background preloader

The 39 MEPs That Voted For ACTA

Related:  NeWeb Privacy

Computer Fraud And Abuse Act 2013: New CFAA Draft Aims To Expand, Not Reform, The ‘Worst Law In Technology’ “The Computer Fraud and Abuse Act is the most outrageous criminal law you’ve never heard of,” Tim Wu, a Columbia law professor and pioneer of network neutrality, wrote in the New Yorker. “It bans ‘unauthorized access’ of computers, but no one really knows what those words mean.” Despite the enormous reach of the Computer Fraud and Abuse Act as it currently stands – it was the same law used by prosecutors to torment late Internet activist Aaron Swartz prior to his suicide on Jan. 11 -- the House Judiciary Committee has actually proposed a number of expansions to the law in a new draft, which Tech Dirt says will be “rushed” to Congress during its “cyber week” in the middle of April. You can read the proposed Computer Fraud and Abuse Act draft in its entirety here.

The Battle over Digital Rights Management: A Multi-Method Study of the Politics of Copyright Management Technologies by Bill Herman Digital rights management (DRM) refers to various technological systems by which copyright holders seek to exert control over the use and circulation of their works. This dissertation explores the policy debate over copyright law as a potential vehicle for regulating DRM technologies. It examines this debate in three separate time periods, between 1989 and 2006, as it took place in Congress, in The New York Times and Washington Post, and online. It answers the question: Which policy actors communicate most regularly in which media about DRM and copyright law, and how has this changed over time? Methods used include quantitative content analysis of documents from all three media, qualitative historical policy analysis, and web graph analysis tools that quantify and map the hyperlinks between websites. This work builds upon and extends the methodology of using web graphs as a tool for identifying the most central actors within a topical cluster of websites.

Robots exclusion standard The Robot Exclusion Standard, also known as the Robots Exclusion Protocol or robots.txt protocol, is a convention to advising cooperating web crawlers and other web robots about accessing all or part of a website which is otherwise publicly viewable. Robots are often used by search engines to categorize and archive web sites, or by webmasters to proofread source code. The standard is different from, but can be used in conjunction with, Sitemaps, a robot inclusion standard for websites. ACTA Voted Down By European Parliament By a vote of 478 to 39, the European Parliament has rejected the Anti-Counterfeiting Trade Agreement (ACTA), by a near-unanimous margin of 478 votes to 39 in favor, with 146 abstentions. ACTA called for internet providers to cooperate with governments in cracking down on online piracy, via measures such as cutting off internet access for those who illegally downloaded music or other files; those accused could face harsh fines and criminal charges. Opponents — many Europeans have been writing to their representatives in protest — have charged that ACTA will lead to censorship and a loss of privacy rights, similar fears of opponents to the two anti-piracy bills, SOPA and PIPA, in the US. ACTA was approved by a unanimous vote in the European council last December. 22 member states of the European Union had signed the treaty in Tokyo on January 26; for the EU to be a formal member of ACTA, all 27 member countries of the EU would have had to sign the treaty.

We need to talk about sensors: How the internet of things could affect privacy Here at Telefonica's Campus Party Europe tech festival in Berlin, this morning has seen some interesting sessions about privacy, with one in particular tackling the potential and risks of the internet of things. We should already be having a widespread discussion about this subject, because the push is on, even if – as with the embedded sensors themselves – it's not visible to most people. The talk that really grabbed me was by Joe Huser, an LA-based corporate attorney who tends to represent entrepreneurs that are trying to get their heads around the regulatory issues associated with the internet of things. He ran through several scenarios that may or may not happen, as the world around us becomes subtly but pervasively connected — with each scenario relating to certain legal principles of data protection and privacy.

Privacy And Self Determination In The Digital Age – Your Phone Company Is Watching Many readers of my blog are interested in privacy/security and might find a recent TED talk of interest also. Entitled Your Phone Company Is Watching, the presenter Malte Spitz talks about his attempts to retrieve records pertaining to his mobile phone usage. The EU’s data retention laws require mobile operators and internet service providers to maintain complete records from 6 months to 2 years regarding such usage. When finally successful he discovers 6 months of his movements and communications records which he shares in visualized form with the audience.

ACTA Is DEAD After European Parliament Vote Today at 12:56 CET, the European Parliament decided whether ACTA would be ultimately rejected or whether it would drag on into uncertainty. In a 478 to 39 vote, the Parliament decided to reject ACTA once and for all. This means that the deceptive treaty is now dead globally. Brain Hacking: Scientists Extract Personal Secrets With Commercial Hardware Chalk this up to super-creepy: scientists have discovered a way to mind-read personal secrets, such as bank PIN numbers and personal associations, using a cheap headset. Utilizing commercial brain-wave reading devices, often used for hands-free gaming, the researchers discovered that they could identify when subjects recognized familiar objects, faces, or locations, which helped them better guess sensitive information. Security interrogators could benefit most immediately from the new brain hacking technique, since it would reveal when suspects are actually familiar with the face of a potential accomplice. As for bank information, scientists could guess the first PIN number only 40% of the time.

OASIS (organization) The Organization for the Advancement of Structured Information Standards (OASIS) is a global consortium that drives the development, convergence, and adoption of e-business and web service standards. With its headquarters in the United States, members of the consortium decide how and what work is undertaken through an open, democratic process.[1] Technical work is being carried out under the following categories: Web Services, e-Commerce, Security, Law & Government, Supply Chain, Computing Management, Application Focus, Document-Centric, XML Processing, Conformance/Interop, and Industry Domains. OASIS was first formed as SGML Open in 1993 as a trade association of SGML tool vendors to cooperatively promote the adoption of SGML through mainly educational activities, though some amount of technical activity was also pursued including an update of the CALS Table Model specification and specifications for fragment interchange and entity management.

Attack ACTA This page lists different ways to take action against ACTA right now and to learn more about this dangerous agreement. ACTA is a multi-lateral trade agreement which threatens to change the Internet as we know it and puts fundamental freedoms at risk. The European Parliament will vote on ACTA this Wednesday July 4th and has the occasion to reject it once and for all. You will find on this page different ways you can act to defeat ACTA as a citizen. As a citizen, the main two things to do are:

Identity management system An identity management system refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity management. Additional terms are used synonymously with "identity management system" including: Access governance systemIdentity and access management systemEntitlement management systemUser provisioning system Identity management (IdM) describes the management of individual identities, their authentication, authorization, roles, and privileges [1] within or across system and enterprise boundaries[1] with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks.[2]