Monday, 1 March 2010

"KEY PROVISIONS OF THE USA PATRIOT ACT SUBJECT TO SUNSET"


Recent tragic events have brought about a rapid reconsideration of the legal restrictions placed on law enforcement and the intelligence communities. On October 26, President Bush signed into law the USA Patriot Act (Patriot Act), which makes significant changes in the legal structure within which the law enforcement and intelligence communities operate. This article focuses on the key provisions of the Patriot Act that pertain to electronic surveillance and intelligence gathering. Notwithstanding the haste with which Congress acted, the provisions of the new law relating to electronic surveillance, for the most part, are a sound effort to provide new tools for law enforcement and intelligence agencies to combat terrorism while preserving the civil liberties of individual Americans. Some changes simply update our surveillance laws to reflect the fact that we live in a digital age. Other sections expand the surveillance powers of our law enforcement and intelligence communities in ways that make sense in light of the new threats facing our country.

When we decide, however, to expand surveillance powers to track terrorists, all residents, not just the terrorists, are affected. A common problem running through many of the new authorities contained in the Patriot Act is the reliance on executive branch supervision rather than meaningful review by a neutral magistrate of the potentially highly intrusive surveillance techniques that are authorized. There are several common sense changes that could be made to the new law that would provide better protections for civil liberties without sacrificing security. Because of the rapidity with which the law was enacted, Congress, wisely, included a four-year sunset of many of the provisions of the new Act. That sunset will allow Congress to make some needed adjustments, hopefully in a calmer climate, and strengthen the protections for civil liberties without sacrificing security.

Section 216

The Patriot Act substantially changes the law with respect to law enforcement access to information about computer use including Web surfing. Reaching for an analogy from the old rotary dialed telephone system, the Act extends provisions written to authorize installation of pen registers and trap and trace devices, which record outgoing and incoming phone numbers, to authorize the installation of devices to record all computer routing, addressing, and signaling information. The government can get this information with a mere certification that the information likely to be obtained is relevant to an ongoing criminal investigation.


"My Last Activity in Final"

"SUMMARY OF THE 1980 OECD PRIVACY GUIDELINES"


  1. Collection Limitation.There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.
  2. Data quality principle. Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.
  3. Purpose specification. The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.
  4. Use limitation principle. Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with Paragraph 9 except:

    (a) with the consent of the data subject; or

    (b) by the authority of law.

  5. Security safeguards principle. Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data.
  6. Openness principle. There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity about usual residence of the data controller.
  7. Individual participation principle. An individual should have the right:

    (a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him;

    (b) to have communicated to him, data relating to him

    1. within a reasonable time;
    2. at a charge, if any, that is not excessive;
    3. in a reasonable manner; and
    4. in a form that is readily intelligible to him;

    ( c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and

    (d) to challenge data relating to him and, if the challenge is successful, to have the data erased; rectified, completed or amended.

  8. Accountability principle. A data controller should be accountable for complying with measures which give effect to the principles stated above.

Friday, 29 January 2010

"My Last Midterm Activity"

"PRIVACY"
Is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.The boundaries and content of what is consider private differ among culture and individuals, but share basic common themes .



"PRIVACY PROTECTION AND THE LAW"

Congress enacted the privacy protection to reduce the chilling effect of law enforcement searches and seizures on publishers.

Wednesday, 13 January 2010

2. You have just been hired as an IT security consultant to "fix the security problem" at Acme United Global Manufacturing. The company has been hacked mercilessly over the last six months, with three of the attacks making headlines for the negative impact they have had on the firm and its customers. You have been given 90 days and budget of 1 million dollars. Where would you begin, and what steps would you take to fix the problem?


If ive been hired as an IT security I will make sure that I can handle that problem before accept that opportunity.The first step that I'm doing is to think the best idea to fix that problem.Second steps, I need a expert person to help me to fix that problem.

Wednesday, 6 January 2010

My First Midterm Quiz

4. Your friend just told you that he is developing a worm to attack the administrative systems at your college. The worm is "harmless" and will simply cause a message - "Let's party!" - to be displayed on all workstations on Friday afternoon at 3 p.m. By 4 p. m., the virus will erase itself and destroy all evidence of its presence. What would you say or do?


If my freind told me that he is developing a worm to attack the administrative system at my college. I say to my freind that he dont need to do that virus to attack the administrative system .Because if he do this he distroy the party .The message ""Lets Party !!!"" is important that need to be displayed on all workstation.