Week in Review: How much is too much data?

Half a million requests for data concerning our communications seems an awful lot…

There has to be a balance between agencies having enough data do their jobs effectively and the rights of individuals but how do you achieve this?

A report recently released showing that there were half a million communication data requests under the RIPA act muddies the waters. It sounds an awful lot.

Naturally the government defends it, but it doesn't break the data down so we know exactly who is making these requests.

It was also reported this week that the government's [a href="https://www.itpro.co.uk/613690/home-office-denies-id-card-hack-claims" target="_blank"]ID card could be hacked in 12 minutes[/a], a claim which is rubbished by the Home Office.

Who to believe? If any of the claims are true, then this could be a very, very big problem.

If we did scrap the scheme, which the Tories say they intend to do, analysts Kable claims that it could save the government more than 3 billion.

The browser is the OS?

This week we also thoroughly investigated what the Google Chrome OS would really mean when it came to the development of cloud services.

It's a nice idea in the sense that it could make web applications easily accessible from anywhere, but will users really trust their data to be off the personal desktop and in the cloud?

Another feature also gives some useful advice about what businesses should do if they suffer the damage of a data breach whether it is by bad luck or bad policies.

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
Access brokers are making it easier for ransomware operators to attack businesses
cyber security

Access brokers are making it easier for ransomware operators to attack businesses

1 Dec 2021