Cloud computing services from outside the U.S. are trying to exploit perceived weaknesses in privacy laws to drive business away from U.S. providers, according to some representatives of the tech industry. Deutsche Telekom and other ...
Tags: Foreign cloud, marketing, privacy, Computer Products
The number of UK websites complying with the newly enforced cookie law improved in the final month of the grace period, but 80% are still not compliant, a study shows. Since 26 May, UK website owners have been required by law to ensure ...
EC vice-president and leader of the digital agenda Neelie Kroes says website owners still need to obtain consent to use cookies,even if web users have browsers that offer'do not track'(DNT). Kroes,who is seeking a way for web users to opt ...
Tags: Cookie Law, obtain consent, use cookies
Vodafone has publically stated it is "extremely disappointed" with Everything Everywhere's successful bid to revamp its 2G databand into the UK's first 4G network coverage. Speaking at yesterday's Broadband Britain Westminster eForum, the ...
Tags: Vodafone, 4G, network, EE, disappointment
Most UK website users are choosing to allow the use of third-party advertising cookies, according to analysis of the impact of the so-called "cookie law". The UK regulation on the use of cookies, or small files containing browser ...
Tags: UK, Cookies, Website Users, Computer Products
The European Commission today launched a public consultation into net neutrality. It will be led by the vice president for the digital agenda at the EC, Neelie Kroes, who is keen to establish the facts around management of internet ...
Tags: European Commission, public consultation, net neutrality, internet
The Information Commissioner's Office (ICO) investigated the men following complaints from consumers, and has put an additional eight companies on notice that they face action, including fines if it is proved they are sending out unwanted ...
Tags: ICO, unsolicited marketing messages, company news, information
In the midst of a tough job market, prospective employees are now dealing with a troubling trend of employers seeking Facebook and other social media passwords as part of their vetting process. After a recent Associated Press report, ...
Tags: job market, social media, vetting process, private information
The U.S. House of Representatives has voted to approve the extension by five years of a controversial law, that its critics claim allows for the warrantless surveillance of electronic communications like email and phone calls of not only ...
Computerworld - The specter that Congress will reauthorize the controversial FISA Amendments Act of 2008 without any changes to its sweeping spying provisions is evoking cries of alarm from advocacy and privacy groups. Many say the law, ...
A federal judge is concerned with the lack of oversight Electronic Communications Privacy Act search requests receive. Few people have ever heard of the Electronic Communications Privacy Act (ECPA) of 1986, but a recent New York Times ...
Tags: Electronic Communications Privacy Act, law, act, enforcement
The Internet, long viewed as a tool to expand freedom, is an equally effective tool for repression. That is just as true in the United States as anywhere else. Security guru Bruce Schneier noted in a recent blog post, citing Evgeny ...
Tags: Cyber spying, Middle East, Skype, Spying, Syria, video
Small and medium enterprises (SMEs) in the UK are up in arms about the last-minute changes made to policy on the newly-enforced cookie law. Since 26 May, UK website owners have been required by law to ensure the sites obtain users' opt-in ...
Tags: SMEs, cookie law, UK
The U.S.Dept.of Energy has set a goal to develop battery and energy storage technologies that are five times more powerful and five times cheaper than today's within five years. To accomplish this,U.S.Energy Secretary Stephen Chu is ...
Tags: U.S.Dept.of Energy, goal, battery, energy storage technologies, DOE
The European Commission (EC) has launched a public consultation on cyber security that will run until 12 October 2012. The EC is seeking the views of governments, businesses and citizens about their experiences and possible EU responses ...
Tags: EC, public consultation, cyber security