With the nominations of Edward Felten and Jane Nitze to serve on the Privacy and Civil Liberties Oversight Board, the White House has done at least one good deed this week.
Latest in Privacy
A new petition for certiorari will give the Supreme Court the opportunity to resolve a circuit-split on an important issue of standing in data breach cases.
The White House announced on Friday that it will nominate Adam Klein to the Privacy and Civil Liberties Oversight Board.
The Justice Department is trying to compel DreamHost to turn over information on visitors to the website disruptj20.org—allegedly 1.3 million IP addresses and other information.
Two Democratic Party donors and one DNC staffer have filed suit for invasion of privacy against the Trump campaign and campaign associate Roger Stone for alleged coordination with the Russian government regarding the hacking and leaking of DNC emails during the presidential campaign. The plaintiffs' personal information was included in the emails leaked to the public by Wikileaks, including the Social Security numbers of two of the plaintiffs. The suit has been filed in the U.S. District Court for the District of Columbia.
The complaint is available in full below.
The National Constitution Center has assembled a new collection of white papers on digital privacy.
A summary of David Kris's new paper for the National Constitution Center's May 10 event on "Digital Privacy in the 21st Century."
Yesterday morning, Microsoft released, along with its most recent biannual transparency reports, a 2014 National Security Letter (NSL) from the FBI which sought “data belonging to belonging to a customer of our consumer services,” according to the company’s press release on the matter.
A summary of Twitter's complaint against the Department of Homeland Security in response to a CBP summons to reveal account information of one of its users.
This is the second part of a three-part series on Judge Neil Gorsuch’s handling of cyber issues. In this collection of cases, Judge Gorsuch identifies the uniqueness of computer searches and the accompanying safeguards, and examines potentially faulty databases.