Search Details

Word: iddings (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Crimson reported on Friday that with a generic e-mail account, reporters were able to access, within 10 minutes, a list of every drug purchased by one Harvard student as well as the e-mail addresses and ID numbers of several students whose identities the University was required to keep secret under federal...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Harvard To Review Site Access Standards | 1/24/2005 | See Source »

...most sensitive data accessible with only a Harvard ID and birthday, though, appears to be that from Harvard’s primary drug insurance provider, PharmaCare...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Drug Records, Confidential Data Vulnerable | 1/21/2005 | See Source »

...Despite that, there are a lot of people in the healthcare industry who just don’t get it,” he said. “If indeed they’re using just [ID and birthday] to identify somebody, that’s an example of just not getting...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Drug Records, Confidential Data Vulnerable | 1/21/2005 | See Source »

Lewis, who is also a computer science professor and will teach a Core course next semester on computers and public policy, said he has advocated since 1996 for clearer Harvard policies on ID privacy...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Drug Records, Confidential Data Vulnerable | 1/21/2005 | See Source »

...years ago the most you could get with a Harvard ID number was a bag lunch,” he said. “But now data of all kinds are on web servers for reasons of convenience, and those Harvard ID numbers, if those are the keys, suddenly are much more powerful tools to get at sensitive information...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Drug Records, Confidential Data Vulnerable | 1/21/2005 | See Source »

Previous | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | Next