Contents
- Introduction
- Communities
- Business/Career
- Services
- Software
- Programming
- Ethics, Law & Professionalism
- Learning Resources
- Linux Distributions
- Sysadmin
- Electronics
- Hypervisors and virtual machines
- Cyber Security Resources
- Other Interesting Stuff
Ethics
- Values and Societal Norms
- Islanders change spouses whenever they want, have dedicated ‘love huts’ and settle their differences over a game of cricket
- An eye for an eye? The morality of punishment.
- How the ‘Original Internet Godfather’ walked away from his cybercrime past
- Call us immediately if your child uses Kali Linux says West Mids Police
- Jeffrey Paul: Your Computer isn’t yours
- Does Apple really log every app you run?
- I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets.
- A hacker got all my texts for $16
- Your period tracking app could be sharing intimate details with all of facebook
- Shaping the Future of Connected Policing
- Enabling Digital Policing: Computacenter and VMware
- NSA Files Decoded: Snowden’s surveillance revelations explained
- Surveillance Technologies under review
- I don’t know how to count that low - Dismissing smaller problems doesn’t mean they don’t exist or that they don’t need solving.
- Hackers turning to exotic programming languages
- Don’t talk to Police - An American Law School lecture with a police officer in attendance exploring why it is never a good idea to talk to police.
- Right to be offended does not exist - High Court Judge - High court Judge on why the right to be offended does not exist.
- Social Media and democracy: we need laws, not platform guidelines - The EU
- Surrey Police officer who lied about domestic abuse is sacked
- EU to allow installation of spyware on journalists phones and laptops
- Web3 doesn’t exist
Guidance
- NCSC Data Breach Guidance
- NCSC Phishing Scam Guidance
- NCSC Phishing Guidance
- REPORT on the proposal for regulation of the european parliament on Machinery Products
Professionalism & Standards
- W3 - Standards for web design and applications, devices, architecture, XML, web services and other technology. guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/)
- Government overview of Data Protection
- The Chartered Institute for IT
- GDPR Compliance Checklist
- ICO Guide to GDPR
- ICO Children’s Code
- Code of Practice for Consumer IoT Security
- ETSI Industry standard Code of Practice
- Electronic Communications Code
- The Seven Principles of Public Life
- Complying with COPPA: Frequently Asked Questions
- Kids Privacy (COPPA)
- Children’s Online Privacy Protection - Cornell Law School
- Chain of Custody - Digital Forensics
Artificial Intelligence
- BCS AI Ethics Guidelines
- Introduction to AI Assurance
- AI Regulation - A pro innovation approach
- AI Standards Hub
- Artificial Intelligence Act
- NIST AI Risk Management Framework
Law
Legal Definitions
- Actus Reus - The Act (Physical)
- Mens Rea - The Intent (Mental)
- Ignorantia juris non excusat - Ignorance of the law is no excuse.
Computing Specific Laws
- Computer Misuse Act 1990
- Data Protection Act 2018
-
Investigatory Powers Act 2016 Read more heres - Malicious Communications Act 1988
Online Safety Act 2023
Read the Online Safety Act 2023
- Online Safety Bill - Fact Sheet
- Online Safety Bill - Guidance
- Online Safety Bill - Publications and Consultations
-
3.1 Facebook Evidence [PDF] HTML Version -
3.2 Internet Watch Foundation Evidence [PDF] HTML Version -
3.3 Age Verification Providers Association, Internet Service Providers Association, and Yoti Evidence [PDF] HTML Version - 3.4 Correspondence to the Committee
- 3.4.1 Nadine Dories Letter
- 3.5 Big Brother Watch Evidence HTML Version
- 3.6 Open Rights Group Evidence HTML Version
- 3.7 Legal to Say, Legal to Type Evidence HTML Version
- 3.8 Mumsnet Evidence HTML Version
- 3.9 Alan Turing Institute Evidence HTML Version
- 3.10 Epilepsy Society Evidence HTML Version
-
- A guide to the Online Safety Bill
- Online Safety Bill ‘catastrophic for free speech’ via BBC News
- Online Safety Bill returns to Parliament After five month delay via The Guardian
- Experts Condemn The UK Online Safety Bill As Harmful To Privacy And Encryption
- The UK Online Safety Bill Attacks Free Speech and Encryption
- EFF Action Center - Tell the UK’s House of Lords: Protect End-to-End Encryption in the Online Safety Bill
- Wrong time to weaken encryption, UK IT chartered institute tells government
- Online Harms White Paper - Government Response
- Online Harms White Paper
- Online Harms Bill Press Release
- Parliamentary Committee - Online Harms Bill
Kids Online Safety Act (KOSA)
- Kids Online Safety Act - Congress
- KOSA One pager
- Kids Online Safety Act may harm minors, civil society groups warn lawmakers
- Reed Smith KOSA Perspective
The Product Security and Telecommunications Infrastructure (PSTI) Bill
- Factsheet
- Secure by Design 2.1 Secure By Design Report
- Regulating consumer smart product cyber security - government response
- Consultation on regulatory proposals on consumer IoT Security
- New Cyber Laws to Protect People’s personal tech from hackers
- Huge fines and a ban on default passwords in new UK law
The Digital Services Act
- EU Digital Services Act: European Commission proposes new rules for digital platforms
- EU Digital Services Act: Europeanising Social Media Regulation
- E.U. Takes Aim at Social Media’s Harms With Landmark New Law
- Social media and democracy: we need laws, not platform guidelines
- Social media innovation and policy
Professional Development
- Tech Interview Handbook
- Software Engineering Technical Interviews
- Devops Exercises
- Engineering Blogs
- System Design 101
- System Design Primer
- Awesome System Design Resources
- Shared Solutions Code Review
- Hands on LLMs
- Papers we Love
- AI Notes
- ML Papers of the Week
- Path to Senior Engineer Handbook
- Resources to become a great engineering leader
- DevOps Roadmap
- The Book of Secret Knowledge
- Free Programming Books
- Developer Roadmap