Print

Print


Tim - I think this is the same message my girlfriend got from her bank.
 
What concerns me is the phrase you highlight: they "would like you to use"
the software. As far as I can see this is your bank marketing a piece of
software which they support (and for which they no doubt receive some
consideration). The implication to those unused to this sort of thing will be
that, in order to bank with this firm, you NEED to install the software. As
many of us will be very aware, with the installation of any anti-malware
program there is a risk of conflicts with other software, incompatibility
with older browser versions etc.
 
Various discussions about this out on t'interwebs, e.g.
http://www.computing.net/answers/security/rapport-installed-problems/24888.ht
ml
<http://www.computing.net/answers/security/rapport-installed-problems/24888.h
tml>  

best wishes

Jonathan

Jonathan Baines 
Complaints Officer 
Legal and Democratic Services 
Buckinghamshire County Council 
tel: 01296 383681 
fax: 01296 382421 


________________________________

From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Tim Trent
Sent: 01 February 2010 00:09
To: [log in to unmask]
Subject: [data-protection] Banks and extra security layers


My bank is doing a lousy job at selling me an extra layer of security it
"would like me to use" for internet banking. They have failed to explain what
they mean and what the new service does.  It is Trusteer's Rapport service
which is a browser plugin. 

Apart from wondering about other plugins that might masquerade as this one I
have found the following paragraph on the Trusteer product description:

"Unauthorized attempts to access the browser or its communication are
automatically reported to the Trusteer cloud-based fraud analysis service.
The Trusteer team of fraud analysts works 24x7 analyzing this information
from customers all over the world, in order to identify new attack patterns.
Institutions registered for the Trusteer service receive immediate reports
and actionable alerts of new attacks, and can learn of attacks as they
happen, instead of days, weeks, and sometimes months later."


Nowhere does it state whether personal information is transmitted.  I doubt
that it is, but would be interested in knowledge that members may have of
this and similar services.  My first instinct is always to be sceptical of
services that an institution wishes me to install.


Also, when you ask your users to deploy something, how well do you sell the
idea to them? And do you recognise that some methods of doing this raise user
hackles instead of acting as a salve to the users?


________________________________


Tim Trent - Consultant
Tel: +44 (0)7710 126618
web: ComplianceAndPrivacy.com - where busy executives go to find the news
first
personal blog: timtrent.blogspot.com/ - news, views, and opinions
personal website: Tim's Personal Website <http://www.trent.karoo.net>  - more
than anyone needs to know


Marketing by Permission
<http://feeds.feedburner.com/~r/MarketingByPermission/~6/1>  

Important: This message is private and confidential. If you have received
this message in error, please notify us and remove it from your system. This
email and any attachment(s) are believed to be virus-free, but it is the
responsibility of the recipient to make all the necessary virus checks. This
email and any attachments to it are copyright of Meadowood Associates, owners
of Compliance And Privacy, unless otherwise stated. Their copying,
transmission, reproduction in whole or in part may only be undertaken with
the express permission, in writing, of Meadowood Associates, at Meadowood
House, 30 Redditch, Bracknell, Berkshire, RG12 0TT.


________________________________

All archives of messages are stored permanently and are available to the
world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the
email if you are receiving emails in HTML format):

*	Leaving this list: send leave data-protection to
[log in to unmask] <mailto:[log in to unmask]&BODY=LEAVE
data-protection>  
*	Suspending emails from all JISCMail lists: send SET * NOMAIL to
[log in to unmask] <mailto:[log in to unmask]&BODY=SET * NOMAIL>  
*	To receive emails from this list in text format: send SET
data-protection NOHTML to [log in to unmask]
<mailto:[log in to unmask]&BODY=SET data-protection NOHTML>  
*	To receive emails from this list in HTML format: send SET
data-protection HTML to [log in to unmask]
<mailto:[log in to unmask]&BODY=SET data-protection HTML>  

All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an
otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner
[log in to unmask]

(Please send all commands to [log in to unmask] not the list or the
moderators, and all requests for technical help to [log in to unmask],
the general office helpline)

________________________________


Buckinghamshire County Council
Visit our Web Site : http://www.buckscc.gov.uk
Buckinghamshire County Council Email Disclaimer
This Email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed.
The views expressed in this email are not necessarily those of Buckinghamshire County Council unless explicitly stated.
If you are not the intended recipient, the use of information by disclosure, copying, retention, distribution or any further processing is prohibited and may be unlawful. If you have received this email in error please notify the system manager at [log in to unmask]
This footnote also confirms that this email has been swept for content and for the presence of computer viruses.
End of disclaimer


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^