David Navetta discusses a proposed law in Colorado, HB 11-1225: Regulation is achieved via the “carrot” or the “stick” (and sometimes both). This is true in the information security context as well. For example, to incentivize encryption of personal information, breach notice laws use a stick: those that fail to encrypt may have to provide…
Category: Laws
‘Aadhar’ does not breach privacy: Nilekani
NEW DELHI: Allaying privacy fears surrounding ‘Aadhar’, the Unique Identification Authority of India Chairman Nandan Nilekani said the project would in no way put at risk citizens’ security and rights. Delivering a lecture on ‘Analysing and Envisioning India,’ Nilekani said having an Aadhar number in no way puts the resident in a security risk or…
India Issues Draft Privacy Rules
The Government of India’s Ministry of Communications & Information Technology has published three draft rules that would implement the Information Technology Act, 2000. These include: Reasonable Security Practices and Procedures and Sensitive Personal Information; Due Diligence Observed by Intermediaries Guidelines and Guidelines for Cyber Cafe. The first two of these rules could affect international companies…
Finnish government wants police to have spyware powers
A draft amendment of the Coercive Measures Act would give the police the power to install so-called spyware on a suspect’s computer, the Finnish News Agency (STT) has learnt. Spyware commonly refers to software installed on a computer without the user’s consent. If passed the law would effectively authorise the police to break or hack…