Tag Archives: United States

Jobs for Men Still 2.1 Million Short of Pre-Obama Recession Levels

U.S. men are still 2.1 million jobs short of pre-recession levels even as women have regained all the jobs lost before the economic collapse.

Some economists have dubbed the gender schism the “man-cession” and the “she-covery.” The latest jobs report reveals that male unemployment is nearly one percent higher than for women.

Analysts say the economic hit to industries like construction and manufacturing, which tend to hire more men than women, is helping drive the gender employment gap.

Last month’s labor force participation rate for women was 57.3% compared to 59.4% in December 2007. Today, a record 90,473,000 people are no longer in the U.S. labor force.


Confidential Data Leaving on Workers Mobile Devices – Under-30-Year-Olds Don’t Care

A security cable attached to a Kensington Security Slot

More than half of employees admit to storing, sharing and working on corporate documents on their personal devices-and this number is growing.

If you think your BYOD policy telling employees that they can’t put sensitive data on their personal smartphones, laptops and tablets is keeping your company safe, think again. Few office workers are actually aware of their company’s BYOD policy.

These are the alarming findings from a recent survey of 4,000 office workers in the United States and United Kingdom, conducted by market researcher Ipsos Mori and commissioned by cloud collaboration platform provider Huddle.

The survey found that 73 percent of respondents in the United States are downloading personal software and apps onto corporate-owned tablets.

Now for the kicker: The security problem is only going to get worse as millennials flood the workplace. That’s because millennials, especially on the younger side of the generation, don’t really care about security or the stress it causes the IT department; they just want BYOD without restrictions.

The survey calls 18- to 24-year-olds the “gourmet chefs of security breach,” because they play loose with corporate documents. That’s not good, given that millennials will make up the majority of your workforce by 2015, according to the U.S.

Had a Denied Warranty Claim at the Apple Store for iPhone or iPod With “Water Damage”?

This past April, Apple agreed to the terms of a US$53 million class-action settlement stemming from Apple’s warranty practices regarding water damage on older-generation iPhones and iPod touches.

Both the iPhone and iPod touch contain Liquid Contact Indicators which change color when they come into contact with water. The crux of the issue, however, is that these Liquid Contact Indicators were also prone to change color in humid environments.

To qualify for a cash refund, you must: (a) be a United States resident; (b) Apple denied warranty coverage for your iPhone on or before December 31, 2009, OR for your iPod touch on or before June 30, 2010; (c) when it was submitted to Apple for warranty coverage, your iPhone or iPod touch was covered either by its original one-year limited warranty or by an AppleCare Protection Plan; and (d) Apple denied warranty coverage because Apple stated that your iPhone or iPod touch had been damaged by liquid.

The chart below is instructive, but note that the amounts are subject to change depending on how many folks actually file claims.

The NSA Should Start Following These Simple Legal Rules

Headquarters of the NSA at Fort Meade, Marylan...

Cray X-MP/24 (serial no. 115) used by NSA

Summarized from an extensive article put together from the EFF.  You can read it here.

While we still believe that the best first step is a modern Church Committee, an independent, public investigation and accounting of the government’s surveillance programs that affect Americans, members of Congress seem determined to try to enact fixes now.

…In short, there’s much Congress can and should do here, but we also need to be on the lookout for phony measures dressed as reform that either don’t fix things or take us backwards.

…At all times, a specific person or specific identifier (like a phone number or email address) or a reasonable, small and well-cabined category (like a group on the terrorist list or member of a foreign spy service) must be specified in the context of an investigation.

…Clarification that if one identified person is under investigation, the NSA does not have the authority to run analysis of call records on persons “two hops” or “three hops” away from that person without a separate court authorization.

…Congress should also state firmly that the fact of third party involvement should be irrelevant to a person’s “reasonable expectation of privacy,” as this may assist the courts when considering Fourth Amendment implications.

…Confirm the NSA must obtain a specific, probable cause warrant to seize or search Americans’ communications when they are picked up via a FISA court order or otherwise even if the American is not the “target” of the order.

…Ensure that the protections of American law, including standing to sue to challenge violations of law, apply to all data accessed by the NSA in the United States, even if the data is about a non-U.S. person.

…The NSA has claimed at various times that the legal protections do not start until a human reviews the information or when it is “processed” or otherwise prepared for human review, thus excluding any legal protections against collection, storing and even apparently many kinds of analysis done by computers.

…The government has tried to use the state secrets privilege to dismiss EFF’s multiple lawsuits challenging the NSA, as well as those of many others, despite the fact there are hundreds of pages of public evidence documenting unconstitutional actions.

…A “compromise” has recently been floated by several members of Congress that instead of the NSA holding onto phone records for five years, the phone companies should do it themselves, without limiting NSA access capabilities.

…This has not yet been floated, as far as we know, but any effort to reform the law in light of the NSA surveillance must not itself require that communications companies increase the surveillance capabilities of their systems. The FBI has been secretly lobbying for years for an update to Communications Assistance for Law Enforcement Act (CALEA), which would essentially force large internet companies to build a backdoor into their systems so the feds could more easily get real-time access to communications. Given the level of distrust users have had with Internet companies after their involvement in the PRISM program with the NSA, this bill should be permanently shelved, instead of being part of any sort of compromise reform bill relating to the NSA.