recentpopularlog in


« earlier   
CILA notifica preliminare lavoratore autonomo imprese asl
burocrazione  leggi  edilizia  cila 
july 2017 by jacoping
Cloud, arriva il codice di condotta europeo per la protezione dei dati - Il Sole 24 ORE
Articolo relativo al problema della tutela della privacy dei dati aziendali e alle normative UE per la conservazione dei dati su cloud residenti sul territorio della Unione Europea
cloud  politica&costume  leggi  UE  privacy  lavoro 
september 2016 by easter
L'Ordine degli Psicologi prende posizione sulla stepchild adoption
Parere Ord Psico PIEMONTE. Sul dibattito omosessualità, adozioni e utero in affitto.
omosesualità  stepchild_adoction  diritti  leggi 
march 2016 by bbgianking
Stepchild adoption: cosa dice la letteratura scientifica
IMPO!! DOSSIER!! Parere Ordine Psico LAZIO. Sul dibattito omosessualità, adozioni, utero in affitto
omosesualità  stepchild_adoction  adozioni  diritti  leggi 
march 2016 by bbgianking
Why the fear over ubiquitous data encryption is overblown - The Washington Post
Mike McConnell is a former director of the National Security Agency and director of national intelligence. Michael Chertoff is a former homeland security secretary and is executive chairman of the Chertoff Group, a security and risk management advisory firm with clients in the technology sector. William Lynn is a former deputy defense secretary and is chief executive of Finmeccanica North America and DRS Technologies.
privacy  crittografia  criminalità  leggi 
december 2015 by dp
The End of Privacy? - The New York Times
Cellphones, e-mail, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital communication. That inattention carries a heavy price.

Wireless carriers reported responding to a whopping 1.3 million demands from law enforcement agencies for subscriber information, including location data, calling records and text messages. The number of people whose information was turned over is almost certainly much higher because a single request for a cell tower “dump” could sweep in the names of thousands of people connected to a given tower at a certain time.

In most cases, law enforcement officers do not need to hear the actual conversation; what they want to know can be discerned from a suspect’s location or travel patterns. And location data can be as revealing of a cellphone owner’s associations, activities and personal tastes as listening in on a conversation, for which a warrant is mandatory.

Both the Leahy bill and the location privacy bill break away from the traditional “third-party doctrine,” which says there is no reasonable expectation of privacy if the information is held by third parties, like the cell carriers.
telefono  e-pistole  privacy  leggi  geolocalizzazione 
november 2015 by dp
Only 'tiny handful' of ministers knew of mass surveillance, Clegg reveals | Politics | The Guardian
The majority of the UK cabinet were never told the security services had been secretly harvesting data from the phone calls, texts and emails of a huge number of British citizens since 2005, Nick Clegg has disclosed.

Clegg says he was informed of the practice by a senior Whitehall official soon after becoming David Cameron’s deputy in 2010, but that“only a tiny handful” of cabinet ministers were also told – likely to include the home secretary, the foreign secretary and chancellor. He said he was astonished to learn of the capability and asked for its necessity to be reviewed.

The government finally admitted on Wednesday that the mass surveillance of British citizens began in 2001 after 9/11 and was stepped up in 2005, using powers under national security directions largely hidden in the 1984 Telecommunications Act.

It is not known if government law officers sanctioned the use of the act in this way, but it appears the intelligence and security committee responsible for parliamentary oversight was not informed, adding to the impression of a so-called deep state operating outside the scrutiny of parliament.

“That the existence of this previously top secret database was finally revealed in parliament by the home secretary on Wednesday, as part of a comprehensive new investigatory powers bill covering many other previously secret intelligence capabilities, speaks volumes about how far we’ve come in a few short years.”

They refused to acknowledge that the democratisation of the security state had become inevitable.”

He says the ability of GCHQ “to hack anything from handsets to whole networks is highly intrusive and needs to be much better understood before we can place it within appropriate constraints.

“The new, revised proposals on the storage of web browsing data remain problematic as the bill appears to call for the storage of vast quantities of data that go far beyond the operational requirements set out by the home secretary in the Commons.”
GCHQ  sorveglianza  leggi  telefono 
november 2015 by dp

Copy this bookmark:

to read