InvestorsHub Logo
Followers 5
Posts 3005
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Tuesday, 05/21/2019 4:01:11 PM

Tuesday, May 21, 2019 4:01:11 PM

Post# of 249566
GDPR, USA? Microsoft says US should match the EU's digital privacy law

https://www.zdnet.com/article/gdpr-usa-microsoft-says-us-should-match-the-eus-digital-privacy-law/?ftag=COS-05-10aaa0g&utm_campaign=trueAnthem%3A+Trending+Content&utm_content=5ce42b2fa78c460001091c55&utm_medium=trueAnthem&utm_source=twitter

Microsoft ratchets up its lobbying for federal EU-style privacy laws for the US.

As the first anniversary of the Europe Union's General Data Protection Regulation (GDPR) approaches, a senior lawyer at Microsoft has called for US Congress to adopt a parallel set of EU-style federal privacy laws.

Even Microsoft has been stung by GDPR's strict rules, albeit lightly compared to Google's €50m GDPR fine in January over "forced consent" after activist lawyer Max Schrems filed a complaint on the day the law arrived on May 25, 2018.

The big question now on the other side of the Atlantic is when and whether the US will introduce a GDPR-like law that puts a bigger burden on companies to protect the data of their users.

Microsoft's top legal officer, company president Brad Smith, recently predicted 2019 could be a turning point on this debate, thanks to the emergence of several state-based privacy acts, most notably the California Consumer Privacy Act (CCPA), which are the toughest in the nation.

Please see the rest of the article at the link above.
==================================================================
17 essential tools to protect your online identity, privacy

https://www.infoworld.com/article/3135324/17-essential-tools-to-protect-your-online-identity-and-privacy.html

Excerpts:

From secure chips to anonymity services, here’s how to stay safe and private on the web

Make no mistake: Professional and state-sponsored cybercriminals are trying to compromise your identity -- either at home, to steal your money; or at work, to steal your employer’s money, sensitive data, or intellectual property.

Most users know the basics of computer privacy and safety when using the internet, including running HTTPS and two-factor authentication whenever possible, and checking haveibeenpwned.com to verify whether their email addresses or user names and passwords have been compromised by a known attack.

But these days, computer users should go well beyond tightening their social media account settings. The security elite run a variety of programs, tools, and specialized hardware to ensure their privacy and security is as strong as it can be. Here, we take a look at this set of tools, beginning with those that provide the broadest security coverage down to each specific application for a particular purpose. Use any, or all, of these tools to protect your privacy and have the best computer security possible.

Everything starts with a secure device

Good computer security starts with a verified secure device, including safe hardware and a verified and intended boot experience. If either can be manipulated, there is no way higher-level applications can be trusted, no matter how bulletproof their code.

Enter the Trusted Computing Group. Supported by the likes of IBM, Intel, Microsoft, and others, TCG has been instrumental in the creation of open, standard-based secure computing devices and boot pathways, the most popular of which are the Trusted Platform Module (TPM) chip and self-encrypting hard drives. Your secure computing experience begins with TPM.

TPM. The TPM chip provides secure cryptographic functions and storage. It stores trusted measurements and private keys of higher-level processes, enabling encryption keys to be stored in the most secure manner possible for general-purpose computers. With TPM, computers can verify their own boot processes, from the firmware level up. Almost all PC manufacturers offer models with TPM chips. If your privacy is paramount, you’ll want to ensure the device you use has an enabled TPM chip.
==================================================================
Enabled TPMs, SEDs and Wave Solutions - a better recipe for security, privacy and good health!
==================================================================
https://www.wavesys.com/products/wave-virtual-smart-card

https://www.wavesys.com/products/wave-self-encrypting-drive-management

Read about and try the above solutions for free and see why Wave Solutions should be at the top of every organizations' cybersecurity solutions list!!























Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.