Feeds

The EU is out to get you, after all

Watch your liberties, Statewatch warns

Securing Web Applications Made Simple and Scalable

Second is the increased blurring of the line between safety and security. Tony Bunyan again: "People wish to feel safe. Security is all about the interests of the State."

However, since 9/11 some degree of liberal restraint - and the sense that individuals should have a right to privacy - has been overturned before the altar of absolute security.

A sense of how things have changed may be gleaned from the Future Group report, which talks about harnessing the power of what it calls the "digital tsunami" for the benefit of law enforcement and security agencies. Or, as the EU Council presidency puts it:

"Every object the individual uses, every transaction they make and almost everywhere they go will create a detailed digital record. This will generate a wealth of information for public security organisations, and create huge opportunities for more effective and productive public security efforts."

The third factor that, according to Tony Bunyan, is working massively to erode traditional safeguards is the way in which the EU appears to be kowtowing to the demands of the US, without putting in place any corresponding safeguards for its own citizenry.

If you think it isn't happening, then take a look at chapter two of the Statewatch report, which sets out in fairly gory detail a list of schemes and initiatives already in place or underway in Europe.

Last word to Jean Lambert MEP, a member of the Civil Liberties, Justice and Home Affairs Committee in the European Parliament, who commented:

"The idea that information makes you safe is a total fallacy. Data capture needs to be proportional and effective and, put simply, more information becomes increasingly difficult to manage and evaluate. The Government and their outsourced agencies have already proven that they can't be trusted to keep data safe, so we need to exercise caution.

"Member States should have to prove why data capture is necessary and be very clear about who will have access to that data before they are permitted to use and store it. There should be a presumption against gathering citizens' personal data for the sake of it. Once data is held there is the potential for it to be misused by persons not acting in our best interests.

"I share the concerns of Statewatch and voted against the EU Directive on Data Retention and I will continue to fight other measures which could lead to infringements of our right to privacy. I agree that there is a need for meaningful and wide-ranging debate on this subject to avoid the further violation of our civil liberties." ®

Application security programs and practises

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.