Content Security

Building off of a lawsuit by nine different authors that began developing in early January, Apple is now facing legal action from 22 Chinese writers. The writers claim that Apple has been selling unauthorized copies of their works through the App Store.

Posted Mar 19, 2012

The High Court of England and Wales has determined that filesharing site The Pirate Bay violates copyright laws on a large scale. Justice Richard Arnold said the site's operators "induce, incite or persuade its users to commit infringements. ..."

Posted Feb 21, 2012

In wake of Apple's admission that mobile iOS apps have had access to users' contact data without permission, Google announced it's impossible for apps on an Android phone to share personal data with a developer unless users acquiesce.

Posted Feb 16, 2012

Copyright Clearance Center (CCC) launched the OnCopyright Education Certificate Program. The program is comprised of industry-specific courses that are geared towards a number of different user communities and their respective challenges in managing copyright.

Posted Feb 13, 2012

Twenty-nine major news and information companies have signed on as initial investors and participants in NewsRight, an independent digital rights and content licensing organization led by former ABC News President David Westin. NewsRight aims to support original news reporting by facilitating the use of published news content and data analytics with the permission of publishers.

Posted Jan 05, 2012

Wiley-Blackwell announced its participation in CrossRef's CrossMark service, which aims to clarify among different versions of scholarly articles being discovered by readers online. The service standardizes the way readers can identify and locate the most up-to-date version of the content.

Posted Nov 30, 2011

The recent proposal of the Commercial Felony Streaming Act, and the uproar over the potential it holds to send artists like Justin Bieber to jail for copyright violation, has put the subject of intellectual property and copyright on the front page. The following is an excerpt from a chapter in the book, Dancing with Digital Natives: Staying in Step with the Generation That's Transforming the Way Business is Done. The full chapter is titled: "Ethics, Technology, and the Net Generation: Rethinking Intellectual Property Law" and is written by Albert M. Erisman. The book is available on Amazon, Barnes & Noble, and other retailers in e-book and print format.

Posted Oct 27, 2011

Copyright Clearance Center, Inc. (CCC) announced that academic institutions using its Pay-Per-Use Services would be able to obtain reuse rights for entire books, including some that are commercially unavailable. CCC enables publishers to offer reuse rights for their books.

Posted Jun 28, 2011

The latest version of Automated Content Access Protocol (ACAP), the publisher-led project to develop tools for online copyright permissions information, was presented at International Press and Telecommunications Council's (IPTC) Business Meets Technology Day in Berlin. Version 2.0 of ACAP targets business-to-business content syndication, with a special focus on the context of licensing newspaper stories and the exchange of video content by news agencies.

Posted Jun 10, 2011

Cintas Corporation, a secure document management service provider, launched its Digital Vault Exchange (DVX) solution, a robust online system that backs up all databases, operating systems, and corporate email systems. Offering businesses 24/7 data security and compliance, the solution instantly recovers data if it is deleted or corrupted, and can save files for a fixed amount of time to comply with a business' retention policy.

Posted May 10, 2011

Liaison Technologies, a provider of cloud-based integration and data management services, acquired nuBridges, Inc., a company that provides enterprise data security, managed file transfer (MFT), B2B integration, and compliance management solutions.

Posted Apr 05, 2011

GigaTrust, a provider of enterprise rights management (ERM) content protection software solutions for Microsoft Active Directory Rights Management Services, is announcing the release of its DLP Protector for CA DLP. The GigaTrust Protector for CA DLP identifies and controls sensitive data while in storage, transmission, and use. It can determine what data needs to be controlled, prompting users to select digital rights to be applied when attempting to send sensitive data via email inside and outside the organization.

Posted Mar 24, 2011

Spectra Logic announced that it is now offering free data integrity verification for its complete series of tape libraries from SME to Enterprise. The company's BlueScale Data Integrity Verification ensures that data written to tape is retrievable now and into the future. According to Spectra, its tape libraries are currently the only tape storage systems that actively, automatically check the media and the data on tape throughout the storage life of the data.

Posted Mar 22, 2011

Giesecke & Devrient and Vodafone are developing mobile security applications that employ the SIM card as a key for authentication and encryption, including an application that involves SIM card-based authentication for access to a company network. The pilot projects for these applications were presented at CeBIT 2011, the international information and communications technology trade show hosted in Hannover, Germany, March 1-5 this year.

Posted Mar 08, 2011

Equifax announced the full integration between IBM Tivoli identity and access management solutions and its Anakam Identity Services. Equifax's Anakam Identity Services help government agencies implement strong authentication by helping configure authentication policy based on level of risk, individual project use cases, and compliance requirements.

Posted Mar 03, 2011

Information consultancy firm Anitian Enterprise Security will begin offering a cloud computing security assessment, allowing companies to evaluate the security of cloud-based solutions and identify potential risks. Anitian's Cloud Computing Assessment analyzes the ten primary areas at risk in a Cloud Computing environment, including user access, regulatory compliance issues, data security, and data forensics.

Posted Mar 03, 2011

In October, The Wall Street Journal reported that several popular Facebook applications had been transmitting users' personal identifying information to literally dozens of advertising and internet tracking companies. While Facebook maintains that there is "no evidence that any personal information was misused or even collected as a result of this issue," not all observers have been appeased.

Posted Feb 17, 2011

MVB, VLB, and the Copyright Clearance Center are teaming up to offer the VLB Books in Print Catalog through "MVB RightsLink - Powered by CCC," an automated and standardized rights trade system for small licence deals for the German-language sector. As part of this cooperation, the software and technology from CCC's Rightslink will be integrated into the VLB.

Posted Feb 10, 2011

Mobile workforce data protection leader attracts funding to fuel growth after signing multiple new channel partnership agreements.Datacastle, a provider of mobile workforce data protection solutions, announced completion of a $2 million financing. The company's latest funding round is led by CM Capital and Haag Ltd., both of Australia. The financing comes on the heels of several recently-announced agreements including relationships with Seagate i365, Systemax MISCO Germany, and Computerlinks to distribute Datacastle's endpoint backup and data protection solution - Datacastle RED.

Posted Feb 08, 2011

CipherOptics announced a company-ide rebranding initiative with a new name and logo. The company also outlined its strategy for support of secure cloud connectivity, along with a data security plan for customers migrating from distributed networking to private clouds and public cloud infrastructures.

Posted Jan 20, 2011

The new version of SecureTower identifies confidential documents within data flows that go beyond a company's borders, comparing those documents to preset templates.

Posted Jan 18, 2011

YouSendIt, Inc. announced the acquisitions of Attassa, an email collaboration company, and Zosh, an e-signature provider, for undisclosed amounts. YouSendIt will acquire the technology and personnel of the companies.

Posted Jan 06, 2011

VaporStream introduced the next generation of its confidential messaging platform, which gives users a way to discuss business issues in writing without fear of private dialogue and information being compromised. VaporStream's new platform provides expanded mobile access and simplified desktop access, as well as content filtering capabilities.

Posted Dec 21, 2010

HiSoftware Inc., a provider of web content and social computing compliance solutions, released HiSoftware Compliance Sheriff version 4.0, the company's enterprise compliance automation solution. Version 4.0 includes a new compliance performance management console consisting of a scorecard, reports and dashboards; an API for enterprise system integration; and the addition of several out-of-box compliance checkpoints for privacy (HIPAA), accessibility (Section 508, HIPAA), and search engine optimization (SEO).

Posted Oct 28, 2010

ForgeRock launched the open source OpenIDM project, which seeks to to create an identity management system for enterprise software systems. OpenIDM provides a web interface for system administrators to create, update and delete user accounts with their respective privileges and identity data on diverse systems. It works in conjunction with a wide range of identity software, including the ForgeRock I3 platform. The project aims to deliver an enterprise provisioning solution in early 2011.

Posted Oct 28, 2010