Feeds

Congress mulls stringent data retention rules

Two-year logs for ISPs, hotspots, even homes

Remote control for virtualized desktops

US politicians have proposed legislation that would oblige both ISPs and people running Wi-Fi hotspots to keep access logs for two years.

The stringent data retention rules are among provisions to two companion bills submitted to the House of Representatives (H.R.1076) and the Senate (S.436). Both bills are known as Internet Stopping Adults Facilitating the Exploitation of Today's Youth Act or Internet Safety Act. Each would impose similar regulations, as described below.

A provider of an electronic communication service or remote computing service shall retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user [DHCP address].

The rules are supposedly needed as a aid to law enforcement prosecuting child abuse and internet fraud cases.

Although the measures are sure to draw fire from those concerned about the privacy and cost implications they are not new. The bills' backers this time around are Republicans but in 2006 similar measures were supported by Democrats. Similar legislation was suggested even longer ago back in the 1990s. Previous efforts have run out of political steam but the EU decision to agree a regime on data retention has reinvigorated efforts to put similar laws onto US statute books.

European laws apply to ISPs, but US definitions are more broadly drafted so that libraries, offices, universities and even homes would fall under the proposed regime, news.com reports. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.