Jonathan Kozlowski, Officer.com, Thursday, July 16, 2015
Michael Donlan, Vice President, Microsoft’s State and Local Government, recently put up a response to IACP's updated cloud computing guidelines. Very simply, he says, "we agree." And further explains how the company's Azure solution has been CJIS-compliant from the ground up. One interesting thing Microsoft is doing is attempting to be very transparent about these standards. Donlan even quotes LAPD Information Security Officer Sanjoy Datta: “The fact that Microsoft contractually committed to CJIS compliance by signing the FBI’s CJIS Security Addendum and having their employees background-checked by California DOJ helped give the LAPD the confidence that we could begin to leverage Azure Government for our most critical, sensitive workloads."
Andrew Jones, Venture Beat, Wednesday, July 15, 2015
Consumers want more personalized messages … but also increased data privacy. Those seemingly paradoxical findings come from Gigya’s 2015 State of Consumer Privacy & Personalization report, published today. The two trends are not new, yet continue to be at odds with one another: Personalization requires customer insight, while increased data privacy would seek to limit the availability and accessibility of customer data. The new research from Gigya, a customer identity management provider, found that 96 percent of American consumers are concerned about data privacy. Yet the study also found that consumers are frustrated with non-relevant messages, causing them to unsubscribe from emails, stop visiting the companies’ websites, and even stop buying from (or even advocate against) the companies.
European Parliamentary Research Service, Wednesday, July 15, 2015
The Google case may provide an opportunity for the Commission to clarify some aspects of competition law with regard to certain digital practices, and to close the difficult gap between the rights of companies who dominate the market, free competition and consumer protection.
Billy Mitchell, FedScoop, Wednesday, July 15, 2015
The two OPM hacks that compromised the personal information of 22.1 million people were just blips on the radar in total volume of federal cyber incidents. The report — submitted as testimony by Greg Wilshusen, director of information security issues at GAO, in a recent congressional hearing — shows that in fiscal year 2014, federal agencies experienced 67,168 cybersecurity incidents involving personally identifiable information. The number of incidents has increased every year since fiscal year 2006, when that number was just 5,503. That's an upsurge of 1,121 percent in just nine years.
Committee on Economic and Monetary Affairs, European Parliament, Tuesday, July 14, 2015
This study describes the challenges that competition policy faces in relation to the digital economy. It explores the specific characteristics of digital economy markets and how these characteristics impact competition policy. This study was well underway when the Commission presented its Digital Single Market (DSM) plans on 6 May 20151, including the announcement of an e-commerce sector inquiry. It is expected that the sector inquiry will deliver its first results in 2016. This study already offers a first overview on market developments and its implications for competition policy. The study focuses on to the economic and legal analysis of competition problems that are caused by the characteristics of the digitalised economy. As such, competition policy and its instruments such as anti-trust laws, merger regulation, State aid, and sector regulation are at the centre of the study. Other policy fields, for instance trade policy, industrial policy and consumer protection fall outside the scope.
European Committee for Standardisation, Tuesday, July 14, 2015
The scope of the Accessible ICT Procurement Toolkit is based on the contents of EN 301 549 and related Technical Reports produced in the context of Mandate 376. Nevertheless, the Toolkit includes a wide range of support and guidance material to facilitate procurers in incorporating accessibility as a criterion in the procurement of ICT products and services.
Derek du Preez, Diginomica (UK), Monday, July 13, 2015
And it can’t be denied that progress has been made. The G-Cloud framework (despite recent worries over awareness levels) has paved the way for a new approach to procurement, working digital hubs are being formed across central government and millions of pounds has been saved. GaaP, if successful, could be genuinely groundbreaking for governments around the world. However, despite the visions, rhetoric and success stories to date, it’s easy to forget the magnitude of the challenge at hand and the problems that the government is going to have in scaling up its digital ambitions beyond the walls of Whitehall and across local government, schools and the NHS.
Benjamin Wittes, Lawfare, Sunday, July 12, 2015
In this post, I want to take on the merits of the renewed encryption debate, which seem to me complicated and multi-faceted and not all pushing in the same direction. Let me start by breaking the encryption debate into two distinct sets of questions: One is the conceptual question of whether a world of end-to-end strong encryption is an attractive idea. The other is whether—assuming it is not an attractive idea and that one wants to ensure that authorities retain the ability to intercept decrypted signal—an extraordinary access scheme is technically possible without eroding other essential security and privacy objectives.
by Joshua Gans, Harvard Business Review, Saturday, July 11, 2015
Why aren’t things better? This is something that I often feel these days when searching for information on the internet. And it is especially something I feel when I am searching for products where quality matters. This applies to restaurants, tradespeople, and books, for example. In each of these cases, I am looking for not just anything — but something that is good or even high quality.
Access to Electronic Data by Third-Country Law Enforcement Authorities: Challenges to EU Rule of Law and Fundamental Rights
The Centre for European Policy Studies (CEPS), Friday, July 10, 2015
This study examines the challenges to European law posed by third-country access to data held by private companies for purposes of law-enforcement investigations in criminal proceedings. The proliferation of electronic communications is putting cloud-computing companies under severe strain from multiple demands from the authorities to acquire access to such data.