InfoWorld reports that “Microsoft has proposed a tiered approach to protecting the privacy of people targeted by online advertising, saying advertisers should get permission before using sensitive, personally identifiable information to deliver ads. […] Microsoft agrees with the FTC's decision to focus on an industry self-regulatory approach, but the company [...]
I read William Patry's blog regularly (and should link to it more often), but his post on Judge Posner's newest book "How Judges Think" is truly insightful. He builds on Posner's deconstruction of the relationship between judges and law school professors and adds legislators to the mix. The final product [...]
By mblafkin|2016-12-21T00:15:11-05:00April 7th, 2008|Blog|
According to the Associated Press, “U.S. military officials seeking to boost the nation's cyberwarfare capabilities are looking beyond defending the Internet: They are developing ways to launch virtual attacks on enemies. But first the military will have to figure out the proper boundaries. ‘What do we consider to be an [...]
The Register reports that “one of Britain's top cops has said that e-crime is the most significant criminal threat facing the UK, and that the government is failing to respond effectively. Chief Constable Ian Johnston, Head of Crime at the Association of Chief Police Officers (ACPO) and boss of the [...]
ZDNet UK's knowledgeable security blogger, Tom Espiner, has posted a piece about the responses of ACT and Red Hat to ISO's recent approval of OOXML as an open standard for electronic documents. Tom seems to take the position of Red Hat as the right honest gospel, not wasting a single [...]