Privacy

Privacy / Most Viewed

Global Surveillance: Towards Convergence?

Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more

Afghanistan Enacts Law Targeting Online Crime and Militancy

Afghanistan's President Ashraf Ghani has signed into law a cybercrime bill this week targeting online crime and militancy by groups such as the Taliban and Islamic State despite concerns it could limit free speech. more

The Boundary Between Sec. 230 Immunity and Liability: Jones v. Dirty World Entertainment Recordings

Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more

Freedom on the Internet: Where Does Your Country Stand?

Out of the 3 billion users on the Internet, how many can trust that their online communications will not be monitored or censored? How many feel safe that they can express their opinions online and will not be arrested for their ideas? How many feel confident in communicating anonymously online? For us at the Internet Society this is a key element of an Internet of opportunity: Internet access is only meaningful if people can trust that their fundamental rights will be respected and protected online as well as offline. more

New Cyberthreats: Have You Been Exposed at Home?

There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more

The Hidden Risks of AI Notetakers: Precaution or Paranoia?

As AI notetakers become common in virtual meetings, concerns grow over data privacy, potential misuse, and the risks of unknowingly sharing sensitive corporate information with unseen third parties beyond organizational control. more

China Proposes Cyberspace IDs to Simplify Online Identity Verification

The Chinese government is considering a new system allowing citizens to use cyberspace IDs instead of providing personal information to internet service providers. more

Enough About Apple and Encryption: Let’s Talk System Security

This week, the RightsCon Silicon Valley 2016 conference is taking place in San Francisco. Since the use of encryption in general and the Apple/FBI case in particular are likely to be debated, I want to share a perspective on system security. My phone as a system The Apple/FBI case resolves around a phone. Think of your own phone now. When I look at my own phone I have rather sensitive information on it. more

Privacy, Risk and Revenue

The nation's leading organization of government, corporate and academic privacy executives -- the International Association of Privacy Professionals -- recently did what good groups do, it issued a report that validated the pursuit of the career it supports... the IAPP reminded all what has long been understood -- privacy is an important and growing risk management activity under the watchful eye (mostly) of general counsels. With $2.4 billions being spent this year and $3 billion next, it is a growth industry. more

Problems With the Burr-Feinstein Bill

What appears to be a leaked copy of the Burr-Feinstein on encryption back doors. Crypto issues aside -- I and my co-authors have written on those before -- this bill has many other disturbing features. (Note: I've heard a rumor that this is an old version. If so, I'll update this post as necessary when something is actually introduced.) One of the more amazing oddities is that the bill's definition of "communications" (page 6, line 10) includes "oral communication", as defined in 18 USC 2510. more

New Data on Domain Name Contact Availability and Privacy

Nearly 90% of the internet's generic top-level (gTLD) domain names do not have identifying contact information in the Registration Data Directory Services (RDDS) system, according to a report by Interisle Consulting Group. A key finding of the report is the rapid growth of registrar-provided proxy service offerings and the inclusion of these services for both new and existing registrations. more

The New Privacy Law in California

The State of California often leads the country in addressing regulatory issues. This makes sense since the State has a population of nearly 40 million and an economy that would be the fifth largest in the world if California were a separate country. A new law was enacted on the last day of the California Legislature that was signed by Governor Gavin Newson this month. more

A Survey of Internet Users from 24 Countries Finds 83% Consider Affordable Access Basic Human Right

A survey of Internet users in 24 countries has found that 83% believe affordable access to the Internet should be a basic human right, according to the "CIGI-Ipsos Global Survey on Internet Security and Trust." The results of the new survey, commissioned by the Centre for International Governance Innovation (CIGI) and conducted by global research company Ipsos, were presented today in Ottawa, Canada. more

First Round of GDPR Fines Coming by the End of the Year, Says EU Data Regulator

The EU's privacy regulator is predicting that the first round of enforcement actions under the new General Data Protection Regulation (GDPR) will be exercised in the coming months. more

Paths of Glory: Privacy Still Matters

The world has changed dramatically for the better over the last 15 years, mainly due to the commercialization of the Internet. That is what I would like to believe. Unfortunately, I am no longer sure. True, the Internet connects all of us with every corner of the world... For the rest, the times may be changing, because there are those who believe that the Internet should be molded to fit those same old bureaucracies and corrupted institutions that have plagued humanity for decades, if not centuries. The solution, many times, feels far out of reach. more