Welcome to my blog, hope you enjoy reading :)
RSS

Monday, July 5, 2010

About Me?????

Hi" I'm Monique Lopez Bañados born on February 24,1993 live at Sikitan Kidapawan City.
Studying at Colegio de Kidapawan taking up Bachelor of Science Information Technology.
Simplicity is Beauty" Echos""""watapunch

Knigths and Ulphans

Knights and Ulphans 1973
In Unity We Stand
Sigma Upsilon Upsilon Lambda
Fraternity and Sorority Fraternity

Monday, February 15, 2010

Key Provisions of the Patriot Act

Section 201--Gives federal the officials the authority to intercept wire, spoken and electronic communications relating to terrorism

Section 202--Gives federal officials the authority to intercept wire , spoken and electronic communications relating to computer fraud and abuses offenses


Section 203(b)--Permits the sharing of grand jury information that involves foreign intelligence or counterintelligence with federal law enforcement.

Section(d)--Gives foreign intelligence or counterintelligence officers the ability to share foreign intelligence information obtained as part of criminal investigation with law enforcement.

Section 204--Makes clear with nothing in the law regarding pen registers--an electronic device which records all records all numbers dialed from a particular phone line--stops the governments ability to obtained foreign intelligence information.

Section(206)--Allows federal officials issue roving"John Doe" wiretaps which allow investigators to listen in on any telephone and tap any computer they think a suspected spy or terrorist night use.

Section 207--Increases the amount of time that federal officials may watch people they suspect are spies or terrorist.

Section 209-- Permits the seizure of voice mail messages under a warrant.

Section 212--Permits Internet service providers and other electronic communication and remote computing service providers to hand over records and e-mails to federal officials emergency situations.

Section 214-- Allows use of a pen register or trap and trace devices that record originating phone numbers of all incoming calls in international terrorism or spy investigations.

Section 215-- Authorizes federal officials to obtained "tangible items" like business records including those from libraries and bookstores,for foreign intelligence and international terrorism investigations.


Section 217--Makes it lawful to intercept the wire or electronic communication of a computer hacker or intruder in certain circumstances

Section 218--Allows federal to officials to wiretap or watch suspect if foreign intelligence gathering is a "significant purpose". for seeking a federal intelligence surveillance act order.

Section 220--Provides for nationwide service of search warrants for electronic evidence.

Section 223--Amends the federal criminal code to provide for administrative discipline of federal officers or employees who violate prohibition against unauthorized disclosure of information gathered under this act.

Section 225--Amends FISA to prohibit lawsuits against people or companies that provide information federal officials for a terrorism investigation.

Source:www.mail.archive.com\infowarrior@g2-forward.org

Monday, January 25, 2010

COMPUTER PRIVACY

Computer privacy



Nowadays we use computers and the Internet everywhere - we do our banking, read books, find different kinds of information, plan holidays and more. The list is endless. But on the other side Internet is full of potential risk to our privacy and security. It is like a mirror that shows all tracks of our computer and Internet activity - every time we surf the Internet we leave traces of our Internet activity that can reveal our real-life identity. And anyone even without special computer skills can monitor our surfing habits, banking history and even our personal information like name, phone, address. Everyone has an IP address to communicate on the Internet, IP address is like a telephone number or mailing address. Using your IP it is possible to know your country, city, internet provider and even physical address.
While surfing the Internet browsers keep tracks of our Internet activity in order to provide a more pleasant computer and surfing experience. But these history tracks can compromise our privacy and provide an easy way for others to see what web sites you visited, what you have been searching, downloading, viewing, etc.
Windows and different applications we use keep tracks about your computer activity in order to provide a more pleasant computer experience. But those history tracks can also compromise our privacy and show what you have been doing, searching, downloading, running, saving, what documents and files you have just opened etc.
So while there are lots of things that we have gained from the computer revolution there is a price we have to pay. And the price is our computer privacy. Of course there is no simple solution for this problem. But inactivity is also impossible. There are some simple steps everyone could do. There are different tools available to help us maintain our privacy - anonymous surfing tools, encryption software, clear history software. When your PC is equipped with privacy software, it has the greatest chance of surviving privacy or security attacks.


Source:SOURCE:www.merchantcircle.com/blogs/Bambi.Faivre.Walters.PC.757-253-5729/2008/12/Cyber-Law-or-Internet-Law-Terminology/153022 -

THE PRIVACY PROTECTION

Privacy protection

Free market versus consumer protection approaches

Approaches to privacy can, broadly, be divided into two categories: free market, and consumer protection In a free market approach, commercial entities are largely allowed to do what they wish, with the expectation that consumers will choose to do business with corporations that respect their privacy to a desired degree. If some companies are not sufficiently respectful of privacy, they will lose market share. Such an approach may be limited by lack of competition in a market, by enterprises not offering privacy options favorable to the user, or by lack of information about actual privacy practices. Claims of privacy protection made by companies may be difficult for consumers to verify, except when they have already been violated.



SOURCE: www.firewallguide.com/privacy.htm

PRIVACY LAW

Privacy law

Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries. For example, the Universal Declaration of Human Rights, article 12, states:

No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.


SOURCE: www.firewallguide.com/privacy.htm

PRIVACY

Privacy (from Latin privatus 'separated from the rest, deprived of sth, esp. office, participation in the government', from privo 'to deprive') is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.

Source:www.merchantcircle.com/blogs/Bambi.Faivre.Walters.PC.757-253-5729/2008/12/Cyber-Law-or-Internet-Law-Terminology/153022 -