Rather than focusing on single vectors of data collection and transmission, the U.S. government must respond comprehensively to the many vectors of data collection, aggregation, buying, selling and sharing that pose risks to national security.
Latest in data privacy
The Privacy Act of 1974 is an orphan. At a time when privacy is a hot legislative topic just about everywhere, almost no one has examined the Privacy Act, one of the oldest information privacy laws in the world. The act reflects the technologies of the 1970s, like ancient mainframe computers (that had less computer power than your smartphone) and filing cabinets filled with paper records—it’s that old.
The digital apps can be effective in curbing coronavirus spread—but not everyone will benefit from them.
In a paper we are making public today, we go beyond private right of action and preemption to consider enforcement frameworks outside the privacy field.
Three principles for tackling the security risks of foreign-made software.
The arguments about the scope of the Computer Fraud and Abuse Act focused on the statute’s text and purpose—and some interesting hypotheticals.
The decision of the European Court of Justice in Schrems II is gobsmacking in its mix of judicial imperialism and Eurocentric hypocrisy.
The Israeli government has reauthorized the General Security Agency to share metadata with the Ministry of Health for the purpose of combating the coronavirus.
There are long-overlooked dangers embedded within the adoption of digital technologies—and as society shifts online during the pandemic, consumers and policymakers must figure out how to address those risks.
The Ninth Circuit Court of Appeals on April 9 ruled that the Facebook users could pursue several wiretap and privacy claims against the company. The plaintiffs allege that Facebook tracked logged-out users’ internet activity by storing cookies on their browsers when they visited outside websites containing Facebook plug-ins and then sold personal profiles based on that data to advertisers.