Subscribe free to our newsletters via your
. Solar Energy News .




INTERNET SPACE
SciTechTalk: Feel secure about your phone?
by Jim Algar
Washington DC (UPI) Feb 10, 2013


HP tightens worker rules for China suppliers
San Francisco (AFP) Feb 8, 2013 - US computer maker Hewlett-Packard said Friday it is cracking down on abuses of student workers and temporary labor used by its suppliers in China.

The move by HP came as Silicon Valley neighbor and rival Apple continued a program to improve conditions for employees at facilities in China that produce its coveted gadgets.

HP announced new guidelines for student and temporary workers in China intended to reinforce local labor laws and introduce "beyond regulatory expectations" for suppliers.

"Student and temporary workers are two very vulnerable groups within the Chinese workforce," said Sanna Johnson, executive director of the Center for Child Rights and Corporate Social Responsibility in China.

"They are often entering the workplace with limited experiences and support."

HP cooperated with the center on the changes.

"We have worked closely with leading Chinese stakeholders to develop our new student and temporary worker guidelines to ensure the highest standards of ethical workforce management," said HP senior vice president of supply chain operations Tony Prophet.

Along with mandating fair compensation, HP guidelines require that workers be free to quit or lodge grievances without facing reprisals.

The number of student workers must be limited to "acceptable levels" with the majority of employees having full-time status, according to HP. In addition, student workers' jobs must complement their primary areas of study.

HP said the new guidelines take effect immediately and that compliance will be tracked with ongoing audits as well as through a key performance indicator program that collects performance data about suppliers.

HP boasts an extensive supply chain that spans more than 45 countries and territories.

Apple last year ramped up its vigilance regarding underage workers, excessive overtime and other abuses at China plants contracted to make its devices.

You've lost your smartphone. Or more worrying, it may have been stolen. Like most people, you've entrusted it with more and more of your personal data. Your first thought: just how secure are those emails, contact list, work documents and that app to access your bank accounts?

Almost all smartphones offer some sort of "lock screen" option, many featuring a password, PIN or pattern of screen touches or swipe gestures the user can set up.

They offer a layer of security, to be sure, but are not foolproof, and some surveys have found fewer that half of smartphone owners have bothered to set up a lock screen option on their devices.

And since you're constantly using your smartphone in public, the method to unlock your phone could be visible to prying eyes.

"For example, a thief sitting on a bus may notice the four characters that an unsuspecting person entered on the person's smartphone," a patent application recently filed by Apple says.

The application, titled "Image-Based Authentication," suggests an entirely new take on securing a smartphone or other mobile device like a tablet computer.

The system, the application explains, would replace validation using text or touch by "(1) selecting at least one image that depicts one or more objects with which the user should be familiar, where the image is stored persistently on the computing device, and (2) displaying the image. An object may be a person's face, for example."

In other words, the security barrier intended to keep unwanted eyes out of your smartphone could be a picture of your favorite Aunt Claire, presented as your lock screen and requiring you to correctly identify who it is.

You know your Aunt Claire, of course; it's highly unlikely a thief does.

The patent application includes mention of "multiple rounds," suggesting layers of security by displaying more than one image that has to be correctly identified.

So, Aunt Claire; correct. Your dog Biscuit; correct. And that generic-looking shot of you on the beach? Malibu. Correct.

That would be a lot of text to enter, of course, so an image in the application suggests instead a list of possible identification answers could be presented along with the image; a convenient single tap on the right one would suffice.

Convenient is a significant word, and is likely why so many smartphone owners choose not to utilize any security technique. Who wants to have to enter a password, PIN or touch the four corners of the phone screen in a particular pattern every time the phone is whipped out?

So smartphone makers continue looking for ways to offer increased security for users they might consider convenient to use; fingerprint scanners and facial recognition using a phone's camera are being investigated by several manufacturers.

Still, whether it's a password, a swipe, a fingerprint or dearly beloved Aunt Claire, security will only work if the user uses it.

Which brings us back to the half of all smartphone owners who don't bother to secure the considerable chunk of their personal life they're blithely carrying about in public where it can be lost -- or worse.

Walking up to their bank's ATM, it's not likely they consider punching in their 4-digit PIN inconvenient. You'd think their smartphone -- and its contents -- are worthy of the same.

.


Related Links
Satellite-based Internet technologies






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








INTERNET SPACE
Sony faces challenge with new PlayStation
San Francisco (AFP) Feb 9, 2013
When Sony pulls back the curtain on the next-generation PlayStation videogame console, the world will see how much the Japanese consumer electronics titan has been paying attention. Sony could double-down on hardware to power even more realistic graphics and rich game play than the impressive specifications of PlayStation 3 consoles nearing the end of a life cycle started in 2006. Or, So ... read more


INTERNET SPACE
Hydrothermal liquefaction - the most promising path to a sustainable bio-oil production

Scientists turn toxic by-product into biofuel booster

Reaping Profits from Landfill Biogas

Versalis and Yulex partner to produce guayule-based biorubbers

INTERNET SPACE
Engineers Building Hard-working Mining Robot

Robofish Grace glides with the greatest of ease

Nexter joins robot development business

Game on: European student codes reach ISS

INTERNET SPACE
Mainstream Renewable Power Starts Building Wind Farm in Chile

Sabotage may have felled U.K. wind turbine

Hgcapital And Blue Energy Agree UK Wind Farm Investment Deal

Japan plans world's largest wind farm

INTERNET SPACE
Nissan profit tumbles on China, Europe woes

Japan's Suzuki sees April-December net profit rise 19%

Japan's Mazda swings back to profit

China auto sales hit record in January: industry group

INTERNET SPACE
US to decide soon on Canada pipeline project

Three Chinese doctors slain in north Nigeria: police

Chinese coal cuts to affect Australia

Argentina ups stakes in Falklands claim

INTERNET SPACE
Fukushima survivors to sue Japan government

Finland's TVO says reactor may be delayed until 2016

France debates nuke waste facility

World's First AP1000 Containment Vessel Top Head Ready

INTERNET SPACE
Diageo Transitions to 100 Percent Renewable Electricity at its North American HQ

China plans stricter fuel standards after smog

Outside View: Energy realism

Obama's energy secretary stepping down

INTERNET SPACE
Mixed forest provides beneficial effects

Paper giant APP promises no deforestation in Indonesia

Asian paper giant to halt deforestation

Measuring the consequence of forest fires on public health




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement