Feeds

MP queries Hargreaves review

How did you choose Boyle and Loosemore?

3 Big data security analytics techniques

An MP has tabled a parliamentary question to find out how BIS arrived at its panel of advisors for the Hargreaves Review. Five experts are advising the former FT journalist with his six-month review into "IP and Growth". But two in particular – campaigning professor James Boyle and former web monkey Tom Loosemore – have raised concerns as they lack business experience, and have a history of hostility to creator's rights.

"I'd like to ensure the review has legitimacy," MP Mike Weatherley told El Reg. "I'd like to see a balanced review and we need to be careful it's not pushed in one direction."

Boyle insists he takes a "balanced" view of copyright. He's the co-author of two comic books, one of which (Theft!) is a collection of paranoid fantasies about copyright, and calls to limit its scope.

James Boyle's comic book Theft!

That looks er, pretty balanced and business-friendly.

Nothing that "the IP communities are quite review-weary and wonder if these exercises are worthwhile," IPKat's Jeremy Phillips describes the appointment as "an unfortunate burden for the review team to bear".

Weatherley is a new Member with an unusual claim to fame for an MP (or legal academic) these days: he's actually had a proper job. He was former financial controller of the Pete Waterman empire. ®

Top three mobile application threats

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.