Jailbreaking is “fair use”

I’m currently taking CPSC 430 and one of the requirements is to keep a journal throughout the term. I will be blogging here my class notes, thoughts, and links as they come up that are relevant to the course material. Also, see the other posts in the CPSC 430 category.

Jailbreaking smartphones is considered “fair use” (at least in the US).

Jailbreaking as fair use:
Electronic Frontier Foundation (civil liberties union for electronic rights)

Jailbreaking contravened which law:
Digital Millennium Copyright Act

CPSC 430 – July 23, 2010

I’m currently taking CPSC 430 and one of the requirements is to keep a journal throughout the term. I will be blogging here my class notes, thoughts, and links as they come up that are relevant to the course material. Also, see the other posts in the CPSC 430 category.

Class Notes

  • Globalization
    • Canada’s strength – multicultural
    • But media/groups pick and choose photos that support their views
    • Visa
      • Kantian?
      • Moral hazard – person’s skills don’t matter -> random chance
  • Multinational Teams
    • Communication breakdowns/difficulties
    • Timezone issues
    • Cost of living Canada/Vancouver > USA for example (harder to pay relocation)
    • Even cost of living in India is increasing
  • Back to Globalization
    • Made possible with recent technology – Skype, Google Docs
    • + competition increases, redistributes wealth, increase stability
    • – WTO superior to countries, forces workers to compete with foreigners
    • E.g., manager at Microsoft hires person in India – bring them over on H1-B, hire local American or Canadian?
    • Infosys – IT in India
      • Outsourcing here is good for India
      • IT in India quite developed into respectable industry
      • Silicon Valley salaries high because people control means of production
      • Employees bring production by themselves compared to automotive assembly line where company controls production infrastructure
      • Companies try to up their business – in India, e.g., Infosys, the business is in IT services, not development or leadership of technologies.  No push to be creative, just $$$
        • Probably will get there, but no resources to push now

CPSC 430 – July 21, 2010

I’m currently taking CPSC 430 and one of the requirements is to keep a journal throughout the term. I will be blogging here my class notes, thoughts, and links as they come up that are relevant to the course material. Also, see the other posts in the CPSC 430 category.

Class Notes

  • Carnivore – a system created by the FBI to monitor email and electronic communications
  • TALON – a database of possible threats maintained by US Air Force after September 11th attacks
    • False positives
  • US Legislation Authorizing Wiretaps
  • USA PATRIOT Act
  • Cloud computing – portions of files in different areas
    • What to do?  Acts and laws are a little out of date
  • Corporate Privacy Guidelines
  • Data Mining
  • Identity theft
  • Skimmers
    • Getting credit card numbers (scanner/photo)
  • SIN number in Canada has error validation schemes

CPSC 430 – July 19, 2010

I’m currently taking CPSC 430 and one of the requirements is to keep a journal throughout the term. I will be blogging here my class notes, thoughts, and links as they come up that are relevant to the course material. Also, see the other posts in the CPSC 430 category.

Class notes

  • Privacy
    • RFID – Wal-Mart
      • Efficient supply chain
      • Container-wide RFID scanner
      • IT success – better logistics, lower cost and labour
    • Passports (US)
      • Privacy – reading at a distance
      • Increased security and efficiency
    • Phones (Japan)
      • Remote disable when lost
      • Thus, secure when lost (unlike wallet)
  • Fair Credit Reporting Act -> Fair and Accurate Credit Transactions Act
    • Promote accuracy, but requires active request for credit report
  • Gramm-Leach-Bliley
    • Privacy policy
  • Health Insurance Portability and Accountability Act
    • Doctors

CPSC 430 – July 16, 2010

I’m currently taking CPSC 430 and one of the requirements is to keep a journal throughout the term. I will be blogging here my class notes, thoughts, and links as they come up that are relevant to the course material. Also, see the other posts in the CPSC 430 category.

Class notes

  • Privacy
    • Already touched on trade secrets – must be kept private
    • Information – who, how it’s obtained, how it’s used
    • Access to information
      • Physical proximity
      • Edmund Byrne – “zone of inaccessibility”
      • Edward Bloustein – violations are an affront to human dignity
    • What happened to community? – larger families, neighbours, friends, etc
      • After 1950, 2nd world war -> smaller families – nuclear families
        • Too much privacy – e.g., suburbs
    • Harm – cover for illegal/immoral activities
    • Benefits – individual growth, psychological feeling that we aren’t being constantly watched
    • Natural right?
      • Celebrities – paparazzi – legal or illegal – e.g., public space ok.
        • Trade offs when being celebrity – can’t be celebrity here but not in other circumstances
    • 3 key aspects
      • freedom from intrusion
      • control of info
      • freedom from surveillance
    • Computers – easier, cheaper, faster to access data
    • Canadian Charter of Rights & Freedoms
      • Right? Not really
      • Should have security against unreasonable search/seizure
      • Life, liberty, and security of a person
    • Invisible information gathering
      • E.g., waiver for a marathon -0 need to enter in phone, address, etc.
    • 10 Principles of Model Code (from Privacytown)
      • developed by Canadian government/Industry Canada to make things smoother for business
    • PIPEDA – promote consumer trust in online/databases
    • Use of data
      • Data mining – finding patterns , matching databases and profiling
      • Detecting fraud
      • Finding terrorists
    • Generation Y
      • Care less about privacy
    • Kyllo vs. U.S.
      • Thermal imaging devices to search inside home
      • Need special technology, not normal usage, similar to physical intrusion
      • As technology becomes more mainstream, laws may change
    • R. vs. Tessling