European Digital Services Act: Setting the Standard for Digital Regulation
The Digital Services Act sets the stage for a new era of digital regulation in the EU by making what is illegal offline, illegal online.
Privacy vs Security is a conundrum. In most cases, to achieve privacy means implementing tools that prevent or preclude security. To achieve security and protection against threats, the trade off for the user is sacrificing privacy. By its very nature, privacy entails eliminating the ability for a user’s web surfing, email, texting, social media and app activity to be monitored. Security requires such activities to be monitored and inspected to provide protection against cyber threats.
A user won’t be able to have both complete privacy and complete security, so when it comes to choosing between privacy vs security, they must decide which compromises they are willing to make. Will they sacrifice some privacy in exchange for security? Or, will they exchange the risk of cyber threats, viruses, and ransomware for better privacy?
The Digital Services Act sets the stage for a new era of digital regulation in the EU by making what is illegal offline, illegal online.
The Strengthening American Cybersecurity Act is necessary to protect the Nation’s critical infrastructure. But is it enough?
EU regulatory agencies forge ahead with new proposals to evolve legislative frameworks for governing the online space with a focus on safety.
Increased encryption is drawing scrutiny as it disables organizations that work to filter and block imagery showing the sexual abuse of children.
Today’s world of hyperconnectivity positions privacy vs security as one of the most fiercely contested global debates. Can you have both without compromise?
We’re only just beginning to understand how mass data surveillance systems and data privacy impacts us. Will GDPR-like regulation come to the U.S. in 2019? It will require time to craft legislation, achieve some level of adoption, and put it up for a vote—but what’s next?
We are constantly reminded of the growing number of privacy concerns from the use of Information and Communications Technology (ICT). Some are quick to blame governments or commercial entities when our personal information is compromised. Very few stop to think whether or not the blame should be pointed at ourselves. To what extent are we as end-users responsible for facilitating our own personal privacy?
People don’t seem to worry much about privacy when “checking in” to a favorite local restaurant or coffee shop, or from other social media posts that reveal one’s location. What if you were approached by a complete stranger who knew your name and other personally indefinable information within minutes after making an upload? A few socialites got quite the shock after a social media experiment revealed how much personal information can be extracted from publicly viewable status updates.
Consumers will soon know exactly how much of their personal information is being collected online, by whom, and may one day be able to correct errors or opt-out entirely from such activity. The name of the game is “privacy” and thanks to a combination of recent investigative reporting and pressure from advocacy groups, regulatory entities and politicians, the urgency to reach this point is now mainstream news.