Indiana laws permit public officials to use personal email accounts for government business, so it does not appear that vice-president Mike Pence violated any laws when he opted to use his personal AOL account to communicate sensitive governmental information; however, he certainly thwarted the state's open records laws, and also exposed that information to hackers who made off with it.
Pence's office in Washington said in a written statement Thursday: "Similar to previous governors, during his time as Governor of Indiana, Mike Pence maintained a state email account and a personal email account. As Governor, Mr. Pence fully complied with Indiana law regarding email use and retention. Government emails involving his state and personal accounts are being archived by the state consistent with Indiana law, and are being managed according to Indiana’s Access to Public Records Act.”
Indiana Gov. Eric Holcomb's office released 29 pages of emails from Pence's AOL account, but declined to release an unspecified number of others because the state considers them confidential and too sensitive to release to the public.
That's of particular concern to Justin Cappos, a computer security professor at New York University's Tandon School of Engineering. “It’s one thing to have an AOL account and use it to send birthday cards to grandkids," he said. "But it’s another thing to use it to send and receive messages that are sensitive and could negatively impact people if that information is public.”
Pence used personal email for state business — and was hacked
(Images: Mike Pence, Gage Skidmore, CC-BY-SA)
In his first U.S. TV interview, Ren Zhengfei describes Huawei as “a tomato” crushed between two superpowers.
MG has built a proof-of-concept malicious USB cable with a tiny wifi radio hidden inside of it, able to wirelessly exfilatrate stolen data; he calls it the O. MG, and while the prototype cost him $4k and took 300 hours, he's working with a team on a small production run for other security researchers to […]
Writing on Techcrunch, Zack Whittaker (previously) calls out the timeworn phrase "we take your privacy and security seriously," pointing out that this phrase appears routinely in company responses to horrific data-breaches, and it generally accompanied by conduct that directly contradicts it, such as stonewalling and minimizing responsibility for breaches and denying their seriousness. "We take […]
Use a single password for every website, and you’re compromising your security. Use a different one each time, and you’re bound to lose track of them. The solution? RoboForm Everywhere, a catch-all tool that will not only manage the passwords on every site you visit but generate better ones. As a simple password database, it’s […]
Just a reminder: Print isn’t dead. And now that printers are becoming as portable as cell phones, it might be around for quite some time. Enter the MEMOBIRD Mobile Thermal Printer, a mini-printer that is versatile, portable – and most importantly, never needs a refill on ink or toner. Measuring just a few inches around, […]
What do Facebook, Twitter, YouTube and Google all have in common? Somewhere in their framework, they all use MySQL, that most versatile (and free!) of database management systems. And they’re not alone. If your company or the one you’d like to work for wrangles data (and who doesn’t?), they’re going to need someone with a […]