The Week’s Technology News – 19th December 2014

IT security needs embracing in the boardroom
Talking from GCHQ headquarters this week, Minister for the Cabinet Office, Francis Maude has urged businesses to make IT security a boardroom issue.  Amicus ITS has recommended this point repeatedly in blogs this year.  Government is now urging businesses to review IT security as an integral part of strategic thinking for the Board, to ensure secure data management remains at the heart of the agenda.

With recent breaches affecting major household names both in the UK and the US, Maude warns against complacency:  “All companies, large or small, face threats from vulnerabilities on a daily basis”.

The Government’s launch of Cert UK earlier this year, created a cyber security information sharing partnership, now enabling 750 organisations to exchange information in real time on threats and vulnerabilities occurring.   Maude pointed to GCHQ data which showed that 80% of attacks were preventable, if best practice was followed.

As organisations are reflecting on 2014 with their staff at Christmas parties up and down the land, a cautionary ice cube should be travelling down the spine of any Board members whose businesses have not thought to place IT security at the forefront of their business continuity plans.  For them, January will be the time to really start pulling this into focus on the 2015 Agendas to review, consult, embrace and invest as required, to ensure the bottom line of their business is not threatened – either profitability or reputation.

Professional header image @ 1000 px

Nats on the rack for IT system failures
Thousands of travellers in UK airports were delayed last weekend due to a software problem from a faulty line of coding at the London Air Traffic Control Centre at Swanwick in Hampshire. National Air Traffic Services (Nats), which controls 200,000 m2 of airspace, reportedly had a power system failure on an internal telephone switch controlling nighttime ‘standby’ to daytime ‘live’ operation.

The partially privatised company (owned 49% by the UK Government, 41.9% by The Airline Group, 4% by Heathrow (formerly BAA)) and 5% by Nats’ employees), has been running air traffic control for commercial UK flights since 2002.

The company handled over 2.1million flights last year, carrying 220 million passengers in the UK.  Nats had problems with its IT in 2008. Additionally, the CAA criticised Nats in a report about a telephone failure which grounded 300 flights in 2013 – and flights in Southern England were delayed earlier in 2014 due to “technical problems”.

The problem software came from a package originally being developed by the US air traffic control network. When this project collapsed, it was left to Nats to work through the outstanding development to make it serviceable and raised the price of Swanwick’s delivery by £150m from an original £475m budget.  Some of the blame is said to lie with an aged IT infrastructure.  Nats CEO explains, “There are 50 different systems at Swanwick and around four million lines of code”.  Nats’  decision last year to make a significant number of its most experienced, older IT engineers redundant when these were the specialists most used to working with the older technology, will not have helped. Especially worrying with this failure is that the fault had not been seen before.  The latest incident follows accusations about a corporate failure to invest in new technology and opens Nats to an increased risk of repeated outtages in future – this despite CEO Richard Deakin’s promise that £575m was being invested over the next five years.

A CAA inquiry will now be launched to assess whether Nats has learned from its previous failures, with the risk of its licence being reviewed. It will be a bumpy ride for the UK’s Transport Secretary, Patrick McLoughlin who will be providing a full account to Parliament about what went wrong.   Clearly any organisation, whatever type, lumbered with legacy infrastructure whether hardware, software or both will see operational effectiveness and bottom line profitability suffer if the Board does not grip the bull by the horns and review and assess the best way to upgrade and secure their IT systems.

13843338_s

Microsoft and Skype attempt to eliminate the language barrier 
Back in May, during the Code Conference event, Microsoft demoed a breakthrough, upcoming feature for Skype which would let people who speak different languages talk to each other without a human translator. Users can either voice or video call each other with translations appearing in near real-time with options for spoken and sub-title like written translations.

This week Skype has opened up a preview of this new feature to Skype users who would like to give the in-development service a spin. Interested parties can go to the Skype website and register their interest. Currently the preview is limited to just English and Spanish languages with more promised coming soon. Initial reactions report – although not perfect yet – the service does exactly as you would expect, allowing two people who can’t speak the same language hold a conversation.

The business applications for an accurate auto-translator that can handle both voice and video calls are enormous. For example a single-language Service Desk could be enabled to communicate with customers worldwide without the traditional language barrier or costly multilingual employees. Skype Translator if successful will shake up the translating business even more, with the need for a dedicated human translator being brought up into question and the knowledge of knowing additional languages not being as valued as is currently.

As the technology develops and matures it is also likely we will see Skype Translator being incorporated into Microsoft’s enterprise communication tool Lync, which was recently announced to be later rebrand Skype for business, and if so, adds further reasoning for the name change decision.

The future for Skype is looking very promising and this announcement more than any so far, including the cross-compatibility of Lync and Skype makes Microsoft’s Skype acquisition in 2011 more justified than any announcement the two companies have made since. With Skype being pre-installed into Windows and tight integration with its own Microsoft account system Skype now more than ever fits very nicely into the Microsoft ecosystem.

With Microsoft’s current Mobile first, Cloud First mantra we will likely see Skype translator eventually being integrated into the Skype app for smart phones and tablets and with near real-time translations built into your phone, Microsoft may be the first to successfully smash the language barrier for all.

skype-logo-open-graph-800x420

Financial services benefiting from outside help
The financial sector has seen major changes since the start of the credit crunch in 2008.  Changes have occurred in working practice, organisational restructures, cost cutting exercises with branch closures in banking and jobs cuts with people replaced by technology as part of a digital strategy, which has seen sector employment decline by 16% since 2009.  Lloyds bank is cutting 9,000 staff as part of its digital strategy and Dutch bank ING has a similar project that will result in 1,700 staff losing their jobs.

Financial services organisations have increasingly turned towards using more third-party IT products, services and talent, as well as outsourcing their IT, which has boosted the number of workers in the IT sector.  According to an analysis by accountancy practice experts Nixon Williams, in 2009 there were 403,000 jobs in the IT sector compared to 459,000 in 2014 (12% up). In comparison, financial services jobs have fallen from 1.18m in 2009 to 986,000 today (16% down).

With the sector witnessing a major increase in automation software replacing manual roles and the rise in public expectation for truly 24×365 customer services, this places enormous pressure on financial institutions to manage such huge data volumes in highly regulated, highly secure environments and needing to resist any downtime or DDos.

Whilst traditionally the banking sector will have had huge in-house IT teams, the costs, regulations and pace of technology evolution has whetted the industry’s appetite for using third parties with expert knowledge and robust solutions.  This lies alongside the disconcerting reality of often uncomfortably large legacy IT systems that continue to create vulnerabilities whilst they remain unchanged and instead rely on being patched up, versus long term strategy and commitment to invest in new IT infrastructures with more flexible integrated systems.

Some of the larger banks are starting to think laterally by turning to third parties for IT innovation to develop and implement non-core systems and apps, involving joint ventures with other institutions or even working with start up firms.  These include Sumeet Chabria, CIO of HSBC Global Banking and Markets and Deutsche Bank who have recently set up a JV innovation project with IBM, Microsoft and Indian IT services firm HCL Technologies to improve its digital credentials.

The motivation to sharpen the pencil, starts to look clearer when recent studies such as those   from specialist retailer Bizrate Insight reveal that 72% of the public still trust banks with their details, over that of retailers.   However there is no room for complacency over ‘trust’.  Potential competition for marketshare should they move into banking could be on the horizon from established transactors Paypal and Amazon who jockey for position on the trust rankings at 48.9% and 45.4% respectively.   Tech giants Apple and Google lag further behind at 21.4% and 12.9% respectively.  Nonetheless all of these, as well as Facebook, all have systems that contain details about people and businesses and handle monetary transactions.   So the circling pirranhas angling for additional income streams and greater global dominance may include some new names in the future.

33596896_s

Public Sector changing outsourcing habits in 2014
Market watcher ISG’s north Europe President, John Keppel, reports that the UK has seen a major boost in outsourcing from the public sector in 2014. This has included small and large contracts remaining in this country, versus being awarded offshore with spending levels nearly doubling in comparison to the UK’s private sector.

This has involved some big-ticket outsourcing deals but also a lot of mid-market government business.  Annual Contract Values (ACVs) from IT outsourcing in 2014 has risen 16% across EMEA, with France’s ACV increasing by 250%, whilst the UK with its more mature outsourcing market has seen a steady increase in line with cautious post recessionary optimism.  This is seen as largely due to the complexity of services required in the UK public sector, as well as a lack of appetite just to exploit cheaper resources from offshore suppliers.  The old adage buy cheap, pay twice perhaps resonating more closely with those responsible for procurement. “The challenge for buyers will be to understand how they can get the most value from their outsourcing efforts, and to understand the real business impact,” concludes Keppel.

Director of Sales at Amicus ITS, Les Keen comments:  “With the increase in Cloud services, this presents ever greater opportunities in 2015 for IT MSPs.  Those who can demonstrate the breadth of their experience, deliver the highest levels of data security, be a true 24×365 IT provider AND respect their customer as a business partner not a number – should see the benefit of working in this sector in 2015”.

18330013_s

End of 2014
This is our last review of IT for the year and the blog staffers at Amicus ITS would like to take this opportunity to wish all our customers and everyone reading these posts, a very Happy Christmas and a peaceful New Year.   We will be back looking at the latest technology developments and worldwide IT business news once again in January.  See you in 2015.

The Week’s Technology News – 12th December 2014

 

 

Have you planned IoT into your business strategy in 2015?
Increasingly it is now possible to connect any powered device to a network.   The Internet of Things (IoT) is an enormous technical development to comprehend let alone incorporate. However, from a business point of view, the real value in IoT will not just be in the connection of ‘things’, but the opportunity (if done properly), to manage the data and bring the customer needs into focus, alongside the product or services on offer.  This suddenly makes it a transformative technology applied through hardware and software and becomes highly interesting commercially.

Cisco’s Internet Business Solutions Group estimates that next year there will be around 25 billion connected devices, which will double to 50 billion by 2020 and Gartner recently suggested that IoT is peaking now in its ‘Hype Cycle’ of expectation around the subject.

If intelligent services are applied from the insights gathered from collated data and interrogated, this has the potential to radically improve customer experience and cost savings in the long run through prompt performance, increased trust and access (given the right security procedures and policies) and bond an existing relationship more more strongly between provider and customer.

Seen in practical terms, an IoT print-enabled supplier, could remotely monitor their customer’s ink levels to advise on re-supply, simultaneously run diagnostics for updates or repairs needed and advise, upsell improved models matching day-to-day needs and immediately have higher level feedback on how the customer is physically using the equipment in real-time.

From an MSP perspective applying three simple concepts, ‘connecting’, ‘managing’ and ‘engaging’ will create a proactive environment and a more bonded relationship attracting because of the intelligent assistance given.  To get there you have to have an agile infrastructure providing quick, simple and secure connections.  Some businesses worry about how to build the infrastructure to connect their devices. There are admittedly many aspects to consider ie. storage; messaging and routing protocols; security; directories; analysis; automation; and APIs to name a few.

According to a recent global KPMG survey of technology business leaders, 20% of businesses find the concept of implementing IoT too complex looked at from the outside without expert help.  However, by utilising ready-built networks, offering fast, secure and scalable connections alongside a range of tools provided as a Platform as a Service (PaaS), businesses can concentrate their efforts on creating innovative connected products.   Now that sounds like a plan!

internet-of-things-IoT

Sony hacked again – one week later

Last week Sony Pictures Entertainment was hit by a huge cyber-attack, leaking unreleased films and 47,000 personal records.

Since then even more data has been leaked including confidential E-mails between Sony Pictures Chair, Amy Pascal and well known Hollywood film producer Scott Rudin. The e-mails in question mock Barack Obama in an exchange of racist messages, with Pascal asking producer Scot Rudin what she should ask Obama at an upcoming event.  “Although this was a private communication that was stolen, I accept full responsibility for what I wrote and apologize to everyone who was offended.”

This week a new attack aimed at Sony’s PSN (PlayStation Network) took the service down on Monday. The attack came in the form of a Distributed Denial-Of-service (DDOS). Although the timing comes hot off the heels from the Sony Pictures attack they did not come from the same source. The PSN attack came from a group called Lizard Squad who boasted about the attack on their Twitter account.

With fresh information still leaking, including plans for unannounced films, Sony may be playing damage control for some time.  These events only highlight the need for stringent malware protection and tightened defences against ever increasing DDoS attacks, as well as perhaps a pertinent reminder to staff about the appropriate use of email content, which in this case could have saved several blushes.

Sony

Data breach red flags for 2015
Global information services company Experian have published their Second Annual Data Breach Industry Forecast for 2015 after reviewing cyber attacks of 3,000 organisations.  In their report, Experian details a change of attitude amongst business leaders when it comes to cybersecurity.  This will affect organisations and regulators in the year ahead.

Not only is reputation critically at stake alongside security and trust, but the demand by consumers for more communication, as well as remedies in restoring the status quo, whilst ‘data fatigue’ from an expectation of resolution against personal apathy for individuals to take more vigilant steps personally.  With almost 50% of businesses having suffered at least one data breach in 2014, the need to increase investment in security technologies and policy planning and guidelines around this is paramount and accountability goes right to the top of the Board.  A company now without a data breach response plan could be the first to fall largest victim to unscrupulous criminal targeting.

New trends are anticipated for 2015.   These are anticipated to include:
• New payment technology
• The continued rapid expansion of Cloud and e-commerce
• The consistently high value of healthcare data on the blackmarket
• Employees as one of biggest threats
• Internet of Things (IoT)

1. Payment technology   The deadline for retailers to adopt EMV (Chip and PIN) credit card technology is October 2015  if they want to accept Visa or MasterCard payments. As a result, breaches may increase as the window for hackers closes.

2. Cloud technology   With the increased adoption of Cloud technology, businesses can do much to ensure they protect theirs and their customer’s data, as the value of consumer online credentials continues to grow.  A great starting point is to take extra steps to safeguard passwords, as hackers will be seeking to target progressively more Cloud data as the volume of data explodes exponentially by companies in the Cloud.  This involves the capability and measures to re-set passwords on an enormous scale and to communicate with affected users to advise them to maintain transparency as part of maintaining trust in the relationship.

3. Healthcare data   In the US, the increased number of access points to Protected Health Information (PHI), sensitive data via electronic medical records and increasing popularity of wearable technology, makes the entire healthcare industry vulnerable and attractive for cybercriminals.  On top of this, the FBI reportedly sent a private notice in 2014 to the healthcare industry that their cyber security systems were lax compared to other sectors.  Given the budget constraints facing the healthcare sector in the UK, it would be remarkable given how many have legacy IT infrastructures and constant downward pressure on budgets, to be able to avoid breaches entirely.

4. Human error   One of the least reported issues is the impact from employee breach – either through human error or malicious endeavour.   They remain the leading cause of breaches, accounting for 59% of reported cases – and companies should therefore take the necessary steps to have policies in place to circumvent or minimise any impact.

5. Internet of Things   With the expansion of the Internet of Things, businesses will be seeking to benefit from reviewing data to optimise performance and consumerisation response.  So with more devices being created with Wi-Fi capabilities and sensors that create the opportunity for everyday items eg. car keys, alarm system or wearable devices – these will relay confidential information over the Internet and communicate with each other. Cyber attacks will therefore likely increase via data accessed from third-party vendors.

Takeaway – so, what action is required?  There will be an expectation for Board members to have a better understanding of their organisation’s data breach response plan and comprehension of new technologies and security protocols in the workplace, along with a clearly defined chain of response should such a breach occur.  Currently less than 17% of Board executives surveyed knew if their organisation had suffered a breach in the previous 12 months. Alongside this, should be security awareness training for employees as legal and regulatory scrutiny is anticipated to increase in 2015.

padlock

The Week’s Technology News – 5th December 2014

Outsourcing priorities changing
The latest Forrester Research report across 435 Europe-based IT decision makers has found that whilst 60% of European businesses are satisfied with IT infrastructure service providers, there is a subtle shift in focus from simple cost reduction desire (66%) to businesses offering  services to help increase sales and improve customer experience (71%).

The overall feedback stats should give serious food for thought to MSPs when marketing and servicing their offerings:
• 34% said cost savings were lower than expected
• 29% said service quality or delivery was inconsistent or poor
• 26% said there is a lack of innovation and/or continuous service-level improvements
• 23% said there is a lack of flexibility in changing volume, scope, business needs or pricing models
• 22% said service providers lacked a fully developed and functioning global delivery model.

“Faced with this customer demand for better, faster and more cost-effective infrastructure services, and increased competition from emerging and India-centric suppliers, Europe’s leading providers are forced to bring new offerings and delivery models to the market,” said Forrester analyst Wolfgang Benkel. “The good news is some of them are finally listening to their customers.”

Businesses which have moved to cloud services are benefiting from accessing more flexible services and MSPs need to ensure that to deliver the most for their clients they have a) the right technical skill set b) the business skills to think strategically around the business objectives of their clients and c) the experience, diligence and ability to adapt to create a more innovative approach with their offerings, in order to stand out from the crowd.

The Euro responses indicate that just meeting an SLA is no longer what is needed in the MSP marketplace and that evidencing and thinking about all ones added values will be the key to retaining customers and winning new business in 2015.

Modular mobile phone developments and corporate tailored opportunities
Google was first out of the gate with a modular mobile phone announcement with Project Ara, planned for release in 2015, but not without competition. Finland based Circular Devices has announced its own plans to create and sell a modular smart phone called Puzzlephone next year.

The Puzzlephone approach is a simpler one with the smart phone being detachable into 3 parts; the spine (the main structure including the screen), the Heart (a large piece that slots into the bottom half of the back – this includes the battery and secondary electronics) and finally the Brain (This slots into the top half of the back – includes the processor and camera).   Google’s Project Ara approach is a lot more customisable with prototypes having 8 smaller, changeable parts – compared to Circular Devices larger 3.  However, it is possible that the simpler solution could win out with users finding Project Ara a bit too complex to get their head around.

With two companies now in preparations for a modular phone launch next year, making reality from the concept is s significant step closer. These devices should appeal to tech enthusiasts and organisations.  The potential for modular phones in the workplace is huge. Organisations would be able to create their tailored smartphone using selected prioritised modules according to their business need and deploy to employees. This would both have the benefit of cutting costs on unneeded or unused features but also being able to add in requested features such as larger capacity batteries or fingerprint scanners.   Another advantage of the modular approach is when things go wrong. Currently if a particular part of a phone fails, the whole unit has to be replaced or sent off to be repaired.  With a standard modular build, fixing future issues could be as simple as swapping the faulty part with stock.   Modular phones will be arriving next year, but their success will be dependent not only the cost of the phone and its modules, but how well the platform is supported by manufacturers providing unique hardware.  Over then to the android market and the likes of Samsung, HTC and Sony for part two of this evolving story…

puzzlephones

Sony hacked again – leaking unreleased films and 47,000 personal records
Sony is no stranger to data breaches, infamously having to pull down their Playstation network in 2011 for 3 weeks after 77 million customers were potentially compromised, later to be fined by the ICO.

Now Sony Picture Entertainment is the next division to fall under cyber-attack. The attack itself appears to be malware and has been used not only to steal data, but also wipe machines at Sony.  With hugely damaging commercial potential, four unreleased films have been leaked online pre-launch with personal details of 47,000 people including Hollywood stars such as Sylvestor Stallone exposed.

Since the Sony attack, the FBI has sent an alert out to US businesses warning them of malicious software that matches up with reports from the Sony Pictures attack. The report warns of malware that overrides all data on a computer’s hard drive including the master boor record, preventing booting up successfully afterwards.  The geographical origin of the attack remains unknown, but a group calling itself Guardians of Peace is claiming responsibility.     With both the risk of data leaks and data deletion, the importance of both a truly secure infrastructure and multiple data stores is more important than ever. For Sony this is another huge wake up call for a household name, swiftly becoming synonymous with susceptibility to cyber-attacks.

sony_pictures

Radio heads up some surgical changes for 5G
The race is on to deliver the fifth generation of our mobile network.  The build in excitement around 5G may in fact be wholly worthy of the buzz, if the latest news on this joined-up superfast technology pans out, as vaunted by Professor Rahim Tafazolli of Surrey University’s 5G Innovation Centre.  This means the opportunity for properly connected smart cities, remote medical surgery, driverless cars and the “internet of things”.  The thought of stalling videos and apps and load delays becoming a mere footnote in tech history would be thrilling news.  Prof Rahim Tafazolli says, “5G will be a dramatic overhaul and harmonisation of the radio spectrum”.

The difference comes from the 5G networks transmitting data via uninterrupted radio waves bouncing off small masts with improved antenna technology.  The waves split into bands (frequencies) with each band reserved for different communications ie.  one for TV broadcast, one for mobile data, one for aeronautical signals etc.  The system has got messy with new technologies squeezed into the gaps.  Now, the regulators, the International Telecommunications Union (ITG) are restructuring parts of the radio network used to transmit data to make more space whilst simultaneously creating efficiencies in the traffic flow, whilst 3G and 4G use carries on.  The network which scientists hope will kick in by 2020, will need to cope with vastly increased levels of communication. Through The Internet of Things (IoT), devices will ‘smarten’ and dynamically switch between three TBC ‘lanes’ (bandwidths) in order to avoid frequency overload and will rely on lower latencies (timelag between action initiation and response).  Ericsson predict that 5G’s latency will be around one millisecond – unperceivable to a human and about 50 times faster than 4G.

So what?  Well 5G is anticipated to run faster, much faster. In 2013 when Samsung announced it was testing 5G at 1Gbps, journalists reported that a high-definition movie could be downloaded in less than half a minute.  A speed of 800Gbps would equate to downloading 33 HD films – in a single second. This is 100 times faster.  To do this, it will need capacity – and lots of it.  By 2020 it is thought that 50 billion to 100 billion devices will be connected to the internet.

Whilst there is great competition between the giants Ericsson and Huawei, both are investing hugely in this research phase and despite the obvious rivalry and associated costs, each is co-operating with the other to bring on the technology to enable product development to advance.   Samsung hopes to launch a temporary trial 5G network in time for 2018’s Winter Olympic Games, whilst Huawei is racing to implement a version for the 2018 World Cup in Moscow. For Managed Service Providers and businesses alike the vast potential of 5G is a major game changer, but harnessing and directing opportunity to create an ‘intelligent’ and more intuitive commercial response for customers will be the real game changer for business.

Barclays seeks (again) to improve customer experience
Barclays is leading the way again in banking technology by seeking to deliver a more personal form of assistance to its customers.  Barclays Beacon service called ‘Barclays Access’ is being trialled in Sheffied and will work through an iPhone app.  iBeacon which uses Bluetooth to detect when a person using the app enters the branch will trap personal details, information on their requirements, plus the option of a photo, to assist with speedy ID on arrival.  An iPad at the front desk picks up the alert.  All of these touch points can then alert bank staff to react promptly, discretely and courteously when a customer with an assistance need arrives at the branch to improve the overall customer experience.

Previously, Barclays pioneered customer banking transfers using only a mobile number, plus enabling some businesses to swap PINs, passwords and authentication codes for fingerprint scanners.  Technological advances have not by themselves caused massive behavioural changes to get customers to switch or stay loyal, but a combination of technology and personal intervention with insight creates a whole new level of customer care.

barclays

The Week’s Technology News – 28th November 2014

Coldfinger not goldfinger, as smartphone biometrics not a panacea

Former GCHQ boss, Sir John Adye, has just given evidence about his concerns regarding the unsupervised use of biometrics on smartphones to an audience of British MPs in the Commons Science and Technology Committee.

Adoption of fingerprint technology has taken off most notably with smartphone giant Apple’s iPhone6 and users can now make payments and access services using a fingerprint. However, as the GCHQ security expert who runs his own biometrics company commented:  “I don’t know what happens to my personal data when I use it on a smartphone… there’s no physical supervision of the system (unlike an ATM which a bank oversees)”.  “You need to design security methods… which are going to be strong to protect the interests of the individual who is using the phone and the relying party at the other end… the bank or whoever it is, who is providing a service to them.”    Apple says it uses the most technologically advanced fingerprint security and puts security and privacy at the core of the “Apple Pay” system.   But Adye also wants more transparency in the way personal information is passed to third parties.  He does not believe users fully read through the notices in the tick box procedures layering complacency, when in the background, the criminal community get ever more clever about seeking ways in.

Another biometrics engineer presenting to the Committee, Ben Fairhead, advised there were various anti-spoofing and other methods to work out whether the finger was real, but acknowledged spurious results got thrown up if for example blood flow to the finger was low, which would reject the verification.  In a twist to the old tales of criminals smuggling a file into prison now we have criminals adding iron filings to fake fingers to mirror the conductivity of human skin.  From the Government’s point of view there will come increasing pressure to demonstrate they have weighed up the increased approval of biometrics in border controls and public services with sufficient measures to safeguard against the risks and possible flaws.
iphone 6

Forget me not
With the ‘right to be forgotten’ now in situ, the European Commission has finally published guidelines to tell search providers how to handle individuals take down requests (first discussed in our blog of 16 May 2014).

Mostly requests synch with what Google has already been doing – and the balance is successfully struck between an individual’s search for privacy against the public’s rights to know something.  One area that has created consternation though in the EU is Google’s tendency to warn both users and site operators when it takes a notice down. This lacks legal basis according to the Commission, when they could be contravening data protection laws.

This was recently experienced by US singer Barbara Streisand, who sought to have some online information taken down, but the ensuing actions actually drew attention to the very issue she was trying to keep secret.

The Commission also wants a level playing field so it applies to all web domains, not just removing them on country centric ones (ie. ‘.co.uk’ or ‘.fr’) and leaving uncensored results on a ‘.com’ page.   This comes at a time when Microsoft’s ‘Forget.me’ has just started reviewing requests through its Bing search engine and using the EU advice as a template, but it remains to be seen if the guidelines can please both sides AND the regulators.
bing-right-to-be-forgotten_thumbnail