Skip to main content

Home/ Internetni praktikum/ Group items tagged regulation

Rss Feed Group items tagged

Janja Petek

Clashes over Internet regulation during UN talks - World Politics - World - The Indepen... - 0 views

  • The head of the UN's telecommunication overseers sought Monday to quell worries about possible moves toward greater Internet controls during global talks in Dubai, but any attempts for increased Web regulations are likely to face stiff opposition from groups led by a major US delegation.
  • he 11-day conference — seeking to update codes last reviewed when the Web was virtually unknown
  • highlights the fundamental shift from tightly managed telecommunications networks to the borderless sweep of the Internet. 
  • ...6 more annotations...
  • xpanding the Internet into developing nations.
  • Many countries will come to reaffirm their desire to see freedom of expression embedded in this conference,
  • The gathering is also powerless to force nations to change their Internet policies, such as China's notorious "Great Firewall" and widespread blackouts of political opposition sites in places including Iran and the Gulf Arab states.
  • That opens the door ... to content censorship
  • t is clear that some governments have an interest in changing the rules and regulations of the Internet,"
  • Over the decades, it has expanded to include telephone, satellite and other advances in communications.
petra funtek

After Leveson: the internet needs regulation to halt 'information terrorism' | Media | ... - 1 views

  • After Leveson: the internet needs regulation to halt 'information terrorism'
  • We are heading into a future of no regulation with the internet where its monoliths will have plenty of clout, pretty well unfettered by democratic national governments (but not totalitarian ones, like China).
  • How does information terrorism work?What's coming in the future could be far more deadly, involving widespread smears, character assassinations and the destruction of companies and maybe even institutions. And by then we may not have a vigorous press to hold it to account.
  • ...4 more annotations...
  • it is no longer reasonable for the big players - the Googles, Facebooks, YouTubes and Twitters - to say: "Nothing to do with us, guv, we only provide the pipes. What goes through them, that's up to the folk who put it there."
  • To illustrate an example of information misuse, it's worth recounting the alarming experience of a work colleague at the hands of Facebook. Someone he did not know took his name and set up a Facebook page purporting to be his, along with a photo and several intimate details, some true, some false.
  • Citing "freedom of expression", which like motherhood and apple pie is impossible to attack, they will host their anonymous contributors' bullying, lies, smears, breathtaking invasions of privacy
  • An entirely new information world is rising in which each of us can be readers and editors, contributors and subscribers, and maybe even proprietors, at the same time.
Patricija Čelik

As 'Do Not Track' Effort Seems to Stall, Web Companies Race to Look Privacy-Friendly - ... - 0 views

  • Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their control.
  • “It’s not just privacy advocates and regulators pushing,” Mr. Lynch said. “Increasingly, people are concerned more about privacy as technology intersects their life.”
  • In some instances, established companies are trying to gain market advantage by casting themselves as more privacy-friendly than their rivals.
  • ...2 more annotations...
  • To some degree, these developments signal that the industry is working hard to stave off government regulation, which is moving at a glacial pace anyway. There seems to be no movement on broad privacy legislation on Capitol Hill, and no consensus has been reached on standards for “Do Not Track,” a browser setting that would let Internet users indicate that they did not want their activity tracked by marketers.
  • Whether Internet users are ready to pay to protect their personal data is unclear, though surveys have repeatedly pointed to consumer anxiety.
Jan Majdič

Free speech on the internet | Technology | guardian.co.uk - 0 views

  • Freedom of expression has long been regarded as one of the fundamental principles of modern democracies, in which civil liberties are honoured and regarded as a prerequisite for individual development and fulfilment.
  • It is this classic liberal argument that is still used by civil liberties' campaigners on the internet, like Hatewatch, which argues that those "hate speak" groups, such as neo-Nazis, must still speak freely, if only to expose and discredit themselves
  • It is not simply a case of "same old issue, new technology" with free speech and the internet. With its low start-up costs and global reach, the internet enables almost anyone in the West, in theory, to speak and be heard around the world, as well as hear others' speech.
  • ...11 more annotations...
  • particularly when they originate from, and are hosted in, foreign countries.
  • China have successfully prevented their citizens from receiving a huge quantity of (pro-democratic) material on the internet.
  • seeking to regulate and control its immense, potential, power.
  • The anti-censorship pressure group, Campaign Against Censorship of the Internet in Britain, was created in response Scotland Yard's request to ISPs to censor their news feeds
  • Governments in the USA, Germany and France, have all taken significant steps to curtail free speech on the internet
  • US is several years ahead of Britain
  • industry self-regulation
  • Technology is used to censor and evade censorship, although it seems likely that censorship tools will grow in sophistication and use as legislators struggle to censor the internet.
  • In December 1997, a 200-strong internet industry group agreed to accept a common standard of labelling called PICS - the Platform for Internet Content Selection
  • Millions of internet users in big offices, cybercafés, education institutions and libraries will use machines or ISPs which have filters installed in them.
  • In 1999, the EU launched an action plan, "Promoting Safer Use of the Internet", which provides for a hotline, where people can report sites which have caused offence
sintija

BBC News - Google told to fix privacy policy by EU data regulators - 0 views

  • Google told to fix privacy policy by EU data regulators
  • consolidate 60 separate privacy policies into a single agreement.
  • Google has been told it should give clearer information about what data is being collected and for what purpose. It has also been told to give users more control over how the information is combined.
  • ...4 more annotations...
  • Google
  • has been accused of providing "incomplete and approximate" details raising "deep concerns about data protection and the respect of the European law".
  • It said that EU data protection laws place limits on such activities and proposed the following changes:
  • Google must "reinforce users' consent". It suggests this could be done by allowing its members to choose under what circumstances data about them was combined by asking them to click on dedicated buttons. The firm should offer a centralised opt-out tool and allow users to decide which of Google's services provided data about them. Google should adapt its own tools so that it could limit data use to authorised purposes. For example, it should be able to use a person's collated data to improve security efforts but not to target advertising.
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
anonymous

Facebook Workers Try to Spend Less Than 1 Second Determining Whether Content Is 'Approp... - 0 views

  • Facebook
  • safer
  • Woodrow Wilson
  • ...14 more annotations...
  • online bullying
  • Internet
  • Facebook
  • ATLANTIC
  • she traveled to Facebook headquarters to see how they dealt with so-called "third party" reports of about inappropriate content.
  • how long he might spend deciding if a page should stay up or come down.
  • they "optimize for half a second." Half a second!
  • Middle- and high-schoolers are all on Facebook and that means all their drama is on Facebook, too.
  • reports
  • Facebook's
  • come up with some remarkable tools for managing conflict on its site.
  • they claim to have ways of handling problems like this, which serves as a defense to the suggestion that perhaps a government agency should try to regulate them, especially around minors' use of the service.
  • It costs money
  • they'll catch most baldly inappropriate content if they give their reviewers half a second to look at each page.
sergeja perklič

The European Union Closes in on Data Privacy Legislation - SPIEGEL ONLINE - 0 views

  • The European Union is seeking to increase the private sphere of its citizens by strengthening data protection laws for the web. Large Internet firms and lobbyists are fighting the plans.
  • Gmail and Facebook may be forced to abandon their ad-supported models and start charging their customers in Europe or stop providing them with these popular services altogether.
  • Take Facebook, for example, which has its European headquarters in Ireland. The Irish government's data protection commissioner would then be responsible for the concerns of all EU citizens relating to the company's privacy policies.
  • ...2 more annotations...
  • Under exi
  • sting privacy regulations, data protection supervision in EU countries must be conducted entirely independently of public authorities, and data protection controllers are not under the supervision of the European Commission. But the EU wants to weaken this policy and install itself as the data protection agencies' supervisory authority.
sintija

BBC News - US internet 'six strikes' anti-piracy campaign begins - 0 views

  • US internet 'six strikes' anti-piracy campaign begins
  • Five of the country's leading internet service providers (ISPs) are taking part in the Copyright Alert System (CAS), which they say is designed to educate rather than punish users.
  • "Over the course of the next several days... our content partners will begin sending notices of alleged peer-to-peer copyright infringement to ISPs, and the ISPs will begin forwarding those notices in the form of copyright alerts to consumers,
  • ...4 more annotations...
  • Consumers whose accounts have been used to share copyrighted content over P2P networks illegally (or without authority) will receive alerts that are meant to educate rather than punish, and direct them to legal alternatives. And for those consumers who believe they received alerts in error, an easy-to-use process will be in place for them to seek independent review of the alerts they received.
  • Meanwhile the UK has favoured a proposed "three strikes" policy
  • Under telecom regulator Ofcom's draft code, users who receive three warnings within 12 months would have anonymous information about their activities passed to copyright holders which could then seek court orders to discover their identities.
  • The policy had been due to come into effect in March 2014, but has been delayed after a House of Lords committee queried whether the Digital Economy Act - which the code is part of - complied with Treasury rules.
Anja Vasle

Even Google won't be around for ever, let alone Facebook | Technology | The Observer - 0 views

  • At the moment, the four leading monsters are Apple, Google, Facebook and Amazon. Yet 18 years ago, Apple was weeks away from extinction, Amazon had just launched, Google was still three years away from incorporation and Facebook lay nine years into the future.
  • We understand pretty well the factors that determine the fortunes of companies that make things people buy – which is why, for example, one can predict thatApple won't be able indefinitely to sustain its huge profit margins on its iDevices.
  • This leaves Facebook, a company that has one billion products (called users) and earns its living by selling information about them to advertisers.
  • ...11 more annotations...
  • The two key factors that will determine Facebook's future are the power of network effects and the "stickiness" of its service – ie, the extent to which it can dissuade users from leaving.
  • he key determinants of success or failure were (i) the average number of friends that users have and (ii) whether the difficulty of using the site comes to outweigh the perceived benefits.
  • Facebook users will constitute a captive market and will be correspondingly exploited. And the company will be regulated as a monopoly.
  • How much exploitation will users tolerate before they decide to quit?
  • n fact, it is now so dominant that millions of people around the world think that Facebook is the internet.
  • At one point in the conversation, the Google boys noticed that their collaborator had suddenly gone rather quiet.
  • But the number of commercial companies that are more than a century old is vanishingly small.
  • in the technology world one can go from zero to hero is a very short time
  • Google has a well understood and currently profitable business model and a huge technical infrastructure but ultimately is vulnerable to a well-resourced competitor armed with better search technology.
  • A telephone network with a million subscribers is infinitely more valuable then one with only 10. In technological ecosystems, network effects are very powerful: they explain, for example, how Microsoft came to dominate the market for desktop operating and office systems.
  • If you put your faith in network effects, therefore, Facebook looks like a good investment because it'll be around for the long term.
nensic

Under the regime of precarity: bring your own device | openDemocracy - 0 views

  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time. This explains the fierce struggle going on among key market players.
  • Today large communities use devices like smartphones, tablets, e-readers and ultrabooks to navigate this new ecosystem.
  • ...26 more annotations...
  • The growing dynamic of mobile internet, today accounting for 12% of all internet traffic,[ii] signals a new ecosystem where living bodies, machines, networks, code, data, territory and time interact.
  • as a way of consolidating their strictly neoliberal economic policy.
  • The hundreds of thousands of apps, available in just a few years, originate from the intersection of two factors:
  • The desire and necessity to have simple, functional and fast devices able to do specific tasks on the go.
  • the operative skills to develop apps for popular mobile platforms such as Iphone Operating System (IOS) or Google Android. 
  • Apps galore
  • Apple likes to play on the ambiguity in a form of propaganda that exalts the “revolutionary” spirit of technological innovation
  • The first iPhone, in 2007, inaugurated the new phase of the cognitive era, just as the PC heralded the decline of the industrial phase. Five years later, Apple no longer has a monopoly: hundreds of millions of smartphones and tablets are sold every year and the total number of these active devices will be soon 2 billion. It took the PC thirty years to reach this level of diffusion.
  • War over the immaterial
  • Often these machines play opposite functions: as a tool to create new forms of horizontal communication and social interaction or as bait for a capillary exploitation.
  • A political analysis of mobile devices
  • The PC became a liberating tool for social cooperation in the workplace of a booming third-sector.
  • In the following phase, the spread of the first mobile devices – cellphones and laptops – provided an initial impulse for a blurring of life and work, imposing with mobile calls, emails or SMS a new type of real-time processing, regulating the rhythms of life
  • In the new biohypermedia environment, the key change lies in the combination of miniaturizing and mobilizing these pieces of equipment, allowing them to always be within the body’s reach in any context.
  • they augment physical reality[ix] with every kind of information – commercial, cultural, ecological – and act more and more as biomedical sets for the control, correction and support of our vital biological functions.
  • The PC has a central function as the medium for linguistic and written processes - its typical uses often tied to the logical concatenation of thought and the priority management of sequences over time.
  • But mobile devices concentrate complex perception of stimuli in terms of spatial organization and intervene in emotional responses. PC work in this way occupies our left hemisphere, while the continual interactions of a smartphone engage the right hemisphere.
  • In contemporary neoliberalism, these devices become an essential means of rent and profit, through a fine capture of what we generate by living with them and using them. At one and the same time technocracy and financial oligarchies find here an ideal medium to extend their influence and their control of individuals in space and time.
  • Marketing and communication campaigns portray these devices as commodity fetishes, characterizing a new phase of capitalism often described as cognitive because based on knowledge.
  • In the sphere of multinational ICT[x] Corporations a war is being waged over the design and deployment of immaterial enclosures
  • Even though all this is based on freeware and open source, they trick us into believing that the iPhone 5, Windows 8 or Jellybean[xi] are miracles that descend from Mount Olympus and for which we should be grateful as to the gods.
  • Unlike automobiles or, to a lesser degree, PCs, the use value of new mobile devices is no longer determined merely by the initial design but can be moulded by the final user.
  • The innumerable websites, blogs and forums in every language globally blooming and growing are a workshop for worldwide exchange where the digital means are developed that could be used to withdraw workers both from precarity and  from total submission to a life of labour.  
  • Microsoft is no less defensive of its monopoly: with Intel and other accomplices, they introduced a new firmware to boot Windows 8 PCs that, substituting the old BIOS,[xv] makes it impossible or very complicated to install Linux or other operating systems on new laptops.
  • Despite hesitations related to “security” problems, today companies allow or even oblige people to use their own devices
  • So, if you were one of those many who found the latest tablet, smartphone or hybrid touch device under the tree this year, be aware that you won’t be the only one pleased: under the regime of precarity, bring your own device if you want to survive. 
  •  
    "Bring your own device (BYOD) is a business policy whereby employees bring personally owned mobile devices to their place of work and use them to access privileged company resources such as email, file servers and databases as well as their personal applications and data."
alja polajžer

BBC News - Internet privacy: Genuine concerns or paranoia? - 0 views

  • However unwittingly, you share personal information with complete strangers every single day - via the internet.
  • Mr Chester.
  • But Google is not the only internet service busy farming out data and this raises the question of the invasion of people's rights.
  • ...8 more annotations...
  • "Companies like Google, Facebook, Yahoo and Microsoft are expanding their data collection techniques and they are not telling consumers and citizens why,"
  • The issue is about how you pay for online services and whether you are happy to sacrifice privacy for getting a service for free.
  • Most newspapers in the world are posting every newspaper they have ever printed, so people are finding that things they did in the past are being made public.
  • e believes it is the Europeans who are driving the policy debate, while the US strategy is to lobby the Europeans to accept the idea that there can be self-regulation, to trust the Googles and Facebooks and let this market grow.
  • The users themselves are problems as well," he says "Because they post, blog, tweet and do everything else also."
  • A lot of times most people click 'Yes' without reading what the privacy policies are” End Quote Frank Ahern
  • Google has changed its rules to allow information to be shared across all its services.
  • Internet privacy: Genuine concerns or paranoia?
alja polajžer

BBC News - Clarity call for mobile and internet privacy - 0 views

  • Clarity call for mobile and internet privacy
  • The Communications Consumer Panel said that people should have control over which information is shared.
  • Data doubts
  • ...5 more annotations...
  • The panel, which was set up to advise communications regulator Ofcom about consumers' interests, wants more control for shoppers over their data.
  • Consumers using their mobile phones can allow businesses to collect data about their location and the products and services they are interested in.
  • the Information Commissioner raised concerns over people's awareness of data privacy.
  • "It has never been more important to protect your personal information. Whether you are surfing the net, shopping online or signing up to social networking sites, it is crucial that people are thinking about how their information might be used," said Christopher Graham, the Information Commissioner.
  • From employers looking up potential employees on Facebook to cyber-criminals hacking into unsecured wi-fi networks, not protecting your personal information can cause serious harm and distress."
Mateja Žnidaršič

Microsoft: An expensive error | The Economist - 0 views

  • Microsoft, maker of the Windows 8 operating system and the Internet Explorer web browser, has been fined €561m ($732m) by the European Union’s antitrust regulators for breaking a promise to offer its customers a choice of the browser they would like to use to surf the internet on their personal computers.
  • Microsoft’s Internet Explorer was once dominant in the browser world,
  • Google’s Chrome, Mozilla’s Firefox and Apple’s Safari
1 - 15 of 15
Showing 20 items per page