Leo Mirani, Quartz, Monday, August 03, 2015
But when it comes to digital policy, the important thing to know is just this: Andrus Ansip is the most powerful person in Europe today. As the commissioner in charge of the “digital single market,” his job is, literally, “to make Europe a world leader in information and communication technology.”
Kenneth Corbin, CIO, Monday, August 03, 2015
Government CIOs are struggling to meet rising expectations among consumers for what level of service a website should deliver, and 70 percent of the respondents in Akamai's survey said that a consistent user experience is an "unmet need."
Ross Todd, The Recorder, Saturday, August 01, 2015
U.S. District Judge Lucy Koh of the Northern District of California ruled that the Fourth Amendment applies to historical cell site information, meaning the government must obtain a search warrant to demand it from cellphone carriers. With many smartphone applications constantly scanning the cellular network, Koh concluded, the data potentially yields such detailed information on individuals' movements that its release without a warrant would violate their reasonable expectation of privacy.
Mike McConnell, Michael Chertoff and William Lynn, Washington Post, Thursday, July 30, 2015
More than three years ago, as former national security officials, we penned an op-ed to raise awareness among the public, the business community and Congress of the serious threat to the nation’s well being posed by the massive theft of intellectual property, technology and business information by the Chinese government through cyberexploitation. Today, we write again to raise the level of thinking and debate about ubiquitous encryption to protect information from exploitation.
Stephanie Bodoni, Bloomberg Business, Thursday, July 30, 2015
Google Inc. pushed back against France’s data privacy authority after the watchdog ordered the search engine giant to extend the so-called right to be forgotten to its websites globally. France’s data protection authority, CNIL, should withdraw its ultimatum threatening Google with fines unless it delists requested links across its network, the Mountain View, California-based company said in a blog post Thursday.
Big Law Business, Bloomberg, Wednesday, July 29, 2015
If global tech companies can’t protect the email accounts of local users in other countries, Howard argued, users will go with local providers, who won’t be subject to the demands of foreign investigators, instead. “The potential end result of the government’s approach in this case, especially if it’s followed by other governments elsewhere, is a balkanized cloud, in which different countries have different local clouds that don’t exist at scale,” Howard said. In a recent interview with Big Law Business, Howard, who’s been at Microsoft for five years, spoke to the importance of the email privacy case, and also provided broader insight into what it’s like to manage the company’s legal matters: what makes a law firm attractive, how he keeps litigation costs down, and how Microsoft monetizes workplace diversity.
Tracy Mitrano, EurActiv, Wednesday, July 29, 2015
The European Commission’s initiatives on cloud have thus far not sufficiently supported the critically important area of accessibility for people with disabilities. Even the Digital Single Market strategy, whose third pillar is to improve Europeans’ access to digital goods and services limits its ambitions in this area by focusing only on outcomes for consumers and businesses rather than all European citizens. In the EU’s democratic society, access to technology should be a legal right rather than purely a market-driven opportunity. To its credit, the EU has made some progress with promoting accessible technologies in public administrations. But new legislation such as the Directive on Accessibility of Public Sector Bodies’ Websites has not yet been decided. Moreover, member states have yet to transpose key laws into their legal landscape, a step towards full implementation of existing EU Directives and principles. Transposition would also lead to further harmonisation and reduce the fragmentation of rules in Europe that is hindering a faster and wider adoption of accessible technology.
Viet Dinh and Jeffrey Harris, Bancroft PLLC, Wednesday, July 29, 2015
Bancroft has published a white paper entitled “Toward A Modern Statutory Framework For Law Enforcement Access To Electronic Communications.” The paper identifies several deficiencies in the current statutory framework governing when law enforcement officials can access consumers’ electronic communications. As the authors explain, the current statutory framework is more than 30 years old and has failed to keep pace with developments in commerce and technology. The authors then analyze the relative merits of several recent legislative proposals that are intended to address these issues (the LEADS Act and Email Privacy Act), and offer suggestions about how to further improve this legislation.
Kevin McCaney, Defense Systems, Wednesday, July 29, 2015
A recent survey by Solar Winds of federal government IT management and monitoring revealed that a majority of DOD IT pros said shadow IT is being used in their departments, nearly 70 percent of them expect the practice to grow at least slightly over the next two years, and they’re not especially confident in their ability to control the use of shadow IT.
Caron Beesley, B2C, Tuesday, July 28, 2015
The feds aren’t the only government targets vulnerable to attack, state and local agencies are also stewards and defenders of a large amount of financial, healthcare, and other personally identifiable information (PII). And while some agencies have made major investments and taken big strides in securing their systems, NASCIO reports that a whopping 76% of state CISOs feel that their budgets remain insufficient to tackle the increasingly sophisticated cyber threats that business and governments are routinely facing.