IACP's Updated Cloud Computing Guidelines

Jonathan Kozlowski, Officer.com,  Thursday, July 16, 2015

Michael Donlan, Vice President, Microsoft’s State and Local Government, recently put up a response to IACP's updated cloud computing guidelines. Very simply, he says, "we agree." And further explains how the company's Azure solution has been CJIS-compliant from the ground up. One interesting thing Microsoft is doing is attempting to be very transparent about these standards. Donlan even quotes LAPD Information Security Officer Sanjoy Datta: “The fact that Microsoft contractually committed to CJIS compliance by signing the FBI’s CJIS Security Addendum and having their employees background-checked by California DOJ helped give the LAPD the confidence that we could begin to leverage Azure Government for our most critical, sensitive workloads."

Consumers want privacy … yet demand personalization

Andrew Jones, Venture Beat,  Wednesday, July 15, 2015

Consumers want more personalized messages … but also increased data privacy. Those seemingly paradoxical findings come from Gigya’s 2015 State of Consumer Privacy & Personalization report, published today. The two trends are not new, yet continue to be at odds with one another: Personalization requires customer insight, while increased data privacy would seek to limit the availability and accessibility of customer data. The new research from Gigya, a customer identity management provider, found that 96 percent of American consumers are concerned about data privacy. Yet the study also found that consumers are frustrated with non-relevant messages, causing them to unsubscribe from emails, stop visiting the companies’ websites, and even stop buying from (or even advocate against) the companies.

Google antitrust proceedings: Digital business and competition

European Parliamentary Research Service,  Wednesday, July 15, 2015

The Google case may provide an opportunity for the Commission to clarify some aspects of competition law with regard to certain digital practices, and to close the difficult gap between the rights of companies who dominate the market, free competition and consumer protection.

Federal cybersecurity incidents increased more than 1,000 percent since 2006

Billy Mitchell, FedScoop,  Wednesday, July 15, 2015

The two OPM hacks that compromised the personal information of 22.1 million people were just blips on the radar in total volume of federal cyber incidents. The report — submitted as testimony by Greg Wilshusen, director of information security issues at GAO, in a recent congressional hearing — shows that in fiscal year 2014, federal agencies experienced 67,168 cybersecurity incidents involving personally identifiable information. The number of incidents has increased every year since fiscal year 2006, when that number was just 5,503. That's an upsurge of 1,121 percent in just nine years.

Challenges for Competition Policy in a Digitalised Economy

Committee on Economic and Monetary Affairs, European Parliament,  Tuesday, July 14, 2015

This study describes the challenges that competition policy faces in relation to the digital economy. It explores the specific characteristics of digital economy markets and how these characteristics impact competition policy. This study was well underway when the Commission presented its Digital Single Market (DSM) plans on 6 May 20151, including the announcement of an e-commerce sector inquiry. It is expected that the sector inquiry will deliver its first results in 2016. This study already offers a first overview on market developments and its implications for competition policy. The study focuses on to the economic and legal analysis of competition problems that are caused by the characteristics of the digitalised economy. As such, competition policy and its instruments such as anti-trust laws, merger regulation, State aid, and sector regulation are at the centre of the study. Other policy fields, for instance trade policy, industrial policy and consumer protection fall outside the scope.

Managing accessibility in the public procurement of ICT

European Committee for Standardisation,  Tuesday, July 14, 2015

The scope of the Accessible ICT Procurement Toolkit is based on the contents of EN 301 549 and related Technical Reports produced in the context of Mandate 376. Nevertheless, the Toolkit includes a wide range of support and guidance material to facilitate procurers in incorporating accessibility as a criterion in the procurement of ICT products and services.

Deloitte paints worrying picture of government readiness for digital transformation

Derek du Preez, Diginomica (UK),  Monday, July 13, 2015

And it can’t be denied that progress has been made. The G-Cloud framework (despite recent worries over awareness levels) has paved the way for a new approach to procurement, working digital hubs are being formed across central government and millions of pounds has been saved. GaaP, if successful, could be genuinely groundbreaking for governments around the world. However, despite the visions, rhetoric and success stories to date, it’s easy to forget the magnitude of the challenge at hand and the problems that the government is going to have in scaling up its digital ambitions beyond the walls of Whitehall and across local government, schools and the NHS.

Thoughts on Encryption and Going Dark, Part II: The Debate on the Merits

Benjamin Wittes, Lawfare,  Sunday, July 12, 2015

In this post, I want to take on the merits of the renewed encryption debate, which seem to me complicated and multi-faceted and not all pushing in the same direction. Let me start by breaking the encryption debate into two distinct sets of questions: One is the conceptual question of whether a world of end-to-end strong encryption is an attractive idea. The other is whether—assuming it is not an attractive idea and that one wants to ensure that authorities retain the ability to intercept decrypted signal—an extraordinary access scheme is technically possible without eroding other essential security and privacy objectives.

Google, Yelp, and the Future of Search

by Joshua Gans, Harvard Business Review,  Saturday, July 11, 2015

Why aren’t things better? This is something that I often feel these days when searching for information on the internet. And it is especially something I feel when I am searching for products where quality matters. This applies to restaurants, tradespeople, and books, for example. In each of these cases, I am looking for not just anything — but something that is good or even high quality.

Access to Electronic Data by Third-Country Law Enforcement Authorities: Challenges to EU Rule of Law and Fundamental Rights

The Centre for European Policy Studies (CEPS),  Friday, July 10, 2015

This study examines the challenges to European law posed by third-country access to data held by private companies for purposes of law-enforcement investigations in criminal proceedings. The proliferation of electronic communications is putting cloud-computing companies under severe strain from multiple demands from the authorities to acquire access to such data.