Friday, March 20, 2009

How Long Can Your Tonsils Stay Swollen

Amministrative: Paissan, è Offensivo il CheckUp per Candidati

A cancer patient can not 'maybe the mayor do?
And a person who had a heart attack can not 'administer a city'?
We are facing a human idea offensive, discriminatory against those who have or have had health problems. "
And 'this is the comment by Mauro Paissan, a member of the Guarantor for the privacy, the proposal for a check up for the candidates for mayor of Bologna.
A proposal - comments Paissan - which by the way "ignores the fact that those who today presented the electorate with both a certificate of full health, tomorrow could be struck down by some evil."
And then there's 'that' is not 'legitimate force anyone, even if a politician, to publish their own health data "' cause in this case" as opposed to what is being said, do not this is a free choice, voluntary, 'cause who would evade the medical would be held up as a person che vuole nascondere qualche male fisico".

Wednesday, March 18, 2009

Raven Riley Brazilian Wax

Processo a Google in Italia «caso test» per Internet (Times)

Per il Times Online il processo a Google è «un caso test» nel dibattito sul controllo dei contenuti diffusi attraverso il web.
«Gli avvocati di Google cercano di fermare il processo in Italia», titola il sito del quotidiano britannico, attirando l'attenzione sull'udienza di oggi a Milano nella quale è previsto che i legali di Google disputino la competenza giurisdizionale italiana.
The prosecution, which began last February, sees the Internet search engine defendant for not having captured a video, filmed with their cell phone and sent to Italy on the Google site, showing the abuse perpetrated by their four children to a school friend of affection Down syndrome in a technical institute in Turin.
The alleged offenses are defamation and invasion of privacy.
"The center-right government of Silvio Berlusconi - reminiscent of the corresponding Richard Owen - are using the current Italian Presidency of the G8 to propose laws that would force ISPs to block access to sites with" objectionable content "" .
The family of disabled boy mishandled the complaint was withdrawn. But the process has gone forward because the court has accepted the Oscar Magi as plaintiff and the City of Milan Vividown association, which represents the interests of those with Down syndrome. Guido Camera, legal Vividown, who had reported the existence of the video in September 2006, told the Times that Google would have understood disputed the Italian jurisdiction.
Google has its headquarters in California and only a few of its 20 thousand employees worldwide work in Italy. At the heart of the arguments, the question of whether the trial should be held in Italy and, if so, whether it should be moved from Milan to Turin, where the victim lives, or Rome, the capitale.Google claims to have removed the video from its site within 24 hours of the complaint - the Times - but the public prosecutor in Milan, Francesco Cajani, said that Google has broken the law by allowing the video is visible on her site, claiming that the video had been online for two months in 2006 and that Google had not responded to complaints.
Accused are David Drummond, Google's legal chief, Peter Fleischer, a consultant on the company's privacy; George Reyes, former chief financial, and Arvind Desikan, former head of Google Video Europe. If convicted, they face up to three years in prison.
victim of the boy's lawyer and his family had said last month that the decision to withdraw the lawsuit had been taken because Google officials had not only shown sympathy for what happened, but had acted "concrete" to show their sensitivity to the problems of the handicapped and the serious problem of bullying.
room said he did not know whether the boy's family has received compensation. The four guys who have beaten his companion were sentenced by the Juvenile Court to carry out assistance activities in association Turin.
process - says the Times - could establish a precedent for ISPs which allow users to put their content online.
The Italian law on the media - TV, newspapers and the Internet - requires that providers are responsible for the content of any third party. "This raises the question whether a website is a" publication "for content providers are responsible by law, the same way as a TV channel, newspaper or magazine."
Giuliano Pisapia, one of Google's legal defense, said - read the Times - it is impossible for Google to monitor everything that appears in video on his site, equating to a complaint, the move of pm in Milan. "Google is a search engine, not a newspaper, "he said.
Google claims that "groped to make neutral platforms are responsible for the content they put online is" a direct attack "on an internet free and open.

Numbness In Left Arm Rapid Heatbeat

Pubblicità al Telefono. Le Aziende Rispettino le Regole

penalties are likely 30,000 to € 300,000

companies and call centers, using the exemption period until December 31, 2009 decree by the so-called "Milleproroghe" connects people to do promotion and commercial offers should only use databases made on the basis of previous directories 1 August 2005. They can not use the derogation period to ask for your consent for further contact or can transfer the data using a third party.

With measure that will be published in the Official Gazette, the Guarantor for the privacy set out the rules that will follow the companies that perform marketing activities in using the data of subscribers.

The decree "Milleproroghe, recently enacted into law, states that the phone numbers and addresses in databases set up on the basis of old telephone directories are used for promotional purposes until December 31, 2009 by those that created these databases prior to August 1, 2005.

The provision of the Guarantor intends to rigorously clarify the limits within which companies engaged in promotional activities through the call center can also use the derogation. Failure to comply with the measure contains an administrative penalty ranging from 30 000 to 180 000 € and, in severe cases, can reach up to 300 000 €.

Customers must first adequately documented in the database, set up phone numbers and addresses of subscribers, was actually created before August 1, 2005. The company will use this data directly and can not sell them in any way to other companies.

Operators telephone subscribers will have to specify for each contact as a company call and remind those concerned of their rights. But above all, should be reported immediately to the possible opposition of the subscriber to be contacted again. The user does not wish to be disturbed shall have the right to know the network operator to whom he communicated his will.

The data contained in the databases will be used for promotional purposes only and may not in any way be used to acquire new information or the consent of the subscribers to make named after the date of December 31, 2009. This would in fact constitute the new databases, going beyond the purposes prescribed by law and by extending the deadline beyond the effects of the temporary exemption.

companies that perform marketing activities must disclose to the Guarantor within 15 days of publication in OJ, to be in possession of databases made before August 1, 2005 and to want to use for promotional activities. Should clarify whether treatment data are also carried out for third parties.

Tuesday, March 17, 2009

I Get Wet During A Brazilian Wax

Privacy e Marketing. Istruzioni per l'Uso

"The Privacy? Today is not confidentiality, but correct processing of data." Is in one sentence, well summarized by Andrea Lisi, Professor of Legal Informatics, University of Salento, the old issue of data protection, both in business to business to business to consumer.

Because the bogeyman of the "note" must give way to a "clear strategy and defined" on the data management company. And this is the real leitmotiv of the conference "Direct marketing: new solutions of respect for privacy", organized recently by know.

"Privacy - Lisi said - but not ban transparency, strategy and organization and has nothing to do with the right of the" right to be alone " (Right to be left alone, Warren and Brandeis 1890 ed).

Privacy is linked to the protection of the data on which the user has the right:
to ask himself what he has to choose willing to reveal to the other to control the use of information about him to self-determination computing / information

"Do not forget - add Diego Fulco, Senior Associate of the law firm Imperial - that privacy has a European origin." Vista the enormous economic importance of the use of personal data, Europe has established a directive to ensure uniformity among the Member States.

The problem is that each State can customize the directive with the "end result - continuous Fulco - that almost all countries they have decided to 'opt-out, while in Italy has opted-in".

simply, according to the dictates of the opt-out notices to all you can do except to those who do not want. With the opt-in, you can make communications only to those who wish to receive (prior consent).

"The point - Fulco continues - is that the law in this area is still very inconsistent and in recent months, rather than simplifying it is made even more complicated."

privacy of communication and one speaks in the Legislative Decree 70/2003 on Electronic Commerce, in consumer protection (which does not apply, however, worldwide B2B), Directive 2002/58/EC concerning the processing of personal data in the rules of advertising, and of course in the Privacy Code.
Considering that "any rule can be interpreted" often come to conflicting situations in the second paragraph of the individual concerned. Added to this is also the fact that the measures of the Guarantor do not go to take the place as defined by the legislature (except in areas in which specific delegation) but have a lot of media coverage with the result that it is spoken in some cases to inappropriately.

B2B and B2C
Let's see some points. The first major distinction to be do is communication between business-to-business (B2B or between enterprises) and communication business-to-consumer (B2C, or business to consumer).

"In B2B - Fulco says - the issue of opt-in practically does not arise. You can make business communication, subject of course to the criteria of transparency and fair trading. Furthermore, we must always provide an opt-out : At any time you can deny being contacted for business communications. "

For B2C, the situation is more complex because the opt-in requires a consensus estimate. But even here there may be exceptions. It 'been carried to such an action as permissible di comunicazione nei confronti dei soci ACI (iscritti a un registro di pubblico dominio) da parte di un produttore di automobili perché si può presumere una sorta di "compatibilità di scopo" (chi è socio ACI verosimilmente è interessato al mondo delle automobili).
La stessa azione non sarebbe permessa invece a un commerciante di vini perché verrebbe meno questa ammissibilità di obiettivi.

Il problema del consenso
Ancora, si fa un gran parlare del "consenso" nell'informativa sulla Tutela della Privacy. Ebbene, il consenso, secondo quanto dice la normativa, deve essere "determinato", ovvero riferito a una specifica finalità.

This means that the consent for direct marketing differs from the consensus profiling. In other words, a company that wants to make commercial communications by telephone to a list of consumer clients (direct marketing) and at the same time profiling these customers (eg shopping habits) need two separate consents.

Consent is not necessary but if customers are contacted by mail or e-mail (with subject, however, goods or services similar to those already purchased), but is required in (almost) all cases in prospect. We wrote "almost" because the consent is not required if the paper is sent to a mailing company mail-order.

These are just some individual examples that clearly outline the difficulty of moving in this minefield.

The interpretations of the rules in the conference has been repeatedly noted that it is necessary to carefully follow the dictates of legislation, but there is always a 20% gray area where you have to move with intelligence to minimize risk.

"In the privacy - says Fulco - is the rule that nothing is obvious. We must put everything on paper and reduce the risk in writing also means documenting the obvious."

Some advice, then. Is transparent to the user receiving the communication. The latter, Lisi says "must clearly and unambiguously shows that a specific statement that it is a commercial communication, as well as the natural or legal person on whose behalf the communication is made. For unsolicited communications (B2B ed) there must be an indication that the message recipient may object to receiving such communications. " Never as in this case, in short, honesty pays.

Another suggestion is to send individual e-mail and targhettizzate with references to its Web site, without being aggressive and that they contain a complete and detailed data processing. Speed \u200b\u200bin the cancellation dei dati e cortesia sono altre carte vincenti.

"In base alla nostra esperienza - commenta Fulco - il Garante decide gli accertamenti dopo segnalazioni e queste ultime abitualmente scattano se gli interessati hanno percepito poca trasparenza o un comportamento "aggressivo" nella comunicazione. Per ridurre i rischi, bisogna raggiungere un ottimo livello di chiarezza privilegiando la sintesi. Se lo spazio a disposizione è troppo poco, meglio fare riferimento all'informativa sul sito Internet, prevedendo magari una pagina dedicata interamente a questa tematica".

Inoltre, è molto importante attrezzarsi dal punto di vista organizzativo e tecnologico per la gestione dei dati sensibili.

Nel In fact, the case of litigation, the Guarantor will immediately verify the roles and responsibilities (formalization of the tasks), the security systems implemented, organizational procedures put in place.
"We must go beyond simple bureaucratic exercise - says Lisi - to consider the value" strategic "privacy".

Finally, the basic philosophy of the legislature is to protect the privacy of the individual citizen, not to restrict trade between enterprises.
The more you get closer to the individual sphere (biometric data of children, trial data and so on) and much more these data are at risk of being stolen (identity theft), the more we must proceed with extreme caution.

Tuesday, March 10, 2009

Portable Skate Sharpener For Sale

Spamming Telefonico. Lo Schema


Kates Playgroundhardcore

Privacy e Sala Parto


fillet of Joseph, a journalist of "La Repubblica"


Camera prohibited in the delivery room.


For privacy problems: even in the face of interest by medical and educational 's universities and graduate schools.


Nor faced with a demand driven by a worldwide search. Nemmeno con il consenso della partoriente. Lo ha deciso temporaneamente la direzione dell' ospedale "San Martino", che però ha chiesto il parere del Comitato Etico, di cui è presidente l' ex procuratore capo di Genova Francesco Meloni.


Stando a quanto dichiara Giorgio Giorgi, ginecologo della Clinica Universitaria, la pratica sarebbe ferma al Comitato da oltre un anno. «Da tempo chiediamo di poter fare queste riprese - spiega Giorgi, che è anche responsabile del comitato di ricerca - abbiamo fornito tutte le garanzie necessarie, compreso il consenso da parte delle donne».


Le riprese con una videocamera dovrebbero filmare i primi minuti di child's birth. "The survey aims to capture the elements of communication that exist between mother and baby - said Giorgi - especially in the first quarter of 'hours of life when the child seeks the mother and between the two there are strong elements of contact and transmission of emotions and messages epidermis.


The search committee would also ensure that there is no frame in the mother's face and that it is forbidden to keep register of names. "Neither do we see the images we know who it is." Furthermore, it was guaranteed the destruction of the frames after the vision for scientific and educational.


The national legislation to "San Martino" allows filming during all surgical procedures, but to the delivery room came from the direction of a flat refusal. To the top of the 'university hospital and the movies, however, would have no meaning and scientific relevance.


The ball is passed to the Ethics Committee, but it seems odd that the 'moral authority consultation takes practice blocked for over a year. Although according to the Giorgi said the request to enter the Big Brother in the delivery room has been signed by a large sign at the University Clinic gynecologists, including the department head, Pierluigi Venturini, and the director of relief, the primary Nicola Ragni. Recently, the Ethics Committee gave the green light to leave the Department of Births Alternative attacked the placenta and umbilical cord between mother to child to the natural separation, mothers who request it.

How Do You Get Rid Of Karma Points On Howrse

Lavoro. Garante della Privacy Boccia le Impronte Digitali per il Controllo delle Presenze.



Companies can not use biometric identification systems to monitor attendance and times of entry and exit of its employees if there are special security requirements.




It 's a tool too heavy-handed and disproportionate.




This was stated by the Authority for the protection of personal data to a company that has prohibited the further processing of data collected through a system of fingerprint recognition that the company had installed in some of its locations in order to be able to match the exact pay ordinary and extraordinary its workers.




The case was raised by an employee who had turned to the Ombudsman asking that it verify the correct installation of a system for detecting the times of entry and exit based on the use of fingerprints digital.




Checks carried out by the statements made and the Authority 'from Company 'were not identified specific reasons to justify the adoption of this system of recognition.




In places where it was installed the system had not been proven and in fact reported no particular need for security, such as, for example, could occur where there are areas of the business 'sensitive' that require special arrangements 'access.



For more ', the system had been installed without an agreement had been reached with the union representatives of business, or was the authorization of the Ministry of Labour procedure provided by the Workers' Statute, it should be observed , as established by a recent ruling by the Supreme Court, even in cases where equipment enabling it to monitor the presence of employees at work.




Recalling the terms of the Privacy Code and the Guidelines on private employment in November 2006, the Authority 'has thus prohibited the processing of data to the company because' illegal and invasive.


Popped Blood Vessel Weed

Lex Nokia. Lecito Controllare le Email dei Dipendenti


check your email for their employees.


As of yesterday, in Finland, you can.


Con 96 voti a favore (57 i contrari, 47 gli assenti) il parlamento di Helsinki ha approvato una legge che consente ai datori di lavoro di controllare il traffico di posta elettronica del personale sospettato di spionaggio industriale a favore della concorrenza.


Il provvedimento, che deve ancora essere controfirmato dal presidente finlandese Tarja Halonen e che ha diviso la stessa coalizione di governo (i Verdi sono contrari), è stato immediatamente ribattezzato «Lex Nokia» in quanto, in passato, l' azienda produttrice di telefonini aveva chiesto alla polizia di controllare le email dei suoi impiegati sospettati di trasmettere informazioni riservate alla concorrenza.


La stessa Nokia ha ufficialmente smentito di aver fatto pressioni per l' approvazione della legge. «Non dobbiamo essere naif e pensare che in Finlandia lo spionaggio industriale non esiste - ha detto il primo ministro Matti Vanhanen -.


Dobbiamo combattere il più possibile questa pratica». Il provvedimento ratificato dal parlamento finlandese apre una nuova strada in materia di privacy perché, per la prima volta, un governo, autorizza il controllo della posta elettronica anche se con dei punti fermi: ai datori di lavoro non sarà consentito di aprire tutte le email dei dipendenti ma solo di verificare eventuali invii di allegati verso ditte concorrenti.


Practice, to be honest, already widespread in the absence of specific laws such as the Finnish. In fact, according to a study undertaken a few years ago, on 'Hitachi Data Systems, in Italy as much as 57 percent of firms make systematic checks on the electronic correspondence of its staff.


And in 2002 the Milan Court ruled that is not a crime to read the email of employees absent. Provided that the control is made only for work purposes.

Monday, March 9, 2009

Ilegallizing Masterbation

Gli “Inasprimenti” delle Sanzioni del 30 Dicembre 2008


With ' Article 44 of Decree No 12/30/2008 207 have been tightened sanctions specified by the " Code for the protection of personal data .




In particular, the treatment in violation of security measures, as well as being liable to imprisonment up to two years, is punished with an administrative fine of 20,000 to 120,000 euro, are also provided for cases of minor and major severity, respectively, decreased and increased penalties.


ADMINISTRATIVE PENALTIES



Failure or inappropriate information to the interested
Before the DL 207/2008 - 3,000 to 18,000 €
After the DL 207/2008 - from 6,000 to 36,000 €



Sale illicit data
Before the DL 207/2008 - From 5,000 to 30,000 €
After the DL 207/2008 - 10,000 to 60,000 €



violations relating to personal data disclosing health
Before DL 207/2008 - 500 to 3000 €
After the DL 207/2008 - from 1,000 to 6,000 €



Failure or incomplete notification
Before the DL 207/2008 - From 10,000 to 60,000 €
After the DL 207/2008 - 20,000 to 120,000 €


Failure to produce documents or information to the Guarantor before
DL 207/2008 - From 4,000 to 24,000 €
After the DL 207/2008 - 10,000 to 60,000 €

Roof Of Mouth Feels Weird

La Privacy ed il Mito della Caverna


Apple lawyer Stephanie, PhD student at the Falcoltà of Law, University of Foggia.




These brief reflections on the issue of privacy created in the simplest possible way. Come to life and animate it with a story, by all chiamata impropriamente “mito”, ma, invero, una delle più efficaci allegorie di Platone, volta ad evidenziare le difficoltà per l’Uomo di scoprire e comprendere la realtà delle cose che lo circondano.


Siamo nel libro settimo de “La Repubblica” ed il filosofo chiede al suo interlocutore di pensare “a uomini chiusi in una specie di caverna sotterranea, che abbia l'ingresso aperto alla luce per tutta la lunghezza dell'antro; essi vi stanno fin da bambini incatenati alle gambe e al collo, così da restare immobili e guardare solo in avanti, non potendo ruotare il capo per via della catena.




Behind them, high and far away, shines the light of a fire, and between the fire and prisoners running an uphill road, along which imagines that it was built a low wall, such as screens upon which the puppeteers, hidden to the public, they stage their shows. " "Imagine then" - Plato continues - "the men who bring along this low wall objects protruding from the edge of every kind, and statues and other images in stone and wood of different shapes, some carriers, of course, speak, others are silent. "



It 'clear that while a person outside the cave would have a complete idea of \u200b\u200bthe situation, the prisoners, not knowing what really happens behind it and having no experience of the outside world, since they are chained since childhood and still can not turn my neck, would be likely to interpret those shadows "talking" as objects, animals, plants and real people. "For these men" - sentence, the philosopher - "the truth can not be anything but the shadows of objects."




leave the story at this point, stopping the narrative on that frame: chained men, intent on watching "Reality" of the shadows reflected on the wall of a cave.
The comparison with the Platonic thought, which immediately refers to our mind far more modern images of men "chained" in front of a busy watching TV and "reality" of the shadows reflected on the television, it may seem, at first sight, very bold and inconsistent.




In my opinion, however, is the most revealing and explaining the reality of confidentiality that all of us currently living on their skin.



The concept of privacy and a small survey

As you know, privacy is a fundamental right today recognized and protected in all EU countries and in most democracies in the world. Its recognition as a significant legal position is, indeed, the result of a conceptual stratification occurred over time and dictated by the need to cross the mere right to property and its more intuitive and primitive mental projection, ie the right not to see "invaded" the by persons outside their home.



But we must wait until the second half of the 800 to assist the United States to a first attempt, very effective, natural to conceptualize that requirement of individuals to have a personal physical space of solitude: what would soon be defined as "the right to be left alone."



Since the beginning, therefore, privacy was seen as an instrument to protect their privacy and to protect themselves from intrusive behavior of those who expressed intent to violate this legitimate expectation of confidentiality. In a sense, this concept was assigned the role as an instrument through which ideally draw a line between himself and others.


With the birth of the idea of \u200b\u200bcommunication and the subsequent ease of dissemination and duplication of information occurred over time through the press, television and, finally, the Internet was subsequently understood that he was no longer enough to protect the mere right to be "left alone" and not to be unwelcome interference in their private lives.


It became even more important that those "other people" might abuse the information related to a particular subject, gathering behind his back and put to uses that are not allowed.




For this reason, in the privacy of 1900 has extended its meaning, changing with the times and becoming a legal instrument aimed at ensuring "the control over the information that concern us."



Just starting with this need for control over our personal data, a recent search of the Italian Privacy, after submitting an anonymous questionnaire on search engines, new technologies, wiretapping and privacy, has highlighted the results very disturbing.




If, indeed, with regard to telephone communications and correspondence in general, 53% said they suspect of being intercepted, and even 60.5% considers it likely that family members or colleagues secretly monitor your e-mail , very different and alarming situation has come to light regarding the Internet world.




62% of respondents, in fact, does not believe that search engines retain "traces" of the queries made by users for more than a day and 73% say do not expect a profiling for marketing purposes on their choices.




It outlines, in short, un'inconsapevolezza very common and widespread practices on commercial content providers such as Google or Yahoo, always intent to collect, categorize and disseminate for commercial purposes without our knowledge and our tastes and our preferences, whatever they are, at the very moment of confidentiality, or when alone in front of computer monitor we believe we are finally free from any risk of being judged for what we are.




The truth of the shadows


The result of this, sees that telephone communications and correspondence as a means of intercepting high-risk, in fact, is simply the result of quell'incatenamento television, despite the now more than ten years of Internet presence in Italy, every day unknowingly continue to suffer . Surveys of high media impact as "Vallettopoli", "Calciopoli", "the Telecom affair" and the "Lazio-Gate", to name those I remember by heart, were only possible thanks to an investigation by of the judiciary based almost exclusively on wiretaps.




This has led, as a logical consequence, and standardized to heightened awareness of the danger of knowing their conversations intercepted home phone or mobile phone. If this is the situation in the world "tangible" on the Net, however, things are different. Constantly portrayed as the last bastion of free and indiscriminate sharing, the kingdom up to pedophiles and unscrupulous cheating bystanders, no emphasis has been given, for example, recently the activity of a European democratic government to develop a software "State "capable, when installed on the victim's computer, and making them easy to intercept listenable encrypted communications performed through the program better known and used VoIP (Voice over IP), called Skype, which, simplifying to the extreme, is nothing more than a phone that uses the Internet as a means of bringing the " voice ".




The activities of this government has had an enormous echo in the network, but not even a whisper came to the media. The result? "Innocent for not having committed the crime." It matters little whether the activity was aimed, in total anonymity and the violation of citizens' privacy, though, I am of course, would take place only with the consent of the magistrates, in extreme cases and investigations particularly complex and only for certain crimes, but as the saying goes: "Who controls the controllers?".




not matter, moreover, if, after the publication of news on the Internet, law enforcement, as it happens always in complete disregard of the mass media, have made inroads in ' office and the home of the spokesman of the "Pirate Party" local looking for information about "Deep Throat." We are given only see the shadows on the cave soltanto “l’ombra degli oggetti” e non la realtà delle cose; quella è riservata a pochi “uomini che portano lungo questo muricciolo oggetti d'ogni genere sporgenti dal margine, e statue e altre immagini in pietra e in legno delle più diverse fogge; alcuni portatori, com'è naturale, parlano, altri [anzi, la maggior parte] tacciono”.


Mi si opporrà a questo punto che, in fondo, “il fine giustifica i mezzi” e che, se l’art. 15 della Costituzione, nel sancire la libertà e l’inviolabilità di qualsiasi forma di comunicazione, prevede chiaramente che essa possa essere compressa “soltanto per atto motivato dell’autorità giudiziaria con le garanzie stabilite dalla legge”, c’è da stare più che tranquilli. Sono costretto allora a richiamare alla memoria, prima di tutto la mia, i dati ufficiali resi noti dal neoministro della Giustizia, l’Avv. Alfano, che il 09 giugno 2008, presentando il disegno di legge volto alla riforma della disciplina sulle intercettazioni, esplicitamente ha ammesso che “nel corso del 2007 sono stati 124.000 i soggetti sottoposti a intercettazioni legalmente ordinate dalla magistratura” e che “i centomila intercettati del 2007 avranno avuto in media, tra telefonate effettuate e ricevute, almeno trenta interlocutori.



Questo significa tre milioni di cittadini intercettati. Il numero va poi moltiplicato per enne giornate. Possiamo ben dire” – conclude il Ministro – “che buona parte del Paese è ascoltata”. E questi sono i dati ufficiali, quelli riguardanti intercettazioni “legalmente ordinate dalla magistratura”, ma l’affaire Telecom ci ha insegnato che, purtroppo, quelle a fini repressivi non sono le uniche tipologie di intercettazioni esistenti nel nostro Paese. Come dicevamo, adesso ironicamente, c’è da stare più che tranquilli..!


Ma non è tutto. Probabilmente chi per lavoro o per diletto si trova giornalmente ad avere a che fare con Internet, avrà sicuramente sentito parlare, Just recently, the new browser from Google to the worldwide community of Internet users. His name is Chrome. He won the "front pages" of all news sites, bringing the absolute latest in the world of navigation windows.




Among these, considerable interest has plenty of opportunities to surf the web, if you wish, in a completely anonymous. Software, so security-conscious users. A software to protect our privacy. Unfortunately for Google, however, there are lawyers and lawyers, you know, are a strange category.




visual masochistic, love to spend what little free time in reading the contract and its clauses, especially those written "in small and in italics, and some even like to read those contracts that you "sign" automatically on your computer before installing any software. And so it happened that someone would notice that the contract of the new "jewel" branded Google, in section 11.1, to be read before it was removed in a hurry and with apologies, that: "You retain copyright and any other rights you already hold Contenuti inviati, pubblicati o visualizzati su o tramite i Servizi.




Inviando, pubblicando o visualizzando i Contenuti, l'utente concede a Google una licenza perenne, irrevocabile, internazionale, non soggetta a diritti d'autore e non esclusiva per riprodurre, adattare, modificare, tradurre, pubblicare, eseguire in pubblico, visualizzare pubblicamente e distribuire qualsiasi Contenuto inviato, pubblicato o visualizzato su o tramite i Servizi”. Non solo. Poco più avanti, al punto 11.4, si trovava scritto: “L'utente conferma e garantisce a Google di disporre di tutti i diritti, del potere e dell'autorità necessari per concedere la suddetta licenza”. Per essere più chiari, il fruitore del software spontaneamente concedeva alla società Google il potere di disporre, liberamente e senza alcun limite, di qualunque dato personale o prodotto dell'ingegno di ogni utente del browser Chrome, risolvendo così alla radice ogni problema di privacy, ovvero ignorandola totalmente.




La Società, successivamente alla segnalazione, ha comunque immediatamente rimosso l’intero punto 11 dalla licenza in lingua inglese, ma non da quella italiana, dando una spiegazione più che “ragionevole” su quanto accaduto: si sarebbe trattato, infatti, di a botched copy and paste. In practice, the license would be taken collectively by the standard version of the Universal Terms of Service and applied first to Chrome happen without a check. All's well that ends well? I (legitimately) I doubt it.



After all Google is a company that thrives on selling advertising to third parties and, like it or not, sensitive information, which will inevitably be placed on the Internet through the browser, though, and always end up " pass "in the database that company. A little 'what happens when we use any search engine.




A little 'what happens when we use our computers daily.
But really no one noticed that the computer virus phenomenon seems not to exist anymore? Really no one has noticed a drastic decrease in detailed bulletins and alerts on the latest malicious programs, yet not be intercepted by anti-virus, ready to destroy all our files? Yet up to no more than two years ago not a month goes by without the "Loveletter", the "Sasser" or "Bugbear" on duty, able to spread and do damage on computers all over the world in just a few hours.




Now everything seems to be silent and not because the problem is solved. The danger is even greater. This market has indeed evolved, adapting to the needs and requirements of potential buyers, thus turning those simple and "boring" virus proof of concept, demonstration of what can be done to a computer with the right skills, in real their malicious programs (technically called "Worm"), capable of producing wealth to those who use them.




We are, in fact, currently engaged in face of malicious programs absolutely silent, which, once in the target system, not in any way manifest their presence and "limit", for example, record keeping and the subsequent release outside the credentials entered by the user to very specific sites, such as banks, e-mail services, business and other credentials.




Once again it is the theft of personal data the real business on the Net


No scandal at this point raise the news that long since the authoritative voice of Donald Kerr , head of the Office of the Director of National Intelligence americano, si è levata per difendere con forza l’idea che Stati e aziende si approprino direttamente di tutti i dati personali dei cittadini e li gestiscano in cambio di sicurezza e servizi. L’argomentazione alla base di questa assurda teoria è tra le più classiche e propone la necessità di effettuare un ulteriore mutamento semantico della parola privacy che, sempre secondo Kerr, “è troppo spesso equiparata al concetto di anonimato”, ormai obsoleto in un mondo costantemente interconnesso.

L’alba della de-privacy?
Rifletto ed anch’io mi interrogo, allora, sulla domanda essenziale che, nel prosieguo di quella nostra storia, Platone fa al suo interlocutore: "Consider then how can they free themselves and heal from the chains of ignorance and, if you happen to their naturally a case like this: if a prisoner was released and compelled suddenly to stand up, turn your neck and walk and look towards the light, and to do everything and suffer for the blunder was unable to see those things which first saw the shadows, how would you react if someone told him that before he saw empty appearances, but now sees something closer to reality and true because his eyes turned to real objects, and also shows each of the objects that pass, forced him to answer some questions with what? Do not you think that would be in difficoltà e riterrebbe le cose viste prima più vere di quelle che gli vengono mostrate adesso?



E se fosse costretto a guardare proprio verso la luce, non gli farebbero male gli occhi e non fuggirebbe, voltandosi indietro verso gli oggetti che può vedere, considerandoli realmente più chiari di quelli che gli vengono mostrati?”. In fondo spesso l’ignoranza è un bene, un’accogliente poltrona nel cui abbraccio contemplare meglio quelle ombre così familiari, senza dover sforzare gli occhi, rilassando la mente.



Mi auguro, ovviamente, che non sia questo il caso.


The colors of this picture, unfortunately, seem very bleak. We are witnessing an ongoing theft of our personal data, breach of "legalization" of our privacy by states and companies are increasingly defiant: the first, using fear, in the name of national security and the other, making the need in exchange for services targeted as much as possible.


dawn of this privacy retouched, this "de-privacy", perhaps to give the true meaning of this word is not nothing but to "take self-awareness and be free." Free if you want, even to give all their personal data to anyone, but by personal choice and nothing else.




E 'useless to hide it, we are seeing more and more to a delisting of the semantic and ideological significance of the word Liberty. Its boundaries continue to blur make it part of a mental representation that often tend to classify as previous experience and obvious, a sign of the cross on an automatic choice, perhaps, there has never been provided. Offer ideas for this new awareness is the goal of this article. Defend it together is the task that awaits us tomorrow.

Cost To Recover Old Lampshade

Lavoro. Le Linee Guida del Garante per Posta Elettronica e Internet


The public and private employers can not check e-mail and surfing the Internet for employees, except in exceptional cases. It is for the employer to define how to use these tools but taking into account the rights of workers and discipline in the field of labor relations.



The Guarantor privacy, with a general measure to be published in "Official Gazette", provides concrete guidelines regarding the use of computers in the workplace. "The issue is particularly sensitive - says Mr Mauro Paissan - because the analysis of websites visited can be drawn including sensitive information about employees and e-mail content can have a private character. Necessary to prevent arbitrary use of IT tools and business of violating the privacy of workers. "



The Authority requires first of all employers to inform clearly and in detail about how employees use the Internet and e-mail and the possibility that controls are in place. The Guarantor also prohibits reading and systematic recording of the e-mail as well as the systematic monitoring of web pages visited by employees, because This achieves a remote control of work prohibited by the Workers' Statute.


It also indicated a number of organizational and technological measures to prevent the possibility, provided only in limited circumstances, analysis of the content of Internet browsing and opening some e-mail messages containing data needed company.


The measure recommends the adoption by businesses of a disciplinary procedure, called also involving the unions, which are clearly set out the rules for Internet use and e-mail.


The employer is also required to adopt any measure that can prevent the risk of misuse, so as to reduce after-care workers.



As for the Internet should be for example:

sites previously identified or not considered related to work performance;

use filters to prevent certain transactions, such as access to sites placed in a sort of blacklist or downloading music files or media.


Regarding the e-mail, should the company:
makes available also addresses shared by several employees (info@ente.it; urp@ente.it; ufficioreclami@ente.it), making clear the nature of private correspondence;
evaluate the possibility of assigning the worker to another address (as well as work), for personal use;
including, in the absence of the worker, auto-reply message with the coordinates of other workers reach,
enables the employee to delegate to another employee (trust) to check the content of the messages addressed to him and to forward those deemed relevant to the holder for office, that in case of unexpected or prolonged absence of the worker and pressing requirements work-related.



If these preventive measures were not sufficient to prevent abnormal behavior, any control by the employer must be made gradually. In the first instance you should carry out audits of the department, office, workgroup, in order to identify the area to retrieve the observance of the rules. Only later, repeating the anomaly, we could go to check on an individual basis.



The Guarantor has finally prompted special measures of protection in those situations where work must be respected professional privilege granted to some categories, such as journalists.

Saturday, March 7, 2009

Temazepam How Long To Take Effect

Spamming Telefonico al Contrattacco. Come Difendere the Privacy



Ross Cadeo, Il Sole 24 Ore.





A step backwards for four years.




is true that the promotional phone calls at dinner time or on Saturday morning - despite the repeated interventions of the Privacy - have never completely disappeared from the homes of Italians.


But now, with the entry into force of the so-called Milleproroghe, there is a risk that the siege of the vendors return to the wire situation pre-summer 2005, when telephone numbers and addresses contained in the lists were also freely used for marketing purposes.


the rule by law in the conversion of Decree 207/2008 on Wednesday 25 February, is in fact passed an amendment stating that the database established on the basis of the telephone format prior to August 1 2005 can be used for promotional purposes until December 31, 2009, without their consent.


In practice, you restore the old rules of the game.


"Our reaction is of great concern and disapproval of the Privacy-look, Francesco Pizzetti -.


For years, we are committed to stamp out the phenomenon of unsolicited phone call, which we consider absolutely uncivilized especially if done at certain times of day and when the called party is a senior: I must pick up the call, it generates a state of anxiety.


The Authority has operated for years in defense of the city, with a sense of responsibility of enterprises and workers in the industry leaving plenty of time to stabilize or redevelopment activity.


Instead he preferred to shield of employees, usually young employees in a state of utter insecurity. "


Evolution To understand the scenario that is emerging, one must take a step back, just to August 2005: from that date, following a European directive (2002 / 58/Ce), telephone directories - except for those "categories" such as the Yellow Pages - could only be used for contacts and not for business calls.


users to receive calls in favor of a commercial mail or were asked to give their express consent for the operator: on the rails in distribution since 2005, their name would appear near the symbol a receiver or a letter.


few customers consenting (750 thousand compared to 25 million landlines and over 90 million SIM cards), but also slow the membership of companies, telephone operators, call centers, so that the Guarantor in recent years has intervened several times with questions, controls and sanctions (2008, 400 complaints 90 formally submitted to the Authority and the penalties imposed for a total of € 450 thousand).


Finally, the office headed by Pizzetti (in September and December 2008) has made "at source" by prohibiting both the purchase and use of data base formats and illegally collecting and the use of such information, with injunctions aimed at specific companies (whose failure would lead to criminal penalties).


But now until December 31, 2009, the contents of the "mailing" pre-2005 may again draw for commercial purposes.


Safeguards should, however, that the user remains completely open. "According to the text of Milleproroghe - notes Pizzetti - personal data shall be lawfully used" only by data controllers that have established such databases before August 1, 2005 "is illegal, then the sale of such information.


For our part, the protection and surveillance activities will continue and even harder to measure, trusting that the coming months can not be used for extensions, but to conduct a reflection on the Protection of citizen's rights.


hope that Parliament will begin a debate on this issue and we are ready to sit at a table with an open credit to businessmen and politicians, from which they come down more widely shared. "


Pending this table are valid anti-spam tools phone is established by the Privacy Code (Legislative Decree 196/2003) and by subsequent action of the Guarantor. Remember that you may first ask those who called him to explain by do-ve extracted the data concerning him.


Il secondo diritto è che venga rispettata la sua volontà di non essere più disturbato con offerte promozionali; in terzo luogo può esigere che i suoi dati siano cancellati dal data base del call center nel quale sono stati inseriti (servendosi, se non bastasse la richiesta a voce, del modulo scaricabile dal sito del Garante, che potrà inviare al responsabile del trattamento dei dati personali).


Se poi il teleselling da parte della società non dovesse cessare, potrà inviare una segnalazione all'Autorità stessa.


remains to be seen how many will be making calls and the other person - when asked to specify the owner of the database or for which the company calls - will not refer, from time to time in different societies.

Telephone Fpb Cr Card

'searches without Respect of privacy can be more invasive of a Stop'


"Come at five o'clock in the morning, wake the whole house. Maybe looking documents in a drawer and rummaging among the study children's toys and awakened with a start. How to run, searches can be more invasive to a halt. "


without words, those of 'lawyer Claudio Botti, who takes a firm stand with respect the raid and its aftermath in the 'course of study. Of course not discuss a specific case, but it is clear that the issue is off the case Franzese, the chief of suicide in his room 'Cardarelli Hospital, under investigation for an incident that had involved the clinic "Villa del Sole" and the activities of intramural some doctors including himself Franzese.


La Guardia di Finanza was presented at "Villa del Sole" a fortnight ago, had raided the study of the surgical oncologist and took away some documents. Thursday Franzese commits suicide, leaving a note to his daughters in which he writes: "I'm honest." It is clear that trauma to the link for the search connected to 'survey. "The searches done without respect for the privacy practices or the balance of family members - continues Botti - have procedures that can traumatize. In a decree of search there are a lot of great reasons that make it seem like the 'worst intervention of an order of remand.


The citizen to 'obscure all that is found the house full of police officers and all law is more shocked. The consequences can be disastrous, because they found a moment to 'other had to give explanations to the family, colleagues, the community without really knowing why. " A remedy? "We must begin to be more respectful of privacy - suggests Botti - and give directions to conduct more precise. " It is a different view Vincenzo Maria Siniscalchi, a lawyer and adviser to the Higher Judicial Council. "Surely a search is not a normal event in the life of a person - says now Siniscalchi -


But there 's a fact: the search is a necessary step in a specific type of investigation. Just as the interception, unless, of course, this is not an unlawful search. It 's other hand, there are different situations with each other, each search is different from' like any other criminal case is different from 'other.


Dunque ogni caso va studiato come un caso unico. Ma non credo - conclude Siniscalchi - che una reazione eccessiva possa essere il prodotto solo e soltanto della perquisizione in sé».

Metalflake Helm Dekor

Prodi and Mastella violate privacy




Tra le persone di cui i pm di Salerno - secondo il Csm - hanno violato la privacy ci sono anche l' ex ministro della Giustizia Clemente Mastella e l' ex premier Romano Prodi, visto che nell' ordinanza di sequestro del fascicolo Why not sono state riportate «indebitamente» le loro utenze telefoniche, senza cioè che fossero «attinenti» all' oggetto e alle finalità del provvedimento.


A fate even at a Secret Service agent. The disciplinary section believes that the prosecutor had "abdicated" its role as judges' impartial 'and' impartial ', as they have played in the grounds of the seizure of the dossier Why not, in a "slavish" and "without any critical scrutiny' , the "content of more than 60 declarations" made by their 'ex pm of Catanzaro Luigi De Magistris.

60th Birthday Toast Template

a problem for Privacy. More Information to Citizens


Vladimir Polchi, La Repubblica.


Cameras private functions with public safety? It is a problem huge and is already scheduled as one of our decision. "


Francesco Pizzetti, data protection commissioners, does not hide the concern in front of the 'hypothesis of a "big eye" that controls everything and everyone. Yet in Rome want to put cameras in public and private network. "It's a phenomenon already risen over the past three years, with the 'introduction of tax incentives for encouraging the connection of cameras with features rooms with private or public security.


The problem is now exacerbated by the security package and the decree anti-rapes, because it connects to the greater powers given to mayors and the federal security. What can the Ombudsman? "We lavorandoa a measure to supplement those of 2004 on video surveillance.


One thing is certain: if the camera is connected to the private police, it must be said to the people, with a 'really great information. That's not all.


next Tuesday in a meeting at the Ministry of 'Inside we'll see if you can convince the Interior to report even the cameras with public safety functions. "

How Much Does Plan B Cost?

Extortion to Trezeguet, Fabrizio Corona indicted for Violation of Privacy


the French claimed 25 000 € in exchange for a photo shoot.


Fabrizio Corona was indicted June 10 and will be prosecuted in court for the crimes of extortion and violation of privacy David Trezeguet.


affair note that dates back to 2006: Juventus player taken outside a bar in Milan with a woman ("The truth was with a group of friends," states her lawyer, Ezio Audisio, Part civilian preliminary hearing to 'protect the image of the player).


The day after Trezeguet Crown calls a meeting and shows Marco Bonato, his driver and personal assistant. It proposes to Trezeguet l’acquisto del servizio per 25 mila euro. «Prezzo di mercato».


Il calciatore consegnerà il denaro a Bonato in un locale torinese in cambio del servizio fotografico completo dei negativi. Un primo gup decise di archiviare le successive accuse a Corona e ai suoi boys (oltre a Bonato, il fotografo Fabrizio Pensa).


Il pm Vincenzo Pacileo ricorse in Cassazione che gli diede ragione. Ieri nuova udienza preliminare e il gup Emanuela Gai decide il rinvio a giudizio dei tre imputati. L’avvocato Claudio Papotti, coodifensore di Corona, osserva: «E’ stata una regolare transazione».