The European Court of Justice has ordered Google to remove Information from their Search Results of anyone who asks.
The court’s decision means that individuals can ask Google or other search operators to take down links to web pages that are published by third parties, such as newspapers, containing information relating to them.
As I mentioned recently, I have been experimenting quite a lot lately with the whole “lifestreaming(Tagged with lifestream)”:http://www.michaelkpate.com/tag/lifestream/ concept. But there are limits.
bq.God, myBlogLog is creepy. I don’t exactly want people to know what I’m reading.. I don’t share google reader links either.
Are you always careful when you are using a public Internet station or a public Access point?
bq.Any business traveler who has logged on to a wireless network at the airport, printed a document at a hotel business center or checked e-mail messages at a public terminal has probably wondered, at least fleetingly, “Is this safe?” Although obsessing about computer security is a bit like worrying about a toddler – potential hazards lurk everywhere and you can drive yourself crazy trying to avoid them – the fact is, business travelers take certain risks with the things they do on most trips.
Any website for any sort of government agency in Florida is now required to prominently display the following statement:
bq.Under Florida law, e-mail addresses are public records. If you do not want your e-mail address released in response to a public records request, do not send electronic mail to this entity.
With heightened concerns over sexual predators lurking at so-called social-networking sites, state attorneys general have called for such communities, particularly MySpace, to improve age and identity checks. If only it were so easy, experts say. “We’re all just grasping for solutions,” said Anne Collier, co-author of the forthcoming “MySpace Unraveled: What It Is and How to Use It Safely.” “We haven’t fully researched it and thought about all the implications.” – “Anick Jesdanun(Online Age Verification May Prove Complex)”:http://www.newsvine.com/_news/2006/07/17/290852-online-age-verification-may-prove-complex The irony is that I was listening earlier to a recent SecondCast where Philip Rosedale was making many of “the same points(Episode 25 – Send Pants)”:http://www.secondcast.com/modules/news/article.php?storyid=41.
It seems like it has been a bad couple of weeks to be a library Director. Jackie Griffin of the Berkeley Public Library recently “resigned(Berkeley library rift reaches resolution)”:http://www.orovillemr.com/news/bayarea/ci_3917710 under a settlement agreement with the city. Jo Ann Pinder was “fired(Gwinnett library board fires director)”:http://www.ajc.com/metro/content/metro/gwinnett/stories/0613gwxlibrary.html as Director of the Gwinnett County Library without any reason given (although some questionable ones were hinted at).
bq.The U.S. Department of Justice is quietly shopping around the explosive idea of requiring Internet service providers to retain records of their customers’ online activities. Data retention rules could permit police to obtain records of e-mail chatter, Web browsing or chat-room activity months after Internet providers ordinarily would have deleted the logs–that is, if logs were ever kept in the first place.
At first, I thought the idea was an odd joke. But then I saw that it was sent to “Slashdot(Anonymous Library Cards An Option?)”:http://yro.slashdot.org/article.pl?sid=05/06/03/1157250&from=rss by Ben Ostrowsky. So I am sure it is a serious proposal.
bq.In short, collecting personal identity information about customers is a dangerous activity for a library.
Indentification via fingerprints seem to be all the vogue “of late(Biometric DRM)”:http://www.libraryplanet.com/2005/05/19/biometric. And since the story of “Naperville Public Library(Naperville Public Library)”:http://www.naperville-lib.org/, “US Biometrics(US Biometrics)”:http://www.usbiometrics.com/ and their “Fingerprints instead of Library Card(Library card? Check. Fingerprint? Really?)”:http://tinyurl.com/7zer6 plan has been commented on at both “LISNews(Want To Use A Computer?
Did you catch the buzz about how easy it is to use Google to find “unprotected web cameras(People like being a peeping tom from the Internet)”:http://www.geeknewscentral.com/archives/003600.html? It turns out there are some “much less innocuous(Google Hacking Digs Up Sensitive Material)”:http://www.lisnews.com/article.pl?sid=05/02/13/1138206 uses for Google.