People don’t use technology they don’t trust

Koh Buck Song, Microsoft Asia Pacific News Center,  Friday, July 8, 2016

In the Asia Vision Series features we dive into key industry trends and issues with our subject matter experts and visionaries the region. In part 1 of 3 of this interview, Koh Buck Song, author and editor of more than twenty books and former political supervisor for Singapore broadsheet The Straits Times, speaks with Jeff Bullwinkel, associate general counsel and director of Corporate, External and Legal Affairs (CELA), Microsoft Asia Pacific & Japan. Bullwinkel is a former federal prosecutor with the US Department of Justice, as well as Microsoft’s most senior legal counsel in Asia. He shares the reasons behind his passion for law and driving policies around trust in technology.

European Union approves ‘Privacy Shield’ data transfer deal with the US

Jonathan Keane, Digital Trends,  Friday, July 8, 2016

Privacy Shield, the much-debated data transfer agreement that will replace Safe Harbor, has been approved by the European Union. The 28 member states of the EU approved the data transfer deal today following extensive debate and some controversy over the protections it provided to EU citizens’ data when transferred to the U.S. Under the terms of the new deal, Privacy Shield will be reviewed on an annual basis.

SUSE Joins Microsoft Enterprise Cloud Alliance and Test Drive Program

Yahoo Finance,  Wednesday, July 6, 2016

SUSE® has joined the Microsoft Enterprise Cloud Alliance as part of its ongoing strategy to enable customers to quickly respond to changing business needs. SUSE delivers cloud-based SUSE Linux Enterprise Server, including automated updates, to enterprise customers using the Microsoft Azure cloud platform.

You are here: Home Public Sector Data Protection News Doubt clouds future of UK’s post-Brexit data protection rules Doubt clouds future of UK’s post-Brexit data protection rules

Joe Curtis, IT Pro,  Wednesday, July 6, 2016

Uncertainty continues over the future of the UK’s data protection policies following Brexit, a government minister has admitted. Saying “for a period the future will be more uncertain”, Baroness Lucy Neville-Rolfe said EU rules on data protection could apply fully in the UK if it remains in the single market, or the UK may replace all EU rules with its own if it does not stay. “Currently it seems unlikely we will know the answer to these questions before the withdrawal negotiations get under way,” the minister for data protection told the Privacy Laws & Business annual conference yesterday.

Who’s responsible for the data breach epidemic?

Mike Cook, IAPP Privacy Perspectives,  Wednesday, July 6, 2016 order for these entrepreneurs and technologies to be successful, we as business leaders need to make some adjustments to the way we think about and use sensitive data. We cannot rely on regulators to be the sole advocates for consumer privacy. Technologists must take the driver’s seat in protecting consumer interests.

Cybersecurity: MEPs back rules to help vital services resist online threats

European Parliament News,  Wednesday, July 6, 2016

Firms supplying essential services, e.g. for energy, transport, banking and health, or digital ones, such as search engines and cloud services, will have to improve their ability to withstand cyber-attacks under the first EU-wide rules on cybersecurity, approved by MEPs on Wednesday.

The Encryption Debate: All Quiet on the Western Front?

Riana Pfefferkorn, Just Security,  Wednesday, July 6, 2016

While encryption has fallen off the front page in US news, the current round of the Crypto Wars continues elsewhere and behind the scenes. Internationally, governments are quite active on this issue. The lower and upper houses of Russia’s legislature have just passed a bill that, if approved by the Kremlin (as is expected), would mandate state security services be able to access Russians’ encrypted communications and would allow them to obtain providers’ encryption keys without a court order. Within the same week, India’s high court rejected a petition to ban end-to-end encrypted messaging apps and mandate crypto backdoors. The court, while dismissing the case, urged the petitioner to take the matter to the appropriate state agencies. In the space of a week, the fate of secure communications turned grim for 143 million Russians and was left up in the air for over 1.3 billion Indians. With national governments watching each other closely on encryption issues, the ramifications of these two powerful countries’ encryption policies won’t be confined within their borders.

The Cloud and Filing Cabinets Should Have the Same Privacy Rights

Peter Carter, Bloomberg Law,  Tuesday, July 5, 2016

Americans have privacy rights regardless of where personal information is stored. As we continue to move forward into a data-driven digital society, the cloud deserves the same legal protection as the office or home filing cabinet. Microsoft should be applauded.

Contractor-Owned Systems Could Open the Door to Innovation for Government

David Young, AFCEA,  Friday, July 1, 2016

Given budget pressures, how do government agencies upgrade their network infrastructure? Progressive, cost-conscious agencies are shifting their way of thinking and using a different operating model completely. They have begun to loosen the reins on their information technology infrastructure, moving from a strict government-owned, government-operated (GOGO) model to a contractor-owned, contractor-operated (COCO) model. Several reasons support this choice.

Run, don't walk, from China's Big Brother law

David Linthicum, InfoWorld,  Friday, July 1, 2016

China's National People's Congress has drafted a second version of a controversial cybersecurity law. It would bring a great deal of censorship for both foreign and domestic citizens and businesses, whether they use the cloud or not. China is a wasteland for the modern internet. Websites like Facebook and Google are blocked. Moreover, web traffic is monitored and censored by the government. It's Big Brother for real.