Remove category international
Remove 2010 Remove Government Remove Security
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

Yet that's not possible, because there is no longer any difference between those categories of devices. They affect national security. All of those "consumer products" Barr wants access to are used by government officials -- heads of state, legislators, judges, military commanders and everyone else -- worldwide.

Military 109
article thumbnail

New White House Announcement on the Vulnerability Equities Process

Schneier on Security

This is the inter-agency process by which the US government decides whether to inform the software vendor of a vulnerability it finds, or keep it secret and use it to eavesdrop on or attack other systems. The details of these categories are outlined in Annex C, which is classified.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Article 29 Working Party Adopts Opinion on Cloud Computing

Hunton Privacy

Cloud computing and the range and geographical dispersion of the various parties involved also have raised significant uncertainty in terms of applicable law, which the Working Party previously analyzed in its Opinion 8/2010. Below is an overview of the different topics covered in the Opinion issued on July 1.

Cloud 40
article thumbnail

Two flavors of software as a service: Intuit QuickBase and Etelos | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Topics Security , Software-as-a-service , Intuit Inc. Topics Security , Software-as-a-service , Intuit Inc. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to.

article thumbnail

'ESME': Social messaging within an enterprise SOA environment | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0

Paper 45
article thumbnail

Free Taxonomy & Folksonomy Book | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Download Now Dealing With Specific Types of Difficult People Global Knowledge About 10 percent of the typical workforce falls into the category of. strategy, tactics, technology decisions and roll out.

Paper 40
article thumbnail

Records Inventory 101:

ARMA International

Among these management issues are insufficient documentation of official acts, incorrect use of recordkeeping technologies, poor filing systems and maintenance standards, poor management of non-record items, insufficient identification of vital records, and insufficient records security policies. Is the DOD 9/30/2010 or 10/01/2010?