Five months after it first announced coming privacy changes this past summer, Facebook is finally rolling out a new set of revamped privacy settings for its 350 million users. The social networking site has rightly been criticized for its confusing privacy settings, most notably in a must-read report by the Canadian Privacy Commissioner issued in July and most recently by a Norwegian consumer protection agency.
The new changes are intended to simplify Facebook's notoriously complex privacy settings and, in the words of today's privacy announcement to all Facebook users, "give you more control of your information." But do all of the changes really give Facebook users more control over their information?
so we want to know about advantage or disadvantage of new privacy, the changes will actually reduce the amount of control that users have over some of their personal data.
Not to say that many of the changes aren't good for privacy. But other changes are bad, while a few are just plain ugly.

The Good: Simpler Privacy Settings and Per-Post Privacy Options

The new changes have definitely simplified Facebook's privacy settings, reducing the overall number of settings while making them clearer and easier for users to find and understand. The simplification of Facebook's privacy settings includes the elimination of regional networks, which sometimes would lead people to unwittingly share their Facebook profile with an entire city, or, as Facebook's founder Mark Zuckerberg explained in a recent open letter, an entire country.

The Bad: EFF Doesn't Recommend Facebook's "Recommended" Privacy Settings

Although sold as a "privacy" revamp, Facebook's new changes are obviously intended to get people to open up even more of their Facebook data to the public. The privacy "transition tool" that guides users through the configuration will "recommend" — preselect by default — the setting to share the content they post to Facebook, such as status messages and wall posts, with everyone on the Internet, even though the default privacy level that those users had accepted previously was limited to "Your Networks and Friends" on Facebook (for more details, we highly recommend the Facebook privacy resource page and blog post from our friends at the ACLU, carefully comparing the old settings to the new settings). As the folks at TechCrunch explained last week before the changes debuted:

The Ugly: Information That You Used to Control Is Now Treated as "Publicly Available," and You Can't Opt Out of The "Sharing" of Your Information with Facebook Apps.Foe more info you can read full article ...


US electronics giant Apple Inc has won a trademark infringement suit against a Chinese corporation that used a logo similar to the US company's distinctive symbol.

The logo was used on the Chinese firm's products and website and it was too similar to its own.

Apple Inc registered the trade name "Apple" and the apple logo when it entered China's market in 1993 and has exclusive trademark rights to 2013.

Copyright infringement remains widespread in China, despite years of pressure by foreign companies and governments on Beijing to crack down.

Foreign governments say such infringement costs overseas companies billions of dollars in sales each year.

Most business organisations store their sensitive information in computer systems. This information is targeted by rivals, criminals and sometimes disgruntled employees.
A very good looking woman went to meet the system administrator (sysadmin) of a large company. She interviewed the sysadmin for a “magazine article”.
During the interview she flirted a lot with the sysadmin and while leaving she “accidentally” left her pen drive at the sysadmin’s room. The sysadmin accessed the pen drive and saw that it contained many photographs of the lady. He did not realize that the photographs were Trojanized! Once the Trojan was in place, a lot of sensitive information was stolen very easily.
Who is liable? The persons who steal the information as well as the persons who misuse the stolen information.


Credit cards are commonly being used for online booking of airline and railway tickets and for other ecommerce transactions. Although most of ecommerce websites have implemented strong security measures (such as SSL, secure web servers etc), instances of credit card frauds are increasing.
The scenario of this case ,The victim’s credit card information is stolen and misused for making online purchases (e.g. airline tickets, software).
Who is liable in this case? All persons who have stolen the credit card information as well as those who have misused it.
The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim.
Unsuspecting victims would use these infected computers to make online transactions. The credit card information of the victim would be emailed to the suspect.

An independent developer has demonstrated a way of installing Google's Android smartphone operating system on the Apple iPhone.
David Wang, known as 'planetbeing' in the iPhone hacking community, posted a YouTube video demonstrating a working iPhone that is able to boot and run applications within Android.

When you’re using Internet Explorer 6 (IE 6), you’re putting you and your clients’ security at risk.

There are two main problems with IE 6:

1) IE 6 not secure.

You may have heard that you can avoid viruses by not clicking on strange files or downloading strange programs. That’s true some of the time, but by using a browser like IE 6 you can contract a virus merely by visiting an infected web page. Hackers often infect otherwise reputable websites as a way to spread viruses. Once you get a virus, everything on your computer, from your credit card information to your clients’ confidential files, are at the mercy of hackers.

2) IE 6 doesn’t render web pages properly because many websites do not support it.

Youtube, Google, Amazon…the list goes on. Major companies are dropping support for IE 6 left and right. What this means is that if you visit a website that doesn’t support IE 6 and you’re using it, the website won’t function properly. It’ll be like viewing the world through broken glasses.


A firewall is the safety barrier between a computer network and the outside world. Individuals, companies and large organizations alike rely on a firewall being robust enough to fend off hackers attempting to break into a computer system. However, managing the firewall rules that decide between online friend and foe has proved to be complex, error-prone, expensive, and inefficient for many large-networked organizations, according to a research team writing in the International Journal of Internet Protocol Technology.

India has risen to the fifth spot in the world's cybercrime ranking for 2009 from the 11th spot in 2008 and now only lags behind the US, China, Brazil and Germany and also shows that cyber criminals are now increasingly going for Web-ased attacks using social-networking sites compared to the earlier dependence on the e-mail route used to steal information about credit cards and bank accounts.


Orkut Fake Profile cases

Orkut.com is a very popular online community and social networking website. Orkut users can search for and interact with people who share the same hobbies and interests. They can create and join a wide variety of online communities. The profiles of Orkut members are publicly
viewable.
1. A fake profile of a woman is created on Orkut. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc). Sometimes it even has her photograph.
The problem is that the profile describes her as a prostitute or a woman of “loose character”
who wants to have sexual relations with anyone. Other Orkut members see this profile and start calling her at all hours of the day asking for sexual favours. This leads to a lot of harassment for the victim and also defames her in society.
2. An online hate community is created. This community displays objectionable information
against a particular country, religious or ethnic group or even against national leaders and
historical figures.
3. A fake profile of a man is created on Orkut. The profile contains defamatory information
abut the victim (such as his alleged sexual weakness, alleged immoral character etc)

Cyberlaw

Cyberlaw

About this blog

This blog is about cyberlaw

Labels

About Me

My photo
Hello my friends my name is Mehran ,I'm going to write about cyberlaw. This weblog is created for the purposes of an MBA project for the subject BYL 7134, Cyberlaw. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research. Appropriate acknowledgments to the materials that do not belong to the web-log owner have been publicly made. If you are the author or a copyright owner of any of the articles posted in this web-log and you object to such posting on any grounds, including copyright infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. Thank you for supporting my blog.

Followers

Labels


Labels

Search This Blog


Labels