Asia Pacific SMB cloud services market opportunity will reach US$19.8 billion in 2015, says the Parallels Asia-Pacific SMB Cloud Insights report.
The huge growth will likely be due to the fact that a majority of the SMBs across Asia-Pacific region prefer to go straight to the cloud, rather than installing in-house IT solutions. China and India with 3.3 million and 3.5 million SMBs respectively are expected to be the front-runners for cloud services in Asia Pacific.
The Infographic below summarizes the key findings of the report. However, country specific findings for Asia-Pacific are:
Australian SMB market will reach AUD$1.5 billion in 2015, registering a growth of AUD$630 million over the next three years.
China, as of September 2012, represented an estimated market of ¥10.8 billion RMB. The figure will likely reach ¥24.2B RMB (US$3.8 billion) in 2015, thereby registering a 31 percent annual growth. 72% of Chinese SMBs who haven’t deployed servers yet, are likely to be major contributors of the growth.
India Indian cloud services market will reach 36.9 billion (US$664 million) in 2015, registering 45% annual growth over 11.9 billion (US$216 million) in September 2012.
To download the complete report by Parallels, click here.
Mobile Applications have met with wide acceptance globally, thanks to their easy installation, streamlined interface, great user experience, and the ability to download them easily via online and offline stores. They lower the technical barriers and offer a simple and enjoyable user experience.
Mobile application has become a giant business in the last few years, and is still growing, opening multiple doors of opportunities for software developers. Customers spend a fairly good amount of money on mobile applications because although there is no dearth of free applications out there, they come with a trial period. In 2012, it is estimated that consumers spent approx. 14 billion dollars on downloading mobile applications. A number as big as that indicates a rapid evolution of mobile applications in the technology arena , and with this evolution are increasing security risks, which make mobile devices vulnerable to online fraud.
A recently released report says more than 28% of android apps and 34% of apple apps are based on the user tracking function, which puts the user data in even greater danger. Why? Because, instead of making a malware program, it is easy for hackers to hijack the application and steal the data of the user. All they need to do is change a few lines of code and inject malware to steal user’s information.
Self-Signed Certificate Many storefronts and websites recognize the gravity of such attacks and take proper steps for application security. Most of them rely on digital signatures to verify the identity and reliability of application developers. However, that is not enough. Many websites and online stores will show you a ‘self signed certificate’ to indicate software’s security as such certificates are signed and authenticated by a person himself and not by trusted authorities. This is where a code signing certificate comes in the picture.
Code Signing Certificate Code Signing Certificate plays a vital role in checking reliability of a third party application provider. It assures customers about the code integrity; that the developer who built a particular application is legitimate and the code has not been changed since it was signed.
How Does Code Signing Work? Code Signing Certificate provides surety of each piece of code and manifests the identity. Below is the process of the Code Signing Certificate.
A Certificate authority validates software developer’s identity and authenticity.
Certificate authority then issues a developer ID which is used to sign a code.
The developer then utilizes code with the developer ID and signs files and sends them to certificate authority.
Finally, the re-signed and authenticated content is ready for distribution.
Time Stamping A code that is being signed by a Code Signing certificate is reliable for a certain period and after that you have to renew it. In case if it is not renewed then your certificate will become worthless. To avoid such situation, Time stamping feature is necessary for a Code Signing Certificate. When you sign a code, a hash of your code is sent to a certificate authority for time stamping. Time stamping is essential when you allocate signed documents and assures that the code will not lapse when the certificate expires. If you ignore time stamping, then you have to resign your code and re-send out to customers. A warning “Unknown date and time” will come out when the file has not been time stamped.
Conclusion: Code Signing is essential for mobile device manufacturers, network platforms and software developers. These three are connected with each other in the mobile application market. Code Signing certificate helps developers in increasing downloads and thereby earning more revenue with distributing high volume of software.
Last decade has seen a phenomenal growth in the usage of Internet. Accepted round the globe unanimously with wide arms, Internet has now become a part of everyone’s daily life. Everybody is now online, and in more ways than one would’ve imagined. People use Internet for checking news, keeping a tab on their favorite sports, listening music, watching movies, professional conversations, interacting with new people, online shopping etc.
Online shopping is easy, ubiquitous, provides a broad range of options to choose from, and most importantly saves time. Businesses now realize the importance of being online, and most of them have websites showcasing and selling their products. But it isn’t that easy to turn a visitor on your website into a customer.
Netizens today are smart and well aware of the security threats online that can jeopardize their confidential data. They need assurance that you are genuine, your website is genuine and most importantly that you’ve proper security system in place to ensure the safety of their confidential information like credit card details, personal details, transaction info, etc.
A majority of online businesses hence use SSL certificates to reflect their reliability. SSL certificates not only secure the online transactions but are also visible proof that the particular website that showcases them is genuine, secure and reliable. But SSLs can be expensive at times.
Say your website has multiple sub-domains, such as yourwebsite.com, blog.yourwebsite.com, login.yourwebsite.com etc. A conventional SSL certificate will only secure one of these domains; to secure others, you’ll have to buy multiple SSLs, which will be capital intensive. If a potential customer visits blog.yourwebsite.com instead of yourwebsite.com and his browser warns him that this page is probably not secure, he might back off.
This is where WildCard SSLs come into the picture. A single WildCard SSL can protect multiple sub-domains on a single server and IP address, thus providing you both convenience (as you don’t need to administer several separate SSL Certificates for each sub-domain) and affordability.
WildCard SSL Certificate provide the same stringent level of security, as they hold the same encryption and decryption technology as other conventional certificates. All you need to do to secure multiple domains with WildCard SSLs is that at the time of installation, just add an asterisk (*) in the subdomain area of the common name, which you want to be protected. For instance, if you configure *.yourwebsite.com, you can secure www.yourwebsite.com, photos.yourwebsite.com, blog.yourwebsite.com, payment.yourwebsite.com and so on. The * hence represents the wildcard part of the SSL certificate. * can be any sub domain that you want to secure with the same base domain.
Login to your Web Host Manager (WHM) control panel.
Go to the left menu and click on ‘Install a SSL Certificate and Setup the Domain’.
Now Copy and paste the contents of your WildCard SSL Certificate (yourwebsite.crt) into the first text area. Access the text version of your certificate by opening it with a text editor. Remember to include the BEGIN and END tags while copying and pasting the certificate.
Let the rest of the text areas to be automatically filled.
Double check that the SSL key and CA bundle are accurate.
Now change the WildCard domain name to match the actual account domain name.
Ensure that the username and IP address match the actual account involved.
Common Compatibility Errors with WildCard SSL Certificates While most of of the platforms and devices are thoroughly compatible with WildCard SSLs, there are some which might have issues. For eg. if a certificate isn’t trusted by a customer’s mobile browser, he/she may face compatibility issues on his mobile device. This particular error is rife with old Windows Mobile 5 devices.
In addition, Microsoft Office Communication Server, Microsoft Lync Server and Oracle Wallet Manager do not accept wildcards. Likewise, there are some outdated and ‘Basic’ versions of browsers that don’t support a “Certificate Request”, thus making the certificate look invalid due to lack of verification.
Wrapping things up!
As already mentioned, WildCard SSL is a great product which gets rid of individualized costs and provides easier web security administration in a cost-effective manner. However they too have their own share of limitations, one of them being the compatibility issue mentioned above. IT Professionals and Web Security Experts should hence carefully gauge which domains and sub-domains they want to protect and the effectiveness of the WildCard SSL Certificate in protecting them to reap the benefits properly.
Microsoft’s Windows division’s CMO Tami Reller yesterday announced that the much talked about update to the Windows 8 software launched last October, code-named “Blue,” will be called Windows 8.1. The announcement was made during a speech at J.P. Morgan’s Global Technology, Media and Telecom Conference, Boston.
Available for download for free for existing Windows 8 users, Windows 8.1 will supposedly have significant changes and not mere ‘frequent fixes’ that Windows 8 OS has had 739 times so far.
“Windows 8.1 will be delivered as a free update to Windows 8 and to Windows RT and it will be easy to get right from the Windows start screen through the app store,” said Tami Reller.
Revealing sparse details about more features, and putting them on hold till Windows 8.1’s preview on June 26 at Microsoft’s Build developers conference, San Francisco, Tami Reller spoke about Windows group’s “principled but not stubborn” approach to updating the operating system.
“You need to have a vision. You need to have a point of view. And you need to consistently deliver on that,” Reller said. “You’re also consistently listening, learning, and becoming smarter,” said Reller.
FAQs and Everything you need to know about Windows 8.1
What is Windows 8.1? An update to Windows 8 software launched last October. It was earlier code-named “Windows Blue”.
When does Windows 8.1 release?
General release of Windows 8.1 will be somewhere around the winter holidays a.k.a Christmas 2013, however a “preview version” will be unveiled at Microsoft’s Build developers conference, San Francisco, on June 26.
How do I get Windows 8.1? The Windows 8.1 update will be available for download for free for existing Windows 8 users through the Windows Store.
Will the start button return in Windows 8.1? No idea. But it surely hasn’t been ruled out. The only thing Microsoft has said regarding the Start button is that “The Start Button might be helpful,” and that the team is having “meaningful discussions” about it. But don’t get your hopes high.
Will Windows 8.1 support different screen sizes? Since Microsoft is rumored to be preparing to launch a 7-inch Surface tablet soon, so probably yes!
What new features will there be in Windows 8.1?
If the Internet leaks of the confidential builds of Windows 8.1 are anything to go by, the new release will have following enhancements:
Changes in Start screen in Windows 8.1:
The “All Apps” button will be removed from the Start screen app bar and replaced by a hidden downward arrow. Users with touch-based systems will be able to access the Apps view by a ‘swipe up’ from the Start screen.
Start screen tiles will be available in more size options; namely small, medium, and extra large. The two new options will be ‘thumbnail size” and an “extra large size.” The thumbnail size will supposedly be 1/4th of the existing smaller tile. Users will also be able to lock tiles in place to prevent accidental shifting.
Color options on the Start screen will be expanded and allow users users to customize a color and a shade as per their choice, instead of choosing one limited colors available.
Users will be able to uninstall Metro-style apps from multiple computers using Start screen’s uninstall command.
Internet Explorer 11: will see an upgrade and include WebGL and SPDY support and redesigned developer tools.
Additional apps: a calculator, alarm clock, sound recorder, video editing app, file manager and probably something called Movie Moments.
WindowsPowerShell v4.0: will have many new commands for managing the Start screen, Windows Defender, Windows components, hardware and network.
Kiosk mode: will enable users to lock down the computer/device running Windows 8.1 to a to a single application, which means it can’t be used for anything else.
SkyDrive: Better SkyDrive control and integration with auto picture uploads and ability to set the SkyDrive as the default location for files. User’s will also be able backup their entire devices to SkyDrive.
50/50 split screen apps: will allow users to run two apps side by side in contrast to one thin and one large as is the case with Windows 8. Theycan also change size of the columns snapped apps occupy themselves. Users on higher-resolution devices will be able to run even three or four app windows side by side. Upon launching an app, Windows8.1 will allow the user to pick which snapped view the app should open into.
Other major changes in Windows 8.1:
Windows 8.1 will also include support for ReFS, Miracast, Non-Volatile Memory Host Controller Interface and Universal Flash Storage.
Updated PC Settings component: will include options that were previously exclusive to only Control Panel.
“Take screenshot” option will be available in the Share charm.
Microsoft also plans to “extend touch in even more dramatic fashion”. This is even more likely if we go by Microsoft’s Research demo video of Fresh Paint for Windows 8.1.
Internet usage and web security go hand in hand. With the exponential growth of Internet traffic over the last decade, online security threats have grown by leaps and bounds too, and the recent flurry of WordPress attacks is a testament to it.
The number of online accounts that get compromised on a daily basis clearly indicate that a great majority of website owners isn’t particularly cautious about their website’s security.
Web Hosting provider HeartInternet recently conducted a research among small business website owners and home PC users to determine whether people take their website security as seriously as their PC security.
Predictably, the answer is no! The survey reveals that only 65% small business website owners have anti-virus software installed on their computers; a stark contrast to 96% of home PC users who have proper security set-ups in place.
The statistics are equally embarrassing when it comes to use of secure passwords, revealing that only half of small business websites protect their sensitive data with strong passwords, compared to 75% of the home users.
Now you don’t like to go through boring statistics, do you? Presented in this good old 90s gaming theme inspired infographic are other key findings of the said security research, wrapped up with helpful tips to help you protect yourself against hacking and online fraud.
With the increasing popularity as well as the need, SSL certificates are now becoming a prerequisite for any website that takes it’s users’ data security seriously. But mere purchase of an SSL certificate doesn’t make your website safe, it has to be installed properly on the web server if you want to reap all of it’s benefits.
As a SSL certificate provider, we’ve noticed over the time that most of our customers face problems while installing SSL Certificates in Microsoft Exchange Server 2007.
Microsoft Exchange Server is a product from Microsoft which generally operates on Windows Server. It is a webmail server, scheduling/calendaring software and contact manger. Till date many updated versions of MES with numerous changes have been released. The most dated version is Microsoft Exchange Server 1.0 and the latest one is Microsoft Exchange Server 2013. Exchange Server 2007 saw it’s official release on April 25, 2006 and was especially suited for the business customers.
So here it is, a step-by-step installation guide of installing an SSL certificate in Microsoft Exchange Server 2007:
Installing an SSL Certificate in Microsoft Exchange Server 2007
Process 1: Intermediate Certificate Installation
Step 1: Copy the contents of the intermediate certificate you have received from the CA or any other SSL provider into a text file (like in Notepad) and save it with the extension .crt. Remember to remove all the spaces in between and also include the tags —–BEGIN CERTIFICATE—– and —–END CERTIFICATE—–. Please note that the use of Microsoft Word is strictly prohibited as it adds new characters to the file.
Step 2: Start the Microsoft Management Console from the start menu by typing “MMC” in the run text box.
Step 3: Go to the File menu and click on “Add/Remove Snap-in”.
Step 4: Select the Certificates and click on the Add button.
Step 5: Select Computer Account, click Next.
Step 6: Now Select Local Computer and Click the Finish button.
Step 7: Close “Add/Remove Snap-in” by clicking OK.
Step 8: Now expand the certificate (Local Certificate) in the MMC window.
Step 9: Right click on the Intermediate Certification Authorities > Mouse Over All Tasks> Click on the Import.
Step 10: Click Next in the Certificate Import Wizard.
Step 11: Now Click on the Browse button to select the intermediate certificate file.
Step 12: Click on the Next button.
Process 2: SSL certificate installation
Step 1: On the Exchange Server, copy the .crt file (created in Step 1 of Process 1) to the C drive.
Step 2: Go to Start menu>Programs>Microsoft Exchange Server 2007 and start the Exchange the Management Shell.
With security risks becoming increasingly rife in the Internet, SSL has become a vital entity to ensure the protection of the organizations. SSL, basically, is a security protocol designed to ensure the authenticity of a website’s integrity and the website’s content.
Now, what SSL does is that it encrypts the data being transmitted between the source and destination, of course, after a secure connection is established between them. Websites involving money transactions and membership procedures, secured with SSL, are protected from cyber crimes very effectively and smoothly.
Ok, SSL protects your websites. So far, so good. But how do visitors or customers of a particular website confirm that it is secured and its safe for them to share their data here?
After having a SSL installed on your website, your URL changes from HTTP to HTTPS. This ‘HTTPS’ in the URL confirms the presence of the SSL security. HTTPS helps you keep hackers away from your website by covering up users’ confidential data from the rest of the world. The video below will help you get better hold of the idea:
Over the years, SSL has undergone many changes like: previously SSL was able to provide just 40 bit of encryption which has now been extended to 256-bit level along with 2048 bit level encryption future proof certificates.
Now there are various types of SSL certificates available. Before going deep down into types of SSL certificates and their uses I would like to tell you that SSL certificates are issued and signed by a trusted third party called Certificate Authority (CA).
Categories of SSL Certificates:
Free SSL: Many web hosting companies provide free SSL. If the data on your website is not of utmost importance, you can think of getting this kind of SSL. Else, its a total no-no.
Shared SSL: Websites having this kind of SSL act as sub domains of the main web hosting provider and hence share the SSL certificates. What it means is that the shared SSL will not display your domain name but instead your web hosting provider’s.You can use shared SSL certificate in situations where you need secure connection to a server that is not typically seen by the general public. For example, when logging into the administration area of your website.If you own an e-commerce website, a shared SSL is a strict no-no because visitors expect to see your domain in the URL, which as already explained, shared SSL does not display. And if you attempt to use your domain name with the shared certificate, your website may or may not work. Even if it does, the visitors will see the shared SSL warnings (please see the figure below) which will most likely put them off, and they won’t share their credit card or any other confidential with you.
Dedicated SSL: Dedicated SSL, for dedicated hosting plans allow customers to choose their domain names. This type of SSL certificates, though costly, are the best ones when it comes to the fulfillment of fully fledged security needs.Ideal for situations when the general public needs to access your website, Dedicated SSLs are the best option for protecting credit card information for e-commerce websites, since customers see your domain name in the URL instead of web hosting provider’s, making them feel comfortable while their data.
A likely occurrence if you use a Free SSL Certificate
Types of SSL Certificates:
Along with the above categories, SSL certificates depending upon the needs can be differentiated into following types:
Domain Validation or DV SSL: These types of SSL certificates secure the domain validity of a particular website. Here, the contact info of the website is detailed in the WHOIS database of the website’s domain.
Organization Validation or OV SSL: OV SSL, as the name suggests, ensures the authenticity of the website’s business organization along with its physical know how and other web addresses.
Extended Validation or EV SSL: Most complex and trusted security validation, EV SSL provides the enhanced authenticity to a particular website/organization. EV SSL shows its uniqueness by changing the color of the website’s address bar in to green.
Different types of SSL Certificate validation
Installing a SSL certificate for Microsoft Exchange 2007:
As far as the installation of SSL certificates is concerned, Microsoft Exchange is the foremost difficult one to be tackled with. Difficult because it demands a great level of case sensitivity as it demands each and every element of information to be entered exactly as it is.
First of all, drag the Microsoft Exchange 2007 program and create a request for the Exchange 2007 certificate, using the Certificate Request Generating tool online. After this, import the Microsoft Exchange 2007 certificate by actually downloading the certificate.cer and copy the certificate’s thumbprint.
After the completion of the above steps, you just need to enable it via a command:
This will enable OW, auto discover and SMTP security. If you want to modify/change the commands for the POP, IMAP, UM or IIS, you can do that. Also make sure that you always check for the SSL certificates updates to avoid the SSL disturbances and expiry dates.
What are Virtual Premium Servers? VPS servers are Virtual Servers, which appear to the end user as a dedicated server. One big server can hold multiple virtual servers, each running their own operating system. VPS’s can either come fully managed by the provider, or self-managed by the end user.
VPS servers are allocated a certain amount of CPU, RAM / memory, storage space and monthly bandwidth. Resources are not oversold, or shared with any other users on the server.
Advantages of Virtual Premium Servers: VPS’s have various advantages over both shared hosting and dedicated servers. For customers looking for a dedicated server on a budget, VPS’s are often the perfect choice. Not only do they provide power than regular shared hosting (greater dedicated resources), but they’re also much cheaper than an entry level dedicated server.
If your website’s traffic and size have outgrown traditional shared hosting, but the jump to dedicated is too costly, VPS is the perfect upgrade. The upgrade process is fairly simple and many hosting providers (including eleven2), can migrate customers between shared and VPS extremely easily.
Your Virtual Machine will not suffer from major performance issues with other VM’s on the same server, as each VM is allocated its own chunk of dedicated server resources.
Another advantage of VPS servers, is the scalability they bring into the picture. Should your website require more resources, you can always scale your VM up to the next VPS plan. Not all VPS providers allow this, but it is extremely common in the industry.
Eleven2 Virtual Premium Servers: The eleven2 development team has spent countless hours in our lab, developing the next generation VPS platform. Using only state of the art enterprise grade hardware, our VPS architecture is cutting edge.
Using Acceleron Caching Technology, all frequently accessed data from your website is cached onto SSD drives, boosting performance and making websites faster. Eleven2’s VPS platform is up to 40% faster than standard VPS providers. Our VPS’s are also 100% fully managed, and start from just $49 per month.
To view our range of fully managed Virtual Premium Servers, please click here. Those who want to have a look as to where their eleven2 VPS servers will be located, check out the video below.
A WildCard SSL certificate has many advantages over a conventional SSL certificate, the most important one being it’s ability to secure not only your website URL, but also an unlimited number of its subdomains. Needless to say, a product with such benefits does attract interest of a large pool of customers.
At RapidSSLOnline, a Certificate Authority of a wide range of brands such as VeriSign (Now Symantec), GeoTrust, Thawte, and RapidSSL, we come across a lot of such customers on a daily basis, who are curious about this product, and have a variety of questions to ask before making a decision to buy it. And hence this post.
What is a WildCard SSL Certificate? WildCard SSL Certificate holds the same encryption and decryption technology, which protects user’s confidential information while transferring it on the web, and additionally, it protects multiple sub domains on a single server and IP address. Every Wildcard begins with an asterisk * or “star”. The star represents the wildcard part of the SSL certificate. The star can be any sub domain that shares the same base domain.
Which level of businesses need WildCard SSL security? It is a highly recommended SSL security solution to medium and wide level e-Commerce websites.
What strength of encryption does WildCard Certificate hold? It holds the advanced 256 bit encryption strength for single and multiple sub domains protection.
What level of security is included in WildCard Security SSL? It protects a Fully Qualified Domain Name (FQDN) and Sub Domains on a Single Server and IP address.
Which brand’s WildCard SSL security holds an unlimited server license? RapidSSL and GeoTrust. These are two major brands whose WildCard SSL certificate security holds an unlimited server license.
What is the issuance time of WildCard SSL security certificate? It can be issued within few minutes for a single Domain Name.
What all web browsers are compatible with a WildCard SSL certificate? Here is a list of web browsers most compatible with WildCard Cert.
IE 5+, 6+, 7+, 8+
Firefox 1+, 2+, 3+
What validation method does WildCard Certificate hold? It holds a complete domain validation.
Does it include trust mark or site seal feature? Yes! Its includes the trust mark or site seal feature, which is essential to gain trust and confidence of the users.
How does one generate WildCard SSL Certificate CSR for any web server? It is the same process, which holds other Domain Validated SSL certificate CSR. However, during the WildCard SSL generation, the common name should be *.yourdomain.com. To get a better idea about WildCard SSL Certificate CSR generation, click here.
Is WildCard SSL security android validated? Yes, it is an Android Validated SSL security.
What is the difference between EV SSL and WildCard SSL?
EV SSL certificate is a complete domain authentication which protects single qualified domain only on a single server and IP, whereas WildCard SSL is domain authenticated security, which protects sub domains and as well as main domains on single server and IP.
To see a list of Frequently Asked Questions about EV SSL Certificates, please click here.
In the earlier two posts of this four part series on Legislation of Privacy, I talked about how many of the newer and upcoming laws regarding privacy in the United States will affect your Digital Life and Digital Commerce.
In this post, I’ll cover the two privacy laws that affect life in the workplace, from how you’re hired to what information is fair game for employers.
Genetic Information Nondiscrimination Act of 2008 The Genetic Information Nondiscrimination Act (GINA) isn’t new legislation. Passed in 2008, it prohibits the use of genetic information in health insurance and employment. That means that employers can’t making hiring, firing, job placement, or promotions decisions based on genetic information, nor can insurers raise premiums or deny coverage to those with a genetic predisposition for a disease. While GINA itself is just five years old, it may soon see some updates. A recent report from the U.S. Presidential Commission for the Study of Bioethical issues recommended that the law be expanded to include security measures whole-genome sequence data rather than just focusing on issues of discrimination. New regulations would likely update the consent forms individuals sign when they agree to take part in research studies, helping protect their genetic information and preventing misuse of this data. Additionally, under recommendations by the committee, GINA would be expanded to include comprehensive national rules on how genetic privacy is protected.
How It Will Affect You: Should the act be expanded, individuals will enjoy greater protection of their genetic data. Research studies must be more transparent about security risks and genetic data itself will see greater protection under law to ensure that fewer privacy breaches occur and that discrimination cannot occur. Currently, GINA does not protect individuals from discrimination when applying for life or long-term care policies. Greater protections on genetic data could make it possible for this information to be off limits to anyone outside the individual or his or her immediate family.
Timeline: The report from the commission was just released in February 2013, so it will likely be quite some time before amendments to the legislation, if they are decided as being warranted, are crafted. In lieu of amending GINA, legislators may opt to create new laws on genetic privacy. In these early stages, however, there are no guarantees and no new legislation may be passed for several years, if at all.
Genetic Information Nondiscrimination Act PDF (Maximize for better readability)
Social Media Privacy Act: Increasingly, employers have turned to social media as a way to learn more about potential employees. However, this has also meant that in some cases privacy boundaries were crossed, with potential employers requiring applicants to turn over passwords to social media accounts. To help job seekers protect their online privacy, California,Delaware, Illinois, Maryland, Michigan, and New Jersey have all passed social media privacy laws. What’s more, 11 other states (including New Mexico and Texas) have legislation of this nature pending.
How It Will Affect You: The legislation will only affect you if you live in a state that has passed an Internet privacy law, though over time it’s likely that most, if not all, states will follow suit. These acts make it illegal for employers to require applicants or current employees to hand over passwords to private accounts, which will help protect your personal accounts and private interactions when seeking employment. Some laws, like those of Delaware and New Jersey, focus on colleges and not employers, banning admissions officers and college employees from requiring password information.
Timeline: All states that have passed legislation with regard to the privacy of social media passwords have gone into effect, some as recently as January. Over the course of 2013, it’s likely that many other states will pass and begin enforcing similar laws, though there are no guarantees: in some states, like Pennsylvania, similar measures never even made it out of committee.