Carriers, Legislators Tackle Privacy Policies

Vaughan, Allyson
October 2000
Wireless Week;10/16/2000, Vol. 6 Issue 42, p16
Trade Publication
Deals with the issue of online security and privacy in the United States wireless telecommunications industry in 2000. Wireless companies that already offer wireless Internet capabilities; Customer preference that should be considered; Issues covered by privacy bills.


Related Articles

  • Achieving secure unwired bliss. Schwartau, Winn // Network World;10/20/2003, Vol. 20 Issue 42, p65 

    Discloses how the author was able to communicate securely via the Internet from DefCon, the 2003 annual hacker convention in Las Vegas, Nevada. Author's goal to be able to hit the Internet from anywhere, anytime, for free; Conversion of the author's Sprint PCS cellular telephone into a wireless...

  • Wireless security is a crucial issue. Lundquist, Eric // PC Week;02/28/2000, Vol. 17 Issue 9, p110 

    Discusses the need for building a secure, Internet-based infrastructure for wireless communication applications. Requirement of constant care, funding and rapid prototyping and deployment; Lessons learned by the industry from the denial of service (DoS) hacker attacks in February 2000; Need for...

  • What's goin' on? Keckler, D.A. // Mobile Radio Technology;Mar1998, Vol. 16 Issue 3, p18 

    Offers advice on the deployment of alarms and monitors at telecommunications sites. Security; Access control; System performance; Needs and risk assessment.

  • Security.  // Communications News;Jan1995, Vol. 32 Issue 1, p65 

    Features communication network security products. Includes CallWatch from Switchview; SecureComm for Windows and Secure Link for cc:Mail Mobile from Cylink; 800 Alpha Security from Cable & Wireless.

  • Cable operators must work to contain ingress, egress. Dziatkiewicz, Mark // America's Network;2/1/96, Vol. 100 Issue 3, p10 

    Reports that cable companies require uninterrupted return transmission paths to provide secure and reliable telecommunications services. Threat posed by short-wave transmissions which contribute to unwanted signals into the cable plant called ingress; Regulation of radio frequencies by the...

  • Latest security products.  // Communications News;Dec97, Vol. 34 Issue 12, p61 

    Introduces telecommunication-related security products and equipment. Includes encryption software from Security Dynamics Technologies Inc.; nFast line of cryptographic hardware accelerators from nCipher Ltd.; SiteMinder 2.0 from Netegrity Inc.

  • Networks at Risk: Assessing Vulnerabilities. Coffield, Dana // Interactive Week;9/24/2001, Vol. 8 Issue 37, p11 

    Reports the vast vulnerability of the United States telecommunication networks against terrorist attacks. Destruction of electronic networks demands greater security and prevention; Possible assaults on media related networks and internet-based services; Diverse platforms and infrastructure of...

  • Security.  // Communications News;May96, Vol. 33 Issue 5, p59 

    Announces the availability of two telecommunications security products in the market as of May 1996. Highly secured route for data between local area networks (LANs) and Internet from Norman Data Defense Systems' Norman Firewall; Entrut encryption and digital signature software from Nortel.

  • Statement regarding Miracast and security.  // Telecom Standards;Apr2014, Vol. 24 Issue 4, p14 

    The article presents the statement issued by the organization Wi-Fi Alliance regarding the security protections and non-compliance passphrase imposition of telecommunications firm Miracast in the U.S.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics