Homepage / Technology / Tech consumers should not be forced to sacrifice privacy for security
test Due Diligence Blog Digital Data Rooms for the Netherlands Board Room Apps Secure Board Management With Secure Board Portals What Happens at Board of Directors Meetings? Board Room Software Review How to Prepare Board Rooms for Effective Board Meetings Board Room Software Boosts Performance and Communication Selecting a Secure Data Room Review Local Data Room Service Review How to Find the Best Virtual Data Room Review What to Look for in a Data Room uk Provider Document Storage and Distribution Software Everything About VDRs Corporate Software Advantages How to Choose a Virtual Data Room Provider The Most Secure Way to Transfer Files How to Manage Online Board Meetings Benefits Virtual Data Room Solutions – Must-Haves for M&A and Due Diligence Best Data Room Functions for the Different Types of Industries How to Choose a VDR Software Provider How to Choose an Online Board Portal The Benefits of a Boardroom Review Board Room Online Solutions – How to Get the Most Out of Your Board Meetings Why You Need a Board Room How a Board Room Blog Can Transform Your Business Choosing the Best Board Room Format How to Have Productive and Engaging Board Directors Meetings Choosing the Right Virtual Data Room How to Keep Safe Documents Storage Teaching Kids About Online Safety Avoid Costly Mistakes With Free Data Room Services Corporate Virtual Data Secure Online Data Rooms Solutions How to Keep Share, Edit and Delete Your Data Safe Virtual Data Room Software Secrets for M&A Due Diligence What to Look For in Boardroom Providers Board of Directors Blog Posts How to Deliver Value at Your Board Meetings How to Have Effective Board Meetings Responsibilities of Board Members Deal Management – How to Effectively Manage a Complex Sales Pipeline Data Rooms For Mergers And Acquisitions How to Have a Successful Board Room Meeting Choosing a Board Room Service Provider What is a Board Room Service? Board Room Software Review – Choosing the Best Portal for Mother Board Meetings Why a Board Room Providers Review Is Important What Is a Board Room Review? Venture Software for VC Firms What Is an Assessment Report? The Importance of a Tech Audit Popular Business Applications What to Look For in a Data Room App What Are Business Applications? How to Choose a Virtual Data Room How to Plan a Data Room Review Coronavirus Guide What is a Virtual Data Room? What Is Data Science? What Is an Operating System? Turbotax Small Business Review How Online VDRs Are Used in M&A Deals Why Choose VDR Software? The Power of Business Software The Benefits of a Software Board Online Data Room Review The Importance of Tech Knowledge Improving Accuracy of Financial Data Online Business Records – How to Keep Your Online Business Records Accurate and Secure What is a Board Portal De? DealRoom Review – A Review of VDR Software M&A Due Diligence for Private Companies The Virtual Data Room Review Why Companies Use a Data Room Review to Facilitate M&A Transactions The Best File Sharing Services How Online VDRs Are Used in M&A Deals Best Virtual Data Room How to Choose a Best Board Room Provider Choosing a Data Room for Due Diligence What Is a Data Room Business Software? Best Data Room Providers Review Data Room Providers Review Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Kumar Oynamak Için En Iyi Yerdir The Benefits of Cloud Data Services for Enterprises Online Data Room and SSL How to Build a Diverse Board of Directors Best Virtual Data Review A Data Room Service Review How Runn Makes Project Data Accessible, Accurate and Shareable Five Pillars of Information Protection The Importance of Online Business Reports Benefits of Colocation Services Virtual Data Rooms Guide Choosing a Business Virtual Data Room Choosing the Right VDR Service Review How to Conduct a Virtual Data Room Review Glory Online Casino Türkiye En Iyi Oyunları Ve Bahisleri Olan Kumarhane

Technology

Tech consumers should not be forced to sacrifice privacy for security

We all expect privacy, especially when it comes to our phones. But how do we feel about upholding the privacy of criminals and terrorists? And what should we do if the information needed to catch or prosecute a criminal – or potentially save lives – is locked away in someone’s encrypted phone?

One problem the technology industry has recently faced is the “backdoor encryption” problem – a situation where law enforcement agencies want access to information on digital and mobile devices that may be instrumental in solving a time-sensitive case. The result is a law enforcement request for a “backdoor” to devices from tech companies – a way to bypass a device’s security measures and gain access to protected devices.

In June, a bipartisan team of legislators put forward the ENCRYPT Act (Ensuring National Constitutional Rights for Your Private Telecommunications). The bill, sponsored by Rep. Ted Lieu (D-CA), would restrict state and local governments from requiring backdoors to exist, and also prevent any restriction of encryption capabilities. The goal is to develop a standardized national encryption policy that protects users’ privacy rights. This bill is an encouraging step forward and one supported by the Consumer Technology Association (CTA).

“Having 50 different mandatory state-level encryption standards is bad for security, consumers, innovation and ultimately law enforcement,” Rep. Lieu explained in a statement about the bill. “Encryption exists to protect us from bad actors, and can’t be weakened without also putting every American in harm’s way.”

“End-to-end” encryption, which ensures information exchanged online can be viewed only by the participants in the conversation, is a common offering of internet companies. It assures users their sensitive data will not fall into the hands of hackers. As Sen. Ron Wyden (D-OR) put it, “If you want to be in a safe community, you shouldn’t be able to weaken encryption.”

This protection was put to the test in December 2015 after two shooters opened fire on workers at the San Bernardino, California, Inland Regional Center, killing 14 people. Critical information about the attack was locked in one of the shooter’s iPhones. The FBI asked Apple for access, and Apple refused. The company argued that if the platform’s backdoor “key” leaked, the security of everyone using the platform – including tens of millions of device users in the U.S. – would be compromised. Before a hearing could take place, the FBI was able to unlock the phone with the aid of a third party, but the battle over encryption continues.

The law enforcement community has claimed that laws have not kept pace with innovation, preventing investigators from gaining information necessary to keep us safe. But law enforcement already has access to a vast amount of powerful technology. Tech companies can – and do – work with law enforcement to help obtain data through means that don’t require new technical rules. Apple, for example, has a policy of releasing iCloud backup data when presented with a valid search warrant, and tools such as facial recognition software, iris scans and gait analyses can be invaluable in identifying criminals.

Transparency between law enforcement and tech companies is critical. But law enforcement needs to avoid overreach, and tech companies should clearly explain data protection policies to customers as well as law enforcement agencies.

That way, the privacy and security of millions of law-abiding users won’t be compromised – and their confidence in technology will remain strong. Encryption doesn’t have to be a black-and-white issue. In an ideal world, we won’t have to choose between privacy and security, but instead be able to find ways for the two to coexist.

Gary Shapiro is president and CEO of the Consumer Technology Association, the U.S. trade association representing more than 2,200 consumer technology companies, and author of the New York Times best-selling books, Ninja Innovation: The Ten Killer Strategies of the World’s Most Successful Businesses and The Comeback: How Innovation Will Restore the American Dream. His views are his own. Connect with him on Twitter: @GaryShapiro

Source: Tech CNBC
Tech consumers should not be forced to sacrifice privacy for security

Comments are closed.