regulation - News, Features, and Slideshows
- Google wants to fly drones above New Mexico
- FTC warns of using big data to exclude consumers
- FCC gets record number of net neutrality comments, what now?
- Google to pay $19 million to refund kids' in-app purchases
The U.S. Federal Communications Commission's deadline for the public to comment on the agency's proposed net neutrality rules passed Monday with more than 3 million comments filed, by far a record number for an FCC proceeding.
By Grant Gross | 17 September, 2014 01:50
The collection and analysis of big data holds great promise, but may also lead some companies to create profiles of consumers leading to discrimination, the chairwoman of the U.S. Federal Trade Commission said Monday.
By Grant Gross | 16 September, 2014 05:19
Swedish law requiring network operators to retain communications metadata continues to breach European Union rules, according to Swedish ISP Bahnhof, which has asked the European Commission to intervene.
By Loek Essers | 12 September, 2014 22:38
A recent data breach at retailer Home Depot and a leak of celebrity nude pictures from Apple's iCloud service raise questions about the companies' data security practices, two U.S. senators said Thursday.
By Grant Gross | 12 September, 2014 05:27
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
The U.S. Federal Communications Commission and its allies have several options, with most of them difficult, after a U.S. appeals court struck down most of the agency's 2010 net neutrality rules.
By Grant Gross | 14 January, 2014 20:48
Making voice calls via cell phone aboard a plane doesn't hold much interest for U.S. airline passengers or airlines, but there isn't a technological reason to ban them, according to federal authorities.
By Matt Hamblen | 13 December, 2013 19:10
In-flight cellular in the U.S. may be closer to reality than some consumers realize, with foreign airlines poised to extend services they already offer elsewhere. But evidence from overseas suggests the odds of being trapped next to a chronic caller are slim.
By Stephen Lawson | 12 December, 2013 18:34
Whitepapers about regulation
With the number of new and emerging security products being denoted by analysts as the “silver bullet” solution, it is critical to recognize that there are many authentication choices available on the market. In this whitepaper, we look at what organisations must consider before making a final selection, specially their user authentication needs, the threats targeting their business, their business objectives and the regulatory guidelines that impact their industry.
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
- FTMedia Planner Buyer - Media Trader OpportunitiesNSW
- FTSearch Account ManagerNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTSenior Media TraderNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
This whitepaper details how Protection Storage Architecture can provide a data protection platform that can evolve with business and technical requirements. Over the next few years, IT will be faced with a new set of data protection challenges, centered on delivering multiple data protection services Transformational architecture not only enables backup teams to solve immediate tactical challenges but also helps IT teams keep business applications running Protection Storage Architecture has three core components: protection storage, data source integration and data management services (Tags: data protection, storage architecture, integration, data management, recovery, backup)
- Committee backs new hacking powers for ASIO
- Use of forced labor 'systemic' in Malaysian IT manufacturing
- Sweeping security law would have computer users surrender privacy
- TIO reveals jump in complaints about mobile data charges
- ZTE brings affordable 5.7-inch phablet to T-Mobile
- Mobile Black Spot program to prioritise areas with 'skin in the game'
- Children’s e-Safety Commissioner will have far-reaching online powers
- No old iPhone is left behind in this Shenzhen market
- NAB Traveller card can be loaded with 10 currencies simultaneously
- Hackers accessed Goodwill hosting provider for 18 months before card breach
- Startup develops optical zoom lens for smartphones
- Dyn sells Internet performance data via SaaS
- In Pictures: In memoriam - Apple's iPod through the years
- Jive adds Office 365 connectors for its enterprise social suite
- IBM Watson Analytics preps the data so you don't have to