Policy & Regulation

Policy & Regulation / Most Viewed

Executive Order and the New Date Privacy Rights of Non-US Citizens

"Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US," Bruce Schneier writes in his security blog. more

Google Hosting a Discussion on the Future of Cloud Computing

Google will be hosting a discussion on the future of cloud computing and technology policy tomorrow, March 20, in Washington, D.C. Participants include Jeffrey Rayport, principal at the Marketspace consulting group and a leading experts on digital strategy and marketing, and Andrew Heyward, former President of CBS News, who will be presenting the findings of their new study. "They will assess the possibilities, risks and returns of cloud computing; the next steps in moving forward; and potential implications for technology policy," says Dorothy Chou, Google's Global Communications and Public Affairs. Those unable to attend are invited to submit questions in advance via Google Moderatormore

Maintaining Trust, Respecting Privacy and Due Process

In order for the Internet to function properly, there has to be "trust". Trust in "online" is something that has ebbed and flowed over the years, but over the past two decades more and more of our daily lives are linked closely to "digital". Our banks encourage us to use online banking and their mobile apps. Government agencies share (and collect) information from private citizens and businesses online. And of course we all do more and more of our shopping online... more

5G Security – Metrics of the Engaged

This past month on 03-06 March, the global industry sub-group that exists at the center of 5G security met virtually. It is known as SA3 within the 3GPP organization, and it met over a period of five days to deal with some of the most important 5G security requirements. 3GPP is a "partnership" created among all the world's major standards bodies, which over several decades has cooperatively developed and evolved by far the largest and most successful global electronic communications network. more

Net Neutrality’s Legal Binary: An Either/Or With No “Third Way”

People working on net neutrality wish for a "third way" — a clever compromise giving us both network neutrality and no blowback from AT&T;, Verizon, Comcast and others. That dream is delusional because the carriers will oppose network neutrality in any real form; they want paid fast lanes. They have expressed particular opposition to "Title II" of the Communications Act — something telecom lawyers mention the same way normal people might reference the First or Second Amendments. Title II is the one essential law to ban paid fast lanes. more

Human Rights in the Digital Age, Online Pharmacies, and the “Brussels Principles”

"Human Rights in a Digital Age" is the theme of this year's RightsCon conference in Toronto. An essential human right is access to safe, affordable prescription medications. The Internet makes this possible, our organization has proven it's achievable and sustainable over an extended period of time, and our proposed "Brussels Principles" provide the framework to take our proven success internationally. Across the Globe, to people everywhere. more

AI Already Succeeding in Most Creative Tasks and Getting Better by the Day

It is redundant to point out how much progress AI applications made during the past few years. What is escaping the attention of many people, however, is that in most creative areas, there are already fully working consumer-grade tools based on generative AI that can produce output similar to that of a human with above-average capabilities, and there are many more on the way. These tools also happen to be rather affordable, making them accessible to a large amount of people. more

In Response to Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Hans-Georg Maassen, Germany's head of the German Federal Office for the Protection of the Constitution says large amounts of data were seized during the May 20015 cyberattack on lower house of parliament (Bundestag). more

British Organizations Could Face Massive Fines for Cybersecurity Failures

Organizations who fail to implement effective cybersecurity measures could be fined as much as £17 million or 4% of global turnover, as part of Britain's plan to prevent cyberattacks. more

Stop the Presses! No Consensus at NetMundial!

We could see it as a victory for those advocating changes and adjustments in the system of internet governance. Au contraire... we could consider it as the debacle of the good intentions... all ending up in not knowing if it was worth it. I say and maintain, that the effort and the earned contributions were worth it. The final result is that ICANN should be strengthened to recognize its merits and achievements, not underestimate what this organization has accomplished in fifteen years of hard and continuous work. more

Internet Governance: Coin of the New Realm

The Aspen Institute released the IDEA Common Statement and Principles as a do no harm Hippocratic Oath for Internet governance. The Aspen report describes the present moment as an inflection point for "the most robust medium of information exchange in history". Reed Hundt outlined the risks associated with Internet governance changes favored by China and a group of developing nations through the ITU. more

Toward an ITU Renaissance

For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the International Telecommunication Union (ITU). It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including "The ITU in a Changing World" with the late George Codding, representing the U.S. at several conferences... more

Controversy Looms as Pakistan Passes Cybercrime Law, Critics Say Violates Human Rights

Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. more

WikiLeaks’ Vault 7: CIA Gives a Free Lesson in Personal Cyber Security

WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more