Home Government Tech Policy
France to ban mobile phones in schools from Sept The French Government has announced that it will ban the use of mobile phones in primary, junior and middle schools from September next year.
German minister seeks backdoor access to digital devices The German Government reportedly wants to force automobile and technology companies to provide the country's security services with hidden access, according to a published report.
Russia hints it may build its own DNS Russia has hinted that it may build its own domain name system by August next year, citing US control of the current infrastructure as the…
Govt to provide citizens better access to their data The federal government has promised to give citizens better access to their banking, energy, phone and Internet data, making it easier for them to switch…
FCC chair to push for complete repeal of net neutrality US Federal Communications Commission chairman Ajit Pai has unveiled a plan to push for the complete repeal of the net neutrality regulations which were put…
DHS official says no proof Kaspersky software used for breaches A senior cyber security official at the US Department of Homeland Security has told a Congressional panel that she has yet to see any proof…
Digital Health Agency says tech is transforming disease management The Australian Digital Health Agency, established last year by the federal government, says technology is already transforming Australia’s ability to predict, diagnose, and treat disease,…
After US, British spies raise doubts about Kaspersky Lab After its products were banned from use in the US public sector, Russian security company Kaspersky Lab now faces questions over its products in the…
Laurie Patton, Australian Smart Communities Association (ASCA) The federal government’s funding of the first grants under its Smart Cities and Suburbs Programme is indicative of the growing realisation in government circles that…
CIA created code to impersonate Kaspersky Lab: WikiLeaks The CIA created code that could be used to impersonate exfiltration attempts from computers infected with its malware implants as being staged by others, according…

Page 1 of 213