US Intelligence Agencies Urges Congress to Act Quickly on FISA Re-Authorization

Whether we admit it or not, the government of America is making all efforts to find the best way on how to protect its citizens against online criminals or hackers these days. On the other hand, there had been unwanted issues that the kind of protection it offers does not fully prevent those intruders and these types of people are continuously bothering millions of U.S. citizens for the past years.

 

Many are experiencing both civil and criminal concerns because despite the enforced laws of the authorities, the numbers of cybercrime victims are increasing each day and sometimes caused by the existing outdated passed laws.

 

Surely, the technology we have using the Internet opened the door wider to abusive people who intend to invade the privacy of their targeted victims. Even if there are surveillance platforms for online security, there are concerns on whether the government is sincere in protecting the public or not.

 

In line with this privacy issue, the latest reported news online revealed that the there are intelligence officials from the United States who are urging the lawmakers to “re-authorize” the existing Foreign Intelligence Surveillance Act (FISA). According to the published information, the officials want the Congress to expedite in re-authorizing the existing Section 702 of FISA to allow them perform mass surveillance to people who are using the Internet outside America.

 

They want the intelligence agencies to spy Internet users in bulk.

If the Congress granted the request, this means the agencies will have the consent to spy as well as keep the data they obtained online from people who are not residents of the United States.

 

According to the information about FISA (a surveillance program authorized by then former US President George W. Bush, it will expire on this coming 31st of December this 2017 if the Congress has no intention to renew this existing law.  As detailed through rt.com, the Senate Intelligence Committee on Tuesday (October 31, 2017) will have to vote about the re-authorization of Section 702 in private.

This is regardless that there is a request for a public debate on this matter.

In line with this, the NSA, CIA and former national intelligence directors had submitted a letter to the Congress to allow in removing and warrant-free secret conversation to pursue. “We strongly urge the Congress to reauthorize the program and continue allowing the intelligence community to protect our country,” said the former intelligence directors as quoted by the online news.

 

Last month, Jeff Sessions already urge the lawmakers to speed up the process of re-authorizing a particular section on the existing FISA law. The same move conducted by Dan Coats on September who signed a submitted letter to the Congress and addressing it to the House Speaker Paul Ryan and to the other involved members of the Congress.

 

The current law remains as an existing legal basis for the surveillance programs of the United States, but faced unwanted issues since they revealed the secret communications between foreign officials and US President Donald Trump, as reported by the Washington Examiner.

The revelation of the conversations came through the permission of Section 702.

 As detailed from the letter of Coats and Sessions, FISA’s Section 702, “allows the Intelligence Community, under a robust regime of oversight by all three branches of government, to collect vital information about international terrorists, cyber actors, individuals and entities engaged in the proliferation of weapons of mass destruction and other important foreign intelligence targets located outside the United States.”

Sessions is an Attorney General, while Coats is a Director of National Intelligence.

The current surveillance program received massive criticism after learning that there are government agencies that spy and store conversations from millions of US citizens. If the Congress renews and re-authorizes the requested section, it permits the intelligence services to search for Internet data even without asking permission.

This allows the US-based agencies to spy conversations from foreign countries.  

DQC Reveals Dominance of Education Data on Many New Passed Laws  

The continuing development of the Internet truly exposed millions of web users across the world today. Besides the great advantages that the Internet offers, there are serious problems about people, businesses, organizations and websites that experience privacy concerns involving hackers or scammers online.

Perhaps one of the main reasons why many people are experiencing unwanted issues is that they reveal too much of their personal information or not using them appropriately. Unfortunately, some of the victims of privacy invasion are young people out there.

This is the reason why like in the United States, there is a law that protects the privacy of students and school institutions when they access the Internet.

In the recent news information online, the Data Quality Campaign (DQC) revealed that the in almost 183 state bills, 93 of them tackled about data privacy during the legislative session this 2017. As detailed from thejournal.com, almost 49 congressional representatives in different states had presented 503 bills wherein 41 of these states passed almost 94 new laws involving data privacy as well as security since 2013.

According to DQC whom they recognized as a non-profit organization that functions as a monitoring agency on how school institutions, districts and states are using information in terms of improving education, this kind of trend is unusual.

The DQC conducts an annual monitoring and issuing its own state legislation report about student privacy and education data. Based on the information shared by this non-profit organization, it published what they call “roadmap” in providing the exact assistance to state education agencies on how they will improve the results of education through coordinating with research experts on this field.

As explained on the website dataqualitycampaign.org, the information they shared about their latest submitted report came out based on the four policy priorities to make data work for students, which mainly addresses the 2017 data education.

Here is the list of the 4 Policy Priorities as detailed by DQC:

  1. Measure what matters
  2. Make data use possible
  3. Be transparent & earn trust
  4. Guarantee access & protect privacy

According to the monitoring organization, these policies aims to determine on whether the new passed laws can support an “effective data use and protection” or will restrain it.

From the 31 new passed laws out of the 95 bills introduced by almost 36 states in America, these laws have connection to the gathering, linking as well as authority of education information. From those bills for right information collection, the law passed by the State of Maryland intended to revise on how the Department of Education gets the reported data “about seclusion and restraint practices,” as detailed through thejournal.com.

Details regarding race, gender and must be part of the submitted report.

About the exact governance or control, a new law that create “Educational and Attainment Research Navigation System” passed by the State of Maine. Based on the explanation about this system, it will be responsible in keeping and reporting education information and results of the workforce.

There will be an executive council in determining any lapse on the new system.

In addition, there are new 21 passed laws in about 26 states for the make data use possible, 20 passed laws in 59 presented bills for the transparent and earning trust and 30 passed new laws from 107 presented bills of 38 states for the guarantee access and protecting privacy.

DQC likewise said that the States made use of the legislation to create significant development to achieving the goal of making the data working for the students. It is very important to work together in assuring the best help for the students, teachers and school institutions when it comes to using the data they need.

Pentagon Reveals Potential Stock Market Hacking, US Financial System at Risk

Due to the issues about hackers in America lately, the United States Department of Defense is worrying that these intruders might attack the financial system of the country. This is the reason why it is currently in talks with the traders of Wall Street to take the necessary actions in preventing the hackers, should they attack.

According from the reported online news through the Wall Street Journal, the Defense Advanced Research Projects Agency (DARPA) of Pentagon is now talking with several traders as well as managers of quantitative hedge fund in order to explain the possible scope of damage that the hackers might cause if they attack the financial system of American.

The DARPA is one of the trusted research divisions of Pentagon.

Based on the reported information, DARPA already began its consultation since 2016 and made an effort to reach out the different business owners who operate financial firms. The agency is serious in creating the best possible solutions, in case the hacking groups start to pursue their plans to take down the stock market in the United States.

They actually considered this move as an early state preparation so that they know exactly what to do should the hacking takes place. DARPA revealed the confirmation of the information about the preparation through the Wall Street Journal and recognized as Financial Market Vulnerabilities Project.

“We started thinking a couple years ago what it would be like if a malicious actor wanted to cause havoc on our financial markets,” Said Wade Shen during an interview with WSJ as quoted by rt.com.

Shen is the current program manager of DARPA.

This particular hacking issued that bothered Pentagon somehow received different reactions from those who learned about it. From the published report through businessinsider.com, the information revealed that it is a bit funny to learn that the Pentagon is now showing interest to determine the potential hacking issues, yet nobody is worrying on how are manipulating the stock market.

It seems that the American government is concerned about the declining stocks, which even involved the Pentagon.

For the past several years, there had been unwanted reports about stock market manipulations and they occurred not only in the United States, but also across the globe. There are experts on this field who revealed that manipulating stocks is already part of the trading industry and believe the shares become stable later on.

Unfortunately, this kind of investment can become rigged to ordinary shareholders who do not have enough knowledge on how to recover their losses and go with the game. Sometimes, there is this mindset that losing money from this kind of trading will never give a chance to win. This particular issue could happen if there are no good buyers and the stock values collapses.

It is also true when they say that the success of stock market can depend on how the ordinary traders survive. This is the reason why there are existing regulations to provide the best security for both minor and huge traders out there. It is definitely important to make the trading fair and not just for the interest of huge traders.

Going back to the concern of Pentagon about the potential hacking of the US financial system, the Security and Exchange Commission (SEC) admitted last month that in 2016, there are hackers who managed to access their corporate disclosure database. The commission added that the hackers might have earned money from the stolen information.

However, SEC revealed that it then resolved the vulnerability last year and last August, it learned about the issue affecting the trade market.

As detailed by rt.com, the hackers might possible attack the payroll system, perform trade algorithms manipulation and create bogus orders in selling stocks. If this happens, it can definitely affect the overall stock market performance down.

DPA Alleges Microsoft for Unpermitted Use of Data from Widows 10 Users

Giant software company Microsoft seriously needs to explain its side after a privacy watchdog revealed that the company is using its gathered data from Windows 10 users.

Microsoft uses the data without the knowledge of the users, the watchdog said.

From the latest news report through Reuters, a Dutch privacy watchdog is alleging the giant software company of gathering data from its Windows 10 users and using them without any permission or consent. They recognized the watchdog as Dutch Data Protection Authority (DPA) and allegedly revealed that the company is not informing its users about such activity wherein it gather personal information when using the Internet.

Based on the statement of DPA, the unpermitted gathering of users data by Microsoft is a clear breach of Dutch data protection law on how it utilize the collected information from Windows 10 users.

From the shared report through zdnet.com, the watchdog said that the giant tech-company is not revealing to its Home as well as Pro users (Windows 10 Operating System) that it gathers their personal information. It does not also clearly explain the reason why.

DPA believe that the users will never agree to allow Microsoft to collect their personal data and use them for whatever purpose it has in mind.

From the explanation of the Dutch watchdog also, the gathered data include those when users access the apps and when browsing the Internet using Edge (its own web portal), when using the default settings.

“It turns out that Microsoft’s operating system follows about every step you take on your computer. That results in an intrusive profile of yourself,” Wilbert Tomesen stated who is the vice-chairman of the regulator. “What does that mean? Do people know about this, do they want this? Microsoft needs to give users a fair opportunity to decide about this themselves,” he continued as quoted by zdnet.com online.

The vice-chairman tells the company to allow its users made a decision on whether they permit personal data gathering or not.

The giant software maker likewise is encouraging the users through the system to enable the “full telemetry” setting and not the “basic” setting. However, this kind of encouragement will instantly transmit the usage and diagnostic information about the computer of the user to the company. The “Full Telemetry” will transmit the app usage data as well as histories of browsing through Edge.

From the statement of the watchdog as quoted through rt.com, it states that, “If a person does not actively change the default settings during installation, it does not mean he or she thereby gives consent for the use of his or her personal data.”

In line with this issue, Microsoft made a respond after learning about the statement and it said that the Windows 10 has actually new added privacy features. It explained that these features give the users the choices to decide on their own. Additionally, it said that it already issued its pointers in a released summary wherein it state that the allegation of DPA is not true and inaccurate.

From the shared news information through extremetech.com last June, it revealed that one of the biggest disagreement flashpoints when it introduced the Windows 10 OS is about the gathering of personal data from the users. Because of this matter, the French data privacy watchdog Commission Nationale de I’informatique et des Libertes (CNIL) already investigated about the practices of Microsoft in gathering data.

As a result, CNIL said that the giant tech-company violated the French law.

This particular data breach issue does not only involve a giant software maker company like Microsoft because few months ago, search engine giant Google likewise made an announcement that it ends its guideline in terms of targeted ads generation based on the keywords, which originate from the gmail account of the users.

OnePlus Secretly Gathers Sensitive User Information, Security Researcher Reveals

Many people believe that one of the most dangerous situations in life is when a person experienced a serious identity theft. This is actually a very wide spreading concern these days, especially hitting millions of innocent folks out there who often expose their personal information over the Internet. There are countless of unlawful strategies that professional criminals and hackers can do to victimize their targets.

This is the exact reason why a person needs to secure all personal information against these types of intruders or abusive individuals. In most cases, they target details such as Social Security Numbers, Credit Cards, Bank Accounts, Phone Numbers and other data about the identity of the victim.

From the latest reported news online, there is now a spreading issue about OnePlus and it is gathering sensitive information from its users without asking them permission. The revelation came from an expert security researcher who recently discovered this unknown activity of the Chinese mobile phone maker.

According to Chris Moore, he explained that OxygenOS-based handsets collect massive user data and this kind of approach is unlawful and can definitely affect the credibility or reputation of the company.

Moore is a security researcher and revealed that all the collected data are stored in a particular server, which include the serial number of the involved handsets. He actually published the issue few months ago in a blog post, but it was only lately when the readers showed interest to learning about this issue.

As detailed through The Verge, the OnePlus Smartphone units are recording the date through the OxygenOS platform such as when a user is locking or unlocking the device, using WIFI connectivity, active apps and these are actually the usual information to check. Unfortunately, the security researcher likewise revealed that the Chinese mobile phone maker is gathering data from the users such as the phone number, IMEI, MAC addresses, IMSI prefixes and mobile network names, among other important data without the knowledge of the person who is using the device.

This is when the issue arises because such activity is limited or very particular.

In addition, Moore stated that the illegal collection of the data happens through the OnePlus Device Manager Provider as well as OnePlus Device Manager, as reported online.

“From a development point of view, wanting to know about abnormal reboots seems legitimate, but the screen on/off and unlock activities feel excessive. At least these are anonymized, right? Well, not really—taking a closer look at the ID field, it seems familiar; this is my phone’s serial number,” said Moore as quoted by hothardware.com. “This I’m less enthusiastic about, as this can be used by OnePlus to tie these events back to me personally (but only because I bought the handset directly from them, I suppose),” he continued.

Aside from being a professional security researcher from UK, Chris Moore owns a tech blog online and a Cyber Security Challenge UK’s finalist.

In line with this issue, the Chinese-based phone manufacturer admitted that it is transmitting analytics to a server from Amazon (2-way streams as it call). Firstly, the purpose is for the usage analytics in fine-tuning its software. Secondly, it transmits analytics for the device information that they need to gather the data for their completing after-sales support, as detailed through The Verge.

However, OnePlus explained that it is not possible to disable the 2nd stream and a user can stop the data collection through turning off the process in the Settings of the device. Through the Settings, a user needs to open Advanced and simply deselect the “Join user experience program” option.

Although the company offers reasonable and good quality handsets to its valued users, it is might not be a reason if it secretly obtains personal data without the right permission or explanation from the users.

It still leads to a doubtful activity considering that the data collection is unknown.

Deloitte Confirms Global Email Service Hacking, Might Compromised 5M Emails

In another cyber attack issue in the United States, popular audit, consulting, tax and advisory service provider Deloitte LLP revealed that there is a possible that some of its own blue-chips customers might be compromised after the security breach that affected five millions registered emails.

From the reported news, this recent cyber attack targeted data from America and due to the massive breach; it is possible for the hackers that they obtained the usernames, IP addresses, passwords, health data as well as business architectural diagrams, as detailed online.

This is again not good news for those affect people who are clients of Deloitte.

Based on the report of The Guardian, the company might had experienced the attack in the last quarter of 2016, although they only found out about it last Match. According to the resources who talked to The Guardian, the hacking group was able to intrude the global email service of Deloitte because it only require one password and no step two verification.

The 2-step verification is necessary to protect the administrator system always.

The company admitted that the hackers successfully attacked their administrator system and infected their internal platform for emailing service. On this matter, the popular UK-based auditing, consulting and advisory service provider is already reaching its affected clients through notification.

Deloitte likewise reported the problem to the government authorities and even obtained expert private assistance to help in reviewing its security system.

In line with this issue, a representative of the company revealed that there are only few customers or clients affected with the breach.

“The review has enabled us to understand what information was at risk and what the hacker actually did, and demonstrated that no disruption has occurred to client business, to Deloitte’s ability to continue to serve clients, or to consumers,” said the representative as quoted by Reuters online.

 

The company however admitted that the data breach is an embarrassment to them because they provide advice to their clients on how to deal with cyber attack and yet they became a victim of hackers. Deloitte is one of the biggest service providers for multinational and government agencies that need consultancy, auditing and tax advice, among other related services.

They are now trying to restore the normal function of their email system and the investigation is ongoing for the protection of their valued clients.

“Deloitte remains deeply committed to ensuring that its cyber security defenses are best in class, to investing heavily in protecting confidential information and to continually reviewing and enhancing cyber security,” the company continued it its statement.

 

Unfortunately, they do not have any lead yet on who are the hackers.

The company is making thorough review also to help them determine the exact hackers who are responsible in intruding their global email system. Likewise, the again want to assure that there are only a few clients who got affected with this latest cyber attack that compromised millions of emails.

Deloitte also posted a statement through their official website to increase the awareness of their clients and explaining the cyber risk is not just about risking the affected data because it can ruin the business seriously.

Few weeks ago, Equifax experienced the same hacking issue and it compromised almost 143 million of personal data from US residents. They are still investigating this issue because they want to make sure they will identify the hackers and file the necessary charges.

This is the reason why the government needs to show more effort in finding the best solution to find and arrest those individuals who are responsible in doing such unlawful activities. It appears that different hacking groups are finding it easy to target their victims.

PM Turnbull to Meet US President Trump, Settles Heated Phone Conversation 

Malcolm Turnbull revealed on Wednesday that he is planning to meet US President Donald Trump in the coming week at the Battle of the Coral Sea commemorations held in New York. Both individuals had a heated phone call few months ago regarding the refugee deal during the Obama administration.

Turnbull is the Prime Minister of Australia.

From the latest news24.com report, the Prime Minister of Australia Malcolm Turnbull said that he is planning to meet US President Donald Trump personally in this coming week at the Battle of the Coral Seal commemorations held in New York. Both of them are attending the event and might give them a chance to settle their past heated phone conversation, which involve the refugee deal.

He announced his plan after he met Defence Secretary James Mattis in Afghanistan and greeted the troops from Australia who are stationed in the Middle East. He visited them before Tuesday’s scheduled Veteran’s Day commemorations.

According from the information, his visit in New York is set on May 4.

The Australian PM likewise got the chance to meet US Vice President Mike Pence in Sydney, which somehow reduced the tension that started after the heated phone call last January 28.

The upcoming event in New York marks the 75h anniversary of the World War II naval battle. Turnbull and Trump will visit the USS Intrepid (floating museum) in New York. Both United States and Australia played a huge against the Japanese during the WWII at the Battle of the Coral back in 1942 before achieving freedom.

“Australia and the United States are enduring allies. Our alliance has been forged over many decades, through times of war and times of peace, securing our nations’ freedom and peace and security in the world,” said Turnbull as quoted by the news online.

He added that, “My meeting with President Trump will provide an opportunity to reaffirm our alliance and the United States’ engagement with the Asia-Pacific.”

Sean Spicer revealed that the leaders will be attending a bilateral meeting on May 4 at the Hudson River to visit the aircraft carrier. He told the media in Washington that US President Trump is looking forward to meet the Australian PM in person to highlight the friendship, continuing bonds and close alliance of both nations, as detailed by the news report.

Spicer is the current Press Secretary of the White House.

For John Berry, he believes that it is important for the Prime Minister to meet the US President in his earlier term as the head of the White House.

“Right now, Australia is side by side with the United States in Afghanistan and Iraq and Syria taking on ISIL (another acronym for ISIS) and terrorists,” said Berry to the Sky News television (he referred to the Islamic State movement).

“The president and vice president are now keenly aware just how deep and broad this relationship is,” he added.

John Berry is the President of the American Australian Association and the former Australian Ambassador to the United States.

Russian Hacker Pleaded Not Guilty, Faced Charges in Georgia Courthouse

Few days ago, the United States served warrant of arrests to at least for individuals from Russia who allegedly had involvements to hacking millions of Yahoo account users. The involved Russians include two employees of the Federal Security Service (FSB) who hired expert hackers to do the hacking job for them.

On Monday, another Russian hacker pleaded not guilty at a federal court in Atlanta, Georgia. This time, the accusation is about the malware toolkit known as “Citadel” wherein the alleged suspect created, maintained and developed it for unlawful activities, as stated by the authorities.

They recognized him as Mark Vartanyan and pleaded for computer fraud as not guilty.

According from the information shared through ajc.com, Norway extradited Vartanyan back in December last year and John Horn stated that the court charge him due to computer scam. They also call the hacking suspect as “Kolypto” and will need to face the lawsuit in Atlanta.

John Horn is the U.S. District Attorney who attended the scheduled news conference.

Based on the investigation of the in-charge authorities, the intention of the Citadel is to infect the systems of different computers to steal money and personal data from various computer networks, which they target as the main victims, Horn explain in his statement.

The Russian hacker had been part of developing as well as improving the malware toolkit since 2011, which they introduced online as a Russian-language only toolkit. It has the capacity to steal personal data, accounts and passwords from the computers of the victims. Vartanyan is also part of creating the “botnets” that infect computers as software while in Norway back in 2012 as well as 2014, wherein they arrested the Russian-national back then.

They even sell the kit through online forums wherein cyber criminals are involved.

The reported information through ajc.com revealed that they were able to hack almost $500 million and infected about 11 million computer systems by just using the Citadel.

From the explanation of attorney John Horn, Vartanyan’s involvement seriously affected many people due to the money they stole from them and the damage they caused the Internet worldwide. With his arrest, it proved that regardless of what country a cyber-criminal lives, the authorities will find and capture them.

The arraignment is set on Tuesday and US Magistrate Judge Russell G. Vineyard will handle the case and the arrested Russian hacker needs to attend the court hearing.

The reports online likewise revealed that aside from “Kalypto,” another Russian hacker got sentenced in September of 2015 due to computer scam. He is the 22-year-old Dimitry “Rainerfox” Belorossov from St. Petersburg in Russia. This young fellow distributed and installed the Citadel to the computers of his victims, although he pleaded guilty that time unlike Vartanyan.

According to the records of the authorities, Belorossov was able to infect over 7,000 computer systems, stole credit card information from various owners, bank records and personal identifications, which include some victims in Atlanta, Georgia.

This just proved that these types of hackers are expert in this field and the authorities ought to be more cautious and prepared.

 

 

 

 

 

 

 

 

 

 

Dean’s Lister Arrested In Isabela In Suspected Credit Card Scam

A student, who happens to be a Dean’s Lister, was arrested in Isabela for being involved in a suspected credit card scam.

According to a report, the suspect was identified as Christian Salvador. Salvador, 23, is currently taking Computer Science. He was alleged to have established a fake bank website. Through this fake site, unsuspecting bank clients had their bank information stolen.

Salvador was apprehended in an apartment unit in Isabela by the authority of the Cybercrime Division of DOJ (Department of Justice) and NBI (National Bureau of Investigation). The arrest has been made based on the warrant issued by the Manila Regional Trial Court.

The report further stated that the arrest took place after the NBI obtained a complaint from one major banking company. The banking institution receives numerous complaints from clients and credit card holders whose account information was stolen from the fake bank website. The clients were being charged for a significant amount of money even though they have no idea that their credit cards were being used by the hackers.

Salvador confessed his involvement in the scam. He said allegations about him regarding the bank phishing page are all true, as well as stealing the personal information of the bank clients. Basically, the bank scam takes place after the suspect sells account information of the owners for P5,000. Moreover, there are cases where he takes advantage of the account information and buy items for his personal use.

The report confirmed that Salvador performs phishing and website penetration. Phishing is an illegal practice of sending emails claiming to be from legitimate companies to persuade  unsuspecting people to share their personal information like passwords and credit card numbers.

The authority has searched the suspect’s house and found a recently-purchased car. Salvador’s father works as a baker, while his mother is an OFW working in Lebanon as a domestic helper. The father was dismayed about his son’s “actions”. The suspect was then brought to Manila’s NBI office.

Salvador may be charged  for violating the Cybercrime Prevention Act of 2012 or the Access Device Regulation Act of 1988. His laptop and PC were also seized to be subjected for further investigation.

New Policy Changes Procedure to Request Public Records in Baldwin County

From the latest shared information online, there is a new policy when accessing public records as detailed by the Baldwin County Commission. However, this policy might complicate the usual procedure when getting records or information.

This may also have conflict to the opinions of the attorney general.

According from the report of lagniappemobile.com, the Baldwin County Commission altered the existing guideline when accessing public records in the county. However, the new policy might trigger conflict than the usual process they utilize to access or get the records.

Based on the statement of the Alabama Public Records Law, it is the right of a citizen to evaluate and get public document copies, but this will be under certain conditions provided by the law.

On the other hand, the opinions of the attorney general include the possible required fees of the exact government agency to the citizens when they process and prepare the requested copies to retrieve data. The fees however are only minimal and reasonable to pay.

In line with this, the new policy might not only charge the citizens when getting the copies, but may need to spend for the attorney’s fee if the designated lawyer from the county will review a request to verify if the releasing of data is legitimate. The projected fee is about $225 (an hour) and with additional fee onwards the timeframe, the online report added.

The Baldwin County Commission already passed the policy on Tuesday.

From this new guideline also, a citizen may need to pay an advance deposit if the processing officer determines the request if more than an hour before it can process the request for the public record. In case it exceeds over 15 minutes, the staff may charge the person who is requesting with minimal amount only for the expected respond.

In practice, a citizen who requests for old data will need to prepare extra cash for the fees if the process takes much time.

The report added that both County Administrator Ron Cink and Commission Chairman Chris Elliot made the proposal as stated by Commission Charles Gruber. The exact objective of the new policy is to help the country recuperate from the expenses when they process and complete the requests for public records.

1 2