Policy & Regulation

Policy & Regulation / Most Viewed

China One Step Closer to Implementing Controversial Cybersecurity Law

China is moving forward towards implementing a controversial cybersecurity law that could have significant implications for foreign businesses operating in that lucrative market, reports Katie Bo Williams in The Hill. more

Testing, Testing, Testing for a More Secure (Internet) World

Reading up on COVID-19 and Zoom/Boris Johnson outcry yesterday, an analogy struck me between the two: the lack of testing. In both cases, to truly know how safe and secure we are, testing needs to be stepped up considerably. This post focuses on cybersecurity. Over the past days and weeks, more and more organisations have switched to digital products and services to sustain working from home, to keep productivity up and to be connected. more

The Digital Age and Education of the Future

For some years I hear people discuss that education needs to transform and adapt to the Digital Age. In one way education has: I am told that so called MOOCs, Massive Open Online Courses, are a huge success. Classes from lecturers at (top) universities are freely available online. But this is traditional education distributed and made accessible in a modern form. The debate ought to focus on education for the jobs and skills of the future. more

Google Hosting a Discussion on the Future of Cloud Computing

Google will be hosting a discussion on the future of cloud computing and technology policy tomorrow, March 20, in Washington, D.C. Participants include Jeffrey Rayport, principal at the Marketspace consulting group and a leading experts on digital strategy and marketing, and Andrew Heyward, former President of CBS News, who will be presenting the findings of their new study. "They will assess the possibilities, risks and returns of cloud computing; the next steps in moving forward; and potential implications for technology policy," says Dorothy Chou, Google's Global Communications and Public Affairs. Those unable to attend are invited to submit questions in advance via Google Moderatormore

Executive Order and the New Date Privacy Rights of Non-US Citizens

"Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US," Bruce Schneier writes in his security blog. more

Net Neutrality’s Legal Binary: An Either/Or With No “Third Way”

People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more

British Organizations Could Face Massive Fines for Cybersecurity Failures

Organizations who fail to implement effective cybersecurity measures could be fined as much as £17 million or 4% of global turnover, as part of Britain's plan to prevent cyberattacks. more

Maintaining Trust, Respecting Privacy and Due Process

In order for the Internet to function properly, there has to be "trust". Trust in "online" is something that has ebbed and flowed over the years, but over the past two decades more and more of our daily lives are linked closely to "digital". Our banks encourage us to use online banking and their mobile apps. Government agencies share (and collect) information from private citizens and businesses online. And of course we all do more and more of our shopping online... more

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Hans-Georg Maassen, Germany's head of the German Federal Office for the Protection of the Constitution says large amounts of data were seized during the May 20015 cyberattack on lower house of parliament (Bundestag). more

In Response to Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more

5G Security – Metrics of the Engaged

This past month on 03-06 March, the global industry sub-group that exists at the center of 5G security met virtually. It is known as SA3 within the 3GPP organization, and it met over a period of five days to deal with some of the most important 5G security requirements. 3GPP is a "partnership" created among all the world's major standards bodies, which over several decades has cooperatively developed and evolved by far the largest and most successful global electronic communications network. more

Human Rights in the Digital Age, Online Pharmacies, and the “Brussels Principles”

"Human Rights in a Digital Age" is the theme of this year's RightsCon conference in Toronto. An essential human right is access to safe, affordable prescription medications. The Internet makes this possible, our organization has proven it's achievable and sustainable over an extended period of time, and our proposed "Brussels Principles" provide the framework to take our proven success internationally. Across the Globe, to people everywhere. more

Controversy Looms as Pakistan Passes Cybercrime Law, Critics Say Violates Human Rights

Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. more

Internet Governance: Coin of the New Realm

The Aspen Institute released the IDEA Common Statement and Principles as a do no harm Hippocratic Oath for Internet governance. The Aspen report describes the present moment as an inflection point for "the most robust medium of information exchange in history". Reed Hundt outlined the risks associated with Internet governance changes favored by China and a group of developing nations through the ITU. more

WikiLeaks’ Vault 7: CIA Gives a Free Lesson in Personal Cyber Security

WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more