Europe and the Right to be Forgotten

The European Court of Justice has ordered Google to remove Information from their Search Results of anyone who asks.

The court’s decision means that individuals can ask Google or other search operators to take down links to web pages that are published by third parties, such as newspapers, containing information relating to them.

Lifestreaming Taken Too Far?

As I mentioned recently, I have been experimenting quite a lot lately with the whole “lifestreaming(Tagged with lifestream)”: concept. But there are limits.
bq.God, myBlogLog is creepy. I don’t exactly want people to know what I’m reading.. I don’t share google reader links either.

Caveat Internet

Are you always careful when you are using a public Internet station or a public Access point?
bq.Any business traveler who has logged on to a wireless network at the airport, printed a document at a hotel business center or checked e-mail messages at a public terminal has probably wondered, at least fleetingly, “Is this safe?” Although obsessing about computer security is a bit like worrying about a toddler – potential hazards lurk everywhere and you can drive yourself crazy trying to avoid them – the fact is, business travelers take certain risks with the things they do on most trips.

E-mail Addresses are Public Records

Any website for any sort of government agency in Florida is now required to prominently display the following statement:
bq.Under Florida law, e-mail addresses are public records. If you do not want your e-mail address released in response to a public records request, do not send electronic mail to this entity.

Age Online

With heightened concerns over sexual predators lurking at so-called social-networking sites, state attorneys general have called for such communities, particularly MySpace, to improve age and identity checks. If only it were so easy, experts say. “We’re all just grasping for solutions,” said Anne Collier, co-author of the forthcoming “MySpace Unraveled: What It Is and How to Use It Safely.” “We haven’t fully researched it and thought about all the implications.” – “Anick Jesdanun(Online Age Verification May Prove Complex)”: The irony is that I was listening earlier to a recent SecondCast where Philip Rosedale was making many of “the same points(Episode 25 – Send Pants)”:

Life in a Police State

It seems like it has been a bad couple of weeks to be a library Director. Jackie Griffin of the Berkeley Public Library recently “resigned(Berkeley library rift reaches resolution)”: under a settlement agreement with the city. Jo Ann Pinder was “fired(Gwinnett library board fires director)”: as Director of the Gwinnett County Library without any reason given (although some questionable ones were hinted at).

Shades of 1984

bq.The U.S. Department of Justice is quietly shopping around the explosive idea of requiring Internet service providers to retain records of their customers’ online activities. Data retention rules could permit police to obtain records of e-mail chatter, Web browsing or chat-room activity months after Internet providers ordinarily would have deleted the logs–that is, if logs were ever kept in the first place.

Anonymous Library Cards

At first, I thought the idea was an odd joke. But then I saw that it was sent to “Slashdot(Anonymous Library Cards An Option?)”: by Ben Ostrowsky. So I am sure it is a serious proposal.
bq.In short, collecting personal identity information about customers is a dangerous activity for a library.

Fingerprints instead of…

Indentification via fingerprints seem to be all the vogue “of late(Biometric DRM)”: And since the story of “Naperville Public Library(Naperville Public Library)”:, “US Biometrics(US Biometrics)”: and their “Fingerprints instead of Library Card(Library card? Check. Fingerprint? Really?)”: plan has been commented on at both “LISNews(Want To Use A Computer?

Googling for Profit

Did you catch the buzz about how easy it is to use Google to find “unprotected web cameras(People like being a peeping tom from the Internet)”: It turns out there are some “much less innocuous(Google Hacking Digs Up Sensitive Material)”: uses for Google.