The Justice Department is trying to compel DreamHost to turn over information on visitors to the website disruptj20.org—allegedly 1.3 million IP addresses and other information.
Latest in Privacy
Two Democratic Party donors and one DNC staffer have filed suit for invasion of privacy against the Trump campaign and campaign associate Roger Stone for alleged coordination with the Russian government regarding the hacking and leaking of DNC emails during the presidential campaign. The plaintiffs' personal information was included in the emails leaked to the public by Wikileaks, including the Social Security numbers of two of the plaintiffs. The suit has been filed in the U.S. District Court for the District of Columbia.
The complaint is available in full below.
The National Constitution Center has assembled a new collection of white papers on digital privacy.
A summary of David Kris's new paper for the National Constitution Center's May 10 event on "Digital Privacy in the 21st Century."
Yesterday morning, Microsoft released, along with its most recent biannual transparency reports, a 2014 National Security Letter (NSL) from the FBI which sought “data belonging to belonging to a customer of our consumer services,” according to the company’s press release on the matter.
A summary of Twitter's complaint against the Department of Homeland Security in response to a CBP summons to reveal account information of one of its users.
This is the second part of a three-part series on Judge Neil Gorsuch’s handling of cyber issues. In this collection of cases, Judge Gorsuch identifies the uniqueness of computer searches and the accompanying safeguards, and examines potentially faulty databases.
The first in a three-part series of Judge Gorsuch’s treatment of cyber-related issues.
Recent proposals to search the cellphones and social media profiles of visitors arriving at the U.S. border raise serious legal questions and are unwise from a policy perspective.
As the recent, seminal BKA-Act Case shows, Germany wants to be seen as a beacon for privacy and data protection in our anxious, big-data era while also benefitting from a blood-and-iron security regime.