Saturday, May 23, 2020

Online Sources for Nursery Tree Purchase and Delivery

High-quality seedlings can be found at reasonable prices on the Internet. You just have to know where to look. Try these sites the next time you need to purchase trees. They have been picked because of the  convenience of online ordering, ease of site navigation and reputation. Note that these businesses are well established and have been growing trees for decades. They know how to do it right. Nurserymen.com Based in Grand Haven, Michigan,  Nurserymen.com  is a third generation business with an extraordinary selection of seedling conifers and sold as bare root and in plug containers. Not as extensive but just as attractive are their hardwood seedlings. They sell out early so request your order at least six months in advance. I ordered 50 bare root Eastern redcedars in December to be planted in Alabama. There was a March delivery from Michigan and I planted the seedlings in early April with a nearly 100 % survival rate. Virginia Department of Forestry The only government supplier of trees on this list, VDOF has been in the seedling business for over 90 years. They offer hundreds of conifers, hardwoods, and specialty packs. Their  website is customer friendly very easy to use. VDOF provides an online catalog. Seedling costs are very reasonable and are mostly sold as bare-root planting stock. The best values are in quantities of 1000 and only sold during the dormant season. Arbor Day Tree Nursery The Arbor Day Foundation is a pioneer in tree promotion and care. I have been a member for years and get my annual bundle of seedlings that come  with the membership. Their nursery  includes a wide variety of fruit, nut, and flowering trees and you can get a significant member discount on bulk wildland trees for planting tracts with large acreage. Musser Forests Based in Indiana County, PA., Musser Forests has been growing quality plants for over 70 years. They offer hundreds of conifers and hardwoods plus their online store is well constructed, easy to use and has the largest selection of tree varieties found anywhere. Musser provides a free catalog and valuable information on tree care and planting. Seedling cost ranges widely according to species and size. Gurneys Seed and Nursery Company Based in Greendale, IN., Gurneys has been in the tree and plant business since 1866 and sells all types of nursery stock, including landscape trees, shrubs and fruit trees. Gurneys is one of the leading seed and nursery companies in the United States and very much present online. I particularly like their Official Blog and YouTube videos. They offer the top-rated flowering trees, shade trees,  and trees for windbreaks. The Nursery at TyTy The TyTy, Georgia-based TyTy Nursery has been in the tree nursery and flower bulb business since 1978. This family business promises to provide each and every customer with the best product, fastest delivery, lowest price, and overall best service for your money. They are also one of the largest tree seedling sources online with an outstanding YouTube collection of how to plant videos.

Monday, May 11, 2020

Data Protection and Theft - Free Essay Example

Sample details Pages: 4 Words: 1122 Downloads: 8 Date added: 2017/06/26 Category Information Systems Essay Type Narrative essay Did you like this example? DATA PROTECTION AND THEFT Forms of Data in Law Firms The (Indian) Information Technology Act, 2000 (hereinafter referred to as the Act) deals with the issues relating to payment of compensation (Civil) and punishment (Criminal) in case of wrongful disclosure and misuse of personal data and violation of contractual terms in respect of personal data. Data is defined under Section 2(o) of the information Technology Act, 2000 as: à ¢Ã¢â€š ¬Ã…“data means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer; à ¢Ã¢â€š ¬Ã…“ Law firms have an immense pool of critical and private data and its usage in any other manner, other than the instruction of the clie nt raises an ethical and legal question. In order to obtain legal advice a client often confide with the law firm with embarrassing details, classified information, future plans. Therefore it is of utmost importance that such data be protected. Additionally, it is to be noted that the obligations of law firms to protect confidential data begins only after the creation of a relationship of an attorney and client.[1] Furthermore, The Indian Evidence Act, 1872 under sections 126 to 129 deals with the privileged communication that is attached to professional communication between a legal adviser and the client. It prohibits attorneys from disclosing any communications exchanged with the client and stating the contents or conditions of documents in possession of the legal advisor in course of and for the latters employment with the client. The responsibility which is carried by the attorney while discussing with the client, is also to be maintained within a law firm which engages t he services of various attorneys. Don’t waste time! Our writers will create an original "Data Protection and Theft" essay for you Create order Effect and obstacles to data theft The electronic nature of data leaves a gaping hole for exploitation and therefore theft largely goes unnoticed until the revelation by the perpetrators of such theft. Further the effect of data theft in a law firm shall result in concealing such a fact from the client and the public in general to avoid any embarrassment, reputational damage and reduced client confidence for inability to take any action to curtail such theft. Section 72A of the Act provides that disclosure of information, knowingly and intentionally, without the consent of the person concerned and in breach of the lawful contract has been also made punishable with imprisonment for a term extending to three years and fine extending to INR 5,00,000 (Approx. US$ 10750). Further Section 72 of the Act provides for penalty for breach of confidentiality and privacy. The Section provides that any person who, in pursuance of any of the powers conferred under the Act, Rules or Regulations made thereunder, has secured access t o any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned, discloses such material to any other person, shall be punishable with imprisonment for a term which may extend to two years, or with fine which may extend to INR 100,000, or with both. Method of data protection Many of the vulnerabilities that exist in protection of data from theft exists due to the inadequacies present in the computer system administrators. Further, even if such loopholes are adequately covered by the programmers and administrators, the trust, freedom to work, enjoyed by the employees and advocates working with a law firm enable them to exploit such a position to their own advantage. Further by virtue of Section 43A of the Act, any body corporate including a firm may be held responsible for leak of sensitive information or data in case it is negligent in implementing and maintaining a reasonable security standards and procedure. Further in case any wrongful loss is caused in consequence of such leak, the firm shall be responsible to pay compensation as well as damages to such a person affected. In order to curb such misuse of data usage various firms employ various tactics. Titus Co., a law firm based out of New Delhi, does not allow temporary employees, or interns to c arry any mobile devices into their office premises. Reasonable security practices and procedures is defined under Explanation (ii) of Section 43A of the Act as security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment as may be specified in an agreement between the parties or as may be specified in any law for the time. Moreover the Government of India in conference of the powers granted under Section 87 read with Section 43A of the Act, framed the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 (hereinafter referred to as the Rules). Rule 3 of the Rules defines sensitive personal data or information as any information involving the financial information, passwords, physical, psychological condition, sexual orientation, biometric information or any clause of a contract. Further, Rule 4 and 5 of the Rules prescri bes that sensitive data and information held by a body corporate or any person on its behalf, then a privacy policy for handling of or dealing in personal information including sensitive personal data or information shall be prepared by the body corporate and it shall ensure that the same is available for view by such providers of information who has provided such information under lawful contract. Additionally, Rule 4 of the Rules states that disclosure of any personal data or information requires the prior permission of the provider of the information. It is pertinent to note that the Ministry of Communication and Information Technology, vide Press note dated 24.11.2011 has clarified that the Rules were applicable on law firms.[2] Moreover, the Bar Council of India, the statutory authority which regulates and represents the Indian bar mandates that an advocate shall not breach the obligations imposed upon him/her under Section 126 of the Indian Evidence Act. [3] Conclusion Undoubtedly, the concept of data theft and protection is at a nascent stage in India. Whoever there are reasons for jubilation with the Data Privacy Protection Bill, 2013 pending in the parliament. Further the framers of the Rules have attempted to adopt ideas from jurisdictions which have long standing and mature data protection regulations. These Rules are only therefore a first step. Moreover, stringent implementation of the law and healthy development of the data privacy and protection jurisprudence in the long run is what one needs to watch out for. [1] Kalikumar Pal v. RajkumarPal 1931 (58) Cal 1379, Para 5 [2] Ministry of Communication and Information technology, Press Note No. 11-7/2010-S-I(Pt. 1) [3] Bar Council of India Rules, Part VI, Chapter II, Section II, Rule 17.

Wednesday, May 6, 2020

Summary and Reflection Free Essays

The article contains a piece of history because in a way, it talks about how the Cold War started based on the point of view of an editor named Charles L. Mee. As can be readily ascertained from the title, the author is merely presenting his educated opinion pertaining to the contribution of different countries like the United States, Russia, Germany and other countries , their hidden conflict, how they acted and reacted, and how they each played their role in the beginning and ending of the Cold War. We will write a custom essay sample on Summary and Reflection or any similar topic only for you Order Now The author also discussed some of the so-called behind -the-scenes strategies that came into play which involved famous political figures, and he is leaning to the possibility that what these authorities did may have mitigated or aggravated the circumstances that further ignited the beginning of the Cold War (Mee, 2009). The author opens the article by painting a picture of two scenarios: The first one focuses on how President Truman expressed his uncensored sentiments about the Russians to Foreign Minister Molotov who only arrived to pay his respects to the remains of President Roosevelt, and the second one talks about how Winston Churchill kept thousand of captured German troops and prepare them against Russia (Mee, 2009). In both of these pictures, the author is trying to illustrate sarcastically that the behavior of these people was a sure fire way to start a conflict. It is not unknown to many that the Cold War began after the World War II. Sensitivity should be exercised at all cost during these trying times when talking about matter relevant to national security and diplomatic relations and the author is trying to say that these political figures showed the exact opposite of being sensitive. The author goes on to discuss how the different countries picked the strategy that would work best for their country economic- and military- wise, and they also picked on the countries which they would deem as allies. The Cold War resulted in a battle between the strongest of countries, the east against the west. This view of the author is strengthen when he mentions that the Big Three does not care about what happens to other countries as long as they did their part right and make sure that they can have everything going in their direction. He further extends his argument when he said that these contenders were just using the weak ones as pawns because during these times, the power is up for grabs and they need all the help they can get. The Big Three that the author is referring to are Joseph Stalin, Franklin Roosevelt, and Winston Churchill (Mee, 2009). How to cite Summary and Reflection, Papers

Friday, May 1, 2020

Security and Privacy Issues Associated with Social Media †Samples

Question: Discuss about the Security and Privacy Issues Associated with Social Media. Answer: Introduction The computer based technologies, which help for creating and sharing any type of data or information or ideas through several communication networks that are present virtually is known as social media. This social media has several features and aspects. The main feature is the interactive Web 2.0 applications (Bertot, Jaeger Hansen, 2012). The users have to create account in the application and thus can communicate with the entire world. There are several types of social media platforms in the modern world. The most popular are the Facebook, Twitter, Instagram, WhatsApp and many more. Facebook has the largest number of users, which crosses over almost thirty billion in number (Gundecha Liu, 2012). WhatsApp is the second most popular after Facebook. It came in the year 2009 and soon it gained popularity all over the world. In the year 2014, Facebook acquired WhatsApp for more profit. Currently, almost one billion users are using WhatsApp and it is the most significant popular messag ing and texting application. These social media applications are extremely popular for all the users and individuals especially for the youth generation (Chen Bryer, 2012). However, there are several security and privacy issues related to these social media platforms, which often turn out to be vulnerable for the society. The report covers a brief description about the security and privacy issues associated with social media. The report provides a detailed discussion on the challenges and problems occurred due to the security and privacy issues. The report also discusses about the relevant technologies of the social media and the impact of social media in modern society. The report further helps to understand what lessons are learnt from this discussion. Discussion Security and Privacy Issues in Social Media The social media is the most utilized applications in the modern world. Several types of social media are present in todays world. The most popular amongst them is the Facebook. A famous entrepreneur, namely Mark Zuckerberg created this very popular and user friendly application for its users (Smith et al., 2012). The users have to create accounts in the social media platform and then access their accounts. They can share information, photos, videos and many more. Above thirty billion people are there in Facebook. WhatsApp is the second most popular social media platform after Facebook. Around one billion users are using WhatsApp today. However, there is a negative side in every positive aspect. Security and privacy issues are extremely common in social media sites (Kavanaugh et al., 2012). The security and privacy issues often turn out to be absolutely vulnerable and dangerous for the society. These security issues mainly have a tremendous negative impact on the entire society and e specially for the youth generation, as they are mostly involved in the social media platforms. Problems The problems and the challenges that are common for the security and privacy issues associated with social media are as follows: Password: The most vulnerable and sensitive issue in any type of social media application is the password. The hacker or intruders often hack into the account by getting the passwords of the users (Taylor, Fritsch Liederbach, 2014). These types of attacks are known as the Brute Force Attacks. These are extremely common in any social media. The hacker or the intruder applies a specific software that helps to retrieve the password of the user and thus the hacker can use the account. Unauthorized Access: This is another major privacy issue in any social media application (Joe Ramakrishnan, 2014). The authorized access to the account of a particular user is not only dangerous but also illegal according to law and regulations. Either this authorized access can occur by hacking that is by entering into someones account without his/her permission or this access can be of unauthorized physical access (Berns, 2017). It is absolutely illegal to access someone elses computer, laptop, tablet or mobile phones without his/her permission. Leakage of Personal Information: This is another significant threat in case of security and privacy for any social media application (Trainor et al., 2014). Nowadays, every personal photo, video, audio is posted and shared with the social media friends by all users. The social and the personal life are opened in front of everyone. However, not everyone present in the social media is safe (Criado, Sandoval-Almazan Gil-Garcia, 2013). The hacker or the intruder gets all the personal information or data as soon as the victim enables all his/her photos or videos online. Relevant Technologies The technologies play the most significant roles in social media application. Any application needs technology for running (Berthon et al., 2012). The most relevant technologies utilized for the social media are as follows: i) Internet: Internet is the most important resource that is needed for any activity related to social media. Any type of application can only work if the device is enabled with Internet connectivity (Oliveira Welch, 2013). Without the Internet connection, even the hacker cannot hack any profile or account. Therefore, the most relevant technology is the Internet for social media. ii) Any Type of Systems: Any type of application requires a system or device to run on it. The second most relevant technology is any system. The mobile phones, the computers, the laptops, the tablets all of them are considered as systems (Gil de Ziga, Jung Valenzuela, 2012). Social media applications can only run if any type of systems is present or involved with it. Without the presence of systems, it is impossible to access any social media site. Impact of the Security and Privacy Issues The security and the privacy issues that are associated with the social media have an extremely strong impact on the society, especially for the youth generation, as they are the main users of these applications (Criado, Sandoval-Almazan Gil-Garcia, 2013). This impact is absolutely negative in nature and causes massive problem for the society. The main impact that is caused is the isolation or lack of communication outside the virtual world. People are not communicating in their social life and thus there social life is affected as they are more involved in the virtual world. The second impact is the health issues. This is mostly for the youth generation (Fuchs, 2017). They are not having any outdoor activity and thus several health issues are striking them like obesity, eye sight problem and many more. These impacts are extremely vulnerable for any individual. Most Important Lesson I have learnt an important lesson from the above discussion. Social media is needed for all human beings as this helps in making new friends. I have learnt that making new friends is not a problem, however depending on them and the social media application is not feasible. Moreover, the security and the privacy issues can be extremely dangerous for any user; therefore one should be careful about them. I have got the lesson that one should not share their personal information, photos, videos and other personal stuffs with any online friend. This can help them to be safe and secure. The next lesson that I have got from this discussion is that passwords should be changed and modified periodically for avoiding any type of hacking and one should not allow strangers to access their computers, laptops, tablets and mobile phones at any cost. Conclusion Therefore, from the above report the conclusion can be made that, social media are computer based technologies, which help for creating and sharing any type of data or information or ideas through several communication networks that are present virtually. This social media has several features and aspects. The main feature is the interactive Web 2.0 applications. The users have to create account in the application and thus can communicate with the entire world. There are several types of social media platforms in the modern world. The most popular are the Facebook, Twitter, Instagram, WhatsApp and many more. Facebook has the largest number of users, which crosses over almost thirty billion in number. WhatsApp is the second most popular after Facebook. It came in the year 2009 and soon it gained popularity all over the world. In the year 2014, Facebook acquired WhatsApp for more profit. Currently, almost one billion users are using WhatsApp and it is the most significant popular messa ging and texting application. These social media applications are extremely popular for all the users and individuals especially for the youth generation. However, there are several security and privacy issues related to these social media platforms, which often turn out to be vulnerable for the society. The above report describes about the security and privacy issues that are related to the social media. These security issues should be resolved as they are affecting to the modern society massively. The report has given a detailed discussion on the challenges and problems on the security issues of social media. The report also provided a brief description on the relevant technologies that are needed for social media and the impact of these issues on the society. The final part of the report has described about the lessons learnt from the above discussion. References Berns, N. S. (2017).Framing the victim: Domestic violence, media, and social problems. Routledge. Berthon, P. R., Pitt, L. F., Plangger, K., Shapiro, D. (2012). Marketing meets Web 2.0, social media, and creative consumers: Implications for international marketing strategy.Business horizons,55(3), 261-271. Bertot, J. C., Jaeger, P. T., Hansen, D. (2012). The impact of polices on government social media usage: Issues, challenges, and recommendations.Government information quarterly,29(1), 30-40. Chen, B., Bryer, T. (2012). Investigating instructional strategies for using social media in formal and informal learning.The International Review of Research in Open and Distributed Learning,13(1), 87-104. Criado, J. I., Sandoval-Almazan, R., Gil-Garcia, J. R. (2013). Government innovation through social media.Government Information Quarterly,30(4), 319-326. Fuchs, C. (2017).Social media: A critical introduction. Sage. Gil de Ziga, H., Jung, N., Valenzuela, S. (2012). Social media use for news and individuals' social capital, civic engagement and political participation.Journal of Computer?Mediated Communication,17(3), 319-336. Gundecha, P., Liu, H. (2012). Mining social media: a brief introduction. InNew Directions in Informatics, Optimization, Logistics, and Production(pp. 1-17). Informs. Joe, M. M., Ramakrishnan, D. B. (2014). A survey of various security issues in online social networks.International Journal of Computer Networks and Applications,1(1), 11-14. Kavanaugh, A. L., Fox, E. A., Sheetz, S. D., Yang, S., Li, L. T., Shoemaker, D. J., ... Xie, L. (2012). Social media use by government: From the routine to the critical.Government Information Quarterly,29(4), 480-491. Oliveira, G. H. M., Welch, E. W. (2013). Social media use in local government: Linkage of technology, task, and organizational context.Government Information Quarterly,30(4), 397-405. Smith, M., Szongott, C., Henne, B., Von Voigt, G. (2012, June). Big data privacy issues in public social media. InDigital Ecosystems Technologies (DEST), 2012 6th IEEE International Conference on(pp. 1-6). IEEE. Taylor, R. W., Fritsch, E. J., Liederbach, J. (2014).Digital crime and digital terrorism. Prentice Hall Press. Trainor, K. J., Andzulis, J. M., Rapp, A., Agnihotri, R. (2014). Social media technology usage and customer relationship performance: A capabilities-based examination of social CRM.Journal of Business Research,67(6), 1201-1208.