VoIP Business and Virtual PBX
Telecommunications

DHS data mining needs privacy oversight

In addition, DHS violated its own privacy rules by sharing information from the Immigration and Customs Enforcement Pattern Analysis and Information Collection program with state and local law enforcement agencies, said Representatives Brad Miller of North Carolina and Donna Edwards of Maryland, both Democratic members of the House Science, Space and Innovation Committee.

"Government data mining should have tough-minded oversight if we're going to keep Americans safe from terrorism, avoid wasting tax dollars on one boondoggle technology afterwards another, and protect the privacy of innocent Americans," Miller said in a statement. "The intelligence community has to stop using the legitimate need for some secrecy in counter-terrorism to hide from oversight, and Congress needs to get over our 'gee-whiz' attitude when we deal with the intelligence community."

Grant Gross covers research and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is grant_gross@idg.com.

In addition to platform enhancements, each and every product in the SOA Suite comes with its own set of enhancements. Read all about Oracle's latest developments here.

Security of a wireless network for all that ranks as one of the largest concerns of IT professionals planning to roll out an enterprise wireless LAN. Many people erroneously believe that a wireless LAN is inherently insecure. This is largely due to security flaws in early Wi-Fi protocols like WEP, more recent vulnerabilities found in TKIP and lack of awareness as to how to deploy a secure WLAN. This whitepaper will help the wireless network administrator or security manager to understand the security capabilities in a modern Wi-Fi solution, where they should be used and how the WLAN integrates with other security devices in the network.

More information: Computerworld.com