List of Capita's successes?
Successful for who, Capita or the purchaser of the service?
279 posts • joined 7 Aug 2009
Successful for who, Capita or the purchaser of the service?
It involves existing treaties which exist for this purpose and which require TPTB to get a warrant from an Irish court. In order to do that they have to put together a convincing case as to why they think they should get the data.
You may wonder why they haven't done this.
I'd guess that if they (the DOJ) win, for future investigations they will know that they won't need to go through the international hassles and can just force a cloud provider to provide the data under US law. If they win they have set a precedent for the future.
When they pester users to "just upload your contacts - it'll make things easier" without spelling out in big clear print and simple words that this is a criminal activity in the EU unless you get consent from every person who's details you upload.
Is this true? I've read some stuff about data protection, but it's all been approached from the point of view of a "company" and their handling of inidividual's personal data. I can see that uploading your contacts/phonebook might be a questionable thing to do, but is it actually illegal?
reminds me of paypal.....
It's in Manchester.
I think the industry sector is also relevant. You see a lot of very well paid jobs in London, the best paid are in banking/finance, and many of them require finance experience as well as tech skills (also degrees but that's a different article).
I'd say it's inevitable that if you say you live in London, and you don't work in finance, the salary calculator will suggest you're massively underpaid. At least it did for me......
If only there was some correlation on being PCI-DSS compliant and actually being secure....at least it forces you to patch.
It also forces you to think, for instance about your network architecture. Apparently there are rules covering taking payments by phone, and using an ip-based phone system, along with networked computers, which wouldn't have occured to me. Mind you this isn't my job area.
Hi Mr Coward, is your name Ian?
You visit your mother-in-law and she charges you for meals? Sounds a bit harsh.
I think it was Tom Sharpe whio had exploding flamingos. Riotous Assembly or Indecent Exposure?
but to ask to join either the EU or the USA (51st state)
I think Puerto Rica is reckoning to be 51st. We might have to settle for 5n.
How many companies do you suppose are under contract to keep their data encrypted to protect their customers?
While not quite 'under contract', the new data protection regulations in Europe are certainly pushing companies towards encrypting all customer data. While this alone won't protect you from data theft, in the event this happens it will be important to show that you considered data security, and encrypting it would be an obvious thing to do. Pretty soon I'd expect encrypted data to be the default, and it's not a particular leap to suggest that this might include communications, as well as databases and the like.
This is where we need a telecommunications operator to stand up and say ok fine we will develop a service that is encrypted in such a manner that we do not have the technical cabability even under duress to decrypt.
The whole point of this paper is make doing that illegal. You (as the telco) will be required to able to decrypt anything that you encrypt, if you can't do that you would be in breach of this proposed law.
the last page of the document on ORG specifically excludes those operators who are providing telecomms for financial services, including banking.
As far as the e-commerce stuff is concerned, this only covers encryption services provided by the telco or isp. It might, for example, be a nice selling point for a telecom/isp to offer me a fully encrypted service. This paper would make that ineffective as that provider is required to be able to decrypt my communications on demand, if they are the ones providing the encryption. If I take the standard service offered today, and choose to encrypt the data I send over it (using https for example), that has nothing to do with this paper.
I think they're trying to prevent fraudsters from misusing credit cards.
One of the checks done to spot fraudulent use involves comparing the country of the card issued with the country identified from the current ip address of the person using it. If they don't match the transaction is flagged as potentially fraudulent. Depending o the processor's rules, it can be denied. Using a VPN would make this less effective, not to mention you don't get an ip address for the possible fraudster.
Previously known as amanfrommars ?
Today's technology, solutions without problems. Paradoxically it has produced large numbers of billionaires.
Also quite a few new problems...
Sadly the most recent ascii-art I can recall is at goat.se (NSFW). I wonder what these databases make of this?
Great comment, coming form a judge.
The inclusion of amanfrommars contributions should help advance the science.
I think I've just spotted a bug. You executed that loop twice. Perhaps you didn't factor in oil depravation.
At first I thought that was a typo for deprivation, but on reflection, maybe not.
Re-read the article. The job spec isn't just Win 10/Office. More to the point they want Exchange, phones, voicemail and networking.
When I clicked the Start button, "Restart" and "Shutdown" had been replaced by "Update and Restart" and "Update and Shutdown". Is that new, or have I just missed it in the past?
It just means that there are updates to be installed. When they have been installed, the legends will return to what they were before. Until next time...
The problem in the UK has always been short term thinking except in a few companies with strategies and vision like RR.
Seems to me this started (or maybe just got a lot worse) in the 80's with the rise of performance-related pay. If the conditions for getting a bonus are sufficiently badly thought out, it can mean that the management strategy for maximising bonus can be contrary to the best interests of the company. This would be particularly true if you don't expect to be with the company for long.
A true genius and what did we do with him? Prosecuted and chemically castrated him, driving him to suicide.
Perhaps better not to reflect on him after all.
Perhaps not long term, but at one point they survived largely because Microsoft bailed them out. At the time Microsoft were trying to claim they didn't have a monopoly on PC operating systems. Having Apple around was kind of necessary, being as the 'year of Linux on the desktop' still hadn't arrived.
mount fsck umount...
This coming from someone who calls themselves Mort....
"The American people will have to weigh in ... The problem is big and broad..."
just like many Americans, as it happens.
Couldn't ever really get into that. For me it has to be solitaire / free cell. But word games could be the new one. Anyone have any tips? Needs to be be multiplayer and preferably multi-language.
I think I'd like to add this to my phone, what was the company name again?.
If it looks like a duck, and it, oh wait....
Now if they were Neuromancer fans, I'd be worried.
Seems a bit unkind, or he really that shape?
the savings are tiny as I'm a very low user
The savings appear to be so small that if anything at all goes wrong, the potential savings will be more than wiped out by the time spent sorting it out.
That was also one of the good things about being in the EU.
which went so well....
Sounds like a song title
It's a moronity with a typo.
Oh no, that's just where they pay tax....
Is 4.3 the strength, CAMRA members want to know?
Make extensions visible by default, dammit. If this had been done decades ago,
Decades ago file extensions _were_ visible by default. Then MS decided to hide them.
the above shows just how effective non-US encryption can be, even if we have to go to Mars to get it.
Surely this, and Andrews previous reply, indicate the problem. Prior to the internet (or digital distribution really) most of this didn't matter, as you couldn't do it - by which I mean simply provide a means for someone to obtain a perfect copy.
The suggestion above that there is a difference between linking to a stolen image on a server that one owns, as compared to linking to a stolen image on another server seems specious. The practical effect is the same - the stolen image is there to be viewed.
The law, as it stands doesn't work anymore, and comparisons with physical situations don't help. Seems to me that we (society) need to figure out is what is the right thing to do, so the law can evolve to work in the digital age. It doesn't matter what a hyperlink actually is,what matters is what it enables, and if what it enables is wrong then let that be the guide.
Biting the hand that feeds IT © 1998–2018