Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Laudable, but not without potential consequences (Score 3, Interesting) 581

While this is a cool idea -- there are no women and no people of color featured on any US bills right now, and that doesn't accurately reflect the demographics of the country -- I can see it causing some confusion. On balance, it's probably a good decision, but this is a pretty major change.

Comment They need to be fined. Heavily. (Score 1) 32

Until customers aren't the only ones left on the hook in the case of breaches like this, companies like Hyatt aren't going to take security seriously. Sure, they might pony up for credit monitoring, but that does little to actually make customers whole if their identities are stolen or their bank accounts are emptied. If we were to start fining companies like this, say, $10,000 per card number / identity / sensitive detail stolen, I have a feeling these breaches would become far less common. Until we do this, we shouldn't expect Hyatt to care.

Comment Re:Lawsuits? (Score 0) 206

Your statements about Uber's contracting agreements are patently false. Drivers drive when they want to, they can turn the app on or off at any time. Many Uber drivers also drive for Lyft. Drivers can work for whoever they want without fear of retaliation. Drivers use their own phones, Uber doesn't require drivers to use a specific phone. It's clear that you have no idea what you're talking about. The next time you post something on the internet, it would be nice if you could take the time to make sure that it's at least mostly true.

Submission + - What asset tracking software do you recommend? 1

grahamsaa writes: I work for an organization that has a number of physical assets, as well as presence in multiple data centers. On the DC side, there are a number of specific things we need to track (one thing we want to be able to account for is how much power do we need for each rack). On the office side, our needs are more basic. We need to be able to tag and track laptops, workstations, monitors, etc.

I would like to use a single system for all of this, but have yet to find something that will work well on the office side and the data center side. Free / open source solutions are preferred, but we're prepared to spend money on a commercial solution if it meets our needs. What would you recommend?

Submission + - If a financial institution mishandles my data, what recourse do I have? 2

grahamsaa writes: My sister recently consolidated her student loans, and the bank e-mailed the paperwork, which included her name, address, date of birth, social security number, drivers license number and bank account information to the wrong e-mail address. The address (a gmail address) is associated with a real person (not her), so someone now has all of her personal details. My sister claims that she read her e-mail address to the bank representative over the phone twice, but that it was transcribed incorrectly.

The real issue is that the bank was willing to use unencrypted e-mail at all to send sensitive information, and I told my sister that at a minimum the bank should cover electronic credit monitoring for her for a minimum of a year, but I feel like that alone probably isn't enough. While my sister should have insisted that they use a more secure means of sending this information, I think it should be the bank's responsibility to ensure that this kind of thing doesn't happen. What kind of recourse does a person in my sister's position have? Did the bank violate any laws (she lives in Connecticut in the United States)? Is there a standard penalty for this kind of thing? I'm not a lawyer, but I know some of you are. What are her options in this case? Thanks!

Slashdot Top Deals

If computers take over (which seems to be their natural tendency), it will serve us right. -- Alistair Cooke