Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
Download Learn More
Nsauditor Screencast
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

SXSW panel heats up over big data privacy concerns

Mar 11 , 2012 | ITNews.com

A Sunday afternoon panel designed to address head-on privacy concerns stemming from so-called "big data" collection sparked passions even though both Facebook and Google, whose privacy practices draw most consternation from critics, declined to participate, leaving no one to take the side of industry.

Moderator Molly Wood, the executive director of CBS Interactive, said Facebook didn't feel it had any staff at SXSW who could speak on the issue. Google's privacy counsel Will DeVries was scheduled to participate but bowed out, citing ongoing litigation with the privacy advocacy group Electronic Privacy Information Center, whose representative Lillie Coney was also on the panel.

Coney said that EPIC was not in litigation with Google, nor does it ever sue corporations. EPIC did recently sue the U.S. Federal Trade Commission, pushing it to take action to block implementation of the company's controversial consolidated privacy policy that took effect March 1. EPIC lost that suit, although it could appeal to the Supreme Court.

Coney called Google's apparent understanding of the action as legal action against the company as "a very strange way to take the regulatory process and the mechanisms that are available to civil society, or even individuals".

Google did not respond to requests for comment.

Even without Google and Facebook in attendance, the panel was hard-fought as Coney and Jay Stanley, a senior policy analyst with the American Civil Liberties Union, battled Berin Szoka, president of the libertarian-leaning nonprofit TechFreedom, over whether the collection and increasingly sophisticated analysis of large amounts of user data for use in corporate marketing constitutes a real harm to consumers and whether government regulators should step in.

Szoka cited an "assumption in the privacy debate that it's unusual that the doing of things precedes the figuring out what we should do about it, but that's how the Internet works". His approach is "sometimes derided as a patchwork approach", he said, "But to me that's a good approach. Government should get involved when there's actual harm."

Privacy advocates Coney and Stanley pointed to other industries, like the auto industry, to make the case that government should regulate practices that pose a clear risk. Coney said that if and when demonstrable harms to consumers come from big data, they, too, will be outsized, affecting thousands of people.

Stanley pointed to Gmail as an example. Calling it "the first step toward the application of artificial intelligence monitoring us," he said, "It's not that smart yet, so it's not that scary. But as it gets smarter it will get scarier, when you get to artificial intelligence levels that approach humans and they're still reading your mail."

The audience appeared to side with privacy advocates. One questioner who identified himself as building social networking applications for the Apple platform said he feared harming his own customers. "If we can't as an industry even defend passwords, how can we protect privacy?" he asked.

View more news...

 
  Most Popular Articles
 
 
  Email Subscriptions
Enter Your Email to be Notified of Software Updates:

 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/