After surgery for separate hand injuries, a father and son endured lengthy occupational therapy, which their insurer considered to be an alternative treatment. The family owed more than $8,500.
(Image credit: Heidi de Marco/Kaiser Health News)
President Trump and Congressional Republicans promised taxpayers could file their returns on a postcard, but the new IRS effort isn't quite that.
(Image credit: Drew Angerer/Getty Images)
Cody Iorns lost his arms in a 2015 motorcycle accident, but with the help of prosthetic limbs and hard work, he became a fixture in the local paddleboarding community.
(Image credit: Marvin D. Lynchard /Department of Defense)
A gunman entered the offices of The Capital newspaper in Annapolis Thursday and opened fire, killing four of the paper's journalists and a sales assistant. We have profiles of the victims.
Data Science Central: “The key of any organization’s digital transformation is becoming more effective at leveraging data and analytics to power their business models. That is, how can organizations exploit the growing bounty of internal and external data sources to uncover new sources of customer, product, service, operational and market insights that they can use to optimize key business and operational processes, mitigate compliance and cybersecurity risks, uncover new monetization opportunities, and create a more compelling, differentiated customer experience..”
The man, who is Jewish and holds both U.S. and Israeli citizenship, reportedly made about 2,000 hoax bomb threats.
(Image credit: Sebastian Scheiner/AP)
Law Technology Today: “Mac computers are now the preferred choice for young professionals, including young lawyers and law students. And many other firms have become Mac enthusiasts. Whether you love the interface, the physical design, or whether you got fed up with the Blue Screen of Death and slow forced updates, it’s great to know that more legal tech developers are bringing their products to the Mac platform…”
In Custodia Legis: “Earlier this month, Andrew provided an update on the Congress.gov enhancements, including that the date of the “Previous Meeting” on the homepage is now linked to a list of items that were on the House or Senate floor that day. The previous release also included errata, a published correction for a committee report that, if applicable, will display in the overview box of the committee report. In this release, you will find that ”On the Floor” reports are now linked from the “Yesterday in Congress” browse, so you can quickly locate detailed information about what was considered on the previous legislative day. We’re also introducing Congress.gov notifications that users can subscribe to in order to receive news and information about new Congress.gov features and system maintenance…”
Brill, Hillary and Jones, Scott, Little Things and Big Challenges: Information Privacy and the Internet of Things (June 1, 2017). Available at SSRN: https://ssrn.com/abstract=3188958 or http://dx.doi.org/10.2139/ssrn.3188958
“The Internet of Things (IoT), the wireless connection of devices to ourselves, each other, and the Internet, has transformed our lives and our society in unimaginable ways. Today, billions of electronic devices and sensors collect, store, and analyze personal information from how fast we drive, to how fast our hearts beat, to how much and what we watch on TV. Even children provide billions of bits of personal information to the cloud through “smart” toys that capture images, recognize voices, and more. The unprecedented and unbridled new information flow generated from the little things of the IoT is creating big challenges for privacy regulators. Traditional regulators are armed with conventional tools not fully capable of handling the privacy challenges of the IoT. A critical review of recent Federal Trade Commission (FTC) enforcement decisions sheds light on a recommended path for the future regulation of the IoT. This Article first examines the pervasiveness of the IoT and the data it collects in order to clarify the challenges facing regulators. It also highlights traditional privacy laws, principles, and regulations and explains why those rules do not fit the novel challenges and issues resulting from the IoT. Then it presents an in-depth analysis of four key FTC enforcement decisions to highlight how the FTC has and can regulate the IoT without undermining the innovation and benefits that this technology — and the data it provides — brings to our society.”
FCW.com: “The federal government is moving to expand emergency procurement authority for purchases used to respond to or recover from a cyberattack, according to a new proposed rule in the Federal Register. The change places cyberattacks against the United States in the same category as nuclear, biological, chemical or radiological attacks. It would allow federal procurement officials to spend up to $20,000 for domestic purchases and $30,000 for international purchases under micropurchasing rules, as well as $750,000 and $1.5 million for simplified acquisition purchases, provided the work has “a clear and direct relationship to the support of a contingency operation.” The notice — put out by the Department of Defense, General Services Administration and NASA — implements several provisions from the 2017 National Defense Authorization Act that increase the dollar threshold for agency purchases that are in support of federal efforts to respond to an emergency or a disaster…”
Report – How tech companies use dark patterns to discourage us from exercising our rights to privacy
Gizmodo: “A bot on Twitter is sharing images of all 212 immigration detention centers along with the address and demographic information of each location, tossing cold, hard facts into the heated online debate over immigration in America. Artist Everest Pipkin created the bot, @Abolish_ICE_Now, on Friday, about two months after Attorney General Jeff Sessions announced the “zero tolerance” policy that has resulted in U.S. Border Patrol agents separating thousands of undocumented children from their parents—an unspeakably cruel policy child health care professionals have characterized as “a form of child abuse.”…
Protesters marched through Washington, D.C., on Thursday to fight for families separated at the southern border. It was one of several demonstrations around the country.
(Image credit: Jacquelyn Martin/AP)
The time is long over due to cease talking about data privacy – we have none – and move forward, now, to develop and implement standards to secure our metadata from organizations that collect, aggregate, sell, buy and trade every facet of our “data” without our knowledge and consent, with ramifications that continue to remain opaque to all too many Americans. Via Wired: “You’ve probably never heard of the marketing and data aggregation firm Exactis. But it may well have heard of you. And now there’s also a good chance that whatever information the company has about you, it recently leaked onto the public internet, available to any hacker who simply knew where to look. Earlier this month, security researcher Vinny Troia discovered that Exactis, a data broker based in Palm Coast, Florida, had exposed a database that contained close to 340 million individual records on a publicly accessible server. The haul comprises close to 2 terabytes of data that appears to include personal information on hundreds of millions of American adults, as well as millions of businesses. While the precise number of individuals included in the data isn’t clear—and the leak doesn’t seem to contain credit card information or Social Security numbers—it does go into minute detail for each individual listed, including phone numbers, home addresses, email addresses, and other highly personal characteristics for every name. The categories range from interests and habits to the number, age, and gender of the person’s children.
- See also Infographic: List of data breaches in 2017 – “2017 was a big year for data breaches. Uber, Equifax and Yahoo all fell victim, and many small organisations also suffered a breach or cyber attack. When it comes to cyber threats, all types of organisations are at risk.
“A majority of Republicans say technology firms support the views of liberals over conservatives and that social media platforms censor political viewpoints. Still, Americans tend to feel that these firms benefit them and – to a lesser degree – society In the midst of an ongoing debate over the power of digital technology companies and the way they do business, sizable shares of Americans believe these companies privilege the views of certain groups over others. Some 43% of Americans think major technology firms support the views of liberals over conservatives, while 33% believe these companies support the views of men over women, a new Pew Research Center survey finds. In addition, 72% of the public thinks it likely that social media platforms actively censor political views that those companies find objectionable. The belief that technology companies are politically biased and/or engaged in suppression of political speech is especially widespread among Republicans. Fully 85% of Republicans and Republican-leaning independents think it likely that social media sites intentionally censor political viewpoints, with 54% saying this is very likely. And a majority of Republicans (64%) think major technology companies as a whole support the views of liberals over conservatives. On a personal level, 74% of Americans say major technology companies and their products and services have had more of a positive than a negative impact on their own lives. And a slightly smaller majority of Americans (63%) think the impact of these companies on society as a whole has been more good than bad. At the same time, their responses highlight an undercurrent of public unease about the technology industry and its broader role in society. When presented with several statements that might describe these firms, a 65% majority of Americans feel the statement “they often fail to anticipate how their products and services will impact society” describes them well – while just 24% think these firms “do enough to protect the personal data of their users.” Meanwhile, a minority of Americans think these companies can be trusted to do the right thing just about always (3%) or most of the time (25%), and roughly half the public (51%) thinks they should be regulated more than they are now. These are among the key findings of this Pew Research Center survey, conducted May 29-June 11 among 4,594 U.S. adults…”
NSA/CSS Statement, June 28, 2018: “Consistent with NSA’s core values of respect for the law, accountability, integrity, and transparency we are making public notice that on May 23, 2018, NSA began deleting all call detail records (CDRs) acquired since 2015 under Title V of the Foreign Intelligence Surveillance Act (FISA). The Government relies on Title V of FISA to obtain CDRs, which do not include the content of any calls. In accordance with this law, the Government obtains these CDRs, following a specific court-authorized process. NSA is deleting the CDRs because several months ago NSA analysts noted technical irregularities in some data received from telecommunications service providers. These irregularities also resulted in the production to NSA of some CDRs that NSA was not authorized to receive. Because it was infeasible to identify and isolate properly produced data, NSA concluded that it should not use any of the CDRs. Consequently, NSA, in consultation with the Department of Justice and the Office of the Director of National Intelligence, decided that the appropriate course of action was to delete all CDRs. NSA notified the Congressional Oversight Committees, the Privacy and Civil Liberties Oversight Board, and the Department of Justice of this decision. The Department of Justice, in turn, notified the Foreign Intelligence Surveillance Court. The root cause of the problem has since been addressed for future CDR acquisitions, and NSA has reviewed and revalidated its intelligence reporting to ensure that the reports were based on properly received CDRs.”
The German chancellor hopes to find some answers to that question at a European Union summit beginning Thursday. The parties she counts as allies have been deeply divided over how to treat newcomers.
(Image credit: Ludovic Marin/AFP/Getty Images)