Implementing technological developments

Difficulties protecting people from bits:

Illegal e-cards spy on your lover
Protecting kids privacy is tough balance
Quicktime audio file
Kid's site owners don't protect kids (or follow the law)
Credit/identity attacks can come from . . . wherever
Implementing standards requires author/owner/producer cooperation

One can do a lot of damage via online resources
.wav file

Corporate cyber security is inadequate