• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Hosting-new.com

Hébergement web, cloud et solutions personnalisées

  • Home
  • About

Hébergement CPanel sur SSD, offre Cloud

Un hébergement professionnel sur serveur Xeon Gold et SSD

Government

Government Surveillance: What Notice Do Web Hosts Owe Their Customers?

January 7, 2015 by Admin Leave a Comment

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

As consumers increasingly utilize the Internet in many aspects of their daily lives, the challenge becomes enjoying the conveniences of online activities without sacrificing privacy. The mechanisms for protecting privacy continue to evolve as the focus of online activity transitions from laptops and desktop computers to smartphones and other portable devices. With enhanced surveillance from government agencies, do web hosts owe their customers notice that their websites and data has been read by other sources?

How Does The Government Access Personal Information?

The government may want private data for regulation implementation reasons or external intelligence inquiries. In fact, they can obtain your electronic records and communications through wiretapping, warrant, or subpoena. Some protection exists against access to email and additional online activities. The government does understand, acknowledge, and appreciate that some Internet activities justify safeguards. The challenge becomes deciding which Internet activities these protections affect.

Consider that current government surveillance can generate the following data from your web host:

  • Email header message in addition to the subject line
  • IP address
  • IP address of computers communicated with
  • A list of all sites visited

This capability leads to the emergence of two key policy questions stemming from the technical realities of the Internet today.

  1. Do we all have a reasonable expectation of privacy when we use the Internet?
  1. When a user encrypts Internet communications, does that entitle them to extended privacy? As a consequence, is the Internet less secure because of the possible need for the government to decrypt it?

What Are Acceptable Surveillance Measures?

The solution to these questions and also an indicator as to if the government is acting appropriately leads to one main issue. How do we know when web discussions are related to espionage, terrorism or criminal activity? The premise is that if they are, then the government should recognize them, be entitled to observe them, and provide a reasonable measure of security.

It seems plausible to conclude that Internet privacy should not extend to offenders. Additionally, the government should observe their communications whether or not encryption is present or perhaps especially if it does. Web hosts should focus on the threshold of how the determination is made to watch particular Internet communications or a specific level of communications. More importantly, an understanding should exist on who monitors and manages this determination.

Several distinct organizations establish appropriate criteria for surveillance in diverse ways. One perspective holds that before implementing monitoring, evaluation of the means, context, and intended uses are critical.

What Are The Means Used To Gather Data? 

Extensive unprocessed volumes of data retrieved from Internet traffic are collected and stored daily in data warehouses. Software is used to inspect social media posts, online purchases, files sent by email, and all web sites visited. Analysts have to defend why they suspect someone is communicating outside of the U.S. when requesting additional information. This raises questions, including:

  • Does the manner cause unfair or unjust psychological or psychological harm?
  • Does it overlook a personal boundary without approval, such as providing intimidating, false, or misleading information?
  • Does the method violate conjectures concerning how data will be handled, including the absence of secret recordings?
  • Does the technique generate invalid conclusions?

What Does Data Collection Reveal? 

Due to the extreme amount of data collected, storing the full contents of intercepted web traffic cannot usually exceed more than 30 days. However, the law permits the storage of some metadata for five years. Additionally, investigators can move specific documents to permanent databases when it becomes connected with and relevant to an ongoing and open-ended investigation. The law authorizes the targeting of certain individuals, allowing monitoring of all standards of communication, including Internet use, without their knowledge or consent. However, if the government wants private emails or social media posts, for example, it must request this data from the web hosts. All of this leads to more critical matters for web hosting consideration.

  • Should individuals provide consent web hosts for the data collection?
  • Are there systems for disputing the results, or for including optional data or explanations into the document?
  • Is the data sufficiently protected?
  • Is targeting broadly applied to all?

What Uses Are Authorized For The Data That Is Collected?

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

While the government is only allowed to intercept communications if at least one part of the conversation is outside of the United States, it does not have to distinguish this fact upfront. What this means is that is can collect bulk data and sort it all out at a later date. If the secured information belongs to an American, the investigator must destroy that information. However, this determination cannot always be made by a machine. It typically occurs after a human investigator analyzes it. The safeguards are in place to protect data obtained from U.S. citizens who are not relevant to an ongoing investigation, unless evidence of a crime exists in the information. This brings up the issues of using the collection of mass surveillance data.

  • Does the authorization of the method to gather information serve the objectives of the target of surveillance and not the particular aims of the government?
  • Does an appropriate balance exist between the essential nature of the intent and the price of the means?
  • Are the intentions of the data gathering legitimate? For instance, is there a distinct connection between the data obtained and the goal sought?
  • Can the gathered information cause unfair harm or damage to its subject? If so, how will an individual be protected?

What Are The Best Methods For Web Hosts To Acknowledge Government Surveillance?

The government must apply certain safeguards and address with web hosts the practices and regulations governing surveillance of individuals and access to otherwise private information. The majority of hosts and users acknowledge that the government must preserve their security, assurance, and protection. For that reason, the current laws and applications are in of immediate improvement.

The established standards of free speech and privacy require alignment with the aims of assuring that intelligence efforts and government law enforcement are understandable and very clearly defined. Even though ethical surveillance is likely, there must exist feasible and publicly accessible documents and culpability for those recommending, supporting, and performing the surveillance.

Top image ©GL Stock Images

whg_banner.new.10k

Related posts:

  • Holiday Security Concerns Good for Small Businesses and Web Hosts
  • The Top 9 Ways You Can Foil Hackers
  • Will the World’s Problems Affect the Internet?
  • Examining the Chinese Influence on International Data Control
  • A Brief History of Data Storage
  • Are Cloud Providers Pushing Clients Back to Colocation?
  • Will IoT Devices Overload Web Hosts?
  • NSA Data Collection: Is it Possible to Remain Anonymous and Still Be on the Web?
  • Website Security: What is Your Ultimate CRASH plan?
  • How Will the Virtual World Create Storage Problems for Web Hosts?
Zemanta

Web Hosting Geeks’ Blog

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

Filed Under: Web Hosting Tagged With: Customers, Government, Hosts, notice, Surveillance, Their

Did the U.S. Government Learn Anything From the ACA Website Failure?

November 6, 2014 by Admin Leave a Comment

Healthcare.gov, the website designed to help consumers compare and purchase health insurance as a part of President Obama’s Affordable Care Act, officially launched on October 1, 2013. The site was immediately plagued by serious problems that made it difficult for many users to navigate. In the months that followed, the Obama administration fought hard to get the site running smoothly and to mend the damage the website’s failure inflicted on the President’s deeply dwindling approval ratings.

Over the course of this past year, journalists have investigated the events leading up to and immediately following the launch, and government officials have held hearings in an attempt to uncover exactly where things went wrong. While it can often be difficult to separate facts from political posturing, it appears clear that the web project was plagued by inefficiency and a lack of communication from its inception. It remains to be seen whether the government or primary contractor will change their ways in the wake of this disaster.

A “Burdensome” Prospect

The firm initially chosen as the primary contractor responsible for building healthcare.gov was CGI Federal. CGI Federal is an American subsidiary of CGI Group, a Canadian company that employs almost 70,000 people who are spread around the globe.

Despite CGI’s experience working with the military, the F.B.I., and over 40 state governments, they were less suited for creating a project of this magnitude than many of the country’s flashier Silicon Valley tech firms. Silicon Valley has little interest in pursuing government contracts, largely because they don’t consider the extra work required to qualify to be worth the effort. As Stan Soloway, the C.E.O. of an organization that represents government contractors explains, “it is very burdensome, and the rules make it very unattractive.”

The extensive requirements that must be met before a company can be considered for government contracts were designed to keep businesses from profiting too much off the American taxpayer. Unfortunately, they also exclude talented firms who are unwilling to slog through the details. As a result, the government often has few choices. The Centers for Medicare and Medicaid Services (CMS), the government agency that the Obama administration charged with implementing its Affordable Care Act and by extension the online healthcare marketplace, chose CGI Federal from a pool of only four pre-qualified contractors.

By early 2014, Federal officials concluded that despite the improvements CGI made to its original designs, the firm was too ineffective and ill equipped to trust with completing the project. CGI was fired and replaced by Accenture, another contractor with more direct experience building large websites for government organizations. Following the July 2014 release of a nonpartisan government investigation into the problems surrounding healthcare.gov, CMS spokesperson Aaron Albright admitted his agency’s poor choice of contractor. Albright stated, “CMS takes its responsibility for contracting oversight seriously and has already implemented contracting reforms…including ending its contract with CGI and moving to a new type of contract with Accenture that rewards performance.” If there were more incentives for qualified companies to seek government work, the Obama administration would have had a larger pool of initial applicants from which to choose and many of the problems that arose could have been avoided.

Lack of Leadership

Perhaps the most consistently cited factor contributing to the failure of healthcare.gov has been a lack of leadership. In a congressional hearing held only weeks after the site’s initial failure, CGI Federal Vice President Cheryl Campbell was one of the first people involved in the project to directly place blame on the government, not its contractors. In a prepared statement, Campbell claimed that CMS “serves the important role of systems integrator or `quarterback’ on this project and is the ultimate responsible party for the end-to-end performance.” Subsequent testimony supported her statement and congress sanctioned CMS’s failure to hire a qualified company to act as systems integrator. A designated systems integrator would have been responsible for making sure that the many different aspects of the website worked smoothly with one another. Because no one firm was specifically given this task, problems arose when it came time to put the pieces together.

Some people attribute this critical oversight to a general lack of knowledge within government agencies when it comes to technology. They suggest that CMS may not have realized in time just how important a systems integrator was to the project’s success. As its name suggests, CMS is primarily tasked with administering medical social services, not web development. It seems likely that they simply did not recognize their mistake until it was too late.

CMS relinquished their role as systems integrator shortly after Campbell’s testimony, and the website has continued to improve since then. Problems still exist, particularly surrounding the ways that insurers receive participant information. These problems serve to further highlight the importance of strong leadership, particularly when building a project that connects so many different businesses to potential consumers.

Practice Makes Perfect

In the year since healthcare.gov first launched, hundreds of government officials have worked extremely hard to determine what went wrong and to fix the problems. For the most part, they have corrected their mistakes and they have done so quickly considering the vast scope of the site. While these decisive actions suggest that the government has learned from its failure, many of the processes that contributed to that failure remain in place. Government contracts are still limited to the specialized companies willing to pursue them. The valuable lessons healthcare.gov taught both CGI Federal and the Obama administration about the importance of clear direction and leadership will however hopefully encourage the American government to better manage similar projects in the future.

At Hanei Marketing, we respect the sophistication involved in many of today’s web ventures and honor that sophistication with targeted b2b marketing strategies that embrace the complex ways businesses connect with one another. Our tech team has the skills to build advanced systems and is driven by strong leaders who realize the importance of seamlessly integrated programming and pre-launch testing. If you are interested in learning more about the services we provide, we invite you to fill out our online contact form. After you have submitted the form, a representative from our firm will contact you shortly.

Top image ©GL Stock Images

whg_banner.new.10k

Related posts:

  • Why the Obamacare Website Failed in So Many Ways
  • Is the Next Cloud Storage Evolution Here?
  • The Four Easy Steps to Getting Your Website Back Online Quickly When Your Host Goes Down
  • Is Your Web Site Complete for Customers?
  • Connecting With Free Online Cybersecurity Tools and Educational Resources
  • Working the Right Way with the Right Web Designer
  • A/B Testing for Web Sites: The Easy Method for Optimizing Your Web Site Traffic and Impact
  • Does Your Web Site Have Intelligent Human Interactions?
  • dot.God
  • Is Your Website Retina Display Ready?
Zemanta

Web Hosting Geeks’ Blog

Filed Under: Web Hosting Tagged With: Anything, Failure, from, Government, Learn, U.S., Website

US Government Faces Cybersecurity Risk Due to Faulty Cloud Contracts

October 13, 2014 by Admin Leave a Comment

Federal agencies are putting sensitive data at risk according to a report released to the public on Thursday from the Council of the Inspectors General on Integrity and Efficiency’s (CIGIE) IT Committee. The report selected 77 commercial cloud contracts for review after 19 Offices of Inspector General (OIGs) shared testing…

The post US Government Faces Cybersecurity Risk Due to Faulty Cloud Contracts appeared first on Web Hosting Talk.

Web Hosting Talk

Filed Under: Web Hosting News Tagged With: Cloud, Contracts, Cybersecurity, Faces, Faulty, Government, Risk

UK Government COO Behind Cloud Push Resigns to Return to Public Sector

August 6, 2014 by Admin Leave a Comment

The UK government’s COO Stephen Kelly, who has helped shape Britain’s ICT procurement policy and G-Cloud, resigned on Wednesday. Kelly reported to the Cabinet Office as leader of the Efficiency and Reform Group (ERG), but is returning to the private sector, and may not be replaced.

The post UK Government COO Behind Cloud Push Resigns to Return to Public Sector appeared first on Web Hosting Talk.

Web Hosting Talk

Filed Under: Web Hosting News Tagged With: Behind, Cloud, Government, Public, Push, Resigns, Return, Sector

US House Representatives Vote to Rein in Unwarranted Government Surveillance and Backdoors

June 21, 2014 by Admin Leave a Comment

The US House of Representatives has voted 293-123 in favor of a proposal that would essentially block government authorities from conducting warrantless searches on the data of US citizens, and stop the Central Intelligence Agency and National Security Agency from creating hardware and software backdoors for spying.


Web Hosting Talk News

Filed Under: Web Hosting News Tagged With: Backdoors, Government, House, Rein, representatives, Surveillance, Unwarranted, vote

Chinese Government to Invest $1 Billion to Drive Cloud Development

September 6, 2013 by Admin Leave a Comment

September 6, 2013 — The Chinese government plans to make more than $ 1 billion available over the next few years to drive cloud computing development, according to a new paper commissioned by the US-China Economic and Security Commission.

Keep on reading: Chinese Government to Invest $ 1 Billion to Drive Cloud Development


Web Hosting Talk News

Filed Under: Web Hosting News Tagged With: Billion, Chinese, Cloud, Development, Drive, Government, invest

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Primary Sidebar

Made with love by Hosting-New