Privacy

Privacy / Most Viewed

Wither WHOIS!: A New Look At An Old System

No, that title is not a typo. The WHOIS service and the underlying protocol are a relic of another Internet age and need to be replaced. At the recent ICANN 43 conference in Costa Rica, WHOIS was on just about every meeting agenda because of two reasons. First, the Security and Stability Advisory Committee put out SAC 051 which called for a replacement WHOIS protocol and at ICANN 43, there was a panel discussion on such a replacement. The second reason was the draft report from the WHOIS Policy Review Team. more

Internet Governance and the Universal Declaration of Human Rights, Part 4: Article 13-15

This is Part 4 of a series of articles published (here in CircleID) on the UDHR and human rights in the cyberspaces of the Internet Ecosystem. Here we discuss Articles 13-15 and touch on other topics such as the role of cyber governance, empowered digital citizenship, and whistleblowers. At this point in this series of articles on the UDHR in the digital age, it is useful to pause and remind ourselves of the purpose of this analysis. more

Wikileaks, the CIA, and the Press

As you've probably read, WikiLeaks has released a trove of purported CIA documents describing their hacking tools. There's a lot more that will be learned, as people work their way through the documents. For now, though, I want to focus on something that's being misreported, possibly because of deliberately misleading text by WikiLeaks itself. Here's the text from WikiLeaks... more

Spotlight on African Contributions to Internet Governance Discussions (Part 1: NETmundial)

The internet affects every individual in this world whether directly or indirectly. For example, a medical professional somewhere in Goma, Congo might access the internet to read and post reviews to current medication available and this might have an impact on the kind of medication that he/she recommends to the patient, whether the patient has access to affordable internet or not. Since the internet affects everyone, Africans citizens who are aware of internet governance discussions, expect African stakeholders to engage in these discussions. more

Scaremongering from Spy Agents

In an article for the Financial Times, Mr Hannigan -- the chief of the British spy agency GCHQ said: "I understand why they [US technology companies] have an uneasy relationship with governments. They aspire to be neutral conduits of data and to sit outside or above politics." "But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and terrorism."... more

ACLU Released Guide for Developers on How to Respond to Government Demands That Compromise Security

It is not uncommon for government agents to force technology companies to create or install malicious software in products in order to help them with surveillance. The American Civil Liberties Union (ACLU) has released a guide for developers that is intended to help preserve security and customers' privacy. more

Join An Online Dialogue About Encryption - Wednesday, May 25, at 13:30 UTC

What are your concerns around encryption? What questions do you have about the legal, technical and policy aspects of the increasing use of encryption? How does encryption help bring about a higher level of trust in the Internet? On Wednesday, May 25, the Internet Society and its Greater Washington, DC Chapter are hosting an "Online Dialogue About Encryption" to discuss all these questions and many more. more

Facebook and Privacy

Mark Zuckerberg shocked a lot of people by promising a new focus on privacy for Facebook. There are many skeptics; Zuckerberg himself noted that the company doesn't "currently have a strong reputation for building privacy protective services." And there are issues that his blog post doesn't address; Zeynep Tufekci discusses many of them While I share many of her concerns, I think there are some other issues - and risks. more

Google’s “Deeply Disturbing Invasion of Privacy” Being Investigated by Connecticut AG

What happens to companies when they get too big for their own good? Do they inadvertently do things that potentially harm our privacy (think Facebook)? Or, do they simply make mistakes that violate our privacy? Well, last month Google revealed that its Street View cars "mistakenly" captured content flowing over wireless networks -- a potential invasion of privacy. more

International Pandemic Contact Tracing Standards Group Formed

The formation of an international pandemic contact tracing standards group was announced yesterday. Designated E4P, it is being established as an open public-private initiative under ETSI to "develop a framework and consistent set of specifications for proximity tracing systems, to enable the development of applications and platforms, and to facilitate international interoperability" that also provide for privacy protection. more

Google Shutting Down Engineering Office in Russia Amid Tighter Data Law

Google is closing its engineering office in Russia as a result of new law coming into force next year requiring foreign firms to store Russian users' personal data on servers located in Russia. more

The Effects of the Forthcoming FCC Privacy Rules on Internet Security

Last week, the Federal Communications Commission (FCC) announced new privacy rules that govern how Internet service providers can share information about consumers with third parties. One focus of this rulemaking has been on the use and sharing of so-called "Consumer Proprietary Network Information (CPNI)" - information about subscribers - for advertising. The Center for Information Technology Policy and the Center for Democracy and Technology jointly hosted a panel exploring this topic last May... more

Can the Internet Work Across Borders?

On the face of it, the answer is a rather obvious and simple "yes"! The Internet obviously works across borders. Technically, it is a global network servicing its users wherever they may be on the planet. But it is this very nature -- the fact that the Internet is not bound to a specific country or territory -- which has more and more people asking themselves whether it can really work across borders. more

India’s eCommerce Policy: NOT a ‘Bollywood Drama’ but an Adaptation of Script of Acts from Elsewhere

The draft e-commerce policy paper of the Ministry of Commerce and Industry of India raises valid observations concerning some of the imbalances, such as, on the excessive advantages gained by the "first movers" in the private sector, which implies advantages gained by the first -mover States on the Internet, on some of the prevailing gaps in the space and also on concerns about the abusive practices by a few e-commerce platforms and vendors. Most of these concerns are best addressed globally... more

Preparing for GDPR’s Impact on WHOIS - 5 Steps to Consider

With GDPR coming into effect this May, it is almost a forgone conclusion that WHOIS as we know it today, will change. Without knowing the full details, how can companies begin to prepare? First and foremost, ensuring that brand protection, security and compliance departments are aware that a change to WHOIS access is on the horizon is an important first step. Just knowing that the ability to uncover domain ownership information is likely to change in the future will help to relieve some of the angst that is likely to occur. more