Feeds

Europe approves mass data transfer to US

Data hoover helped catch suspects in Norway

Internet Security Threat Report 2014

The European Parliament has passed SWIFT II - the renewed treaty giving the United States access to financial information in order to investigate terrorism.

The previous version of the treaty was rejected in February.

Changes included a promise to phase out mass transfers of data. Instead Europol will work to filter US requests to keep as much data as possible in Europe.

Europe also gets the right to send an independent inspector to check US data processing facilities. The treaty also bans data mining or automated searches of all financial transactions.

A minority opinion signed by six MEPs questioned Europol's supposed oversight role. It also complained that the data was kept for far too long and that rights of people whose data is being used were not protected.

The treaty is due to come into force 1 August and will last for five years.

The full statement is here.

In related news, Norway's arrest of two Al Qaeda suspects (a third was arrested in Germany) this week was helped by US intelligence gained from SWIFT.

Stuart Levey, under-secretary for terrorism and financial intelligence, said: "I can tell you the 'Terrorism Finance Tracking Program' (TFTP) provided support to the Norwegian investigation of that al Qaeda threat."

This despite the fact that TFTP stopped receiving data at the end of 2009, when the treaty lapsed. It continued to "generate leads" based on the data it already had, Levey told EUObserver.

Levey said changes were designed to reassure Europeans but would have no impact on the effective working of the system. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.