I am moderating what will almost certainly be a fascinating discussion about BYOD, enterprise data security and device management at the BlackBerry Experience event at Montecasino in Fourways, Johannesburg today. The event is hosted by BlackBerry in partnership with ITWeb Events and will also take place in Durban and Cape Town later this month. TheContinue reading “BYOD, data security and the BlackBerry Experience”
That the respondent in the latest High Court Facebook defamation case, M v B, was ordered to remove defamatory posts on Facebook isn’t remarkable. What is more interesting about that case is that it reiterates a principle that a court will not step in and proactively block future defamatory posts. The applicant in this case,Continue reading “Facebook defamation is not necessarily illegal”
Recent reports about hacked celebrity iCloud accounts seem to be attributable a vulnerability in iOS’ Find My iPhone service which enabled someone trying to gain access to an iCloud account to use a brute force attack to guess the account password. A brute force attack involves guessing a large number of possible passwords until theContinue reading “Protect your iCloud account with two-step verification”
A recent New York Police Department attempt to engage with New Yorkers serves as a reminder that crowdsourcing positive feedback doesn’t always work quite as well as you may hope, if it works at all. As Ars Technica reported: The Twitterverse was abuzz Tuesday evening after the New York City Police Department made what itContinue reading “Community feedback: be careful what you wish for”
SnapChat’s privacy controls are what made it both enormously popular and troubling to its young users’ parents. When SnapChat launched, it gave users the ability to share photos and videos which promptly vanished into the ether. This appealed to its typically young and privacy conscious users because they finally had a way to share stuffContinue reading “SnapChat privacy is not what you think”
The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB employee’s flippant tweet about an ad personality’s activities in Afghanistan.
Each incident has unfolded a little differently. Both are stark reminders about the very serious legal consequences for misguided tweets.
I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person following women around shooting video of them or taking photos without their knowledge. ThisContinue reading “How to deal with stalkers taking photos of you”
Our email providers give themselves much more convenient access to your data through their terms of service or privacy policies. On one hand, this is level of access may be necessary to prevent disruptions and limit liability but, on the other hand, these permissions we, as users, grant providers like Microsoft, Google, Yahoo and others pretty broad access to our data without requiring them to obtain court orders or satisfy any external legal requirement.
Update (2014-02-26): The Next Web has reported that Hiroshima is once again in control of his envious Twitter handle, @N. This is a happy ending not only for me but also for sane employees and loyal users of Twitter's. Congrats to those, too. — Naoki Hiroshima (@N) February 26, 2014 //platform.twitter.com/widgets.js A good Twitter handleContinue reading “Extorted out of a $50 000 Twitter handle”
Although the tweet was almost certainly not sanctioned by Nokia’s marketing team, it highlights the importance of carefully managing not only access to a brand’s social profiles and establishing clear guidelines for people who do have access to those profiles explaining what acceptable behaviour and content are because whatever is published using those platforms is going to be perceived as representative of the brand to some degree. Aside from the obvious reputational smear, consider the economic impact of a brand that is perceived to have taken a strong stand against its customers, especially at a time when it is undergoing considerable transformation.