Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with Privacy
Showing posts in English
D Thomson | 28 Mar 2014 | 0 comments

I believe that the IT industry will, in the future, hold far more responsibility for radical changes to culture and society than ever before. The Internet of Things (IoT) will see humanity take a new foundation on which to build things (the Internet) and start to create architectures and services that fundamentally change the way we live our lives. Just in the past few weeks, I have spoken to entrepreneurs and large businesses that are seeding technological concepts that could, eventually, touch all of us in very meaningful and real ways. It is difficult (especially for a technologist like me) not to get excited about self-driving cars that learn from each other, connected homes that allow us to remotely monitor and control our personal spaces and smart meters that have a profound impact on a nations energy consumption. But, as I have discussed before, there are likely to be unintended consequences to all of these ideas that technologists (even the really clever ones) are likely to...

Sian John | 26 Feb 2014 | 0 comments

It can often seem that security measures exist to stop people from doing things, or to try to catch them out if they do. Across organisations, an broadening range of mechanisms can be used to ensure staff are not breaking the rules - raising the increasingly important question - how can security needs be balanced with employee privacy?

The answer is not straightforward. All manner of techniques are available to system administrators, security managers or senior management, including Data Leakage Prevention (DLP) and Deep Packet Inspection, but also extending to simply using privileges to gain access to the content of employee emails.

Not only is the potential for abuse clear and present but also, the corporate environment is becoming more complicated. A person's smartphone may connect to the corporate guest LAN - does this make it fair game for monitoring? What about use of  location information or CCTV, to help process efficiency or monitor for...

Jon C | 20 Dec 2012 | 1 comment

The Information Commissioner's Office (ICO) is between a rock and several hard places. Long-castigated for being a soft touch, over the past year it has been increasingly visible in terms of the fines it imposes. These range from individual confidentiality breaches to the large-scale spamming via text with fines commensurate with the scale of the breach.

While nobody would doubt the need for regulation - and enforcement - in matters of data protection, the process followed has come under scrutiny, particularly around reporting of breaches. A recent Computer Weekly article...

D Thomson | 01 Feb 2012 | 0 comments

With many organisations giving cloud computing serious consideration, a question we are often asked is, "Should we be putting our data in the cloud?" Organisations should be concerned about their data, wherever it is - it's a strategic business asset, after all. Indeed, this concern should extend to wherever the data is, depending on what it is and how it is being used. 

Each organisation is different and no blog post would be long enough to map out all the different risks and options, but we can get an idea of where to look for causes of concern. Here we separate risks out into non-scientific but nonetheless helpful categories of security, privacy, supplier and compliance. 

Security risks first, then. When we say data need to be kept secure, what we're really thinking is that malicious third parties can't get hold of it, to use or damage it in some way. Of course you need some kind of assurance that a cloud provider is protecting your...