264 DEAR HACKER
264 DEAR HACKER
embedded in the middle of the string, and they were not format- ted in any manner that would identify them as an SSN.
“Nevertheless, we sincerely apologize for this inadvertent error, which is completely inconsistent with our strict policies to pro- tect our clients’ privacy. Our internal policies limit the use of cli- ent SSNs for purposes other than tax preparation. Furthermore, our internal procedures require that mailing source codes are formulated in a manner that excludes use of any sensitive or confidential information. Please know that we have conducted
a thorough internal review of this matter, and are taking actions to ensure that this does not reoccur.”
So, not only are they sending me junk mail... they are sending me junk mail that exposes sensitive personal information.
drlecter
This is probably a lot more common than even the most paranoid among us fear. While these guys at least owned up to their huge mistake, one has to wonder why they would use that number in any way outside of having to report it to the tax people. It makes about as much sense as sticking your total income into a mailing label code. Such information has no business being used for other purposes. And yet it is—everywhere we look. We invite our readers to let us know whenever they see an SSN someplace where it shouldn’t be.
Dear 2600:
I was browsing the Internet at work and I wanted to check out some guitar tabs. I visited a site that usually offers tablature online. This is what I saw:
“Due to actions threatened by the National Music Publishers Association and the Music Publishers Association of America under the Digital Millennium Copyright Act, GuitarTabs.com is not offering guitar tablature at this time. We are currently evaluating our legal rights and options at this time, but unfor- tunately cannot offer tablature in the meantime. More infor- mation and updates on the situation can be found here. Check
T H E M A G I C O F T H E C O R P O R AT E W O R L D
Because of the money hungry corporations who would snatch candy from a baby, this is how we have to suffer. We will have to have pi- rated music tabs. Scanned PDF docs online. I guess it is illegal to have
a copy of a music sheet now. Come on. It’s like Metallica and these other bands aren’t rich enough that they have to punish people for sharing their music.
Kingpin It’s funny how this wasn’t even an issue years ago. Nobody in their wildest imagi-
nation would have thought sharing guitar tabs could somehow be a problem for anyone. We suspect that it’s not really a problem but instead is now being seen as another potential source of income.
Dear 2600:
I work for a small computer support company in the southeast United States. The job consists mostly of field calls that require almost no knowledge whatsoever—broken CD-ROM trays, unplugged network cables, etc. On occasion I receive work orders to repair issues at a local hospital. The hospital is one of the largest in the region with almost 100 independent practices partnered with the 500+ bed facility. I received
a work order in January to “revamp” the network for a practice. The networking closets for these independent practices are still controlled by the hospital’s management company.
I called the phone number located on a sign that was attached to the locked closet door. A young lady answered the phone and explained that I would have to come to their office and get the key. I ran across the street to their office and talked to the receptionist whom I had just called. She gave me a puzzled look and asked if I wanted a main- tenance key or a telecom key. I told her telecom followed by which building the closet was located in. She opened a wall locker and pulled out a key with a tag attached to it. She asked for my name, company, and cell phone number. I pulled out my wallet as I answered the