Privacy

Privacy / Most Commented

CircleID Launches the First in a Series of Community Dialogues on COVID-19 and the Internet

The COVID-19 pandemic has led to the rapid migration of the world's workforce and consumer services to virtual spaces, has amplified the Internet governance and policy issues including infrastructure, access, exponential instances of fraud and abuse, global cooperation and data privacy, to name but a few. The need for practical, scalable and efficient solutions has risen dramatically. more

International Pandemic Contact Tracing Standards Group Formed

The formation of an international pandemic contact tracing standards group was announced yesterday. Designated E4P, it is being established as an open public-private initiative under ETSI to "develop a framework and consistent set of specifications for proximity tracing systems, to enable the development of applications and platforms, and to facilitate international interoperability" that also provide for privacy protection. more

The Price of Lack of Clarity

As anyone reading this blog, assuredly knows, the world is in the grip of a deadly pandemic. One way to contain it is contact-tracing: finding those who have been near infected people and getting them to self-quarantine. Some experts think that because of how rapidly newly infected individuals themselves become contagious, we need some sort of automated scheme. That is, traditional contact tracing is labor-intensive and time-consuming - a time we don't have. more

Your Data or Your Life? Towards the Acceptance of Digital Technologies and Data in Medicine

There is currently a heated discussion going on in Europe, and particularly here in Germany, about the use of COVID-19 digital tracing apps, a discussion that shows us how much the Internet has become a matter of life and death. The uses for such apps are undeniable, but the idea of deployment still meets with popular resistance. Sensitized by countless leaks and hacks, and chafing under restrictions in their freedom of movement, people are concerned that even the last zones of privacy are to be monitored, and that the personal data collected could be misused. more

New Cyberthreats: Have You Been Exposed at Home?

There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more

Ten Stopgap Tips for Privacy and Security Risk Management in a Pandemic

As businesses adjust to the "new normal" in the ongoing COVID-19 pandemic, it is important to quickly take stock of where your organization stands on privacy and security risk. Even in these unusual circumstances, organizations of all sizes and sophistication continue to be expected to act with reasonable care and comply with their public commitments and regulatory obligations. Enterprises may be finding different or better ways to operate, collaborate, and service customers. more

Internet Governance and the Universal Declaration of Human Rights, Part 4: Article 13-15

This is Part 4 of a series of articles published (here in CircleID) on the UDHR and human rights in the cyberspaces of the Internet Ecosystem. Here we discuss Articles 13-15 and touch on other topics such as the role of cyber governance, empowered digital citizenship, and whistleblowers. At this point in this series of articles on the UDHR in the digital age, it is useful to pause and remind ourselves of the purpose of this analysis. more

When Proxy Services Enable Abuse

People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more

Israel’s Entire Voter Registry Exposed, the Massive Data Leak Involves 6.5 Million Voters

Israel's entire voter registry was recently uploaded to a vulnerable voting management app which effectively left the data wide open for days. more

Coronavirus Exposes China’s Deep Surveillance State

Surveillance cameras in China can detect fevers with infrared cameras to an accuracy within 0.3℃ and recognize faces even if they are wearing masks. more

Internet Governance and the Universal Declaration of Human Rights, Part 3: Article 6-12

Internet Governance like all governance needs to be founded in guiding principles from which all policy making is derived. There are no better fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article is Part 3 of a series exploring the UDHR as a guide and template for the digital governance and digital citizenship. We discuss UDHR Articles 6 through 12 and address topics such as fundamental digital values, cyberlaw, policymaking and the role of tribunals in digital governance. more

Internet Governance and the Universal Declaration of Human Rights, Part 2: Article 1-5

Digital governance, like all governance, needs to be founded in guiding principles from which all policy making is derived. There are no more fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article is Part 2 of a series of articles exploring the application of the UDHR to rights issues in the cyberspaces of the Internet ecosystem. The previous article in the series explores the foundations of the UDHR. more

Why the EPDP is Essential for a Long-Term Solution for WHOIS

Major European legislation, the General Data Protection Regulation, evoked substantial change in the way we deal with the visibility of domain name registration information, and understandably those that use that data to solve problems are concerned about these changes, and some have even called for a U.S. legislative fix. However, a more in-depth look at the issue and the policy-making surrounding it will show that there is, in fact, a process already well underway to address the situation. more

How AI Affects ComSec and Accessibility

Data transmission is one area where security should be among the biggest concerns. Overseeing data integrity is the realm of communications security (ComSec) teams, and they're getting a lot of assistance these days from artificial intelligence (AI) via machine learning and other AI components that also prove helpful in improving accessibility. Under the umbrella of AI, advances like assistive technologies promote accessibility while preserving data integrity and the flow of communications. more

Internet Governance and the Universal Declaration of Human Rights, Part 1: Foundations

One could think that the authors of The Universal Declaration of Human Rights (UDHR) -- adopted in 1948 -- had the Internet in mind when they declared in Article 19: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." All human beings are entitled to certain rights, and it makes no difference if they choose to exercise them in a town square or an Internet chatroom. more