The Year 2013 Has Become 1984

Size: px
Start display at page:

Download "The Year 2013 Has Become 1984"

Transcription

1 The Year 2013 Has Become 1984 Saturday, September 21, :33 idiscovery Solutions Tom Matzen The Editor interviews Tom Matzen, Director at idiscovery Solutions, in charge of the firm s International e Discovery and Data Privacy Group. Editor: In view of your more than 13 years in the field of data analysis, advance search technologies and data production, what is your assessment of the security surrounding the NSA s data collection techniques in view of the Edward Snowden revelations? Tom Matzen Matzen: As far as the security surrounding how the NSA s data collection was done, Edward Snowden shined a light on PRISM, a collaboration between the government and private companies that store all data for their own accounts Google, Microsoft, Hotmail, Yahoo. The fact that the U.S. government was able to access all that information without revealing it to the public has long been debated. Congress apparently was told, but may not have understood the implications, or the extent, to which information was gathered. The real question deals with the security of the NSA s data collection techniques. Yes, they definitely kept secret their techniques, which Snowden exposed. As for me, personally, having lived in Washington, DC for the past 10 to 15 years, none of this disclosure surprised me. Editor: As I recall, it was very much in the news a few years back that some of the telecoms were resisting turning over their records and other information to the government. Matzen: Yes, the news came and went. Snowden s revelations had to do with Verizon and AT&T handing over documents to the government. The telecoms were put in a very bad spot, since they make their money on what is technically government bandwidth, which is entrusted to them. When the government comes knocking on your door, you really cannot say no when you are making billions of dollars off of a national resource. Snowden s revelations mention the telecoms directly, pointing out that the telecoms have access to all your text messages, all your s, all your browsing history, etc. Should people have known about it? How did they do it? The way the NSA is building an infrastructure to store such a colossal amount of information is unlike anything else anyone has built. The NSA has built an even larger facility in Utah to house up to 12 exabytes of data. Naturally, the NSA expects to store more and more data. If there is a government agency

2 that does not delete anything, the question becomes: who has access to the data and why? Editor: Do you place the blame for allowing Snowden to have access to such sensitive information on the NSA s (and earlier CIA s) failure to perform adequate measures in his security clearance? Matzen: It is easy to place the blame on the person who certified he should be given topsecret clearance. Getting top clearance is too easy to obtain, in my opinion. What kind of background check was made? Not everyone needs clearance to do certain NSA or government jobs. There seems to be a disconnect between a job description and what a person has access to. The government has shown laxity in giving large numbers of personnel access to so much information because it is hard to segregate the wheat from the chaff. For what Snowden was supposed to be doing, I do not understand the reason to give him unfettered access to all that was made available to him, as well as the security of being able to move it. One would think that moving such a large amount of data off of a server could have been avoided by providing a computer that had more limited capabilities. The failure was on two fronts: the background check issue and the making available of data that was more than was required for a given position. Editor: Do you consider there was also a failure to properly screen Bradley Manning in placing him in a pivotal position among highly classified documents in the U.S. military? Matzen: Manning had access to more information than he needed to do his job, and he was able to remove data from systems, although it was not his responsibility to monitor the data. Information security is something these systems all seem to lack, or at the very least their security was easily circumvented. Editor: By the NSA using the argument that it is only filtering out metadata from telephone conversations, an assertion which has been challenged, should U.S. citizens feel that their privacy has not been breached? Matzen: No, their privacy has definitely been breached. This statement is being made for political reasons. Metadata is often more important than readable, hard data in what we do. You can have over 250 fields of metadata around a single communication. Metadata can contain the time, the date, the destination, your longitude and latitude, location of where a picture was taken that you attached, and more. You can track people with metadata. That is why the courts in e discovery require production of the metadata along with the other data. They know it is just as important. Oh, it s just metadata is factually incorrect. In any case, your privacy has been breached. Is that a legal cause of action? It depends on what state you reside in. Different courts are interpreting it differently. Editor: It was reported in June 2013, that the U.S. military blocked access to parts of the Guardian website related to government surveillance programs for thousands of defense personnel not only in Britain, but also in Afghanistan, the Middle East and South Asia. If this report is correct, how does this affect data transfers from nation to nation and across the world?

3 Matzen: The president of Brazil, Dilma Rousseff, was supposed to meet with President Obama recently, but she cancelled her trip upon learning that her own privacy had been breached. Some parties in Germany expressed a wish to cut trade ties. Many in the EU, where the sensitivities are so high, expressed political outrage. I think at the end of the day, people are going to make their political points to embarrass the U.S., but politics reacts to economics. No country is going to isolate itself in the global marketplace over this dustup. It all comes down to politics. I see it causing a lot of FUD fear, uncertainty and doubt generated by other countries that are trying to fine Facebook and Google for privacy violations. While those countries will not change their policies, our government is also not willing to change its policies despite the outrage overseas. Editor: As I recall, Google was blocked from China for awhile for having intruded on China s privacy. Matzen: Google has been trying for a year and a half to get back into China, offering to let the Chinese build some of their routers and other devices. An Italian court fined Google a few years ago for mapping and picturing neighborhoods. The U.S. government is now incorporating these same maps into its PRISM program. They are paying millions mostly to Yahoo and Google that s upwards of 80 percent of PRISM for the information. Not only do you have the government storing all this information, but the for profit companies have it, as well. This type of big data storage can lead to predicting outcomes, such as police departments that are now predicting where crimes will occur. This raises an ethical dilemma: can you predict a crime and make an arrest before it actually occurs? In my opinion, the recent Obama election was over before it even took place, owing to the use of big data. Assembling all that data into their systems, algorithms were targeted to certain audiences in terms of what they wished to hear and who was likely to vote. It is difficult to wrap your mind around the predictive aspects of big data, and that is a bit scary. Editor: Is there any means by which encryption can protect documents from would be intruders? It has been said that many efforts at trial and error can usually break any code. Matzen: If somebody wants to break into your database, they probably can. Whether you have encryption or not, it does not stop PRISM and some government entities from entering software through the back door. If your password is a simple password like number numbernumber number, then trial and error can unlock it. If you use eight characters and a number a strong password it is not so easily broken. Editor: Director of National Intelligence James Clapper acknowledged that Snowden may have done a public service, since a debate regarding privacy versus security is very much needed. How does the right to privacy, as perceived in parts of Europe, differ from that in the U.S.? Matzen: In the EU, privacy is considered a fundamental human right, whereas in the United States it is not as important. South American countries are following the EU model, as well. When we collect data there, the collection has to be narrow and targeted, whereas in the U.S., often the whole content of the computer may be made available. EU privacy has gone

4 as far as adopting an EU Data Directive, with several basic principles on how data transfers should occur. Whereas of an employee of a U.S. company is recognized as belonging to the company if used on its equipment, the same is not true in the case of an employee of a European company. An EU employee has a personal right to that . In Europe, you have a personal cause of action if your data is breached. In Switzerland, for example, when we collect data, the custodian can sit next to us and delete data while we are collecting it. While our litigators are uneasy about this practice, there is not much we can do. Editor: While the FISA court overseeing the NSA has found that the NSA has overstepped its authority in certain areas, what measures have been undertaken to curb some of these abuses? Do you expect that any of the NSA s activities will be curbed? Matzen: No. Although, there have been arguments as to how we should change the FISA court, as was the case when one retired judge suggested that it should become an adversarial body with two sides taking opposite views. While the rule is that PRISM is only supposed to retain data for a limited time unless there is a warrant, the practice of retaining documents for much longer has been muddled without the FISA court being involved. The ardor with which the NSA is hailed as the best spying and data gathering group gives cover to their practices. I do not feel the U.S. government is going to change anything, because Obama is able to say we have stopped X number of attacks, and we haven t been struck by a foreign terrorist since I ve been in office. Technically, people do not really understand it. Even if they did understand it, and it does violate the Fourth Amendment, Congress has shown that it does not really matter. If you stop the NSA s accrual of data and you are attacked a year later, who is going to take responsibility for that? No one. Editor: What is your outlook for implementation of greater controls and monitors of international e discovery and data surveillance? Are we living in glass houses? Mantz: In The Washington Post right after 9/11, an article that has remained with me since I read it stated that if you commute from Virginia to DC and back, you have your picture taken no less than, I believe, 43 times. While if you are not doing anything wrong, you should not care, I am still uneasy the government and private companies are able to do this, but I do not think it will change. A friend of mine who used to work at the Department of Commerce in the Safe Harbor Group was charged with coming up with a global compromise relating to international e discovery, since we are faced with e discovery in many different contexts where it is not paramount. In the EU and Asia, they design rules to protect their citizens from spam, telemarketing, and having medical records revealed. France has a blocking statute. We are faced with dealing with laws from other countries that do not have litigation in mind, nor should they. For countries in international commerce, we could allow for encryption, where you collect data with a person s consent; that might be an international solution. The Sedona Conference is trying to develop rules that might apply for onward transfer in e discovery issues. As for the actions of the U.S. government going forward, I do not think solving crimes after the fact is a reason to keep petabytes of data infinitely. That crosses the line between riskreward, not to mention issues with the Constitution. Most data is captured that no one

5 reviews; it is only scrutinized when someone is looking for predetermined phrases. Obviously you can control who has access to it, but as far as stopping data collection, I do not think that will ever happen. Please the interviewee at [email protected] with questions about this interview. Disclaimer Privacy The Metropolitan Corporate Counsel, Inc Wychwood Road, Mountainside, NJ Contact us at [email protected] 2013The Metropolitan Corporate Counsel, Inc. All rights reserved.

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

UNITED STATES DISTRICT COURT DISTRICT OF OREGON PORTLAND DIVISION

UNITED STATES DISTRICT COURT DISTRICT OF OREGON PORTLAND DIVISION UNITED STATES DISTRICT COURT DISTRICT OF OREGON PORTLAND DIVISION UNITED STATES OF AMERICA, Plaintiff, v. Criminal Case No. 3:10-CR-00475-KI-1 OPINION AND ORDER MOHAMED OSMAN MOHAMUD, Defendant. S. Amanda

More information

As the US debates email privacy a Berlin start up surges with...

As the US debates email privacy a Berlin start up surges with... TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services

More information

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with

More information

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the

More information

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the

More information

Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world

Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world To cloud or not to cloud, that is a very serious question EEMA / TrustCore Legal challenges in a post Safe Harbour and pre GDPR cloud world 18 November 2015 [email protected] Context Major cloud providers

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing

More information

Securing our information we have the technology; we just have to have the will to do it

Securing our information we have the technology; we just have to have the will to do it Interview with Arjen Kamphuis, information technology specialist Securing our information we have the technology; we just have to have the will to do it Author: Valentina Novak "The hackers need you as

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic

More information

Brief on Did GCHQ Spy on You Illegally?

Brief on Did GCHQ Spy on You Illegally? Brief on Did GCHQ Spy on You Illegally? Privacy International on Monday launched a campaign and platform allowing people to ask the UK s surveillance court, the Investigatory Powers Tribunal, if GCHQ spied

More information

Report on Data Aggregation Kelly Heffner, Rachel Popkin, Reem Alsweilem, Anjuli Kannan

Report on Data Aggregation Kelly Heffner, Rachel Popkin, Reem Alsweilem, Anjuli Kannan The Electronic Frontier Foundation Defending Freedom in the Digital World Report on Data Aggregation Kelly Heffner, Rachel Popkin, Reem Alsweilem, Anjuli Kannan Introduction The primary concern of the

More information

THE NOT A SEARCH GAME

THE NOT A SEARCH GAME THE NOT A SEARCH GAME JOHN F. STINNEFORD * The privacy versus security discussion is not just about the Fourth Amendment it involves policy considerations as well. The Fourth Amendment concerns frame the

More information

Where can I get help after a sexual assault?

Where can I get help after a sexual assault? Sexual Assault What is assault? Assault is when someone uses force to hurt you. Slapping, kicking and pushing can be assault. Sometimes touching can be an assault. Threatening or trying to hurt someone

More information

Patriot Act Impact on Canadian Organizations Using Cloud Services

Patriot Act Impact on Canadian Organizations Using Cloud Services Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states

More information

Insider Threats in the Real World Eavesdropping and Unauthorized Access

Insider Threats in the Real World Eavesdropping and Unauthorized Access Insider Threats in the Real World Eavesdropping and Unauthorized Access A Visual Data Security Whitepaper Prepared by: OptioLabs Camden Yards 323 West Camden Street, Suite 801 Baltimore, Maryland 21201

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

ROGERS JOSEPH O'DONNELL

ROGERS JOSEPH O'DONNELL 415.956.2828 (t) Robert Dollar Building 415.956.6457 (f) 311 California Street, 10th Flr. San Francisco CA 94104 ROGERS JOSEPH O'DONNELL 202.777.8950 (t) Victor Building 202.347.8429 (f) 750 9th Street,

More information

Future Proof Your ediscovery Practices

Future Proof Your ediscovery Practices FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) vs. ) Case No. 09-00296-03-CR-W-FJG ) ROBERT E. STEWART, ) ) Defendant.

More information

Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime (3d ed.)

Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime (3d ed.) Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime (3d ed.) Edited by Ralph D. Clifford Carolina Academic Press, Durham, North Carolina, ISBN 978-1-59460-853-7 Price $38.00,

More information

Website Security: How to Avoid a Website Breach. Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions

Website Security: How to Avoid a Website Breach. Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions Website Security: How to Avoid a Website Breach Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions www.caretech.com > 877.700.8324 An enterprise s website is now

More information

ediscovery: The New Information Management Battleground Developments in the Law and Best Practices

ediscovery: The New Information Management Battleground Developments in the Law and Best Practices Sponsored by ediscovery: The New Information Management Battleground Developments in the Law and Best Practices Kahn Consulting Inc. (847) 266-0722 [email protected] Introduction The following

More information

Professional Ethics for Computer Science

Professional Ethics for Computer Science Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:

More information

What Lawyers Don t Tell You The Realities of Record Keeping

What Lawyers Don t Tell You The Realities of Record Keeping What Lawyers Don t Tell You The Realities of Record Keeping Welcome to the Power of Attorney Podcast which is part of our Conversations that Matter Podcasts. My name is Mary Bart, Chair of Caregiving Matters.

More information

What Is A Security Program? How Do I Build A Successful Program?

What Is A Security Program? How Do I Build A Successful Program? What Is A Security Program? How Do I Build A Successful Program? White Paper A Security Program is like building a house, the standards provide you with a list of parts needed to build the house and a

More information

SPECIAL REPORT ON ATTORNEY WEBSITES: WATCH FOR THESE TOP 10 RED FLAGS BEFORE HIRING A PERSONAL INJURY LAWYER

SPECIAL REPORT ON ATTORNEY WEBSITES: WATCH FOR THESE TOP 10 RED FLAGS BEFORE HIRING A PERSONAL INJURY LAWYER SPECIAL REPORT ON ATTORNEY WEBSITES: WATCH FOR THESE TOP 10 RED FLAGS BEFORE HIRING A PERSONAL INJURY LAWYER VUJASINOVIC & BECKCOM, P.L.L.C. 1001 Texas Ave., Suite 1020 Houston, Texas 77002 (713) 224-7800

More information

PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B.

PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B. PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B. Privacy The focus of my presentation will be on two thing that have made marketing and contacting clients

More information

Privacy & Data Security: The Future of the US-EU Safe Harbor

Privacy & Data Security: The Future of the US-EU Safe Harbor Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT

More information

Accession to Convention 108: Benefits and Commitments. Marc Rotenberg, President Electronic Privacy Information Center Washington, DC

Accession to Convention 108: Benefits and Commitments. Marc Rotenberg, President Electronic Privacy Information Center Washington, DC Accession to Convention 108: Benefits and Commitments Marc Rotenberg, President Electronic Privacy Information Center Washington, DC Convention 108: From a European Reality to Global Treaty Strasbourg,

More information

Federal Criminal Court

Federal Criminal Court No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled

More information

Business Internet Banking Agreement Effective November 12, 2012

Business Internet Banking Agreement Effective November 12, 2012 Business Internet Banking Agreement Effective November 12, 2012 PRINT AND RETAIN THIS FOR YOUR RECORDS 1. AGREEMENT This Agreement is a contract that establishes the rules that cover your electronic access

More information

TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION

TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION PRESENTED BY JEFF KEARNEY KEARNEY & WESTFALL 2501 PARKVIEW STREET, SUITE 300 FORT WORTH, TEXAS 76102 (817) 336-5600 LUBBOCK CRIMINAL DEFENSE LAWYERS

More information

How To Adopt A Child In Germany

How To Adopt A Child In Germany 7 th JMTC Legal Assistance Information Adoption Please note that this Information Paper only provides basic information and is not intended to serve as a substitute for personal consultations with a Legal

More information

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally

More information

CITIZEN ADVOCACY CENTER

CITIZEN ADVOCACY CENTER CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical

More information

Foreign Currency Account & Foreign Currency Term Deposit Terms and Conditions Effective 1 April 2015

Foreign Currency Account & Foreign Currency Term Deposit Terms and Conditions Effective 1 April 2015 Foreign Currency Account & Foreign Currency Term Deposit Terms and Conditions Effective 1 April 2015 What you need to know about these terms and conditions This booklet sets out the terms and conditions

More information

Self-Encrypting Hard Disk Drives in the Data Center

Self-Encrypting Hard Disk Drives in the Data Center Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional

More information

If You have Been Arrested Don t Do Anything Until You Read My Special Report!

If You have Been Arrested Don t Do Anything Until You Read My Special Report! If You have Been Arrested Don t Do Anything Until You Read My Special Report! If you have been arrested by the police for a criminal offense, you re probably confused or worried about what steps to take

More information

Critical analysis. Be more critical! More analysis needed! That s what my tutors say about my essays. I m not really sure what they mean.

Critical analysis. Be more critical! More analysis needed! That s what my tutors say about my essays. I m not really sure what they mean. Critical analysis Be more critical! More analysis needed! That s what my tutors say about my essays. I m not really sure what they mean. I thought I had written a really good assignment this time. I did

More information

CONDUCT A NEBRASKA SEARCH AND SEIZURE OF YOUR HOME?

CONDUCT A NEBRASKA SEARCH AND SEIZURE OF YOUR HOME? WHEN CAN THE POLICE CONDUCT A NEBRASKA SEARCH AND SEIZURE OF YOUR HOME? A man's house shall be his own castle, privileged against all civil and military intrusion. Petersen Criminal Defense Law Regardless

More information

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view

More information

Computing, Python and Robots Net Neutrality

Computing, Python and Robots Net Neutrality Department of Computer Science University of San Francisco p. 1/? Computing, Python and Robots Net Neutrality Chris Brooks Department of Computer Science University of San Francisco Department of Computer

More information

GUESTBOOK REWARDS, INC. Privacy Policy

GUESTBOOK REWARDS, INC. Privacy Policy GUESTBOOK REWARDS, INC. Privacy Policy Welcome to Guestbook Rewards, Inc. the online and mobile service of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,

More information

How Do People Settle Disputes? How a Civil Trial Works in California

How Do People Settle Disputes? How a Civil Trial Works in California Article brought to you by the Administrative Office of the California Courts and California Council for the Social Studies in partnership for Civic Education How Do People Settle Disputes? How a Civil

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

A Guide to the Human Rights Act

A Guide to the Human Rights Act A Guide to the Human Rights Act A booklet for People with Learning Disabilities Human Rights Human Rights Illustrations by CHANGE Picture Bank What s inside This booklet,..................................1

More information

Drunk Driving Vocabulary Lesson

Drunk Driving Vocabulary Lesson Hello and welcome to the vocabulary lesson for the conversation Drunk Driving. In this conversation, Joe and I are just talking about different friends or different people that we ve known that have gotten

More information

Bush Lets U.S. Spy on Callers Without Courts

Bush Lets U.S. Spy on Callers Without Courts Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December

More information

What You Need to Know and What You Need to Do

What You Need to Know and What You Need to Do South Central Wisconsin MLS Corporation 4801 Forest Run Road, Suite 101 Madison, WI 53704 Phone (608) 240-2800 Fax (608) 240-2801 What You Need to Know and What You Need to Do A Real Estate Broker s Risk

More information

Notice of Privacy Practices

Notice of Privacy Practices SHANNON LERACH, Ph.D. Licensed Clinical Psychologist PSY23705 243 N. Highway 101, Suite 16, Solana Beach, CA 92075 Telephone: (619) 817.5320 Fax: (858) 481.1674 Notice of Privacy Practices This Notice

More information

Big Data Big Security Problems? Ivan Damgård, Aarhus University

Big Data Big Security Problems? Ivan Damgård, Aarhus University Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence

More information

ROLES TO ASSIGN. 1. Judge. 2. Courtroom Deputy. 3. Prosecutor 1 opening statement. 4. Prosecutor 2 direct of Dana Capro

ROLES TO ASSIGN. 1. Judge. 2. Courtroom Deputy. 3. Prosecutor 1 opening statement. 4. Prosecutor 2 direct of Dana Capro ROLES TO ASSIGN 1. Judge 2. Courtroom Deputy 3. Prosecutor 1 opening statement 4. Prosecutor 2 direct of Dana Capro 5. Prosecutor 3 direct of Jamie Medina 6. Prosecutor 4 cross of Pat Morton 7. Prosecutor

More information

Castle Branch Guide to the Fair Credit Reporting Act 888-723-4263

Castle Branch Guide to the Fair Credit Reporting Act 888-723-4263 Castle Branch Guide to the Fair Credit Reporting Act 888-723-4263 fair credit reporting act regulations] castle branch, inc. guide to complying with the fair credit reporting act regulations.........................................

More information

PEOPLE V. HARRY POTTER

PEOPLE V. HARRY POTTER PEOPLE V. HARRY POTTER THE COURT: Members of the jury, the defendant, Harry Potter, is charged in a one-count information which reads as follows: On or about November 23, 2008, HARRY POTTER, did unlawfully

More information

Developed by. Emma Oettinger, Anti-Money Laundering Policy Officer Law Society of England & Wales

Developed by. Emma Oettinger, Anti-Money Laundering Policy Officer Law Society of England & Wales A TEACHING EXERCISE FOR LAW SCHOOLS, POST-GRADUATE PROFESSIONAL EDUCATION PROGRAMS AND CONTINUING PROFESSIONAL DEVELOPMENT FOR LAWYERS ON ANTI-MONEY LAUNDERING OBLIGATIONS, LEGAL ETHICS AND PROFESSIONAL

More information

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft

More information

Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions?

Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions? Know your rights What rights do I have as a non-immigrant, F-1/J-1 visa holder? Whether or not you re a citizen, you have rights under the United States Constitution. The Fifth Amendment gives every person

More information