Posts Tagged ‘Report’
The Feltron Biennial Report of 2010 and 2011
Last Updated on Sunday, 18 March 2012 02:22 Written by Celframe Web Team Thursday, 5 April 2012 11:22
It is that happy time of year again: information designer Nicholas Felton has released his latest year report, this time covering a two-year period. As usual, the biennial report covers almost all the quantified facts and statistics of the daily life of Nicholas, which he painstakingly records through careful note taking, as well as analyzing his Last.fm and FitBit statistics.
The covered topics of the report include trivial things like the places he visited or the most popular beverages he drank. These statistics have been filtered by local versus overseas location, as well as the actual person he was accompanied with.
The real joy of reading such reports, however, hides in reading the juicy anecdotes, such as the number of tsunami warnings he luckily survived or the car accidents he experienced, in addition to discovering various small annotations on the data graphics, that clarify the impact of some events, such as the long itinerary to Australia or the unfortunate death of his father.
Be sure not to miss a critical eye to the work by The Why Axis.
. Interview with Felton.
. Video Interview with Felton
. Feltron’s Father Life Report (2010)
. Feltron 2009 Annual Report
. Feltron 2008 Annual Report
. Feltron 2007 Annual Report
. Feltron 2006 Annual Report
. Feltron 2005 Annual Report
Identity Theft Police Report
Last Updated on Monday, 12 March 2012 12:31 Written by Celframe Security Team Wednesday, 21 March 2012 08:03
An identity theft police report also called an identity theft report has many benefits in all areas of personal identity theft management. Although identity theft affects many areas of one’s life, credit identity theft or using someone’s personal information to access credit cash or merchandise is the most common risk of identity theft facing most people.
As you may know, credit reporting agencies collect, analyze and sell personal and credit information to companies which are willing to pay for accurate and complete information for making credit decisions. Therefore, high reliance is placed on the credibility of the purchased information to minimize business losses and credit reporting agencies have the best intention and interest for doing all they can to make sure the information they sell is accurate and complete. Therefore, when disagreements arise between consumers whose information has been falsely used in all credit matters and the entities which sold, purchased and used such information, such discrepancies must be properly investigated and corrected as necessary.
One of the best steps consumers can take to formally document their identity theft cases as part of their identity theft action plan is file an identity theft police report. An identity theft report entitles consumers to certain legal rights when it is provided to all major credit reporting agencies or to companies which may be adversely affected when consumer information is misused. For example, an identity theft police report can be used to permanently block fraudulent information which resulted from identity theft to appear on credit reports and ensure that fraudulent debts do not appear on credit reports. Also, identity theft police reports can prevent a company or their agents such as collection agencies from continuing to collect debts which were created due to identity theft.
Most importantly, an identity theft report is required to place an extended fraud alert on credit reports. Although consumers can place initial fraud alerts on their credit reports even if they suspect they are facing or might face identity theft, an extended fraud alert is placed when a person has suffered identity theft and requires an identity theft police report. In addition, a police report is also needed to get copies of the original application which was completed and submitted by the identity thief as well as all relevant transaction information from companies which used the fraudulent information to create the accounts.
Most often, a report is not needed to refute charges on existing accounts which can be resolved by working directly with the companies. Usually, an identity theft report is necessary when a new account has been opened under another person’s name without authorization or when fraudulent charges have been reported to the consumer credit reporting agencies in order take advantage of the available legal protection under the laws.
For an identity theft report to be effective, it must include complete and specific details about the identity theft case. It is also a good idea to complain and report the identity theft case to the government such as the Federal Trade Commission (FTC) and include the identity theft complaint in the police report.
In order to request and receive information pertaining to identity theft cases from companies and all associated entities, requests must be made in writing accompanied by all supporting documentation including the police identity theft report.
Read other identity theft victim articles after reading about identity theft police report.
Report: Google’s Schmidt Condemns Carrier IQ
Last Updated on Thursday, 8 March 2012 11:43 Written by Celframe Security Team Friday, 9 March 2012 05:41
Google chairman Eric Schmidt has joined the angry chorus of of Carrier IQ critics in condemning the beleagured diagnostic software.
“Android is an open platform which means people can make software for it that’s not very good for you,” Schmidt told journalists and democracy activists at the Freedom Online conference at the Hague, Netherlands, according to The Telegraph.
“This [Carrier IQ] appears to be one [such case]," he added. (Of course, Android malware is probably a better example…)
In separate remarks, Schmidt also said “We certainly don’t work with them” and “We certainly don’t support it.”
Last month, Carrier IQ's diagnostic software was discovered in Android (and later, in iOS) devices to be tracking how you use your cell phone – from GPS coordinates, browser history, and keystrokes – on the behalf of U.S. carriers.
The carriers say it's purely for the sake of diagnosing network and battery problems, and security experts from BitDefender, Kaspersky Lab, Lookout, F-Secure, and others have not found any malicious use of Carrier IQ. However most agree the potential for harm exists.
“The biggest issue for most users is that they do not know whether they have Carrier IQ on their mobile device,” Lookout Mobile wrote in a recent blog post. “In addition, there is no clear opt-out path available for those users who do have Carrier IQ installed and would prefer not to have it on their device.”
Meanwhile class-action lawsuits have been filed in California and Missouri that accuse Carrier IQ, as well as Samsung and HTC, of violating federal wiretap laws.
There are apps that detect the use of Carrier IQ, and ways to remove it from your Android device, but are you sure you want to?
For more, see Carrier IQ Fails the Occupy Wall Street Test.
For more from Sara, follow her on Twitter @sarapyin.
For the top stories in tech, follow us on Twitter at @PCMag.