Apalachicola Water Wars: A Battle Between Georgia, Florida And Alabama Is Killing The Last Great BayInternational Business Times On a hot Tuesday in mid-August, residents of Apalachicola, Fla., gathered outside the county courthouse, where a banner over the entrance read in capital letters “Save the last great bay!” Some carried signs with messages like “Save our river!” and “Congress must act!” In a packed room inside, the state’s two U.S. Farmers use soil moisture sensors to determine when to irrigateAlbany HeraldSoil moisture sensors are an efficient tool farmers use to optimize their irrigation water use. Breweries bring Tennessee-Georgia border war to a headWBIR-TV That mistake more than a couple of centuries ago is meaningful today because it left water-thirsty Georgia high and dry without access to the Tennessee River that flows achingly close to the current state line. Legislators in Georgia have passed …

Your smartphone is hackers’ next big target CNNIn the world of cyber security there are some well-known designations for anyone that considers him or herself to be a hacker, the term being so broad in scope now. One can be a “white-hat” hacker or a “black hat,” the former being someone who … The Insecure Pacemaker: FDA Issues Guidance for Wireless Medical Device …  Infosecurity Magazine The US Food and Drug Administration has issued a malware alert, warning that medical devices that contain configurable embedded computer systems can be vulnerable to cybersecurity breaches. Pacemaker virus could lead to “mass murder” Hackers now … Surveillance Revelations Shake US-German Ties  New York Times In a country scarred by Nazi and Communist pasts, the issue is prompting not just a debate about privacy and data protection, but also demands from German officials that the Berlin-Washington security partnership be put on a new footing….       Read More

It is not difficult to figure out the public sentiment on the issue of employers forcing job applicants or employees to provide their social media passwords or credentials.  Washington has just become the 11th state with a law banning employers from such conduct.  The other 10 states that have similar laws governing social media privacy in the workplace are Arkansas, California, Colorado, Illinois, Maryland, Michigan, Nevada, New Mexico, Oregon and Utah. The Washington law goes so far as to prohibit employers from forcing employees to open their social media accounts while the employer looks over their shoulder.  The law does, however, have an exception which allows employers to obtain information from an employee’s social media account if the employer is conducting an investigation into the employee’s misconduct, or if the employee is accused of improperly transferring proprietary information.  Even then the employer can only ask the employee to provide their…       Read More

It is not difficult to figure out the public sentiment on the issue of employers forcing job applicants or employees to provide their social media passwords or credentials.  Washington has just become the 11th state with a law banning employers from such conduct.  The other 10 states that have similar laws governing social media privacy in the workplace are Arkansas, California, Colorado, Illinois, Maryland, Michigan, Nevada, New Mexico, Oregon and Utah. The Washington law goes so far as to prohibit employers from forcing employees to open their social media accounts while the employer looks over their shoulder.  The law does, however, have an exception which allows employers to obtain information from an employee’s social media account if the employer is conducting an investigation into the employee’s misconduct, or if the employee is accused of improperly transferring proprietary information.  Even then the employer can only ask the employee to provide their…       Read More

Chinese General Denies Cyber Attacks on U.S. U.S. News & World ReportChina’s military chief flatly denied on Monday his country’s participation in a hacking scheme targeting U.S. businesses, while also warning that missteps in the western Pacific could lead to “a severe impact” on security in that region. [ALSO: Chinese … Source: New York Times Website Hit by Cyber Attack  Fox Business The corporate and media sites of The New York Times (NYT) experienced a lengthy outage on Wednesday that a source close to the matter said appeared to be caused by a cyber attack. The apparent attack began to block or slow access to the websites … Cassidy Wolf, Miss Teen USA, claims she was extorted by an online hacker … CBS News The recently-crowned Miss Teen USA says someone took private photos of her by hacking into her computer’s webcam and is now extorting her, according to the…       Read More

As we all know, employers are required to provide reasonable medical treatment for work injuries.  In exchange, employers can limit who the injured employee is allowed to see by posting a valid Panel of Physicians.  A valid panel will have at least six unaffiliated doctors, at least one orthopedic surgeon, and no more than two industrial clinics.  We recommend naming specific doctors, rather than just the name of a facility.  Furthermore, the Employer must post the panel and the Employee’s Bill of Rights in a conspicuous place and explain to them that they are must choose from the panel following an injury.  Please note, these forms are available in Spanish as well. If there is a valid panel, the Employee must treat with a panel doctor, except in case of a medical emergency or a referral from a panel doctor.  On the other hand, if the panel is invalid for…       Read More

The Journal of the Association of American Medical Colleges has noted that there are widespread shortages of primary care doctors, as less than 25 percent of new physicians are entering the primary care field, while a small fraction, only 4.8 percent, of new doctors are practicing in rural areas.   This shortage will only increase with time, further causing harm to rural and struggling urban areas where medical care is already limited.  Given this shortage, our immigration laws provide for many foreign physicians to obtain legal permanent status in the United States through the National Interest Waiver. The National Interest Waiver (NIW) To be eligible for a physician NIW, the foreign physician must: 1. Agree to work full-time in a clinical practice.  In most cases, the required period of service is 5 years.  The beginning of the five year period varies depending on whether the applicant previously secured a J-1…       Read More

Chinese military attempted to hack Missouri water plant  World Tribune The fear of U.S. infrastructure being vulnerable to Chinese military hacking attacks was further intensified after a tech publication revealed that the Chinese military attempted to hack a water plant in Missouri. Of all the cyber attacks tracked by a … Hackers put a bull’s-eye on small business PC World Pamela’s company survived. Small business cybercrime Small businesses constituted 31 percent of targeted attacks in 2012. Not every company that gets hacked is so lucky. According to the National Cyber Security Alliance, one in five small businesses … Obama, tech executives met to discuss surveillance: report  Reuters WASHINGTON- President Barack Obama quietly met with the CEOs of Apple Inc, AT&T Inc as well as other technology and privacy representatives on Thursday to discuss government surveillance, according to a media report. Google Inc computer … US Surveillance Programs Spur EU Efforts…       Read More

UVA forms data breach taskforce; IN hospital apologizes for error  HealthITSecurity.comThe University of Virginia’s Chief Operating Officer, Pat Hogan, will lead a task force to review the policies that led to 18,700 student social security numbers to be printed on the outside of health insurance enrollment fliers sent to their homes … OHSU breach triggers sufficient risk assessment questions HealthITSecurity.com As data breaches become a fact of life in the age of cloud computing, new evidence suggests that consumers are seeking out companies that protect their privacy. According to Forrester Research (FORR), people will choose to give their business to firms … Ponemon Institute Study: New Security Training Yields Increase In  Dark Reading Ponemon’s 2013 Cost of a Data Breach: Global Analysis study shows that 35% of global data breaches concerned a negligent employee or contractor (human factor). In light of these statistics, it is important that organizations have access…       Read More

The Competitive Advantages of Data Privacy Businessweek As data breaches become a fact of life in the age of cloud computing, new evidence suggests that consumers are seeking out companies that protect their privacy. According to Forrester Research (FORR), people will choose to give their business to firms … Stanford computer system target of cyberattack  KTVU San Francisco Stanford University announced Thursday its computer system had suffered a security breach and warned users of its local network to change their passwords. In a press release, university officials said the attack “bears many similarities” to recent … Two Russians Indicted in Computer Hacking Scheme, Stole Millions…  LongIsland.com Manhattan, New York – The United States Attorney for the Southern District of New York, Preet Bharara, and the Assistant Director in Charge of the New York Office of the Federal Bureau of Investigation, George Venizelos, jointly ….