Legal Complaint RE: Freelance Reporting and Google Blog Posts: Capella University-"No Capella Does Not Own A Student's Homework!"
Hi Bayo,
I want to express a
few concerns that I have. First, in your discussion posts, I see that you are
combining content from your blog into a discussion response. The content
from the blog is not relevant to the discussion topic and may confuse or upset
other students. Your discussion responses should stay focused only on the content
needed to provide a direct response to the topic.
More concerning is
that I see you have posted responses from other students on your blog. This
might be a violation of the learner code of conduct, falling under
"theft" per policy 4.02.02, Learner Code of Conduct, which states:
"Theft is taking property that is not one's own or posting,
transmitting, promoting, or distributing content that violates copyright or
other protected intellectual property rights. Unauthorized use of university
property is prohibited. Theft and abuse of compute resources is
prohibited." Did you receive permission from these students to post
their Discussion responses to your blog? Please see the examples I have
posted at the end of this email.
In reading the
blog content on your discussion post, I note that you are fearful for the
lives and well-being of yourself and your children. I would like to refer
you to a source that Capella contracts with called Lifeworks. This organization
can provide you with information and resources, it is 100% confidential, is
open 24/7, and there is no cost to our learners. This organization might be
able to offer you some options to relieve your situation. You can contact this
group at (877)234-5151 and can visit https://login.lifeworks.com/ To login,
use "capella" as your user name and "university" as your
password. I also encourage you to contact your local law enforcement if
you are feeling threatened in any way.
Examples of Student Posts on
your personal blog:
"Unit 6 Discussion 1 Response 1 Keating
Response from: Miss. Bayo
Elizabeth Cary, AA, BA, MLIS
Information
Security professionals are exposed to confidential and sensitive information
regularly. It is only natural that Information Security professional have
expose to data that could have the potential to damage the company in multiple
ways. Being part of the Information Security profession for many years, I have
been exposed to multiple situations that required confidently. Data Loss
Prevention (DLP) process is one of the more sensitive issues that I have
experienced in recent history.
DLP is the
process of ensuring that data is not transported to places it is not authorized
to be. Several applications can be used to review activities of employees
throughout the organization. Implementing DLP was sensitive subject as there is
a level of “monitoring of employee activities on devices that have company data
such as laptops and mobile devices. There was concern on how much monitoring is
needed to protect data and how much was too far. We settled only scanning
information for social security number, account numbers, and driver’s license
numbers. On mobile devices, an employee was required to input a PIN to access
the device. These profiles were reviewed by legal and senior management. There
is a legal component when monitoring employees along with the basic ethical
challenge on how much monitoring is crossing an ethical line.
To ensure
confidently of DLP alerts, a process was created that had my team directly
report alerts to Human Resources. Information Security would review all
employees’ activities as mention earlier, which included IT and senior
management. Due to the sensitivity nature of DLP, it was decided that Human
Resources would take the lead on investigations or issues with employees. Alerts
could be trigger not only for violation of data practices, but also
unauthorized activities on the internet, such as looking up inappropriate
pictures on the internet. Regardless of the violation, HR would be the most
appropriate area to address these violations.
Unit 2 Discussion 1 David Keller
Requires A Response
Response From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
This is a difficult question to answer since there isn’t much information to go on. For starters, critical thinking will be easier for them since they don’t work for the company full time. This helps remove biased opinions, stress and other factors that may influence the decisions made. Based on the type of breach and information found so far, critical thinking may help piece together a theory on how the attack was conducted, where to look for more evidence, and different security controls measures to put into place as a few examples. If done properly it should help create a thorough analysis and evaluation of the issue and reduce the chance of looking over or missing something.
Unit 6
Discussion 2 Post 2 Davis
Response to Davis from: Miss.
Bayo Elizabeth Cary, AA, BA, MLIS
I agree with
Apple. Because while building a backdoor into an encryption mechanism that is
knowingly flawed for future exploitation. Creating encryption tools with a
vulnerability to make it easier for everyone both good and bad which defeats
the purpose of cryptography.
For example, "In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession." Tim Cook
Tim was modest when he stated, "in someone's physical possession."
He should have worded it slightly different and stated: "in anyone's physical possession." Backdoors will have the potential to do the same exact thing on a global scale for multiple entities. Imagine the possibilities for unrelenting cyber warfare on the infrastructure of all countries in all industry sectors. The actual concern is that if there is a backdoor(s), there is always the potential for the backdoor(s) to be closed and opened again by anyone or group.
Apple, The FBI And iPhone Encryption: A Look At What's At Stake (n.d.). Retrieved fromhttp://www.npr.org/sections/thetwo-way/2016/02/17/467096705/apple-the-fbi-and-iphone-encryption-a-look-at-whats-at-stake
For example, "In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession." Tim Cook
Tim was modest when he stated, "in someone's physical possession."
He should have worded it slightly different and stated: "in anyone's physical possession." Backdoors will have the potential to do the same exact thing on a global scale for multiple entities. Imagine the possibilities for unrelenting cyber warfare on the infrastructure of all countries in all industry sectors. The actual concern is that if there is a backdoor(s), there is always the potential for the backdoor(s) to be closed and opened again by anyone or group.
Apple, The FBI And iPhone Encryption: A Look At What's At Stake (n.d.). Retrieved fromhttp://www.npr.org/sections/thetwo-way/2016/02/17/467096705/apple-the-fbi-and-iphone-encryption-a-look-at-whats-at-stake
Response, from: Miss.
Bayo Elizabeth Cary, AA, BA, MLIS
Thank you, for bringing your
concerns, to my attention. I university, has no ownership, over a students’
homework. I own what I produce, just like other students, have some rights,
regarding what they produce. If the University hired me, and I was hired to
teach, i.e.: “Publish or Parrish,” then-the University, could argue with me,
about ownership rights. I, the student-alone, produce what I right.
When something is posted, with a
limited amount of information, regarding who the authors are, then-an
interested individual, could inquire, as to who produced the original. When,
protecting the privacy rights of others-I as a journalist, am not required, to
provide full contact information, or full permissions, to utilize resources.
I am not stealing information, or pretending, like
someone else's work is my own. As, it makes you-personally
uncomfortable-although, I have not broken any US rules, or guidelines, in-regards-to
educational privacy, ownership rights, or publication attributions, I will not
longer, seek to include, anyone else's comments, in my blog. I am unhappy in America. You are correct. I want to leave,
and police stole my passport. I am being tortured, and abused, and I share my
experiences, as part of my homework, because-IT security issues, are ruining my
life. Thank you for caring.
I am flying to DC this weekend, to speak
to: FBI, CIA, a judge, and the NAACP, about the continued police beatings,
the unbearable pain, the medication that my health care continues to refuse to cover, and the continuing need I
have, to replace my Passport. If you have any other concerns, please contact
me right away-through the class discussion board. I am not receiving, my: post
mail, emails, or phone calls. I think there is reason, and need for concern.
Miss. Bayo Elizabeth Cary, AA, BA, MLIS
Comments
Post a Comment