Author Archives: Robert McKay Jones

Robert McKay Jones

I have spent more than 25 years working hand in hand with clients in creating custom software applications that improve and enhance their operation, productivity and visibility.

Trojan Warning

Please be aware of a Trojan that is spreading itself by an email being sent from resume-thanks@google.com with a subject Thank you from Google! There is an attachment to this email that should not be opened under any circumstance.  The attached file contains a Trojan that will infect your computer.

Posted in http://www.trif.com.

On-Line Collaboration

Have you been looking for a way to collaborate with many people in your group, organization or family?  I stumbled on a very simple to use on-line service that allows you to do just that.  It is intuitive and versatile.  It provides a shared workspace for files and discussions, tasks, calendar, database, reports or a blog.  More utility than Google Docs and Google Groups combined.  Check it out and sign up for a free trial.    http://signup.centraldesktop.com/tresource

Posted in http://www.trif.com.

Compliance with Massachusetts 201 CMR 17.00

The Office of Consumer Affairs and Business Regulation, pursuant to the authority granted to it by G.L. c. 93H, in November 2009 promulgated 201 CMR 17:00, a regulation setting standards for the protection of personal information of Massachusetts residents. The Division of Insurance reminds all of its licensees about their obligations under this regulation and the March 1, 2010 deadline for full compliance.

Any person that receives, stores, maintains, processes or otherwise has access to personal information acquired in connection with employment or with the provision of goods or services to a Massachusetts resident has a duty to protect that information. A “person,” for purposes of the regulation, may be an individual, corporation, association, partnership or other legal entity. Personal information includes a surname, together with a first name or initial, in combination with one or more of the following three data elements pertaining to that person: Social Security Number; driver’s license or state-issued identification card number; or financial account or credit or debit card number, with or without any other data element, such as a code, password, or PIN, that would permit access to the person’s financial account.
The duty includes the requirement that the person develops and maintain a comprehensive written information security program (“WISP”) to safeguard such information. If the person electronically stores or transmits personal information, the WISP must include a security system covering the person’s computers and any portable and/or wireless devices. Safeguards should be appropriate to the size, scope and type of the person’s business, to the person’s available resources, to the amount of stored data and to the need for security and confidentiality of consumer and employee information. They must be consistent with safeguards for the protection of personal information, and information of a similar character, that are set out in any state or federal regulations that apply to the person.
A WISP must provide administrative, technical and physical safeguards for personal information under 201 CMR 17.00. It must address a wide range of matters that include, but are not limited to:

  • Designation of the individuals who will oversee and maintain the WISP;
  • Analysis of the reasonably foreseeable risks to the security, confidentiality and integrity of records, in any form, that contain personal information, of the effectiveness of any current safeguards for limiting those risks, and of the need to develop improved safeguards;
  • Policies and procedures relating to employee training on the importance of the WISP, its specific requirements, the consequences of failure to comply with those requirements, and prevention of access by former employees
  • For paper records, provisions for secure storage of materials containing personal information, including restrictions on physical access to such records and, for electronic records, control measures that restrict access and include secure user authentication protocols;
  • Encryption of personal information that is stored on computers, laptops or other portable devices or is transmitted across public networks or transmitted wirelessly;
  • Provisions to ensure that any electronic records system that is connected to the internet includes firewall protection and operating system security patches, that security software includes malware protections and virus definitions, and that all these programs are reasonably current as of March 1, 2010 and will be updated on a regular basis thereafter;
  • Oversight of third-party service providers who have access to personal information, including a process to select and retain service providers that are able to maintain appropriate security measures consistent with 201 CMR 17.00;
  • Regular monitoring to ensure that the WISP operates effectively to protect both paper and electronic records, to detect any unauthorized use of or access to personal information, and to identify any areas where upgraded safeguards are needed;
  • Review of the WISP’s scope at least annually, and whenever there is a material change in business practices that may reasonably implicate the protection of personal information; and
  • Documentation of responses to any breach of security and of any actions taken thereafter to change practices relating to the protection of personal information.

More information came be found in these PDF’s:

http://www.mass.gov/Eoca/docs/idtheft/201CMR1700reg.pdf

http://www.mass.gov/Eoca/docs/idtheft/201CMR17faqs.pdf

Posted in http://www.trif.com.

Are you a WINNER or a LOSER?

A list of 31 characteristics are listed for winners and losers. Below are the top 12. The gift here is that you can move things from one side to another.

For the complete list, click here: http://www.healthmoneysuccess.com/1795/33-differences-between-winners-and-losers/

Posted in http://www.trif.com.

Our Core Values

Welcome 2010.  In this new year, this new decade, we believe it is our values, more than any other attribute that will move us towards the goals we have for our company, our people and our clients. Our talents, capabilities and range of services are all important aspects of our differentiation, but at our core are these values. They lay the foundation for our business; the byproduct of which is our success, reputation and legacy. Without the dedication to these principles we cannot flourish, we cannot prosper.

We would hope that all companies, large and small, rededicate themselves to the basic principles of humanity and fair play. It is right. It is proper.

Posted in http://www.trif.com.

The Browser War

Are you curious who is winning the browser war?  Check out the graphic at http://www.axiis.org/. It will show you in no uncertain terms. Microsoft may be winning  but Firefox is close behind. Take a look. Microsoft IE versions are shades of blue. Firefox is orange and gaining ground. See it here.

Posted in http://www.trif.com.

Stumble Upon

Found some interesting art work at http://www.stumbleupon.com/. A site devoted to what people find interesting. And it is interesting. This for example was in the photography section as a popular link. This is a picture of a bridge built in Norway in 2005.  It was posted as picture of the day for December 10, 2009.  Photographed by  by Giorgio Ghezzi.

Posted in http://www.trif.com.

Kindle for your PC

Amazon has just released Kindle software for your PC.  If you already had a Kindle, all your books and publications will be immediately available.  Download here: http://www.amazon.com/gp/feature.html/ref=kcp_pc_mkt_lnd?docId=1000426311

So what is so great about this?  For one thing, you don’t always have your Kindle with you.  The best thing is your PC monitor is in color and the Kindle is gray scale.  Books you purchase in color are in color on your PC.  This is especially important for childrens books.

Another Kindle note – Amazon has just released a firmware update for your Kindle. A great new feature is screen orientation. You can switch display view to landscape as well as portrait. It is kind of a nice feature. 

Posted in http://www.trif.com.

Business Video? Really? Yes!

I started playing with video editing this past week. It’s not easy. But it is fun. Have a look at my first attempt. http://trif.com/video.htm. Combining video, text and sound can be daunting. It is easy to overdue because it’s hard to know when to stop. I have watched and learned a bit from Ross Jones, owner of Harvard Video in Harvard, MA. Ross produces business videos and has created some memorable moments for some people I know. Here are some examples:

http://www.jsclassicwoodworking.com/
http://www.selinamaitreya.com/video.html
http://www.progressiveenergyservices.com/video.htm

Have a look at these and check out http://harvardvideo.com/  and consider what a business video might do for your business.

Posted in http://www.trif.com.

Jay Leno’s Garage

Were you ever curious how Jay Leno gets all those great cars?  Jay Leno has more than 160 cars in his garage and half of them were delivered by our client Intercity Lines, Inc. based in Warren, Massachusetts.  Jay Leno posted a video describing the process when he recieved his 1963 Chrysler Turbine in a 53′ fully enclosed air ride trailer fitted with complete hydraulics to transport cars safely.  Only 50 of these cars were produced.  It’s claim to fame?  Engine was capable of 60,000 rpms and it could run on diesel, unleaded gas, jet fuel, kerosene or vegetable oil.  Also capable of running on tequila.

Check out the video http://www.trif.com/ICL/JayLeno.wmv and if you ever need a car transported from north to south, east to west or back again, check out the Intercity Lines web site: http://www.intercitylines.com/ or call them at 800-221-3936.  You can also find the video on Jay’s website http://www.jaylenosgarage.com/video/.

Posted in http://www.trif.com.