- More possibilities for influence from interest groups
- Common goal: Develop and strengthen multi-stakeholder approach
- Decision expected by June 2015
Who should perform the supervision of the world-wide Internet administration in the future? This question has been negotiated by participants from governments, industry and the civil society since the US Government announced, in March last year, that they wanted to relinquish their sole control over the core functions of the Internet, as carried out by the Internet Corporation for Assigned Names and Numbers (ICANN), as long as certain framework conditions can be complied with. eco – Association of the German Internet Industry, DENIC and the German section of the Internet Society (ISOC) have, together with the German Federal Ministry of Economic Affairs and Energy, which leads the German Government’s participation in the negotiations, prepared a Joint Position Paper and have submitted it to ICANN as a set of recommendations for action. Continue reading
80 Data Center experts from 5 countries on a networking tour through Dublin
Close to 80 IT and DC experts from 5 countries met from 4 to 6 March for the ecoTrialog “Emerald Isle” in Dublin. The three-day networking event, taking place for the first time in Ireland, had the objective of introducing European data center specialists to the special characteristics of the Irish IT landscape. Continue reading
The Council of the European Union has written a note discussing goals for a new directive on network and information security, which it wants to negotiate in April with the European Parliament. Plans include new rules for the private sector to follow in case of data breaches. The public sector, however, would not be required to disclose the occurrence of data breaches, according to the note.
The recent meeting of the eco Competence Group Security dealt with the IT security of tomorrow - Group Leader Oliver Dehning reports:
For a long time now, those responsible for IT security have relied on a quite simple principle: They separated protected internal areas, controlled and monitored by themselves (the “good” company network), from unprotected external areas, not monitored by them (the “bad” Internet). Between these was the perimeter. Data requiring protection belonged categorically in the internal area. All data traffic which needed to be transmitted from the internal to external area, or vice versa, had to pass the perimeter. What data left the protected area could as a result be well monitored at the perimeter.
Protection at the perimeter assumes that there are secure inner and insecure outer areas which can be clearly separated from each other. This has, however, not been the case for a long time now. Important resources are today found outside the company borders (Cloud) and usage can basically occur from anywhere (Mobile) – with an increasing tendency. Systems that are actually operated within the inner area, and therefore count as protected, also have numerous access possibilities that circumvent the security mechanisms at the perimeter, be that through encrypted transmissions of data or because they, for example, establish their own wireless Internet connection. Therefore, while perimeter security is still important for the protection of central internal systems, for a growing portion of the usage of IT systems in companies it is completely ineffective. Gartner estimates that as early as 2018, 25 % of the network traffic from companies will circumvent traditional security measures. Continue reading
- Draft remains below expectations
- Instead of clarity, new legal uncertainty looms
- Provision for Hosting providers unacceptable
The draft legislation on changes to the Telemedia Act publically released this week by the German Federal Ministry of Economic Affairs and Energy is supposed to clarify the legal requirements for Wi-Fi operators. This objective will not be achieved with the new draft. Furthermore, it contains provisions which could have a significant negative impact on Hosting providers. As a result, eco sees substantial need for improvement. Continue reading