----------------------------------------------------------------------
Message-ID:
<CAH8yC8=RVdXwS7wb-MiC8DgurJ8NE7UgoKAiq74cEFiedZQ4=g@mail.gmail.com>
Date: 27 Oct 2020 14:49:51 -0400
From: "Jeffrey Walton" <noloader@gmail.com>
Subject: Re: How is this guy getting through from a blocked
number?
On Tue, Oct 27, 2020 at 2:36 PM Linc Madison <telenews@lincmad.com> wrote:
>
> ...
> I have an Apple iPhone 6S+ running iOS 14.0.1 on the Sprint network. I
> have added all the various numbers from which he has called to a
> contact that is supposed to be blocked, and yet it doesn't even slow
> him down. ... I would really like to get him out of my life.
States are starting to tighten stalking and harassment laws. Maybe you
can get a Peace Order to stop the harassment. It should be easier if
the person is a danger to himself or others.
For example, Maryland increased coverage of stalking and harassment to
include emails and text in its criminal code section 3-803. The new
law in Maryland took effect April 1, 2020.
http://mgaleg.maryland.gov/mgawebsite/Laws/StatuteText?article=gcr§ion=3-803&enactments .
Microsoft and the botnet operating at Sharepoint Online are getting
ready to learn about Maryland's expanded laws the hard way. They have
been served a demand letter by certified mail. The request for a Peace
Order is coming soon.
One of the nice things about Maryland's law is service providers only
receive safe harbor in some circumstances from persons. They don't
enjoy safe harbor from botnets. And in other circumstances (like
stalking and harassment) they don't receive safe harbor.
Jeff
------------------------------
Message-ID: <868sbrwfl2.fsf@telecom2018.csail.mit.edu>
Date: 27 Oct 2020 20:59:05 +0000
From: Moderator <telecomdigestsubmissions@remove-this.telecom-digest.org>
Subject: Easy Hacking Tools Facilitate Bad Behavior
A few years ago, if you wanted to wreak havoc online, you needed some
skill. You needed to understand coding and how to break into other
computers. You needed to develop attack bots and probe for
vulnerabilities.
Now you just need to point and click.A few years ago, if you wanted to
wreak havoc online, you needed some skill. You needed to understand
coding and how to break into other computers. You needed to develop
attack bots and probe for vulnerabilities.
Now you just need to point and click.
https://www.natlawreview.com/article/easy-hacking-tools-facilitate-bad-behavior
--
Bill Horne
Telecom Digest Moderator
------------------------------
Message-ID: <86h7qffoj9.fsf@telecom2018.csail.mit.edu>
Date: 27 Oct 2020 19:37:46 +0000
From: Moderator <telecomdigestsubmissions@remove-this.telecom-digest.org>
Subject: Privacy and Security Considerations for Employers Grappling
with Introducing Social Distancing and Contact Tracing Technologies in the
Workplace
As employers continue their efforts to safely bring employees back to
the workplace, many have moved beyond initial pre-entry wellness
checks or questionnaires and are considering technology solutions that
monitor social distancing and conduct contact tracing in
real-time. Along with introducing these enhanced capabilities, the
question of the privacy and security of employee personally
identifiable information ("PII") and protected health information
("PHI") continues to loom.
https://www.natlawreview.com/article/privacy-and-security-considerations-employers-grappling-introducing-social
--
Bill Horne
Telecom Digest Moderator
------------------------------
*********************************************
End of telecom Digest Thu, 29 Oct 2020