In today’s world of high-speed electronic communications you would expect your employees to use email. Your organisation’s corporate email configuration should include an email disclaimer configured and added automatically to the bottom of the message before being sent. The email disclaimer should contain information such as the signature of the sender; business notice; confidentiality notice; […]
Just over a decade ago amid increasing threats from terrorism and organised crime, the UK’s interception of communications regime was updated to include the lawful interception of email, the Internet and other online technologies. Unauthorised interception of electronic communications was banned outright. Yet organisations would still need to have control over their own business systems for lawful business practices. […]
As the NSA PRISM debate rages E RADAR’s Jim Richardson looks at some of the steps you can take to protect your online personal privacy from the prying eyes of government. Today it seems like you have no privacy at all. Your home may be monitored at any time by both legitimate and illegitimate sources. […]
Hence the also the reason why the blog entry quoted on the Today Programme concluded on the need for genuine partnership and a Communications BIll that really does address the obstacles to that partnership: not the re-creation of a mythical past.
one of the lessons from the past is that the Internet as currently conceived cannot survive unless those who want it to do so work together to help rebuild confidence that it is worth protecting. And if it is going to have to continue to evolve, it is even more important to work together to ensure that it evolves into something better suited to the needs of the majority of law abiding citizens and businesses.
The murder of Drummer Lee Rigby in South London has sent shock waves around the world prompting UK calls to revive the stalled Communications Data Bill which would monitor terrorist activities over the Internet and social media websites. But is the Home Secretary simply riding on a wave of public outrage for political ends, or […]
The House of Representatives passed the Cyber Intelligence Sharing and Protection Act (CISPA) on April 18, almost a year to the day after it also passed CISPA in 2012. The Senate voted the bill down in 2012. In this year’s edition, it simply decided not to vote on the bill at all, reports the LA […]
In a well run organisation the security and anti-fraud teams and the marketing and business development teams should be allies not enemies.
The US Supreme Court is considering the right of citizens to sue over a law that lets government agents conduct dragnet telephone and email surveillance. The current case won’t determine the constitutionality of the sweeping powers of the Foreign Intelligence Surveillance Act (FISA), but a ruling against the government could set the stage for a […]
It going to support the effort necessary to mandate the use of security by design across the public sector (and its suppliers) and to support its adoption by major private sector players so that we stop the development of new applications which incorporate 20 and 30 year old vulnerabilities?