Warwick Ashford is chief reporter at Computer Weekly. He joined the CW team in June 2007 and is focused on IT security, business continuity, IT law and issues relating to regulation, compliance and governance. Before joining CW, he spent four years working in various roles including technology editor for ITWeb, an IT news publisher based in Johannesburg, South Africa. In addition to news and feature writing for ITWeb’s print publications, he was involved in liaising with sponsors of specialist news areas on the ITWeb site and developing new sponsorship opportunities. He came to IT journalism after three years as a course developer and technical writer for an IT training organisation and eight years working in radio news as a writer and presenter at the South African Broadcasting Corporation (SABC).
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
firstname.lastname@example.org 020 8652 8505 Active Warwick Ashford False True
Developed and promoted by the Trusted Computing Group, Trusted Computing allows third parties to verify that only authorised code runs on a system.
"Trusted Computing is consistent with privacy by design, which is a key part of our agenda," David Smith (pictured) told attendees of the 2011 Trusted Computing Seminar hosted by Wave Systems in London.
The ICO is keen to see Trusted Computing embedded in the draft European data protection law to be published in November, he said.
With reference to future legislative changes to comply with EU requirements, Smith said the ICO would continue to work to ensure the UK had "a sensible legal instrument" for data protection.
"There should be serious penalties for those accessing personal information illegally," said Smith, adding that this did not refer only to journalists and hackers, but included private investigators and members of the UK police forces.
MetaKeywords MetaDescription Sensitive Landingpage False