Feeds

US customs: Yes, we can seize your laptop, iPod

And what exactly do you plan to do about it?

Secure remote control for conventional and virtual desktops

The Department of Homeland Security has outlined what we've all known for some time - that border agents are allowed to snoop through files on your computer, mobile phone or any other digital device.

Officials can keep documents or computers, take them to an off-site location, copy the contents and share the data with other agencies. If there is no probable cause to keep the information after this it must be destroyed. A San Francisco court upheld the right of border agents to search laptops even without reasonable cause back in April.

Officers who find business or commercial information "shall take all reasonable measures to protect that information from unauthorized disclosure". But officers cannot read, or allow others to read, "correspondence contained in a sealed letter class mail (the international equivalent of First Class) without an appropriate search warrant or consent".

However, letters carried by individuals or private carriers like DHL or UPS are not considered mail.

Border officials are told to seek advice if they believe material may be subject to attorney-client privilege.

If this all sounds draconian, don't worry. The border folks are also told that in the course of every border search, they "will protect the rights of individuals against unreasonable search and seizure." So, if you're travelling to the states on business and don't like the border patrol rummaging around your laptop, feel free to start quoting the fourth ammendment at them. We're sure it'll pull them up in their tracks.

The full guidance is available here (pdf). ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.