No Author

Articles by No Author

10 queries on e-waste recycling

Ask 10 questions to ensure that your e-waste is being recycled and not exported.

ewastespecial3

Contents of the Special ReportSpecial featureE-Waste Special Main ArticleSomething's cooking in a forgotten corner of the province of Zheijiang, China -and it's the perfect...

Who is the IT doctor?

University Health Network

Todd McDermott

The end point is evidence

Phillipa Lawson

Another driving force

Sidebar: Michael Power’s presentation

In terms of lawful access, it's designed to catch the bad guys and nobody in the business community would ever argue that they would never want to be in a position where they would say, 'We really don't want to help the police, or national security, or law enforcement authority catch the bad guys.' Who would be against that? The trouble is getting the balance right.

John Lawford presentation

Aw(e)ful access is referring to the breathtaking scope of this. It is something that I think everyone should be concerned about. The excuse for this particular initiative (lawful access) is that, we need to modernize the law, we need to intercept things like voice calls, get into people's e-mail records, their Web surfing habits. That is true. But we must keep in mind that this came all of a sudden, in the wake of that awful incident in 2001, and as part of the excuse given for this particular project, due to terrorist concerns.

David MacMahon’s presentation

Technology has evolved and privacy issues discussed include access issues, cost and recovery. To their credit, law enforcement agencies are now airing the issue in public for somewhat public discussion. To a certain extent, public policy is sort of playing catch up, in a way.

Tech News