Top 10 Information Technology and Telecoms Headlines from All Regions
"Like" it, "poke" it, but don’t post your latest sweepstakes on Facebook without some serious thought. Your contest could be violating the site’s promotions rules.
This article quotes a report by Cast which found that the average large application requires extra investment of £2.23m to fix problems that become apparent once it goes live and if the problem is not fixed, companies risk even greater damage.
Today, 5 June 2012, the new rules on cookies have entered into force.
Data security breach notification has become a significant compliance risk for most businesses today.
We are pleased to share with you Littler's Report on the 2012 Littler Initiative entitled The "Bring Your Own Device" to Work Movement.
European consumers have expressed concern that the USA Patriot Act (the "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001" or "Patriot Act") will afford the US government undue and unfettered access to their data if they choose to store it on the cloud servers of US providers (e.g., Microsoft or IBM).
It’s been a long time coming, but in April this year the Indian Government brought its data privacy rules into line with European requirements.
More and more businesses are making virtual currency part of their business model. While the use of virtual currency provides great opportunities, businesses need to be aware of the emerging legal issues before using it as a means to build customer loyalty.
Data Protection refers to the set of privacy laws, policies and procedures that aim to minimize intrusion into one’s privacy caused by the collection, storage and dissemination of personal data.
The government asks for public feedback on a proposed DNC registry to register to avoid unsolicited marketing calls.