background preloader

IPrivacy4IT – Clarinette's blog

The Electronic Commerce Directive (00/31/EC), in the footsteps of the 2000 Lisbon European Council, aim was set to ensure the free movement of “Information Society Services” throughout the European Community. To encourage greater use of E-commerce by breaking down barriers across Europe and to boost consumer confidence and trust by clarifying the rights and obligations of businesses and consumers. To develop secure transactions inside the Internal Market to be able to compete with the rest of the world – by creating the European Regulatory Framework similar to the US DCMA. the Directive came after a German case in which a managing director of an ISP was sentenced to prison for pornography unknowingly held on its servers. Although the decision was reversed on appeal, it drew attention to the need for clear guidelines on the liability of ISPs, especially when they do not have knowledge of the infringing material

http://clarinettesblog.wordpress.com/

Related:  CCTV cameras

Is Internet Access a Fundamental Human Right? France's High Cour France's highest court, the Constitutional Council, ruled that access to the internet is a "fundamental human right" this week in striking down a controversial "three strikes" anti-piracy law called Loi Hadopi, according to a report today from the UK Daily Mail. Were such an opinion agreed upon by other governments around the world, the implications would be striking. Conversely, are peoples' fundamental human rights being violated when they don't have access to the internet? It's tempting to consider internet access a luxury, but consider the increased quality of life that comes with the huge jump in access to cultural and logistical information the internet brings.

Not opt out not opt in, but something in between - Articles - All - Publications - Welcome to Field Fisher Waterhouse LLP This article was first published in Data Protection Law & Policy in July 2010 A fascinating subject, a well thought out and constructed story line, some surprises and an intriguing open ending - if this was a movie, we would be heading for a Hollywood blockbuster. As it happens, it is just an Article 29 Working Party Opinion, but possibly a critical one for the development of the Internet. Is Google Watching You? New Plugin Will Let You Know [APPS] Another rad browser plugin called Google Alarm hit the Internets this week, which alerts you every time your personal info is sent to Google's servers. How? Via notifications, a running tally of dangerous sites and, naturally, a super annoying, vuvuzela-like alarm. After seeing this new plugin — which works with both Firefox and Chrome — on F.A.T., I contacted the developer who made it: Jamie Wilkinson, who also created Know Your Meme and Mag.ma.

Hacker exposes 40,000 Credit Cards from Digital Playground Hacker exposes 40,000 Credit Cards from Digital Playground A new hacking group called The Consortium has hit the scene and their first take down is the porn site Digital Playground deface it and Mirror is available here. Everything, including credit card information, was stored in plain text. "The Consortium" claim to have broken into the servers of DigitalPlayground.com last weekend and stolen 72,000 usernames and passwords and 40,000 credit-card numbers. In addition to the theft of credit card numbers, the hackers also claim that they made off with the personal information of 72,000 other users. This the second large hacking attack on a porn website in the last several months.

net.wars: An affair to remember Politicians change; policies remain the same. Or if, they don't, they return like the monsters in horror movies that end with the epigraph, "It's still out there..." Cut to 1994, my first outing to the Computers, Freedom, and Privacy conference. I saw: passionate discussions about the right to strong cryptography. The counterargument from government and law enforcement and security service types was that yes, strong cryptography was a fine and excellent thing at protecting communications from prying eyes and for that very reason we needed key escrow to ensure that bad people couldn't say evil things to each other in perfect secrecy. The listing of organized crime, terrorists, drug dealers, and pedophiles as the reasons why it was vital to ensure access to cleartext became so routine that physicist Timothy May dubbed them "The Four Horsemen of the Infocalypse".

Tells Congress Privacy Bills May Harm Business and Consumers Testifies on Privacy Legislative Drafts, Champions Industry Self-Regulation, Raises Serious Concerns About Current Proposals The Interactive Advertising Bureau’s Mike Zaneis, Vice President of Public Policy, testifies before the U.S. Congress to express the advertising industry’s serious reservations about two legislative proposals that jeopardize the Internet and the interactive advertising that has made possible an explosion of new information, communications and entertainment. On July 19, Illinois Representative Bobby Rush, Chairman of the Subcommittee on Commerce Trade and Consumer Protection, introduced HR 5777, the Best Practices Act. It followed the release of a discussion draft of privacy legislation made last May by U.S. Representatives Rick Boucher, Chairman of the Subcommittee on Communications, Technology, and the Internet, and Cliff Stearns, Ranking Member of the Subcommittee.

Official Website These Google Analytics Terms of Service (this "Agreement") are entered into by Google Inc. ("Google") and the entity executing this Agreement ("You"). This Agreement governs Your use of the standard Google Analytics (the "Service"). BY CLICKING THE "I ACCEPT" BUTTON, COMPLETING THE REGISTRATION PROCESS, OR USING THE SERVICE, YOU ACKNOWLEDGE THAT YOU HAVE REVIEWED AND ACCEPT THIS AGREEMENT AND ARE AUTHORIZED TO ACT ON BEHALF OF, AND BIND TO THIS AGREEMENT, THE OWNER OF THIS ACCOUNT.

Deutsche Telekom: simko: "Fort Knox" in the Telephone Telekom offers security for those who work with cell phones.Data and communication protection for business and government.Espionage, sabotage, cyber attacks are real threats. At CeBIT Deutsche Telekom is launching the third version of simko, a new standard for secure mobile working scenarios. The further development of the security solution for classified information of the German government means that the solution will soon be deployed abroad.

On Facebook Apps Leaking User Identities The Wall Street Journal today reports that many Facebook applications are handing over user information—specifically, Facebook IDs—to online advertisers. Since a Facebook ID can easily be linked to a user’s real name, third party advertisers and their downstream partners can learn the names of people who load their advertisement from those leaky apps. This reportedly happens on all ten of Facebook’s most popular apps and many others. The Journal article provides few technical details behind what they found, so here’s a bit more about what I think they’re reporting. The content of a Facebook application, for example FarmVille, is loaded within an iframe on the Facebook page.

Related:  Copyright related blogs