Forrester is publishing an interesting map “Privacy and Data Protection by Country” (Global heat Map), which provides a status overview in the world.
Map “Privacy and Data Protection by Country”, by Forrester
Mobile Privacy guidelines, by GSM Association (GSMA)
GSMA has prepared privacy guidelines within their “GSMA Mobile Privacy Initiative“.
What this is about?
See their brochure:
In January 2011, the GSMA published a set of universal Mobile Privacy Principles that describe the way in which mobile consumers’ privacy could be respected and protected when consumers use mobile applications and services that access, use or collect their personal information.
GSMA also published a discussion document in April 2011, outlining a set of Privacy Design Guidelines for Mobile Application Development.
- Openness, Transparency and Notice
- Purpose and Use
- User Choice and Control
- Data Minimisation and Retention
- Respect User Rights
- Security
- Education
- Children and Adolescents
- Accountability and Enforcement
Privacy Design Guidelines for Mobile Application Development
(Shortened list for readability)
- Transparency, choice and control (TCC) guidelines
- TCC1 Do not surreptitiously access or collect personal information.
- TCC2 Identify yourself to users
- TCC3 Let users exercise their rights.
- …
- Data retention and security (DRS) guidelines
- DRS1 Actively manage identifiers.
- DRS2 Keep data secure.
- …
- Education guidelines
- E1 Educate users about the privacy implications …
- Social networking and social media (SNS) guidelines
- SNS1 Prompt users to register for social networks, but be careful about mapping registration information to public profiles.
- SNS2 Ensure default settings are privacy protective and give users control of their
personal profiles… - SNS3 Take measures to protect children from endangering themselves.
- …
- Mobile advertising (MA) guidelines
- MA1 Inform users about advertising features.
- …
- Location guidelines
- L1 Inform the user that location will be used and give them choice.
- L2 Capture appropriate consents to use location data.
- Children and adolescents (CA) guidelines
- CA1 Tailor applications to appropriate age ranges.
- CA2 Set privacy protective default settings.
- …
- Accountability and enforcement guidelines
- AE1 Assign responsibility for ensuring end-user privacy is considered and delivered
throughout the product lifecycle… - AE2 Give users tools to report problems regarding an application.
- AE1 Assign responsibility for ensuring end-user privacy is considered and delivered
Curiosity robot vehicle on Mars
NASA’s Curiosity robot has reached Mars surface.
Article with 10 min intro video “Target Mars: Rover Lands on the Red Planet“
Links
-
Wikipedia: Mars Science Laboratory
-
Wikipedia: Curiosity
-
NASA: Mars Science Laboratory mission
-
Latest MSL Updates
-
Image Gallery
-
-
NASA: Mars Exploration Program
Note
Depending on findings (minerals, water, life?), the impact might be big!
Next
News: virus attack blows Qatari gas giant offline
Disturbing news, see article “Mystery virus attack blows Qatari gas giant RasGas offline“.
Good Link: IT’s 9 biggest security threats
It is worth to look article “IT’s 9 biggest security threats“
Questions: Where the world is going? What can individuals do? What can companies do?
GreatNews, Tool for reading news (RSS feeds)
GreatNews is a good alternative for reading news (RSS/Atom feeds)
Good:
- list of feeds are maintained
- automatic refresh of feeds
- different styles available for showing feeds
- search over Feed Group
- import & export in OPML format (XML)
- possibility to open feed text in external browser for better reading
The figure below shows the condensed view when using “Brief” style.
Automatic updates makes it possible to use this tool to display latest news on “newsboard”.
The figure below shows the handy search function applied to Feed Group Security.
OPML Example
The text below is created by exporting the BBC Feed Group from GreatNews tool.
Advanced
One can extend GreatNews functionality for a “newsboard” display by using a simple autoit script for automating the looping through all the feeds. See autoit script below; key F7 is send regularly into GreatNews tool.
While 1
WinActivate(“GreatNews”, “”)
WinWaitActive(“GreatNews”, “”, 30)
Send(“{F7}”)
Sleep(10000)
WEnd
With wine tool, one can run GreatNews (and autoit) also in linux environment.
Alternatives
- Sage is a light Firefox add-on. However, it still lacks the automatic updates. Although it does updates feeds when clicked. Condensed view can be achieved by using custom css called StealthCSS, which is available from their wiki pages.
- Readefine is capable of showing feeds in a condensed way (in newspaper style). In addition, it can be runned in Linux. However, it does not “really” maintain list of feeds.
Cybersecurity, recommendations for governments by DIGITALEUROPE, JEITA and ITI
Cybersecurity is clearly an issue for national security. 3 organizations have created a joined set of recommendations for governments.
- DIGITALEUROPE
- represents the digital technology industry in Europe
- http://www.digitaleurope.org
- JEITA
- Japan Electronics and Information Technology Industries Association
- http://www.jeita.or.jp/english/
- ITI
- Information Technology Industry Council
- http://www.itic.org
Press release and Recommendations in June 2012.
The recommendations are:
- Develop cyber security policies in a transparent manner and with relevant stakeholder input.
- Enable risk management and innovation.
- Develop and implement cyber security policies in partnership with the private sector.
- Encourage the development and use of globally recognized, industry-led, voluntary consensus
security standards, best practices, assurance programs, and conformity assessment schemes. - Ensure the use of globally standardised tests and certification.
- Ensure that cyber security requirements are technology-neutral.
- Ensure that cyber security requirements allow for procurement of technologies regardless of
the country of origin or the nationality of the technology vendor. - Ensure that any cyber security requirements avoid forced transfer or review of intellectual
property (IP), such as source code. - Limit any prescriptive requirements to areas of the economy that are highly sensitive, such as
government intelligence and military networks. - Strengthen institutions, and develop contingency plans and cyber security strategies.
- Focus on criminals and their threats.
- Focus on education and awareness.
Notes
This is good news for information security industry, ie. to address cybersecurity with a mature approach. It encourages to use standards and best practises. The issue is difficult. But also there are tools and methods to address this. The solution is not only to create one security unit for this, but to involve stakeholders, which we have many, in the process. Information security professionals are needed to guide and educate stakeholders into a mature approach.
Other links
The information is also available at EurActiv.