy settings and profile preferences. Be cautious of giving out personal information, particularly your Social Security number and names of family members, unless you are familiar with the company and its Web site privacy policy. Many companies, like AT&T, have made it easier to understand their policies.
Keep virus and spyware protection up to date and in place. Computer viruses often look like something they are not - such as a picture, screen saver or even a Web link. Some spyware programs can track everything you do online and send this information to an unauthorized user, leaving you vulnerable to identity theft. Antivirus and spyware protection programs scan and monitor your computer for viruses and spyware and then alert you before damage occurs. AT&T offers its broadband customers the award-winning AT&T Internet Security Suite powered by McAfee®, which offers protection on up to 10 PCs and is included with qualifying plans.
Avoid sending sensitive personal data over public connections. Be aware that many public computers, such as those at the library and unsecured Wi-Fi connections can enable other users nearby to capture the information you are sending or receiving. If you have to use an unsecured or public connection, make sure the site is secure. The AT&T Wi-Fi network supports secure Virtual Private Network (VPN) access. If you have VPN, AT&T recommends that you connect through it for optimum security.
Never respond to e-mails or pop-ups asking for personal data or passwords. Use filtering software to help block unwanted e-mail and to reduce the likelihood of receiving viruses and spyware from unknown senders. Also use pop-up and ad-blocking features that let you control the quantity and type of pop-ups you receive or to block them completely.
Use a strong password for all devices and accounts. Use combinations of letters, numbers, upper and lower case characters, and symbols in your passwords. Change your passwords frequently.
Find Web sites on your own; don't use links in e-mails or on other sites. "Phishing," also known as "brand spoofing" or "carding," is a trick Internet scammers use to "fish" for consumers' financial information and password data using fake company e-mails and Web sites. Many companies, like AT&T, will not send e-mail requests to customers asking for personal account or credit card information. Instead of clicking the link in the e-mail, go to the site directly from your browser or search engine.
Look for signs that a Web site is secure before sending financial or personal data. Secure sites will often show a "lock" icon or there will be an "s" after the "http" ("https:///"). If you don't see these indications, then the site is probably not secure and you should carefully consider whether to send personal or financial data over the site.
Talk to your kids, teens and tweens. Teach children to never share their name, address, phone number, school name or any other personal information about their family while online.
Use the parental control tools available to make your job easier. Parental controls, such as AT&T's Smart Limits, enable you to establish sensible boundaries around the technology your family uses on a daily basis and to determine how and when your children can use their phone, computer or other connected device.
"I want to thank our state and community leaders who work every day to help keep consumers safe online," said Marshall Criser, III, AT&T Florida President "At AT&T, we are dedicated to promoting online safety awareness and education and providing our customers with the necessary tools to be safe and responsible digital citizens."
Last year, AT&T announced its support with the American School Counselor Association of iKeepSafe's Project PRO, an effort to teach students how to protect their privacy and reputation online. Project PRO enables school counselors, parents and teens to become an active part in managing a student's digital reputation through innovative educational resources such as video clips and training documents. To date, more than 4,200 educators and counselors throughout the country have sought out the curriculum.
"The Internet Keep Safe Coalition is thrilled to work with the Florida Attorney General and AT&T in commemoration of Data Privacy Day, and to join the effort in helping to raise awareness and educate the public on data safeguards," said iKeepSafe President Marsali Hancock. "We applaud Florida Attorney General Bill McCollum's efforts to expand awareness about the need to protect your security, privacy and safety to families nationwide. Let this Day serve as a catalyst for all of us to improve the way we manage our personal privacy online."
To help consumers have a safer online experience, AT&T offers a full library of supportive Internet safety and security tips as well as interactive safety games for children, all available at http://www.att.com/safety.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
"Technology is such an important part of our lives, and we must use it responsibly by protecting our personal information," said Florida Attorney General Bill McCollum. "Any information you post online can never fully be removed, so guard your information very carefully and never share it with strangers or enter into unfamiliar Web sites."
The Internet Keep Safe Coalition (iKeepSafe), Florida Attorney General Bill McCollum and AT&T offer the following important tips for consumers to protect their privacy online:
What happens online stays online...forever. The Internet helps us enhance our social and civic lives. As you post the picture from spring break, or share your most intimate details or views, remember many Web sites and social networks are public, and information posted online is often permanent and searchable.
Know with whom you are sharing information online. Social media sites, chat rooms and other online forums can be anonymous, and some people may be pretending to be someone they are not. Be as suspicious of a stranger online as you are of strangers in public places.
Review privacy policies, privacy settings and profile preferences. Be cautious of giving out personal information, particularly your Social Security number and names of family members, unless you are familiar with the company and its Web site privacy policy. Many companies, like AT&T, have made it easier to understand their policies.
Keep virus and spyware protection up to date and in place. Computer viruses often look like something they are not - such as a picture, screen saver or even a Web link. Some spyware programs can track everything you do online and send this information to an unauthorized user, leaving you vulnerable to identity theft. Antivirus and spyware protection programs scan and monitor your computer for viruses and spyware and then alert you before damage occurs. AT&T offers its broadband customers the award-winning AT&T Internet Security Suite powered by McAfee®, which offers protection on up to 10 PCs and is included with qualifying plans.
Avoid sending sensitive personal data over public connections. Be aware that many public computers, such as those at the library and unsecured Wi-Fi connections can enable other users nearby to capture the information you are sending or receiving. If you have to use an unsecured or public connection, make sure the site is secure. The AT&T Wi-Fi network supports secure Virtual Private Network (VPN) access. If you have VPN, AT&T recommends that you connect through it for optimum security.
Never respond to e-mails or pop-ups asking for personal data or passwords. Use filtering software to help block unwanted e-mail and to reduce the likelihood of receiving viruses and spyware from unknown senders. Also use pop-up and ad-blocking features that let you control the quantity and type of pop-ups you receive or to block them completely.
Use a strong password for all devices and accounts. Use combinations of letters, numbers, upper and lower case characters, and symbols in your passwords. Change your passwords frequently.
Find Web sites on your own; don't use links in e-mails or on other sites. "Phishing," also known as "brand spoofing" or "carding," is a trick Internet scammers use to "fish" for consumers' financial information and password data using fake company e-mails and Web sites. Many companies, like AT&T, will not send e-mail requests to customers asking for personal account or credit card information. Instead of clicking the link in the e-mail, go to the site directly from your browser or search engine.
Look for signs that a Web site is secure before sending financial or personal data. Secure sites will often show a "lock" icon or there will be an "s" after the "http" ("https:///"). If you don't see these indications, then the site is probably not secure and you should carefully consider whether to send personal or financial data over the site.
Talk to your kids, teens and tweens. Teach children to never share their name, address, phone number, school name or any other personal information about their family while online.
Use the parental control tools available to make your job easier. Parental controls, such as AT&T's Smart Limits, enable you to establish sensible boundaries around the technology your family uses on a daily basis and to determine how and when your children can use their phone, computer or other connected device.
"I want to thank our state and community leaders who work every day to help keep consumers safe online," said Marshall Criser, III, AT&T Florida President "At AT&T, we are dedicated to promoting online safety awareness and education and providing our customers with the necessary tools to be safe and responsible digital citizens."
Last year, AT&T announced its support with the American School Counselor Association of iKeepSafe's Project PRO, an effort to teach students how to protect their privacy and reputation online. Project PRO enables school counselors, parents and teens to become an active part in managing a student's digital reputation through innovative educational resources such as video clips and training documents. To date, more than 4,200 educators and counselors throughout the country have sought out the curriculum.
"The Internet Keep Safe Coalition is thrilled to work with the Florida Attorney General and AT&T in commemoration of Data Privacy Day, and to join the effort in helping to raise awareness and educate the public on data safeguards," said iKeepSafe President Marsali Hancock. "We applaud Florida Attorney General Bill McCollum's efforts to expand awareness about the need to protect your security, privacy and safety to families nationwide. Let this Day serve as a catalyst for all of us to improve the way we manage our personal privacy online."
To help consumers have a safer online experience, AT&T offers a full library of supportive Internet safety and security tips as well as interactive safety games for children, all available at http://www.att.com/safety.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Labels:
fayette,
fayette front page,
georgia,
georgia front page,
identity,
identity theft,
information,
internet,
safety,
technology,
tips
Friday, January 22, 2010
Consumer Watchdog Lauds Clinton's Call for Open Internet, Stresses Need for Online Consumer Privacy Safeguards
/PRNewswire/ -- Secretary of State Hillary Clinton's condemnation of cyber attacks and censorship is an important endorsement of a free global Internet, but just as important to ensuring the Internet's contribution to democracy and economic growth is a commitment to consumer privacy, Consumer Watchdog said today.
"Too many online companies ignore a consumer's right to control information gathered about their behavior on the Internet," said John M. Simpson, a consumer advocate with the nonpartisan, nonprofit consumer group. "Consider Google; they track your every move as you use their services and surf the Web just so they can mine the accumulated data and serve up targeted ads."
Consumer Watchdog said Clinton's speech demonstrated the State Department is playing a key role in ensuring an open Internet globally, but said the Federal Trade Commission must act to ensure consumer privacy is guaranteed within the United States.
Clinton's high-profile speech on Internet policy came after a recent incident in which hackers, widely believed to be tied to the Chinese government, gained access to Google and at least 30 other corporate computer networks. Google revealed the cyber attacks and said it would no longer self-censor search results on its China Internet search engine, Google.cn.
Cyber attacks and censorship undermine the free flow of information on the Internet and must be thwarted, Consumer Watchdog agreed. Equally important to a vibrant cyber economy, the group said, is that consumers are able to trust online companies not to abuse their privacy. Too often privacy guarantees are given short shrift in the drive for profits.
"For instance, Google tells us they are a technology company that wants to organize the world's information and make it accessible," said Simpson. "In analyzing Google's every move we need to understand they are fundamentally an advertising business. Most of what they do is to maximize those revenues."
Documents filed with the SEC show that 97 percent of the Internet giant's revenue came from advertising in the third quarter of 2009. The documents show that 53 percent of its revenue came from outside the United States.
"Google was right to end its misguided self-censorship in the face of the Chinese cyber attacks and good for them," said Simpson. "But while I'm concerned about the Chinese attacks, I'm even more concerned about the private data gold mine Google and other online companies have gathered about us, what they do with it and whom they share it with. Consumers must have control of what data is gathered, how it is used, how long its kept and whether it is even gathered."
Meanwhile, the FTC is holding a series of roundtable discussions to discuss online privacy issues. The second in the three-part series is next Thursday in Berkeley, Ca. Read about the Privacy Roundtable: http://www.ftc.gov/bcp/workshops/privacyroundtables/
Consumer Watchdog, formerly the Foundation for Taxpayer and Consumer Rights is a nonprofit, nonpartisan consumer advocacy organization with offices in Washington, DC and Santa Monica, Ca. Our website is: www.ConsumerWatchdog.org.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
"Too many online companies ignore a consumer's right to control information gathered about their behavior on the Internet," said John M. Simpson, a consumer advocate with the nonpartisan, nonprofit consumer group. "Consider Google; they track your every move as you use their services and surf the Web just so they can mine the accumulated data and serve up targeted ads."
Consumer Watchdog said Clinton's speech demonstrated the State Department is playing a key role in ensuring an open Internet globally, but said the Federal Trade Commission must act to ensure consumer privacy is guaranteed within the United States.
Clinton's high-profile speech on Internet policy came after a recent incident in which hackers, widely believed to be tied to the Chinese government, gained access to Google and at least 30 other corporate computer networks. Google revealed the cyber attacks and said it would no longer self-censor search results on its China Internet search engine, Google.cn.
Cyber attacks and censorship undermine the free flow of information on the Internet and must be thwarted, Consumer Watchdog agreed. Equally important to a vibrant cyber economy, the group said, is that consumers are able to trust online companies not to abuse their privacy. Too often privacy guarantees are given short shrift in the drive for profits.
"For instance, Google tells us they are a technology company that wants to organize the world's information and make it accessible," said Simpson. "In analyzing Google's every move we need to understand they are fundamentally an advertising business. Most of what they do is to maximize those revenues."
Documents filed with the SEC show that 97 percent of the Internet giant's revenue came from advertising in the third quarter of 2009. The documents show that 53 percent of its revenue came from outside the United States.
"Google was right to end its misguided self-censorship in the face of the Chinese cyber attacks and good for them," said Simpson. "But while I'm concerned about the Chinese attacks, I'm even more concerned about the private data gold mine Google and other online companies have gathered about us, what they do with it and whom they share it with. Consumers must have control of what data is gathered, how it is used, how long its kept and whether it is even gathered."
Meanwhile, the FTC is holding a series of roundtable discussions to discuss online privacy issues. The second in the three-part series is next Thursday in Berkeley, Ca. Read about the Privacy Roundtable: http://www.ftc.gov/bcp/workshops/privacyroundtables/
Consumer Watchdog, formerly the Foundation for Taxpayer and Consumer Rights is a nonprofit, nonpartisan consumer advocacy organization with offices in Washington, DC and Santa Monica, Ca. Our website is: www.ConsumerWatchdog.org.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Labels:
attacks,
censorship,
clinton,
cyber,
fayette,
fayette front page,
georgia,
georgia front page,
internet,
policy,
privacy
Thursday, January 14, 2010
State Legislators Say Net Regulation Will Hurt Investment and Jobs
/PRNewswire/ -- The American Legislative Exchange Council (ALEC) has delivered a letter to the Federal Communications Commission (FCC) opposing proposed network neutrality regulation. The state lawmakers expressed serious concerns that the unintended consequences of the proposed federal regulatory expansion into the Internet will harm states' economies. ALEC's letter was signed by 91 legislators from 36 states.
Connecticut State Representative Bill Hamzy serves as Chair of ALEC's Telecommunications & Information Technology Task Force and is the lead signatory of the ALEC letter opposing network neutrality regulation. "Federal regulation of broadband networks is the wrong way to spur the kind of technological innovation and financial investment in broadband infrastructure that will bring sustainable job growth to state economies. Since the FCC cannot even point to any existing problem with the Internet, it should say 'no' to network neutrality regulation," he said.
The ALEC letter described the proposed network neutrality regulation as "an unprecedented foray into government control of broadband private networks and the Internet" that could result in economic slowdown and setback in the states. "If adopted, extensive regulatory control and uncertainties will harm innovation, stifle investment, and curtail job growth. We believe that unintended consequences stemming from the draft rules will be detrimental to our states' economies and forestall marketplace recovery."
In 2007, ALEC adopted a Resolution on Network Neutrality that calls on the federal government and states to refrain from imposing such regulation.
The American Legislative Exchange Council (ALEC) is the nation's largest nonpartisan, individual membership organization of state legislators.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Connecticut State Representative Bill Hamzy serves as Chair of ALEC's Telecommunications & Information Technology Task Force and is the lead signatory of the ALEC letter opposing network neutrality regulation. "Federal regulation of broadband networks is the wrong way to spur the kind of technological innovation and financial investment in broadband infrastructure that will bring sustainable job growth to state economies. Since the FCC cannot even point to any existing problem with the Internet, it should say 'no' to network neutrality regulation," he said.
The ALEC letter described the proposed network neutrality regulation as "an unprecedented foray into government control of broadband private networks and the Internet" that could result in economic slowdown and setback in the states. "If adopted, extensive regulatory control and uncertainties will harm innovation, stifle investment, and curtail job growth. We believe that unintended consequences stemming from the draft rules will be detrimental to our states' economies and forestall marketplace recovery."
In 2007, ALEC adopted a Resolution on Network Neutrality that calls on the federal government and states to refrain from imposing such regulation.
The American Legislative Exchange Council (ALEC) is the nation's largest nonpartisan, individual membership organization of state legislators.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Labels:
alec,
broadband,
fayette,
fayette front page,
FCC,
federal,
georgia,
georgia front page,
government,
net neutrality,
network,
regulatory
China News from U.S. Hit by Denial of Service Cyber Attack Originating from China
/PRNewswire/ -- Concurrent with the Chinese cyber attack on Google's gmail, VerticalNews China was the subject of a denial of service (DoS) attack on Wednesday that originated from China. The company also publishes the popular China Weekly News, and both titles are available on the Internet.
VerticalNews China is a product of NewsRx, a 25-year-old news publisher headquartered in Atlanta. The attack was quickly stopped when the company's IP service identified the source and blocked it. VerticalNews China can be found at www.VerticalNews.com.
"Your VerticalNews site was getting a denial-of-service attack (DoS attack) from someone in China. We went ahead and quickly blocked the source IP address at the router level," according to NewsRx's IP service located in Bowie, Maryland.
"In a DoS attack, they are not hacking into your machine, but are preventing it from being usable to everyone else by sending very high volumes of traffic in very short amounts of time. I think you may have been targeted because of your VerticalNews China coverage."
VerticalNews China covers day-to-day business news, medical research, manufacturing and technology developments in China. It does not have a political agenda, but is a major supplier of detailed, in-depth news about China. Today's issue is fairly typical of its coverage, including articles on the number of gas stations in China; a report that Liberty Mutual Group Insurance has received permission to open an office in Zhejiang; that CBI China will host the third annual China Petrochemical Summit; that Shanda Interactive Entertainment Limited has received an award; and a report that forecasts Asia Pacific jet fleet growth will expand 80%, led by China.
"I do know that the large-scale attack originated in China, and now that we know it can happen, we've taken steps to hopefully prevent future disruptions," said Susan Hasty, publisher at NewsRx, the parent company of VerticalNews. "We have every intention to continue coverage of vital news about China."
VerticalNews China and VerticalNews India were launched by NewsRx in 2009, to expand the company's coverage of the Far East. The content is also available at the online sites of Lexis Nexis, Dialog, ProQuest and Gale through the additional VerticalNews titles China Weekly News, China Business Newsweekly, Journal of India, India Business Newsweekly, and Asia Business Newsweekly.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
VerticalNews China is a product of NewsRx, a 25-year-old news publisher headquartered in Atlanta. The attack was quickly stopped when the company's IP service identified the source and blocked it. VerticalNews China can be found at www.VerticalNews.com.
"Your VerticalNews site was getting a denial-of-service attack (DoS attack) from someone in China. We went ahead and quickly blocked the source IP address at the router level," according to NewsRx's IP service located in Bowie, Maryland.
"In a DoS attack, they are not hacking into your machine, but are preventing it from being usable to everyone else by sending very high volumes of traffic in very short amounts of time. I think you may have been targeted because of your VerticalNews China coverage."
VerticalNews China covers day-to-day business news, medical research, manufacturing and technology developments in China. It does not have a political agenda, but is a major supplier of detailed, in-depth news about China. Today's issue is fairly typical of its coverage, including articles on the number of gas stations in China; a report that Liberty Mutual Group Insurance has received permission to open an office in Zhejiang; that CBI China will host the third annual China Petrochemical Summit; that Shanda Interactive Entertainment Limited has received an award; and a report that forecasts Asia Pacific jet fleet growth will expand 80%, led by China.
"I do know that the large-scale attack originated in China, and now that we know it can happen, we've taken steps to hopefully prevent future disruptions," said Susan Hasty, publisher at NewsRx, the parent company of VerticalNews. "We have every intention to continue coverage of vital news about China."
VerticalNews China and VerticalNews India were launched by NewsRx in 2009, to expand the company's coverage of the Far East. The content is also available at the online sites of Lexis Nexis, Dialog, ProQuest and Gale through the additional VerticalNews titles China Weekly News, China Business Newsweekly, Journal of India, India Business Newsweekly, and Asia Business Newsweekly.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Labels:
attacks,
china,
chinese,
cyber,
denial,
dos,
fayette,
fayette front page,
georgia,
georgia front page,
google,
verticalnews
Tuesday, January 12, 2010
Universal Music Group (UMG) Partners With Free All Music to Offer Free Legal Downloads
/PRNewswire/ -- Universal Music Group, the world's leading music company, has partnered with ad-sponsored digital music download service FreeAllMusic.com (www.freeallmusic.com) to offer consumers free, legal downloads from UMG's broad digital catalog of chart-topping musical artists. The announcement was made today by David Ring, Executive Vice President of Business Development and Business Affairs for UMG's eLabs, and Richard Nailling, Chief Executive Officer of FreeAllMusic.com.
Through this agreement, thousands of tracks representing many of the world's most prominent artists are being made available now in FAM's current private beta period, where users will be offered up to 20 free downloads per month, five per week, starting every New Music Tuesday. This is based on the usage patterns of a typical "hits-oriented" iTunes customer. FreeAllMusic.com is keeping with its "walk before we run" philosophy in slowly building its user and advertiser base.
FreeAllMusic.com is a new music service that provides consumers with downloadable, high-quality, iPod-compatible MP3s of popular songs that are advertiser-paid, free, legal, and unrestricted (DRM-free). In exchange for watching one brief video commercial per download on the FreeAllMusic.com site, users receive a permanent, high-quality download which they can enjoy anytime, anywhere with no further advertising or restrictions. There is no software required for the service. Users' music selections and sponsoring brands are then promoted externally through an opt-in, consumer-informed digital advertising network.
To download a free track, registered users simply select a participating brand they prefer, and watch a brief video from that brand. After each download, FreeAllMusic.com serves additional advertisements for that brand across targeted websites. Visitors to those sites will see ads displaying information about downloads, supporting brands, and FreeAllMusic.com. Users can also email information about their download to friends, who can also download it legally for free...if they watch the ad, too. Sharing of download activity can also be posted on popular social networking sites.
Charter brands for the private beta period include Coca-Cola®, Warner Bros. TV, Zappos.com, LIONSGATE®, LG, inconcert3D, and Powermat.
Fans get their free music legally, brands gain new loyalties, and artists are compensated no differently than if the tracks were purchased, creating a fair balance for all participants.
"For the first time, a legitimate free music download service is making 'doing the right thing' easier than piracy. Our site is fast, easy and fun for consumers," noted FreeAllMusic.com's Richard Nailling. "The addition of UMG's artists from Lady Gaga and Rihanna to Taylor Swift and Jay Sean means people can count on FAM to offer an excellent selection of DRM-free music for just about every taste."
"Free All Music has created a new advertising model that connects fans, artists and brands," stated Mr. Ring. "It provides an opportunity for fans to support the artists that they love, and brands to build loyalty with existing and new consumers. Universal Music is committed to enabling and supporting services that provide engaging alternatives for fans looking to legally download music."
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Through this agreement, thousands of tracks representing many of the world's most prominent artists are being made available now in FAM's current private beta period, where users will be offered up to 20 free downloads per month, five per week, starting every New Music Tuesday. This is based on the usage patterns of a typical "hits-oriented" iTunes customer. FreeAllMusic.com is keeping with its "walk before we run" philosophy in slowly building its user and advertiser base.
FreeAllMusic.com is a new music service that provides consumers with downloadable, high-quality, iPod-compatible MP3s of popular songs that are advertiser-paid, free, legal, and unrestricted (DRM-free). In exchange for watching one brief video commercial per download on the FreeAllMusic.com site, users receive a permanent, high-quality download which they can enjoy anytime, anywhere with no further advertising or restrictions. There is no software required for the service. Users' music selections and sponsoring brands are then promoted externally through an opt-in, consumer-informed digital advertising network.
To download a free track, registered users simply select a participating brand they prefer, and watch a brief video from that brand. After each download, FreeAllMusic.com serves additional advertisements for that brand across targeted websites. Visitors to those sites will see ads displaying information about downloads, supporting brands, and FreeAllMusic.com. Users can also email information about their download to friends, who can also download it legally for free...if they watch the ad, too. Sharing of download activity can also be posted on popular social networking sites.
Charter brands for the private beta period include Coca-Cola®, Warner Bros. TV, Zappos.com, LIONSGATE®, LG, inconcert3D, and Powermat.
Fans get their free music legally, brands gain new loyalties, and artists are compensated no differently than if the tracks were purchased, creating a fair balance for all participants.
"For the first time, a legitimate free music download service is making 'doing the right thing' easier than piracy. Our site is fast, easy and fun for consumers," noted FreeAllMusic.com's Richard Nailling. "The addition of UMG's artists from Lady Gaga and Rihanna to Taylor Swift and Jay Sean means people can count on FAM to offer an excellent selection of DRM-free music for just about every taste."
"Free All Music has created a new advertising model that connects fans, artists and brands," stated Mr. Ring. "It provides an opportunity for fans to support the artists that they love, and brands to build loyalty with existing and new consumers. Universal Music is committed to enabling and supporting services that provide engaging alternatives for fans looking to legally download music."
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Labels:
agreement,
download,
fayette,
fayette front page,
free,
georgia,
georgia front page,
legal,
music,
universal
New Report: Google vs. Apple in Wireless
/PRNewswire/ -- A new Jeff Kagan Report & Comment discusses Google and its first wireless phone, Nexus One and Android: how it may change the wireless industry and how it compares to and competes with the Apple iPhone.
This report also looks at how Google and Apple will impact others like RIM, Palm, Samsung, LG, HTC, Motorola and others, as well as networks like AT&T, Verizon, Sprint, T-Mobile and others.
"Strategies are changing in the wireless industry. In a few short years the entire industry will look completely different. Will you be a leader or will you be caught by surprise?" asks Kagan.
The report discusses the changing wireless industry and the two companies that are not wireless companies yet are both leaders in their field and using their power to reshape this industry.
Smart phone growth is accelerating and will become dominant during the next few years. There are enormous opportunities and risks involved for every player, including handset makers, networks, network equipment, and App makers.
The wireless industry already looks much different over the last few years and that transformation will continue. Over the next few years it will look like an entirely different place.
This report discusses where the industry has been and where it is heading. It looks at the new opportunities and the hidden challenges. It looks at how certain leaders may lose their footing and become followers or worse. It has happened before in the 1990's and it is about to happen again.
Click here for PREVIEW and additional information about reports: http://www.jeffkagan.com/ or http://www.jeffkagan.com/jeff_kagan_report_&_comment.htm
OTHER REPORTS:
(1) Is Motorola coming back to life?
(2) What's next at Sprint?
(3) Changing telecom job market 2010
(4) RIM Blackberry: How will new competition from Apple and Google impact the company?
(5) State of the industry 2010; wireless and telecom in transition
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
This report also looks at how Google and Apple will impact others like RIM, Palm, Samsung, LG, HTC, Motorola and others, as well as networks like AT&T, Verizon, Sprint, T-Mobile and others.
"Strategies are changing in the wireless industry. In a few short years the entire industry will look completely different. Will you be a leader or will you be caught by surprise?" asks Kagan.
The report discusses the changing wireless industry and the two companies that are not wireless companies yet are both leaders in their field and using their power to reshape this industry.
Smart phone growth is accelerating and will become dominant during the next few years. There are enormous opportunities and risks involved for every player, including handset makers, networks, network equipment, and App makers.
The wireless industry already looks much different over the last few years and that transformation will continue. Over the next few years it will look like an entirely different place.
This report discusses where the industry has been and where it is heading. It looks at the new opportunities and the hidden challenges. It looks at how certain leaders may lose their footing and become followers or worse. It has happened before in the 1990's and it is about to happen again.
Click here for PREVIEW and additional information about reports: http://www.jeffkagan.com/ or http://www.jeffkagan.com/jeff_kagan_report_&_comment.htm
OTHER REPORTS:
(1) Is Motorola coming back to life?
(2) What's next at Sprint?
(3) Changing telecom job market 2010
(4) RIM Blackberry: How will new competition from Apple and Google impact the company?
(5) State of the industry 2010; wireless and telecom in transition
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Wednesday, January 6, 2010
Georgia Tech Professor Howard Schmidt Named National Cyber Czar
President Barack Obama has appointed Howard Schmidt, adjunct faculty member in the Georgia Tech Information Security Center (GTISC) in the College of Computing, as the new White House cybersecurity coordinator.
“Howard is one of the world’s leading authorities on computer security, with some 40 years of experience in government, business and law enforcement,” said John Brennan, assistant to the president for Homeland Security and Counterterrorism, in an e-mail announcing the appointment last month. “Howard will have regular access to the president and serve as a key member of his National Security Staff. He will also work closely with his economic team to ensure that our cybersecurity efforts keep the nation secure and prosperous.”
At Tech, Schmidt has helped set up the GTISC industry advisory board. He has worked on a research project to evaluate the cyber security policies of various United States stakeholders. He has also given lectures on security policies and strategies.
Schmidt previously served as former chief security strategist for the US CERT Partners Program and former special advisor to the White House for Cyberspace Security under President George W. Bush. He joined Tech in 2006 to work with GTISC to improve the state of information security by lending his vast knowledge and expertise in this growing technological area.
Schmidt’s distinguished career as an information security advocate includes leadership positions with both public and private sector organizations. He has served on the President’s Critical Infrastructure Protection Board, was an augmented member of the President’s Committee of Advisors on Science and Technology and held executive positions with the Information Systems Security Association, the Information Technology Information Sharing and Analysis Center, the National Institute of Standards and Technology and the Information Security Privacy Advisory Board. Schmidt also served as vice president and chief security strategist for eBay and chief security officer for Microsoft Corporation, forming and directing the computer giant’s Trustworthy Computer Security Strategies Group.
David Terraso
Georgia Tech
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
“Howard is one of the world’s leading authorities on computer security, with some 40 years of experience in government, business and law enforcement,” said John Brennan, assistant to the president for Homeland Security and Counterterrorism, in an e-mail announcing the appointment last month. “Howard will have regular access to the president and serve as a key member of his National Security Staff. He will also work closely with his economic team to ensure that our cybersecurity efforts keep the nation secure and prosperous.”
At Tech, Schmidt has helped set up the GTISC industry advisory board. He has worked on a research project to evaluate the cyber security policies of various United States stakeholders. He has also given lectures on security policies and strategies.
Schmidt previously served as former chief security strategist for the US CERT Partners Program and former special advisor to the White House for Cyberspace Security under President George W. Bush. He joined Tech in 2006 to work with GTISC to improve the state of information security by lending his vast knowledge and expertise in this growing technological area.
Schmidt’s distinguished career as an information security advocate includes leadership positions with both public and private sector organizations. He has served on the President’s Critical Infrastructure Protection Board, was an augmented member of the President’s Committee of Advisors on Science and Technology and held executive positions with the Information Systems Security Association, the Information Technology Information Sharing and Analysis Center, the National Institute of Standards and Technology and the Information Security Privacy Advisory Board. Schmidt also served as vice president and chief security strategist for eBay and chief security officer for Microsoft Corporation, forming and directing the computer giant’s Trustworthy Computer Security Strategies Group.
David Terraso
Georgia Tech
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Tennis Channel Files FCC Complaint Against Comcast
/PRNewswire/ -- On Tuesday, January 5, Tennis Channel filed a complaint with the Federal Communications Commission demonstrating that Comcast Cable Communications is violating the FCC's program carriage rules, which prohibit cable system operators from discriminating against unaffiliated cable programming services in favor of networks they own. According to the complaint, Comcast isolates Tennis Channel on a premium sports tier received by a small fraction of Comcast subscribers while it carries Comcast-owned networks that compete with Tennis Channel on basic tiers available to far more subscribers at no additional charge.
"We did not want to file this complaint, but Comcast has left us with no choice," said Ken Solomon, chairman and CEO of Tennis Channel. "After steadily building the most comprehensive single-sport network in television over the past few years, in the first half of 2009 we had numerous discussions with Comcast. We made offers with added incentives for it to move us to a competitive, broadly penetrated service tier, as it has done recently with the MLB, NHL and NBA channels, in which it has financial interests. But Comcast declined to do so."
According to evidence included in the complaint, Tennis Channel's ratings performance is comparable in its service area to that of Comcast's leading sports services, the Golf Channel and Versus; it offers coverage of all four of tennis' Grand Slam events, while the Golf Channel and Versus offer little or no comparable coverage of the major events in the sports they cover; it charges a per-subscriber rate that is about half the rate charged by the Golf Channel and Versus, but broadcasts more than 2,700 hours per year of event coverage - compared to 2,400 hours on the Golf Channel and 1,350 hours on Versus; and it offers a full-time high-definition service.
Comcast's Golf Channel and Versus are among the most broadly distributed channels on Comcast systems, reaching almost all of Comcast's 23.8 million subscribers, according to the complaint, while Tennis Channel is limited to the added-cost premium sports tier that reaches only about 2.6 million homes. "This ten-to-one disparity in carriage seriously impedes our ability to grow and compete in the sports cable marketplace," said Solomon. "It results solely from Comcast's decision to protect the services it owns from legitimate competition."
The complaint notes that Comcast executives have conceded that they give special carriage consideration to their owned services and that advertiser-supported services like Tennis Channel cannot succeed if they are carried on the Comcast sports tier. The complaint also establishes that only unaffiliated sports networks are carried on that tier and that all of the services in which Comcast has an interest enjoy considerably broader coverage.
"This case is truly the litmus test for unaffiliated programmers everywhere, and the future of the public's interest in having a wide variety of voices and choice in the media marketplace," said Solomon. "Ultimately, we simply want to be treated comparably to the way Comcast treats the sports program services it owns."
Tennis Channel (www.tennischannel.com) is the only 24-hour, television-based multimedia destination dedicated to both the professional sport and tennis lifestyle. A hybrid of comprehensive sports, health, fitness, pop culture, entertainment, lifestyle and travel programming, the network is home to every aspect of the wide-ranging, worldwide tennis community. It also has the most concentrated single-sport coverage in television, with telecast rights to the US Open, Wimbledon, Roland Garros (French Open), Australian Open, Olympus US Open Series, ATP Masters Series, top-tier Sony Ericsson WTA Tour championship competitions, Davis Cup and Fed Cup by BNP Paribas, and Hyundai Hopman Cup. Tennis Channel is carried by nine of the top 10 MSOs, Verizon FiOS TV, and has a national footprint via DIRECTV and DISH Network.
The sport of tennis itself is currently enjoying major growth. Thirty million Americans played tennis last year, the most in two decades, according to study commissioned by the United States Tennis Association and Tennis Industry Association. A Sports Illustrated list of the top 10 athletes of the past decade included two tennis players and named a tennis player No. 1. Additionally, Tennis Channel's ratings for top-level tennis events are competitive with those for programming on the highest-ranking cable networks.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
"We did not want to file this complaint, but Comcast has left us with no choice," said Ken Solomon, chairman and CEO of Tennis Channel. "After steadily building the most comprehensive single-sport network in television over the past few years, in the first half of 2009 we had numerous discussions with Comcast. We made offers with added incentives for it to move us to a competitive, broadly penetrated service tier, as it has done recently with the MLB, NHL and NBA channels, in which it has financial interests. But Comcast declined to do so."
According to evidence included in the complaint, Tennis Channel's ratings performance is comparable in its service area to that of Comcast's leading sports services, the Golf Channel and Versus; it offers coverage of all four of tennis' Grand Slam events, while the Golf Channel and Versus offer little or no comparable coverage of the major events in the sports they cover; it charges a per-subscriber rate that is about half the rate charged by the Golf Channel and Versus, but broadcasts more than 2,700 hours per year of event coverage - compared to 2,400 hours on the Golf Channel and 1,350 hours on Versus; and it offers a full-time high-definition service.
Comcast's Golf Channel and Versus are among the most broadly distributed channels on Comcast systems, reaching almost all of Comcast's 23.8 million subscribers, according to the complaint, while Tennis Channel is limited to the added-cost premium sports tier that reaches only about 2.6 million homes. "This ten-to-one disparity in carriage seriously impedes our ability to grow and compete in the sports cable marketplace," said Solomon. "It results solely from Comcast's decision to protect the services it owns from legitimate competition."
The complaint notes that Comcast executives have conceded that they give special carriage consideration to their owned services and that advertiser-supported services like Tennis Channel cannot succeed if they are carried on the Comcast sports tier. The complaint also establishes that only unaffiliated sports networks are carried on that tier and that all of the services in which Comcast has an interest enjoy considerably broader coverage.
"This case is truly the litmus test for unaffiliated programmers everywhere, and the future of the public's interest in having a wide variety of voices and choice in the media marketplace," said Solomon. "Ultimately, we simply want to be treated comparably to the way Comcast treats the sports program services it owns."
Tennis Channel (www.tennischannel.com) is the only 24-hour, television-based multimedia destination dedicated to both the professional sport and tennis lifestyle. A hybrid of comprehensive sports, health, fitness, pop culture, entertainment, lifestyle and travel programming, the network is home to every aspect of the wide-ranging, worldwide tennis community. It also has the most concentrated single-sport coverage in television, with telecast rights to the US Open, Wimbledon, Roland Garros (French Open), Australian Open, Olympus US Open Series, ATP Masters Series, top-tier Sony Ericsson WTA Tour championship competitions, Davis Cup and Fed Cup by BNP Paribas, and Hyundai Hopman Cup. Tennis Channel is carried by nine of the top 10 MSOs, Verizon FiOS TV, and has a national footprint via DIRECTV and DISH Network.
The sport of tennis itself is currently enjoying major growth. Thirty million Americans played tennis last year, the most in two decades, according to study commissioned by the United States Tennis Association and Tennis Industry Association. A Sports Illustrated list of the top 10 athletes of the past decade included two tennis players and named a tennis player No. 1. Additionally, Tennis Channel's ratings for top-level tennis events are competitive with those for programming on the highest-ranking cable networks.
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Labels:
channel,
comcast,
complaint,
discrimination,
fayette,
fayette front page,
georgia,
georgia front page,
sport,
tennis
Tuesday, January 5, 2010
Justices Step Into Uncharted Waters With 'Sexting' Cyber-Liability Case
/PRNewswire/ -- When the U.S. Supreme Court agreed to take the case of a California police officer who sent sexually explicit text messages on a department-issued pager, news reports underscored the potential impact on private employers. Whether this case will lead to a new "blueprint" for privacy rules in the American workplace is uncertain at best, but it does point to the rising prominence of cyber-liability in our Twittering, Facebooking, iPhone-enabled age, said veteran attorney Joseph P. Paranac, Jr., a member of LeClairRyan's Labor & Employment team.
"In its first major case on cyber-liability, the Supreme Court is striding into uncharted territory," noted the Newark-based attorney. "But it is important to emphasize that this case, in which a police chief acquired and read transcripts of texts sent by his officers, involves a public employer. This was a state action. That means it is covered under Fourth Amendment protections against unreasonable searches and seizures. Public employees have a greater expectation of privacy than their private-sector counterparts."
The Supreme Court will hear the case, Ontario v. Quon, this spring. At issue is whether the police chief in Ontario, Calif., violated the privacy rights of SWAT team member Jeff Quon and three other officers by acquiring and reading records of their texts, many of which turned out to be sexually explicit. The chief, who shared the texts with city officials, had sought to find out whether the officers were reimbursing the department for all personal messages sent from their pagers. The officers sued, and a panel of the U.S. Court of Appeals for the Ninth Circuit ruled in their favor.
While the public nature of this case might limit its ultimate impact on private employers, Ontario v. Quon nonetheless touches upon unexplored questions that are at the heart of the rapidly evolving field of cyber-liability, Paranac said.
For more than a decade, lawyers have urged employers to adopt straightforward policies on how their employees use company-owned computers, pagers and other electronic devices. The City of Ontario Police Department did have such policies in place, and specifically warned employees that their communications were subject to monitoring. According to the Ninth Circuit's ruling in the Quon case, however, the lieutenant in charge of monitoring pager use for the department had undermined this written policy by telling officers he would not read their texts.
"His informal policy, notwithstanding the official policy, was to go to the officers and ask them for a guesstimate of their personal pager use over and above the monthly content limit of 25,000 total characters," Paranac noted. "According to the court decision, the supervisor would then ask the officers to reimburse the department based on those guesses."
In the view of the Ninth Circuit panel, this mixed message was enough to create an expectation of privacy regarding personal texts. "Again and again, Labor & Employment attorneys have urged employers to adopt, clearly communicate and consistently enforce cyber-communications policies," Paranac said. "This case illustrates precisely why."
Indeed, the decision, which included a 10-page dissent, pointed to other cases in which government agencies, by adopting such straightforward and consistent approaches, were able to diminish their employees' privacy expectations. "This was true despite the greater expectation of privacy generally afforded public employees," Paranac noted.
As befits the complexity of cyber-liability, however, courts do appear to be demarcating some notable exceptions even to clearly enunciated Internet and electronic-communications policies. "For example, the case of Stengart v. Loving Care Agency Inc., which is headed for the New Jersey Supreme Court, centered on whether e-mails sent by an employee to her lawyer using a company-owned computer are protected by the attorney-client privilege and therefore off-limits from monitoring," Paranac noted. "In that case, the plaintiff used her password-protected Yahoo account, not the company's e-mail system, to communicate with her attorney about a planned lawsuit against the company."
The nation's highest courts might well carve out similar exceptions for other sensitive communications, such as doctor-patient e-mails sent with employer-owned equipment. "This puts employers in a quandary," Paranac said. "The best they can do is to establish and enforce clear and consistent polices, because we are just at the beginning of a process in which the courts will likely shape the limits of those policies. Until that process is complete, employers and employees alike will have to operate within a kind of cyber-liability grey area."
In its Quon ruling, meanwhile, the Ninth Circuit asserted that Arch Wireless, the pager provider that turned over the text transcripts to the police chief, violated the Stored Communications Act (SCA) of 1986 by doing so. The act stipulates that stored communications be released by third-parties only with the permission of the sender or receiver of the original message. "This act, which has largely been forgotten about and is rarely if ever cited in cyber-liability cases, was passed back in the prehistoric age, when it comes to Internet, e-mail and mobile devices," Paranac explained. "If the SCA is resurrected as a result of the Quon case, there could be major liability implications for third-party communications companies like Verizon and AT&T. They will likely have to grapple with questions like, 'Are we actually allowed to hand these texts or e-mails over to the employer?' "
In certain instances, IT specialists who work with third-party providers to facilitate access to employee communications might even be subject to liability under a newly resurrected SCA, Paranac noted. "I would not be surprised if Congress were to revisit the Stored Communications Act," he said. "If you look at the iPhone and the whole universe of apps, many of which are GPS-enabled, it becomes clear that we are dealing with communications and devices that nobody even dreamed of in 1986."
Much the same could be said of cyber-liability itself, the attorney added. "The wheels of justice turn slowly, and both courts and lawmakers are struggling to catch up to technology," he said. "Technology, however, evolves at an ever-accelerating pace."
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
"In its first major case on cyber-liability, the Supreme Court is striding into uncharted territory," noted the Newark-based attorney. "But it is important to emphasize that this case, in which a police chief acquired and read transcripts of texts sent by his officers, involves a public employer. This was a state action. That means it is covered under Fourth Amendment protections against unreasonable searches and seizures. Public employees have a greater expectation of privacy than their private-sector counterparts."
The Supreme Court will hear the case, Ontario v. Quon, this spring. At issue is whether the police chief in Ontario, Calif., violated the privacy rights of SWAT team member Jeff Quon and three other officers by acquiring and reading records of their texts, many of which turned out to be sexually explicit. The chief, who shared the texts with city officials, had sought to find out whether the officers were reimbursing the department for all personal messages sent from their pagers. The officers sued, and a panel of the U.S. Court of Appeals for the Ninth Circuit ruled in their favor.
While the public nature of this case might limit its ultimate impact on private employers, Ontario v. Quon nonetheless touches upon unexplored questions that are at the heart of the rapidly evolving field of cyber-liability, Paranac said.
For more than a decade, lawyers have urged employers to adopt straightforward policies on how their employees use company-owned computers, pagers and other electronic devices. The City of Ontario Police Department did have such policies in place, and specifically warned employees that their communications were subject to monitoring. According to the Ninth Circuit's ruling in the Quon case, however, the lieutenant in charge of monitoring pager use for the department had undermined this written policy by telling officers he would not read their texts.
"His informal policy, notwithstanding the official policy, was to go to the officers and ask them for a guesstimate of their personal pager use over and above the monthly content limit of 25,000 total characters," Paranac noted. "According to the court decision, the supervisor would then ask the officers to reimburse the department based on those guesses."
In the view of the Ninth Circuit panel, this mixed message was enough to create an expectation of privacy regarding personal texts. "Again and again, Labor & Employment attorneys have urged employers to adopt, clearly communicate and consistently enforce cyber-communications policies," Paranac said. "This case illustrates precisely why."
Indeed, the decision, which included a 10-page dissent, pointed to other cases in which government agencies, by adopting such straightforward and consistent approaches, were able to diminish their employees' privacy expectations. "This was true despite the greater expectation of privacy generally afforded public employees," Paranac noted.
As befits the complexity of cyber-liability, however, courts do appear to be demarcating some notable exceptions even to clearly enunciated Internet and electronic-communications policies. "For example, the case of Stengart v. Loving Care Agency Inc., which is headed for the New Jersey Supreme Court, centered on whether e-mails sent by an employee to her lawyer using a company-owned computer are protected by the attorney-client privilege and therefore off-limits from monitoring," Paranac noted. "In that case, the plaintiff used her password-protected Yahoo account, not the company's e-mail system, to communicate with her attorney about a planned lawsuit against the company."
The nation's highest courts might well carve out similar exceptions for other sensitive communications, such as doctor-patient e-mails sent with employer-owned equipment. "This puts employers in a quandary," Paranac said. "The best they can do is to establish and enforce clear and consistent polices, because we are just at the beginning of a process in which the courts will likely shape the limits of those policies. Until that process is complete, employers and employees alike will have to operate within a kind of cyber-liability grey area."
In its Quon ruling, meanwhile, the Ninth Circuit asserted that Arch Wireless, the pager provider that turned over the text transcripts to the police chief, violated the Stored Communications Act (SCA) of 1986 by doing so. The act stipulates that stored communications be released by third-parties only with the permission of the sender or receiver of the original message. "This act, which has largely been forgotten about and is rarely if ever cited in cyber-liability cases, was passed back in the prehistoric age, when it comes to Internet, e-mail and mobile devices," Paranac explained. "If the SCA is resurrected as a result of the Quon case, there could be major liability implications for third-party communications companies like Verizon and AT&T. They will likely have to grapple with questions like, 'Are we actually allowed to hand these texts or e-mails over to the employer?' "
In certain instances, IT specialists who work with third-party providers to facilitate access to employee communications might even be subject to liability under a newly resurrected SCA, Paranac noted. "I would not be surprised if Congress were to revisit the Stored Communications Act," he said. "If you look at the iPhone and the whole universe of apps, many of which are GPS-enabled, it becomes clear that we are dealing with communications and devices that nobody even dreamed of in 1986."
Much the same could be said of cyber-liability itself, the attorney added. "The wheels of justice turn slowly, and both courts and lawmakers are struggling to catch up to technology," he said. "Technology, however, evolves at an ever-accelerating pace."
-----
www.fayettefrontpage.com
Fayette Front Page
www.georgiafrontpage.com
Georgia Front Page
Follow us on Twitter: @GAFrontPage
Subscribe to:
Posts (Atom)