Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

Pete Recommends – Weekly highlights on cyber security issues, November 28, 2021

Via LLRXPete Recommends – Weekly highlights on cyber security issues, November 28, 2021 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Five highlights from this week: An introduction to U.S. data compliance laws; Companies ditching VPNs for zero trust architectures to secure hybrid workplaces; Research finds US adults have context-specific views on biometric technology use; Apple iOS privacy settings to change now; and Mozilla has released a new platform for privacy-focused email communications.

Amazon Web Services (AWS): A cheat sheet

TechRepublic: “The rise of cloud computing provides businesses the ability to quickly provision computing resources without the costly and laborious task of building data centers, and without the costs of running servers with underutilized capacity due to variable workloads. Amazon Web Services was the first large vendor of easily affordable cloud infrastructure and services, and… Continue Reading

New ABA Legal Fact Check explores conflict over presidential executive privilege

“A new ABA Legal Fact Check released [November 17, 2021] examines whether a former U.S. president can constitutionally assert executive privilege to block the release of presidential documents held by the National Archives and Records Administration and subpoenaed by Congress. The question of whether former President Donald Trump has a legal basis to block a… Continue Reading

Workplace monitoring is everywhere. Here’s how to stop algorithms ruling your office

ZDNet – A new report lays out five recommendations to protect us from the rapid rise of automated workplace-monitoring and decision-making tools…The group’s report, The New Frontier: Artificial Intelligence at Work, came as the European Commission’s Joint Research Council published separate research on electronic monitoring and surveillance in the workplace. It too found that explosive growth… Continue Reading

You Are the Object of a Secret Extraction Operation

New York Times Opinion, Dr. Shoshana Zuboff, professor emeritus at Harvard Business School and the author of The Age of Surveillance Capitalism –  “Facebook is not just any corporation. It reached trillion-dollar status in a single decade by applying the logic of what I call surveillance capitalism — an economic system built on the secret… Continue Reading

The Internet’s Unkillable App

The Atlantic, by Dave Pell: “The noisier our digital lives get, the more popular the humble newsletter becomes. The Romans brought the newsletter into existence. Later, in the Middle Ages, newsletters became common forms of communication among extended families, traders, and those looking to share information in a format that eventually led to what we… Continue Reading

Employee experiences of enterprise software have huge impact on user adoption

Tech Republic: “A Gartner survey of professionals who use tech products and services in their day-to-day work reveals that 60% report being frustrated with business software in the past 24 months. Those very same users, the report said, can kick off a word-of-mouth chain reaction that influences software adoption across an entire company. The Gartner… Continue Reading

You’re one of 125,698,496 people pwned in the LinkedIn Scraped Data data breach

“You signed up for notifications when your account was pwned in a data breach and unfortunately, it’s happened. Here’s what’s known about the breach: Education levels, Email addresses, Genders, Geographic locations, Job titles, Names, Social media profiles. During the first half of 2021, LinkedIn was targeted by attackers who scraped data from hundreds of millions… Continue Reading