ITsecurity
twitter facebook rss

Is Google too big to control?

Posted by Kevin on December 3, 2014

Publishers in general look at Google’s massive profits compared to their own and say, “That’s not fair. We produce the copy and get very little; they do nothing but link to it and get huge profits.” Not surprisingly, they want things to change. “Since we own the copyright,” says the argument, “Google should be forced […]

European privacy regulators clarify right to be forgotten

Posted by Kevin on November 28, 2014

The European Article 29 working party of national data protection regulators has issued guidelines on the European Court’s so-called right to be forgotten ruling, effectively closing some of the loopholes. Perhaps the most important of the opinions is that the ruling applies to all domains available in the EU and not just European domains. Thus, […]

Update on FTC penalties against TRUSTe

Posted by Alexander Hanff on November 22, 2014

As many people will know I was in Brussels earlier this week delivering two presentations at the IAPP Europe Data Protection Congress.  I was there to talk about encrypted email in the first session and mobile privacy (more specifically the risks BYOD pose to corporate networks, data and infrastructure) in the second session. On Wednesday […]

It is official, you can’t trust TRUSTe.

Posted by Alexander Hanff on November 17, 2014

Today the Federal Trade Commission (FTC) issued a press release outlining details of a settlement reached with TRUSTe on the grounds that the “company failed to conduct annual recertifications, facilitated misrepresentation as non-profit”.  The FTC goes on to accuse TRUSTe of not following through on annual recertifications of companies who obtained their privacy seal from […]

Taking Back My Privacy – DIY Secure Phone

Posted by Alexander Hanff on November 14, 2014

Over the last week I decided to start a new project mostly as a proof of concept but also down to curiosity as to how easy/difficult it would be – I decided to try to make myself a secure phone. Hardware-wise it was fairly simple, I have an old HTC Desire handset which has been […]

Protect your Privacy from as little as 7p per day

Posted by Alexander Hanff on November 10, 2014

How many of you use mobile data? Have you read the terms and conditions of your mobile contract? If you have you will be aware that pretty much every mobile carrier in the world grants themselves permission to read your emails, monitor which web sites you visit and a whole host of other privacy invading […]

Westin’s “Privacy Segmentation” critiqued.

Posted by Alexander Hanff on November 9, 2014

Professor Alan Westin was a privacy giant with research dating back to the 1960s and a professional career seen by many privacy professionals as paramount to the development of the current legal regime regarding privacy and data processing. It is without question that Westin dedicated his life to privacy law but his research was often private […]

Google and Differential Privacy – RAPPOR

Posted by Alexander Hanff on November 8, 2014

There is a great deal of press coverage this week about Google’s announcement at CCS 2014 that they are working on a new project called RAPPOR (PDF) which reportedly uses techniques from the 1960s based around differential privacy. This is good news, or would be if it meant Google were becoming more ethical with regards […]

The right to privacy Vs the right to spy

Posted by Kevin on November 5, 2014

Human rights are hugely misunderstood — there is actually no such thing. We are born with no ‘rights’; we are simply born. The assertion of a right is nothing more than a refusal to accept a negative. It is a denial that some third party should be allowed to prevent something. In this way, a […]

Google, RAPPOR and care.data

Posted by Kevin on November 3, 2014

The Holy Grail of acquiring statistics without impinging privacy has, according to Google, been found. It is an application of Randomized Aggregatable Privacy-Preserving Ordinal Response (Rappor); and Google will present its technical paper at this week’s 21st ACM Conference on Computer and Communications Security in Scottsdale, Arizona. The paper claims, RAPPORs allow the forest of client […]