Skip to main content

Home/ Internetni praktikum/ Group items tagged enforcement

Rss Feed Group items tagged

Urška Cerar

What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views

  • Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
  • many of these requests are legitimate
  • It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
  • ...5 more annotations...
  • Google says, "When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and Google's policies.
  • once a request has been deemed valid, Google will notify users when possible.
  • Google will not provide a user's search-query information or the contents of a user's account (email content, pictures, documents, etc.) without a warrant.
  • Google has advocated for updating ECPA, "so the same protections that apply to your personal documents that you keep in your home also apply to your email and online documents."
  • If Google can establish clear practices now that somehow balance the competing needs of law-enforcement agencies and private users, that effort will pay off
Katja Saje

Readers' privacy is under threat in the digital age | Books | The Guardian - 1 views

  • Every time you read a newspaper on your computer or buy an ebook, you can leave an electronic trail behind you. That trail is potentially lucrative for business, and is a new source of surveillance for government and law enforcement.
  • Retailers and search engines, most notably Amazon and Google, can now gather an astonishingly detailed portrait of our book-reading habits: what we buy, what we browse, the amount of time we spend on a page and even the annotations we make in an ebook.
  • Amazon also reserves the right to disclose information when it "believes release is appropriate to comply with the law". A stronger protection for our privacy should require a warrant before personal data is released.
  • ...2 more annotations...
  • Awareness of the problem is growing, from Google's catastrophic launch of its social network Buzz in 2010, which shared users' contacts without their permission, to the revelation last year that Facebook was still tracking users' browsing information after they had logged out.
  • The new possibilities for surveillance undermine the fundamental privacy of the act of reading.
Jan Keček

Cyber-security: To the barricades | The Economist - 0 views

  • European Commission and the White House have set out a series of new rules designed to stem the rising tide of cyber-attacks against public and private victims.
  • Alongside his state-of-the-union message on February 11th, Barack Obama released an executive order intended to plug the gap left by the failure of Congress to pass cyber-security legislation that matches the growing threat.
  • By contrast, the European Commission’s cyber-security strategy is at an earlier stage. It wants member countries to introduce laws compelling important firms in industries such as transport, telecoms, finance and online infrastructure to disclose details of any attack they suffer to a national authority, known as a CERT (Computer Emergency Response Team). Each CERT will be responsible for defending vital infrastructure-providers against online attacks and sharing information with its counterparts, law-enforcement agencies and data-protection bodies.
  • ...1 more annotation...
  • What neither the European nor American measures deal with directly is the shortage of cyber-security specialists. A gloomy review of the British government’s strategy by the National Audit Office, a spending watchdog, said the skills gap could take 20 years to bridge.
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Rok Urbancic

BBC News - Google must drop ivory adverts say campaigners - 0 views

  • Campaigners say Google are encouraging the poaching of elephants by running advertisements promoting ivory products.
  • more than 10,000 ads about ivory were running on Google's Japanese shopping site.
  • They have written to the internet giant asking for their removal.
  • ...9 more annotations...
  • adverts relating to endangered species were not allowed on their sites.
  • They found more than 1,400 of these types of ads
  • ads on Google's wholly owned Japanese shopping site, they found more than 10,000.
  • one of the world’s richest and successful technology companies with such incredible resources had taken no action to enforce their own policies
  • They say that the adverts are still up and running.
  • Dealing with the ivory issues is one of the key tasks for this meeting of Cites
  • The sale of elephant tusks was banned back in 1989.
  • around 30,000 elephants a year are still being killed to meet the demand for trinkets and carvings that are often sold to tourists
  • The internet has given a huge boost to the ivory business.
1 - 5 of 5
Showing 20 items per page