article thumbnail

EU: Competition policy in the digital era (Part 1)

DLA Piper Privacy Matters

The benefits are enormous, as digital communication facilitates exchanges and searches, and enhances consumer choices not only in purchasing consumer goods, but also in finance, healthcare, and producing industries from manufacture to agriculture. 1] COMP/2020/16 of November 2011. [2] Stay tuned. 16 of the study).

article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

Fitbit and similar technology can be used to track employees’ exercise routines, with some companies even offering rewards like extra days off for good behavior. While the article was written in 2011, the lion’s share of information on the topic of employee monitoring still belongs to businesses.

IT 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

In 2011, there a was user in a chat room by the name of altoid, like the mint. Anyone talking about it in 2011 most likely had inside information. So in this episode, it's not really a handbook for criminal hackers or want to be terrorists, brother this is a purely academic exercise. But again, this is an academic exercise.

Privacy 52
article thumbnail

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

State-of-the-art telepresence gear, supplied by Merit Network , funnels everything from capture-the-flag exercises to full course work and certification testing to earn 42 different professional designations. Ford and for its giant furniture manufacturing companies. Merit Network, by the way, is quite unique. My guess is that Gov.

article thumbnail

A Flurry of Recent Cybersecurity Activity from the Trump Administration

Data Matters

Awareness and education are needed ,” as users, developers, manufacturers, and infrastructure operators all can lack the knowledge and capabilities to protect the Internet. Government’s cybersecurity approach – in particular, as seen in the 2011 International Strategy for Cyberspace , calls for increased U.S. in isolation.”.

article thumbnail

Election Results: Key Developments for Federal Privacy and Data Security Legislation

Hunton Privacy

Representative Mary Bono Mack (R-CA) has chaired the Energy & Commerce Committee’s Subcommittee on Commerce, Manufacturing and Trade for the past two years and has been a strong proponent of data security and breach notice legislation. However, Representative Bono Mack lost her re-election bid. Representative John Conyers, Jr. (D-MI)

Privacy 40
article thumbnail

Predictions 2021: Disinformation, SPACs, Africa, Facebook, and a Return to Tech Optimism

John Battelle's Searchblog

.” 2021 will be a year where we search for the root causes of our failures over the past few years, and at the center of that failure is a communication system that mindlessly manufactures disinformation. Predictions 2011. 2011: How I Did. A free and open democratic economy can’t run on b t. Predictions 2016.

Marketing 144