IT professionals continue to cite security concerns as one of the largest barriers to cloud migration. Uniform government standards specific to cloud computing have yet to be finalized, leaving important questions regarding data availability and integrity unanswered. aims to provoke discussion related to these concerns as well as raise awareness of the ways in which cloud computing could ultimately strengthen existing security measures.

Police body-worn cameras reduce citizen complaints, preliminary studies show

Sarah Buduson, ABC News,  Friday, July 31, 2015

Studies show the use of police body-worn cameras reduces the number of complaints against officers, according to the U.S. Department of Justice. "If we do get complaints, 99 percent of the time it exonerates the officer from any wrongdoing," said Bratenahl Police Patrolman Jon Basche. He oversees the department's body-worn camera program.

Why the fear over ubiquitous data encryption is overblown

Mike McConnell, Michael Chertoff and William Lynn, Washington Post,  Thursday, July 30, 2015

More than three years ago, as former national security officials, we penned an op-ed to raise awareness among the public, the business community and Congress of the serious threat to the nation’s well being posed by the massive theft of intellectual property, technology and business information by the Chinese government through cyberexploitation. Today, we write again to raise the level of thinking and debate about ubiquitous encryption to protect information from exploitation.

US Must Do More To Protect Privacy

Julie Anderson by Julie Anderson, AG Strategy Group
Thursday, July 30, 2015

If the U.S. fails to assert its international leadership role, national security and individual privacy could continue to suffer. There are two things the U.S. can do to demonstrate its leadership on these issues and enable law enforcement to fulfill its mission while protecting individual privacy. On its own, each action is necessary but not sufficient.

Google Pushes Back Against French Privacy Regulator’s Order

Stephanie Bodoni, Bloomberg Business,  Thursday, July 30, 2015

Google Inc. pushed back against France’s data privacy authority after the watchdog ordered the search engine giant to extend the so-called right to be forgotten to its websites globally. France’s data protection authority, CNIL, should withdraw its ultimatum threatening Google with fines unless it delists requested links across its network, the Mountain View, California-based company said in a blog post Thursday.

Microsoft Deputy GC: Cloud Computing Is On Trial at the Second Circuit

Big Law Business, Bloomberg,  Wednesday, July 29, 2015

If global tech companies can’t protect the email accounts of local users in other countries, Howard argued, users will go with local providers, who won’t be subject to the demands of foreign investigators, instead. “The potential end result of the government’s approach in this case, especially if it’s followed by other governments elsewhere, is a balkanized cloud, in which different countries have different local clouds that don’t exist at scale,” Howard said. In a recent interview with Big Law Business, Howard, who’s been at Microsoft for five years, spoke to the importance of the email privacy case, and also provided broader insight into what it’s like to manage the company’s legal matters: what makes a law firm attractive, how he keeps litigation costs down, and how Microsoft monetizes workplace diversity.

How accessibility in the cloud could redefine European citizenship

Tracy Mitrano, EurActiv,  Wednesday, July 29, 2015

The European Commission’s initiatives on cloud have thus far not sufficiently supported the critically important area of accessibility for people with disabilities. Even the Digital Single Market strategy, whose third pillar is to improve Europeans’ access to digital goods and services limits its ambitions in this area by focusing only on outcomes for consumers and businesses rather than all European citizens. In the EU’s democratic society, access to technology should be a legal right rather than purely a market-driven opportunity. To its credit, the EU has made some progress with promoting accessible technologies in public administrations. But new legislation such as the Directive on Accessibility of Public Sector Bodies’ Websites has not yet been decided. Moreover, member states have yet to transpose key laws into their legal landscape, a step towards full implementation of existing EU Directives and principles. Transposition would also lead to further harmonisation and reduce the fragmentation of rules in Europe that is hindering a faster and wider adoption of accessible technology.

Bancroft Publishes White Paper On Electronic Privacy Issues

Viet Dinh and Jeffrey Harris, Bancroft PLLC,  Wednesday, July 29, 2015

Bancroft has published a white paper entitled “Toward A Modern Statutory Framework For Law Enforcement Access To Electronic Communications.” The paper identifies several deficiencies in the current statutory framework governing when law enforcement officials can access consumers’ electronic communications. As the authors explain, the current statutory framework is more than 30 years old and has failed to keep pace with developments in commerce and technology. The authors then analyze the relative merits of several recent legislative proposals that are intended to address these issues (the LEADS Act and Email Privacy Act), and offer suggestions about how to further improve this legislation.

Survey: Shadow IT haunts DOD networks

Kevin McCaney, Defense Systems,  Wednesday, July 29, 2015

A recent survey by Solar Winds of federal government IT management and monitoring revealed that a majority of DOD IT pros said shadow IT is being used in their departments, nearly 70 percent of them expect the practice to grow at least slightly over the next two years, and they’re not especially confident in their ability to control the use of shadow IT.

5 Top Data Privacy Challenges for State and Local Agencies

Caron Beesley, B2C,  Tuesday, July 28, 2015

The feds aren’t the only government targets vulnerable to attack, state and local agencies are also stewards and defenders of a large amount of financial, healthcare, and other personally identifiable information (PII). And while some agencies have made major investments and taken big strides in securing their systems, NASCIO reports that a whopping 76% of state CISOs feel that their budgets remain insufficient to tackle the increasingly sophisticated cyber threats that business and governments are routinely facing.

Nearly 1 billion phones can be hacked with 1 text

Robert Hackett, Forbes,  Tuesday, July 28, 2015

A mobile security researcher has uncovered a flaw that leaves as many as 95% of Android devices—that’s 950 million gadgets—exposed to attack. The computer bug, nicknamed “Stagefright” after a vulnerable media library in the operating system’s open source code, may be one of the worst Android security holes discovered to date. It affects Android versions 2.2 and on.