Editorial roundup

The Columbus Dispatch, April 4

Depending on which side one stands, the “Boycott, Divestment, Sanctions” movement is either a way to punish Israel for its treatment of Palestinians through economic and political pressure, or it’s an anti-Semitic campaign to demonize America’s only democratic ally in the Middle East.

But one thing the BDS movement is not: a legitimate vehicle for deciding how a public university should spend tax dollars. Universities should not get involved in political battles over how their dollars should be invested and spent. It’s not their money: A sizeable amount of public-university funding comes from taxpayers, either through direct state support or through federal student loans, tuition grants and research dollars.

Yet, Ohio campuses have become awash in the national debate over BDS. Student governments at Ohio State and Capital universities in March considered resolutions on opposite sides of the issue. The pro-Israel side prevailed in both votes.

The decision on whether university dollars should be used to isolate and punish an international ally does not belong on the Oval at Ohio State University. It belongs in the halls of the Congress or state legislature, where elected officials who represent people who pay the taxes that support higher education can hold hearings, consider expert testimony and weigh the financial, economic, political and social consequences…

Online: http://bit.ly/1PQy9s6

The (Tiffin) Advertiser-Tribune, April 1

Cyber terrorism- for profit, not twisted ideology -has become a clear and present danger to Americans. If there is a cohesive strategy to defeat it, it is not working.

Last week, hackers crippled computer networks at several hospitals in Washington, D.C., and Baltimore. The facilities are owned by MedStar Health Inc., which would not comment on whether the attackers demanded money.

Fortunately, backup systems- including paper patient records -were adequate to keep harm from coming to those being treated at the hospitals.

Just a few weeks ago, a similar attack shut down computers at a California hospital until officials there paid the $17,000 demanded by the hackers. Again, no patients suffered harm.

But unless some means of blocking such attacks is found, it will be only a matter of time until cyber assaults against health care providers escalate- and someone dies as a result.

Neither private nor government computer systems are secure against such invasions. Though there are some safeguards to avoid data loss, there appear to be few failsafe methods of blocking temporary shutdowns and theft of information…

Online: http://bit.ly/1W5Vpdf

comments powered by Disqus