Zix Corporation Enhances ZixPort with Message Recall and Two-Factor Authentication

Here’s an interesting appliance that offers two-factor authentication for added security.  Watch for an increasing number of devices that will help with identity and scurity.

Zix Corporation Enhances ZixPort with Message Recall and Two-Factor Authentication.

Posted in Identity Security | Tagged , , , | Leave a comment

6 Ways to Anticipate the Future of Digital Behavior

6 Ways to Anticipate the Future of Digital Behavior.

Posted in Opinions | Tagged , , , | Leave a comment

Fujitsu Unveils Revolutionary New “My Cloud” Concept for PCs – MarketWatch

We really hope that one or more of these device vendors gets it right.  Apple’s attempts get mixed reviews because of the cost and the closed systems that they demand.  Yes, the cloud will become more and more unbiquitous.  Users will still want to know where their “stuff” is stored and what may happen to it in the future – ya know, a year from now!

See also:  http://closettocloud.blogspot.com/2012/02/some-more-stuff.html

Fujitsu Unveils Revolutionary New “My Cloud” Concept for PCs – MarketWatch.

Posted in Cloud | Tagged , , , , , | Leave a comment

Technology News: Cybersecurity: The Malicious Hacker’s Ever-Sharper Eye

Another of the new technologies that promise to protect our devices and, possible, our identity itself from the bad guys.

Technology News: Cybersecurity: The Malicious Hacker’s Ever-Sharper Eye.

Posted in Identity Security | Tagged , , , | Leave a comment

Internet Bill of Rights

Internet Bill of Rights

(modified by Colin MacKinnon from the Consumer Privacy Bill of Rights)

We the citizens of the World, in an effort to promote information freedom – while respecting the individual rights of all Internet users – do hereby declare the following standards for Internet use and conduct regardless of where in the World it may be used:

  • We have a right to expect that companies and other internet users will collect, use, and disclose personal data in ways that are consistent with the context in which we provide the data.
  • We have a right to reasonable limits on the personal data that companies collect and how long they retain it.
  • We have the right to exercise control over what personal data companies collect from us and how they use it.
  • We have a right to easily understandable and accessible information about privacy and security practices of all Internet companies
  • We have a right to secure and responsible handling of personal data including fair and appropriate sanctions for its mishandling, improper, or illegal use
  • We have a right to access and correct our personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to us if the data is inaccurate
  • We have a right to have personal data handled by companies with appropriate measures in place to assure they adhere to the Internet Standards

It’s not clear from the White House’s announcement of the Consumer’s Bill of Rights in February whether these principles, which call for common-sense notions like notification, choice, responsible security and data usage, will be turned into law or whether they will instead become a code of conduct that (media) companies can voluntarily agree to follow.  I guess it may be up to all of us to decide.

Stay Tuned!

Posted in Identity Security | Tagged , , , , | Leave a comment

Do you know where your cloud data is?

The question about the location of your cloud data keeps coming up.  Is it relevant?  Important?  In many cases it probably doesn’t matter unless security, redundancy, or privacy of your data is important to you or any compliance requirements you may face.

See also:  http://closettocloud.blogspot.com/2012/02/some-more-stuff.html

Do you know where your cloud data is?

Posted in Identity | Tagged , , , | Leave a comment

Clean Out Your Twitter App Permissions as Part of Your Spring Cleaning Regimen

Here’s a great way to stay on top of who/what may or may not be tracking what you do on the Internet.  Remember, a part of your responsibility as a citizen of the Internet is to clean house periodically, especially if you have been responsible for inviting followers to track you.

Clean Out Your Twitter App Permissions as Part of Your Spring Cleaning Regimen

Posted in Identity Security | Tagged , , , | Leave a comment

Obama’s Internet Bill Of Rights Will Be Hard to Enforce

The Consumer Bill of Rights spells out guidelines for conduct, especially what media companies like Google, Apple, and Facebook can and can’t do with YOUR information and data.  Do you really care?

Take this survey and we’ll report the findings in the weeks to come.

http://www.surveymonkey.com/s/JPV9GGL

Obama’s Internet Bill Of Rights Will Be Hard to Enforce: Here’s Why | PCWorld

Posted in Uncategorized | Leave a comment

Cloud computing: Legal standards up in the air

The Wild Wild West of the Internet and Cloud Computing will be challenged in the legal system of the US, EU, and other countries as bricks and mortar laws and commercial codes meet the tests of time and blurred boundaries.  At present there is no standard for conduct.  But the “anything goes” mentality of cybercrime will change.  Good thing.

Cloud computing: Legal standards up in the air – CSMonitor.com

Posted in Uncategorized | Leave a comment

Consumers Attitude toward Smart Grids Changing

The Internet and Cloud are changing attitudes about the decentralization of nearly everything including energy.  What would happen if access to power were redistributed?  Here’s a curious take on the whole idea.

Consumers Attitude toward Smart Grids Changing

Posted in Uncategorized | Leave a comment