texas

Eagle Eye Networks acquires Panasonic Cloud Management Services Europe BV

Cloud-based video surveillance Eagle Eye Networks has acquired Panasonic Cloud Management Services Europe BV (PCMSEU), whose flagship products are Panasonic Cameramanager and Panasonic Nubo. The two companies operate in the same market cloud-based video surveillance with Eagle Eye Networks the dominant force in North America and PCMSEU the clear European leader. PCMSEU operates more cloud-recorded cameras than any other company in Europe by some distance.

The acquisition of CMSEU gives Eagle Eye Networks a bridgehead into the European market and creates a truly global player in a still nascent cloud surveillance market that is growing at a much faster rate than the conventional DVR/NVR segment. Panasonic Cloud Management Services Europe BV will be renamed Eagle Eye Networks BV. Serving as the European headquarters for Eagle Eye, the European giant will now sell and support the expanded Eagle Eye product line. Our dealers in Europe have responded with overwhelming support for this acquisition. It will greatly enhance our sales and support efforts in the European market, said Dean Drako, CEO of Eagle Eye Networks. The strong and experienced team in cloud video surveillance at our new Eagle Eye EMEA headquarters will make it possible for us to provide a tremendous level of support to all of our dealers in the region. Eagle Eye Networks are exhibiting at IFSEC International between 20-22 June 2017 at London ExCeL. You will find th em on stand C1025 . Get your free badge now.

The Eagle Eye NuboCam All PCMSEU employees will be retained following the deal. Cameramanager co-founders Rishi Lodhia and Tijmen Vos will remain with the company as managing director and technical director of Eagle Eye Networks EMEA respectively. Said Rishi Lodhia: This is a unique opportunity to bring two pioneers in cloud video surveillance together and deliver a broad portfolio of innovative cloud surveillance solutions. Eagle Eye and Cameramanager dealers worldwide will now have a wider selection of cloud video products to meet their customers needs. Panasonic Cameramanager, on which small and medium businesses can watch and manage live and recorded surveillance footage from their smartphone, will be renamed Eagle Eye CameraManager. Eagle Eye plans to expand global sales of CameraManager to meet demand for direct camera to cloud connectivity. CameraManager cloud surveillance products boast optional storage methods, motion detection, push notifications and cloud based video analytics. Lacking the onsite bridge device of the Eagle Eye Cloud Security Camera VMS, the CameraManager solution can be more cost-effective for smaller camera counts per location. Eagle Eye Cameramanager Eagle Eye Networks BV will continue to sell Eagle Eye Cloud Security VMS in Europe to customers that prioritise camera interoperability and have high camera counts.

Eagle Eye Cloud Security Camera VMS supports more than 1,000 different digital cameras, over 10,000 different analogue cameras, up to 10 years of video retention and very large camera counts. Panasonic Nubo, which becomes Eagle Eye NuboCam, is an LTE camera and was the world s first mobile video monitoring surveillance camera when it launched in 2015. Datacenters Eagle Eye Networks operates datacenters in California, Texas, Canada, Japan (two), the UK and thanks to the acquisition two in the Netherlands. Eagle Eye Networks are exhibiting at IFSEC International between 20-22 June 2017 at London ExCeL. You will find th em on stand C1025 . Get your free badge now. Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

Public security – Wikipedia

From Wikipedia, the free encyclopedia See also: public safety

Public security is the function of governments which ensures the protection of citizens, organizations, and institutions against threats to their well-being and to the prosperity of their communities.1

To meet the increasing challenges in the public security area, responsible public institutions and organisations can tap into their own intelligence to successfully address possible threats in advance. They optimise their internal structures, use synergies, and carefully balance costs and benefits of their measures.

Framework

Organised crime and international terrorism are hardly deterred by geographical, linguistic, or financial barriers. Competence and administrative hurdles play into their hands. The latter has largely contributed to public security becoming an important political and economic issue, nationally as well as internationally. Politics, public organisations and businesses closely collaborate to guarantee public security and maintain a stable environment for economic prosperity.

Although public security significantly contributes to the attractiveness of a location, the productivity of its people, and hence the overall success of an economy, the sector frequently suffers from low budgets, limited resources, and inadequate information systems. Large events, pandemics, severe accidents, environmental disasters, and terrorism attacks pose additional threats to public security and order.

The police, federal police and border authorities nonetheless need to warrant the security of the country as a fundamental prerequisite for the domestic political ability to act. The quality and scope of potential threats have changed significantly, and the tasks and general framework for the police, federal police and border authorities have changed accordingly.

National

Regional

Local

Sub-sectors

There are five sub-sectors within public security:

Law enforcement

Police Services:

Intelligence and information sharing

Emergency Management

Emergency Services:

Justice

Justice Services:

Interior services:

Global public security

See also: Criminal justice system

  • There are ever new hot spots and crises representing new challenges for public security globally
  • A worldwide collaboration across all areas of public security becomes ever more important due to global threats
  • The vision of politics and the industry is maximum integration of all organisations and systems
  • This vision is reflected in the past, current, and expected future investments
  • International congresses and fairs are also dominated by issues of optimal integration / collaboration

See also

External links

  1. ^ http://cradpdf.drdc-rddc.gc.ca/PDFS/unc131/p538238_A1b.pdf

Authority control

Public Security - Wikipedia Retrieved from “https://en.wikipedia.org/w/index.php?title=Public_security&oldid=737632978

Public health surveillance

From Wikipedia, the free encyclopedia

Public health surveillance (also epidemiological surveillance, clinical surveillance or syndromic surveillance) is, according to the World Health Organization (WHO), “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.”1 Public health surveillance may be used to “serve as an early warning system for impending public health emergencies; document the impact of an intervention, or track progress towards specified goals; and monitor and clarify the epidemiology of health problems, to allow priorities to be set and to inform public health policy and strategies.”1

The term applies to surveillance of populations and is distinct from active surveillance, which applies to individuals. Techniques of public health surveillance have been used in particular to study infectious diseases. Many large institutions, such as the WHO and the CDC, have created databases and modern computer systems (public health informatics) that can track and monitor emerging outbreaks of illnesses such as influenza, SARS, HIV, and even bioterrorism, such as the 2001 anthrax attacks in the United States. Many regions and countries have their own cancer registry, one function of which is to monitor the incidence of cancers to determine the prevalence and possible causes of these illnesses.

Other illnesses such as one-time events like stroke and chronic conditions such as diabetes, as well as social problems such as domestic violence, are increasingly being integrated into epidemiologic databases called disease registries that are being used in cost-benefit analysis in determining governmental funding for research and prevention. Systems that can automate the process of identifying adverse drug events, are currently being used, and are being compared to traditional written reports of such events.2 These systems intersect with the field of medical informatics, and are rapidly becoming adapted by hospitals and endorsed by institutions that oversee healthcare providers (such as JCAHO in the United States). Issues in regards to healthcare improvement are evolving around the surveillance of medication errors within institutions.3

Syndromic surveillance

See also: Disease surveillance

Syndromic surveillance is the analysis of medical data to detect or anticipate disease outbreaks. According to a CDC definition, “the term ‘syndromic surveillance’ applies to surveillance using health-related data that precede diagnosis and signal a sufficient probability of a case or an outbreak to warrant further public health response. Though historically syndromic surveillance has been utilized to target investigation of potential cases, its utility for detecting outbreaks associated with bioterrorism is increasingly being explored by public health officials.”4

The first indications of disease outbreak or bioterrorist attack may not be the definitive diagnosis of a physician or a lab.

Using a normal influenza outbreak as an example, once the outbreak begins to affect the population, some people may call in sick for work/school, others may visit their drug store and purchase medicine over the counter, others will visit their doctor’s office and other’s may have symptoms severe enough that they call the emergency telephone number or go to an emergency room. Syndromic surveillance systems monitor data from school absenteeism logs, emergency call systems, hospitals’ over-the-counter drug sale records, Internet searches, and other data sources to detect unusual patterns. When a spike in activity is seen in any of the monitored systems disease epidemiologists and public health professionals are alerted that may be an issue. An early awareness and response to a bioterrorist attack could save many lives and potentially stop or slow the spread of the outbreak.

The most effective syndromic surveillance systems automatically monitor these systems in real-time, do not require individuals to enter separate information (secondary data entry), include advanced analytical tools, aggregate data from multiple systems, across geo-political boundaries and include an automated alerting process.5

A syndromic surveillance system based on search queries was first proposed by Gunther Eysenbach, who began work on such a system in 2004.6 Inspired by these early, encouraging experiences, Google launched Google Flu Trends7 in 2008. More flu-related searches are taken to indicate higher flu activity. The results closely match CDC data, and lead it by – 1 2 weeks. The results appeared in Nature.8 More recently, a series of more advanced linear and nonlinear approaches to influenza modelling from Google search queries have been proposed.9 Extending Google‘s work researchers from the Intelligent Systems Laboratory (University of Bristol, UK) created Flu Detector;10 an online tool which based on Information Retrieval and Statistical Analysis methods uses the content of Twitter to nowcast flu rates in the UK.11

Influenzanet

Influenzanet is a syndromic surveillance system based on voluntary reports of symptoms via the internet. Residents of the participant countries are invited to provide regular reports on the presence or absence of flu related symptoms. The system has been in place and running since 2003 in the Netherlands and Belgium. The success of this first initiative led to the implementation of Gripenet in Portugal in 2005 followed by Italy in 2008 and Brasil, Mexico, and the United Kingdom in 2009.

Laboratory-based surveillance

Some conditions, especially chronic diseases such as diabetes mellitus, are supposed to be routinely managed with frequent laboratory measurements. Since many laboratory results, at least in Europe and the US, are automatically processed by computerized laboratory information systems, the results are relatively easy to inexpensively collate in special purpose databases or disease registries. Unlike most syndromic surveillance systems, in which each record is assumed to be independent of the others, laboratory data in chronic conditions can be theoretically linked together at the individual patient level. If patient identifiers can be matched, a chronological record of each patient’s laboratory results can be analyzed as well as aggregated to the population level. Laboratory registries allow for the analysis of the incidence and prevalence of the target condition as well as trends in the level of control. For instance, an NIH-funded program called the Vermedx Diabetes Information System12 maintained a registry of laboratory values of diabetic adults in Vermont and northern New York State in the US with several years of laboratory results on thousands of patients.13 The data included measures of blood sugar control (glycosolated hemoglobin A1C), cholesterol, and kidney function (serum creatinine and urine protein), and were used to monitor the quality of care at the patient, practice, and population levels. Since the data contained each patient’s name and address, the system was also used to communicate directly with patients when the laboratory data indicated the need for attention.

Out of control test results generated a letter to the patient suggesting they take action with their medical provider. Tests that were overdue generated reminders to have testing performed. The system also generated reminders and alerts with guideline-based advice for the practice as well as a periodic roster of each provider’s patients and a report card summarizing the health status of the population. Clinical and economic evaluations of the system, including a large randomized clinical trial, demonstrated improvements in adherence to practice guidelines and reductions in the need for emergency room and hospital services as well as total costs per patient.141516 The system has been commercialized and distributed to physicians, insurers, employers and others responsible for the care of chronically ill patients. It is now being expanded to other conditions such as chronic kidney disease. A similar system, The New York City A1C Registry,17 is in used to monitor the estimated 600,000 diabetic patients in New York City, although unlike the Vermont Diabetes Information System, there are no provisions for patients to have their data excluded from the NYC database. The NYC Department of Health and Mental Hygiene has linked additional patient services to the registry such as health information and improved access to health care services.

As of early 2012, the registry contains over 10 million test results on 3.6 million individuals. Although intended to improve health outcomes and reduce the incidence of the complications of diabetes,18 a formal evaluation has not yet been done. In May 2008, the City Council of San Antonio, Texas approved the deployment of an A1C registry for Bexar County. Authorized by the Texas Legislature and the state Health Department, the San Antonio Metropolitan Health District19 implemented the registry which drew results from all the major clinical laboratories in San Antonio. The program was discontinued in 2010 for lack of funds.

Laboratory surveillance differs from population-wide surveillance in that it can only monitor patients who are already receiving medical treatment and therefore having lab tests done. For this reason, it does not identify patients who have never been tested. Therefore, it is more suitable for quality management and care improvement than for epidemiological monitoring of an entire population or catchment area.

See also

References

  1. ^ a b Public health surveillance, World Health Organization (accessed January 14, 2016).
  2. ^ Kilbridge PM, Campbell UC, Cozart HB, Mojarrad MG (Jul Aug 2006). “Automated Surveillance for Adverse Drug Events at a Community Hospital and an Academic Medical Center”. J Am Med Inform Assoc. 13 (4): 372 7. doi:10.1197/jamia.M2069. PMC 1513675Public Health Surveillance. PMID 16622159.
  3. ^ disa.mil PDF
  4. ^ “webcitation.org”. webcitation.org. Archived from the original on December 22, 2006. Retrieved 2014-04-18.
  5. ^ United States Centers for Disease Control and Prevention (WebCited/cached version)
  6. ^ Eysenbach G (2006). “Infodemiology: Tracking Flu-Related Searches on the Web for Syndromic Surveillance”. AMIA Annu Symp Proc. 2006: 244 8. PMC 1839505Public Health Surveillance. PMID 17238340.
  7. ^ “Google Flu Trends”. Google.org. Retrieved 2014-04-18.
  8. ^ Ginsberg J, Mohebbi MH, Patel RS, Brammer L, Smolinski MS, Brilliant L (2009). “Detecting influenza epidemics using search engine query data”. Nature. 457 (7232): 1012 4. doi:10.1038/nature07634. PMID 19020500.
  9. ^ Lampos, Vasileios; Miller, Andrew C.; Crossan, Steve; Stefansen, Christian (3 Aug 2015). “Advances in nowcasting influenza-like illness rates using search query logs”. Scientific Reports. 5 (12760). doi:10.1038/srep12760.
  10. ^ “GeoPatterns – Flu Detector – Tracking Epidemics on Twitter”. Geopatterns.enm.bris.ac.uk.

    Retrieved 2014-04-18.

  11. ^ Lampos V, De Bie T, Cristianini N (2010). Flu Detector – Tracking Epidemics on Twitter. ECML PKDD. pp.

    599 602. doi:10.1007/978-3-642-15939-8_42.

  12. ^ “vermedx.com”. vermedx.com. Retrieved 2014-04-18.
  13. ^ “MacLean CD, Littenberg B, Gagnon M. Diabetes Decision Support: Initial Experience with the Vermont Diabetes Information System in Community Primary Care. ”Am J Pub Health” 2006; 96:593-595″. Ajph.org.

    1970-01-01. Retrieved 2014-04-18.

  14. ^ Littenberg, B; MacLean, CD; Zygarowski, K; Drapola, BH; Duncan, JA; Frank, CR (Mar 2009). “The Vermedx Diabetes Information System reduces healthcare utilization.”. The American journal of managed care. 15 (3): 166 70. PMID 19298097.
  15. ^ Maclean, CD; Gagnon, M; Callas, P; Littenberg, B (Dec 2009). “The Vermont diabetes information system: a cluster randomized trial of a population based decision support system.”. Journal of general internal medicine. 24 (12): 1303 10. doi:10.1007/s11606-009-1147-x. PMC 2787948Public Health Surveillance. PMID 19862578.
  16. ^ Khan, S; Maclean, CD; Littenberg, B (Jul 2010). “The effect of the Vermont Diabetes Information System on inpatient and emergency room use: results from a randomized trial.”. Health outcomes research in medicine. 1 (1): e61 e66. doi:10.1016/j.ehrm.2010.03.002. PMC 2958673Public Health Surveillance. PMID 20975923.
  17. ^ 1 Archived June 9, 2007, at the Wayback Machine.
  18. ^ “Frieden, Thomas R; “Letter: New York City’s Diabetes Reporting System Helps Patients and their Physicians”; ”American Journal of Public Health”; July 16, 2006″. Ajph.aphapublications.org.

    1970-01-01. Retrieved 2014-04-18.

  19. ^ “Metropolitan Health District”. Sanantonio.gov.

    Retrieved 2014-04-18.

Public Health Surveillance Retrieved from “https://en.wikipedia.org/w/index.php?title=Public_health_surveillance&oldid=730086733

Attack Stopped, Gunman Wounded by Armed Security Guard in …

TXMan

In San Antonio, Texas, over the weekend, an attack on a restaurant and movie theater was stopped by an armed security guard. The gunman first attacked a Chinese restaurant where he worked, firing at his co-workers and then chasing them into the parking lot. According to reports, Jesus Garcia, 19, then encountered a police cruiser, shooting out the officer s window before chasing one or more co-workers into a movie theater, firing multiple shots.

He wounded a bystander in the theater lobby, but luckily the man survived. Bexar County Sgt. Lisa Castellano, who was off duty and working as a security guard at the theater, chased Garcia into a bathroom, shooting him several times.

Garcia is now in stable condition and being held on a $10 million bond.

The attack was reportedly sparked when Garcia s girlfriend, who also works at the restaurant, broke up with him earlier in the day.

Watch the report from Happening Now:

Why Aren't Armed Security Guards Available To Protect Elementary …

Why did mass murderers like Adam Lanza and James Holmes, both with high IQ s, both gamers and both loners, choose their targets and kill Innocent adults and children who they had no previous contact with. Was it the infusion of violent video games were you kill hundreds of your enemy and earn points that influenced goofballs Adam Lanza and James Holmes in their bizarre world. Why were their targets unprotected, don t we deserve to go to a movie or send our children to school and not have to worry about some crazed wack job shooting up the place?

Adam Lanza the unhinged gunman who slaughtered 26 children and adults1 at Sandy Hook elementary school arrived with guns blazing blasting his way into the building, according to Connecticut State police. He was not voluntarily let into the school at all, Connecticut State Police Lt.

Paul Vance said at a Saturday morning press conference outside Sandy Hook Elementary School, where Adam Lanza unleashed one of the worst massacres in US history2 before committing suicide. He forced his way into the school.

Today, two of the Sandy Hook Elementary children were laid to rest, Noah Pozner and Jack Pinto, a New York Giants fan.

Adam Lanza a string bean-thin goth kid3 described by friends as a genius first shot his mother then drove to the school in her car with at least three of her guns: a Glock and a SIG Sauer, and a .223-caliber Bushmaster rifle. And the gunman had access to even more guns than the trio found at the school cops recovered a .45-caliber Henry repeating rifle, a .22-caliber Marlin rifle, and a .30-caliber Enfield rifle, a law enforcement source told CNN.

Why did mass murderer James Holmes pick the Cinemark theater in Auroura out of all the movie theaters 4within 20 minutes of his apartment showing the new Batman movie that night.

It appears that the Cinemark theater in Auroura was the only one where guns were banned5 (legal concealed gun holders). In Colorado, individuals with permits can carry concealed handgun in most malls, stores, movie theaters, and restaurants.

But private businesses can determine whether permit holders can carry guns on their private property. Most movie theaters allow permit holders carrying guns.

But the Cinemark movie theater was the only one with a sign posted at the theater s entrance6. They also did not have armed Security Guards at the entrance like many of the other surrounding theaters did. Madman James Holmes researched and did surveillance on the nearby movie theaters and found the Cinemark movie theater 7a easy target with no customers armed in the theater and no armed Securtiy Guards on the property, no one to fight back.

I have been a private detective for almost 20 years in Florida and I have seen a lot situations with waring divorced parents in confrontations in school parking lots which could have escalated to violence if not for a armed Security Guard, everybody in Florida has a gun.

Maybe they might want to rethink there choice: Aug 29, 2012 Norcross GA, When Tina Mack dropped off lunch to her son at Palmer Elementary School this morning, she wondered: What happened to the security guard8?

Her son, now in fourth grade, has attended Palmer since kindergarten. The school s had security every year until now. This is honestly the first time I can say I don t feel safe sending him there, she said9. Security guards at Cheston, Forks, Palmer, March, Shawnee, Tracy and Paxinosa elementary schools were eliminated as part of the Easton Area School District s layoffs for 2012-13. We don t have security guards at the elementary schools any longer10, board member Frank Pintabone said today.

Teachers are picking up that slack. .What the hell is this man thinking????

During the last couple of weeks I have taken an advanced firearms training course and also qualified for a Security Officer license under the supervision of Derek Jones.11 Over the years Derek Jones has received numerous certificates in criminal justice12. The University of Florida is just one of the schools. In May of 2008 Derek traveled to Ontario, California to become a NRA Law Enforcement Certified Firearm Instructor in a course sponsored by the Ontario Police Department.

He is proficient in criminal and investigation procedures, armed and unarmed security, firearms, weapons training and basic electronics.

Derek Jones passed on some of his wisdom to me, stating that the first line of defense for schools and movie theaters and malls and just about every other place where large groups of people and children congregate should be armed Security Guards with radios who could confront suspicious people and contact Law Enforcement immediately on the OUTSIDE of the building, before the perp gets into the building.

References

  1. ^ Adam Lanza the unhinged gunman who slaughtered 26 children and adults (www.nypost.com)
  2. ^ Adam Lanza unleashed one of the worst massacres in US history (www.nypost.com)
  3. ^ Adam Lanza a string bean-thin goth kid (www.nypost.com)
  4. ^ James Holmes pick the Cinemark theater in Auroura out of all the movie theaters (www.foxnews.com)
  5. ^ the Cinemark theater in Auroura was the only one where guns were banned (www.foxnews.com)
  6. ^ Cinemark movie theater was the only one with a sign posted at the theater s entrance (www.foxnews.com)
  7. ^ Cinemark movie theater (www.foxnews.com)
  8. ^ What happened to the security guard (community.ashworthcollege.edu)
  9. ^ This is honestly the first time I can say I don t feel safe sending him there, she said (community.ashworthcollege.edu)
  10. ^ We don t have security guards at the elementary schools any longer (community.ashworthcollege.edu)
  11. ^ Derek Jones. (djsfa.com)
  12. ^ Derek Jones has received numerous certificates in criminal justice (djsfa.com)

Daily Kos: Private Lives, Public Surveillance

Whether people think about this election s hot button issues in this framework or not, many of our country s so-called social issues are issues of privacy. While lawmakers fought over the economic and religious implications of hot topics like gay marriage, abortion, health care and cybersecurity1, they were essentially deciding what level of privacy Americans should be entitled to under the law, and how strictly the Constitution should be interpreted to provide or deny that privacy.

I thought about this struggle between the private lives of citizens and the public decisions of legislators and administrations when I saw a story from Texas about high school sophomore Natalie Hernandez suing her school following her expulsion. Hernandez was expelled from her high school because she refused to wear her school s name badge, which contains an RFID tracking device.

Hernandez says the badge violates her religion the badge is considered a mark of the beast and by forcing her to wear it, the school district is violating her First Amendment rights. After the school offered her a name badge without the tracking device, which she refused, the school expelled her.

I think the religious aspect of this case is not as important as the general question of privacy . Yes, the mark of the beast claim allows Hernandez to make a First Amendment argument, and in cases like Wisconsin v.

Yoder, the Supreme Court has made exceptions for religious beliefs in public education before. But there s more to this case than a school wanting to know where a student is, and a Christian student refusing to let them because of religious reasons. This case is a sign of privacy debates in the age of technology.

The obvious conflict in this case is the right to privacy of the students, versus the necessity of tracking them of the administration.

The school district argues that the RFID trackers are meant to keep students on the school premises during school hours, and to make sure that they re in class when they should be. The students argue that the school is unnecessarily tracking their every move for reasons that could easily be solved by other solutions and if the feed were accessible to others outside the school, they could put students in danger by making all of their movements traceable.

The second conflict is the how free schools are to begin with. With regards to constitutional rights to expression and privacy, schools are considered special places they re grouped with prisons and military bases in legal terms (prisons also often require tracking devices).

And while the US Supreme Court decided that students and teachers do not shed their constitutional rights to freedom of speech or expression at the schoolhouse gate in Tinker vs. Des Moines2, schools can still do things like search students lockers, place restrictions on their school newspapers, and limit free expression by implementing and enforcing dress codes because they must balance the rights of the students with the order and safety of the school.

It makes sense that teachers and school administrators would want to know where students are when they re at school if they re cutting P.E. and hanging out in the bathroom, or lingering a little longer at lunch than they should.

But the attendance-boosting RFID cards aren’t foolproof what s to say a student can t pass off their ID card to a friend to carry around for the day? Furthermore, can t teachers just pay attention to who is present and who isn’t by taking attendance, and making a round of the hallways once and again? It would certainly save money, those trackers can t be cheap.

To make students wear these tracking devices sets a dangerous precedent for limiting students privacy even further within an already restricted space, and put schools closer to prisons on the legal privacy spectrum.

It takes accountability away from students, who should show up to class of their own volition, and takes away accountability from teachers, who should be paying attention to keeping students in class. Perhaps this method of tracking could be used at schools for at-risk students or juvenile facilities where students have made past infractions and require more attention, but it’s excessive for the average kid at a public school that took longer to get to class than his peers.

Furthermore, Constitutional precedent only allows an invasion of students privacy to keep school order and to protect students safety. And while the RFID device does help to find where students are at all times and helps the administration ensure that students are in class when they say they are, this tracker badge requirement invades a student s privacy more than necessary for a school to keep order it s a disproportionate response, and shouldn’t be allowed to continue.

References

  1. ^ cybersecurity (www.politico.com)
  2. ^ Tinker vs.

    Des Moines (www.bc.edu)

Security guard opens fire, kills replacement at Houston shopping …

Posted on: 4:49 pm, November 25, 2012, by , updated on: 04:53pm, November 25, 20121

HOUSTON, Texas (CNN) Texas deputies say a security guard who recently lost his job opened fire and killed his replacement Saturday at a shopping center in Houston.

Authorities took the suspected gunman into custody after they say he shot and killed the victim.

Investigators say the company they worked for provided security for a food market.

Deputies learned even though the alleged shooter lost his job weeks ago, businesses at the shopping plaza still paid him when he continued to show up for work.

Officers say Saturday afternoon, November 24th he noticed another security guard working instead of him.

The security guard pulled his weapon and discharged it multiple times into our victim, a 38-year-old Hispanic male who unfortunately died at the scene. It s just a sad thing, Sgt. Robert Spurgeon with the Harris County Sheriff s Office said.

Customers described the suspect as someone who sometimes had run-ins with co-workers.

Deputies say it s unclear why the security guard lost his job.

References

  1. ^ (fox6now.com)

Real Texas PI: The Growing Trend of Unlicensed Private …

I have noticed through what I can see in advertising and promises on the internet, that there is a large increase in people and companies doing private investigation work without a license.

Where I see this glaring increase, is in companies that are offering pre-foreclosure “assessments” of properties for banks and lending companies. Legally, only 2 types of people can do this in Texas and they are both licensed entities. You have to have a license to be a Real Estate Broker and also a private investigator. What is being done is considered an investigation under the law. It is not a “grey area” or “maybe” could be an issue, this is out right illegal activity in the State of Texas. You can be fined for doing it and you can be fined for hiring an unlicensed person to do it.

The other commonly occurring unlicensed activity is “skip tracing” by companies and people that are not licensed investigators or investigations companies. Skip tracing is basically finding or locating a person who has “skipped out” on some type of financial obligation. I have noticed that process servers are advertising that they will do these locates for a fee. If they are not a licensed investigator, they are doing it illegally. Process servers are only allowed to “skip trace” someone that they are actually attempting to serve. They cannot charge for locating someone. They can only charge for serving that person.

I am not talking about state or governmental agencies that do similar work, they are obviously not required to be an investigations company.

Why am I concerned? It is hard enough to do business the right way and compete with others who do business the right way. It is not just illegal for these unlicensed companies to to this service, it is an unfair advantage, by not fulfilling the requirements to become a licensed company.

Whatever you do – don’t hire or use these unlicensed companies, and Stay Safe!

Softex Partners With McAfee By Joining The McAfee Security …

AUSTIN, Texas, Sept. 11, 2012 /PRNewswire/ — Softex, a leading provider of security products and solutions, today announced that it has joined the McAfee Security Innovation Alliance (SIA) partner program. As a member of the McAfee SIA program, Softex will develop a plug-in to the McAfee ePolicy Orchestrator (ePO) management console, which will enable enterprises for the first time to economically disable and manage lost or stolen laptops using the recently announced Softex SecureDisable PC anti-theft solution.

SecureDisable was developed in collaboration with Intel Corporation to provide a high value security solution powered by Intel Anti-Theft Technology (Intel AT) that can lock-down lost or stolen Intel processor-based notebooks and provide audit trails for compliance. It can be securely hosted in the cloud by Softex or hosted by enterprises and solution providers using enterprise software. With the McAfee ePO plug-in for SecureDisable, enterprise help-desks can deploy the software agent on ePO managed assets, view reports in the ePO dashboards, and use the ePO management console workflows to reactivate a lost or stolen machine.

“Softex is excited to work with McAfee ePO so that customers can benefit from their existing investments in McAfee products, and to enable them to manage the SecureDisable product using existing work flow consoles,” said Apurva Bhansali, CTO, Softex Incorporated.

“We are pleased to add Softex to the McAfee Security Innovation Alliance,” said Ed Barry, vice president of the Security Innovation Alliance, McAfee. “Our customers face growing challenges to secure their ePO managed assets, including the ability to track lost or stolen laptops. When SecureDisable is integrated with ePO, our customers will have a powerful new capability to manage their lost and stolen laptop assets from a console they already use and trust.”

“The collaboration between Intel and McAfee will enable enterprise customers who have deployed laptops or Ultrabook devices with Intel Anti-Theft Technology to use the McAfee ePO security management console as a single solution to manage diverse security products, including data and asset protection to deliver stronger enterprise security” said Anand Pashupathy, General Manager, Intel Anti-Theft Technology, Intel Corporation.

About Softex

Austin, TX-based Softex Inc was founded in 1992. The company is a leading provider of computer security solutions and services. Softex serves many of the top tier OEM companies, such as Fujitsu, Lenovo, Hewlett-Packard, Motion Computing, IBM, and Samsung. For more information about Softex, visit www.softexinc.com1.

SOURCE Softex Inc.

References

  1. ^ www.softexinc.com (www.softexinc.com)

Security Guard Shot, Killed In Southeast Houston; Shooting Caught …

Home1 > Local2 > Security Guard Shot, Killed In Southeast Houston; Shooting Caught On Tape

A security guard was shot and killed in southeast Houston over the weekend. Now investigators are searching for the men who shot and killed that security guard on Saturday night.

According to reports, a group of men tried to walk into the Evergreen Game Room on Evergreen and Hemlock at about 11:30 p.m. The security guard met them at the door and tried to stop them from coming in. During the confrontation, one of the men shot the guard in the head; the guard was killed instantly.

As a result of intervening, the guard lost his life. The fatal incident was caught on surveillance tape and authorities are now hoping that they can find the men responsible for the shooting.

Investigators are reportedly looking for four men, including the black male in his mid-twenties that can be seen in the surveillance video. Police believe that the men had planned on robbing the game room. Anyone with information is urged to call Crime Stoppers: 713-222-TIPS (8477).

Tags: > > > > > > > 345678910

References

  1. ^ Home (news92fm.com)
  2. ^ View all posts in Local (news92fm.com)
  3. ^ (news92fm.com)
  4. ^ (news92fm.com)
  5. ^ (news92fm.com)
  6. ^ (news92fm.com)
  7. ^ (news92fm.com)
  8. ^ (news92fm.com)
  9. ^ (news92fm.com)
  10. ^ (news92fm.com)