RESOURCE:
David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
RESOURCE:
This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
EGUIDE:
Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
EZINE:
In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.
EZINE:
In this week's Computer Weekly, we look at gamification, the trend for corporate software to use techniques developed for computer games. After the Prism internet surveillance scandal, Switzerland hopes to become a safe location for cloud services. And we talk to an NHS CIO about the challenges of a paperless health service. Read the issue now.
WHITE PAPER:
Redaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.
WHITE PAPER:
The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
WHITE PAPER:
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
EBOOK:
In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.