Privacy

Adopting cloud computing can mean entrusting data to a third-party vendor. For agencies responsible for personally identifiable information or mission-critical applications, this raises a host of privacy concerns, chief among them the issue of data sovereignty and the question of determining appropriate government and commercial uses of private citizens’ data. This section of the SafeGov.org site analyzes the risks to privacy associated with cloud adoption and explores ongoing means to mitigate them.

Taking Digital Privacy to the Next Level

Bjorn Aannestad, Business 2 Community,  Friday, September 23, 2016

Robin Wilton Interview: Robin is technical outreach director for identity and privacy in the Internet Society’s Internet Technology Office. He is a specialist in digital identity, IT security and public policy and is a member of the Kantara Initiative’s Board of Trustees. Robin also worked as a research analyst on Gartner’s Identity and Privacy Strategies team.

After GDPR, Privacy Shield and Brexit, 5 questions you need to ask about your data

Fortunato Guarino, SC Magazine,  Thursday, September 15, 2016

Any new regulation brings an inherent risk of non-compliance. To avoid issues, organisations need to understand exactly where any sensitive data is stored. Unfortunately, this is usually much easier said than done. The exponential increase in the amount of data produced makes answering even basic questions about how information is created, stored and managed difficult for many businesses to answer. This lack of insight creates a tremendous amount of risk. However, there are steps organisations can take to better manage data, reducing their risk of non-compliance, and mitigating potential damages in the event of a cyber-attack. The process starts with knowing which questions to ask.

Azure, Office 365: Microsoft's two new cloud regions tackle data privacy issues

Liam Tung, ZDNet,  Wednesday, September 7, 2016

Microsoft has officially opened two new cloud regions, offering Azure and Office 365 from multiple datacenter locations in the UK for the first time. The new UK regions take to 28 the number of Microsoft generally-available regions for its cloud infrastructure and platform services. For UK enterprise customers, the regional services are also designed to provide a better option for meeting requirements to store certain data locally. The new cloud areas are made up of UK West and UK South, served from datacenters in London and Cardiff, the capital of Wales.

Should U.S. States Store Their Citizens’ Data Overseas?

Jeff Gould by Jeff Gould, SafeCloud.org
Tuesday, September 6, 2016

After a recent federal court ruling against prosecutors seeking emails stored abroad, a new case in Virginia again highlights the clash between privacy rights and data sovereignty

Data Is Forever…

Eric Peters, Inside Sources,  Tuesday, September 6, 2016

James Bond had it wrong — diamonds aren’t forever. Data is. Its privacy ought to be, too. Unfortunately, laws regarding who may access your data, how it’s accessed — and when — haven’t caught up to data storage technology.

Tim Cook, the interview: Running Apple ‘is sort of a lonely job’

Jena McGregor, Washington Post,  Monday, August 22, 2016

Just after Apple disclosed those results, Cook sat down with The Washington Post to discuss his first five years in one of Corporate America’s most glaring spotlights. In two sprawling and highly self-reflective interviews — one in his office and another by phone just before he left for vacation in Yellowstone and Grand Teton National Parks — Cook described why the visibility of the job has been “shocking,” how he’s learned to deal with the scrutiny, and who he’s turned to for advice at pivotal moments...

EU Privacy Regulation Changes For WhatsApp + Skype

Richard Stiennon, Information Security Buzz,  Friday, August 19, 2016

The EU Commission has confirmed its desire to bring in more regulation for online messaging services such as WhatsApp and Skype in an attempt to safeguard users’ privacy. Richard Stiennon, Chief Strategy Officer, Blancco Technology Group commented below.

Canada police chiefs push for law forcing people to hand over passwords

Jim Bronskill, Toronto Star,  Thursday, August 18, 2016

The Canadian Association of Chiefs of Police has passed a resolution calling for the legal measure to unlock digital evidence, saying criminals increasingly use encryption to hide illicit activities. There is nothing currently in Canadian law that would compel someone to provide a password to police during an investigation, RCMP Assistant Commissioner Joe Oliver told a news conference Tuesday. Oliver said criminals — from child abusers to mobsters — are operating online in almost complete anonymity with the help of tools that mask identities and messages, a phenomenon police call “going dark.” “The victims in the digital space are real,” Oliver said. “Canada’s law and policing capabilities must keep pace with the evolution of technology.”

Microsoft’s leaky ‘boot’ offers another reason to preserve encryption

Nathan Leamer, R Street,  Thursday, August 18, 2016

We at the R Street Institute support strong encryption and have warned about the consequences of efforts to undermine this essential security tool through government-mandated backdoors, compelled assistance or other means. A similar position was reiterated by Apple CEO Tim Cook in his February “letter to customers” that clarified the company’s defense of encryption.

The Privacy Paradox

Colin Poltras, UConn,  Thursday, August 18, 2016

In a new study by a UConn communication professor and co-authors, hundreds of university students agreed to give up their first-born child and turn their personal data over to the National Security Agency in return for access to what they thought was a new social networking site. “The privacy paradox is basically the idea that we say one thing and do another when it comes to privacy,” says Oeldorf-Hirsch. “Individuals may state that privacy is important and that they are interested in protecting their information, but their behavior does not corroborate those intentions. People generally share more information or share it more widely than they claim to.”