Privacy

The legalities of big data and data analytics
Data is a business asset, like money, IP, stock, property or employees; and in dealing with any of these assets, there are legal rights, obligations, regulations and limits, writes Matthew Hunter.
2014 in Review: Cloud computing comes of age
As the new year kicks off and businesses reflect on last year’s enterprise IT developments, one major trend that has dominated the landscape in Malaysia was cloud computing, writes Edwin Yapp.
Nine social media scams you need to know
As social media is now a common destination for mobile users, it has also become one of the favourite attack hotspots for cybercriminals, Trend Micro said.
Trend Micro rolls out Maximum Security 2015 Cloud Edition
Trend Micro Inc has launched a security solution available that offers protection from cyber-threats for PC, Macintosh, Android and iOS platforms to protect consumers from the perils of Internet across multiple devices anytime, anywhere.
Naked celebrity pictures: How safe is your cloud?
Trend Micro’s Rik Ferguson ponders the release of explicit pictures of Hollywood celebrities, and the uncomfortable question for anyone using iCloud: Is my cloud storage safe?
Personal safety app Folr launched
The ‘personal safety’ app market saw a new entrant with the recent launch of Folr, a geolocation tracking application which claims to give real-time information on the whereabouts of family members, significant others, best friends and more.
BYOD: Corporate security and global users’ privacy rights
The economic benefit of BYOD is overpowering the security concerns, but in today’s age of global business, it’s crucial to have a BYOD policy in place that not only protects corporate data, but also follows laws for respecting employee privacy, writes Dell Software’s Matthew Johnston.
Facebook under fire for conducting secretive emotions study
The recent move by Facebook to conduct a sociological experiment on a select group of its users has drawn criticism from academia, analysts and social media professionals who described it as callous, unethical and irresponsible; although perhaps not illegal, writes Edwin Yapp.
Securing health information exchanges
The trends toward personalised medicine, prevention, and wellness means stakeholders need to connect information from various points within the healthcare value chain − including providers, laboratories, payers, and patients, writes George Chang of Fortinet.
Telco Deep Dive: New uses for telcos’ core assets
On May 26, Digital News Asia (DNA) released its first Deep Dive report, which looked at the telecommunications space in Malaysia. In this article, Melanie Bockemühl and Helge Hofmeister of the Boston Consulting Group write about how telcos can generate new revenue streams by making their assets and related services available to their business customers.
Subscribe to SNAP
Download Digerati50 2020-2021 PDF

Digerati50 2020-2021

Get and download a digital copy of Digerati50 2020-2021