Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

After Google Spain and Charlie Hebdo: The Continuing Evolution of European Union Data Privacy Law in a Time of Change

Voss, W. Gregory, After Google Spain and Charlie Hebdo: The Continuing Evolution of European Union Data Privacy Law in a Time of Change (January 6, 2016). Business Lawyer, Vol. 71, No. 1, 2015/2016. Available for download at SSRN: http://ssrn.com/abstract=2711996 “This article investigates various developments over that year that helped (or are helping) reshape European UnionContinue Reading

Executive Order – Commission on Enhancing National Cybersecurity

“By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to enhance cybersecurity awareness and protections at all levels of Government, business, and society, to protect privacy, to ensure public safety and economic and national security, and to empower Americans to takeContinue Reading

President Obama’s new Cybersecurity National Action Plan

“What is the President’s Cybersecurity National Action Plan (CNAP)? It’s the capstone of more than seven years of effort from this administration that takes near-term actions and puts in place a long-term strategy to ensure the federal government, the private sector, and American citizens can take better control of our digital security. The President’s planContinue Reading

Reconciling Perspectives: New Report Reframes Encryption Debate

“The Berklett Cybersecurity Project of the Berkman Center for Internet & Society at Harvard University is pleased to announce the publication of a new report entitled “Don’t Panic: Making Progress on the ‘Going Dark’ Debate.” The report examines the high-profile debate around government access to encryption, and offers a new perspective gleaned from the discussion,Continue Reading

Digital Preservation Coalition Report – Personal Digital Archiving

Digital Preservation Coalition Technology Watch Report ‘Personal Digital Archiving’, by Gabriela Redwine, Digital Archivist at the Beinecke Rare Book and Manuscript Library at Yale University. “This free peer-reviewed report is aimed at individuals who are concerned about how best to manage and preserve their own personal digital archives, as well as professionals who advise peopleContinue Reading

Oversight Committee Announces FITARA Scorecard

“Members of the House Oversight and Government Reform Committee released a scorecard assigning letter grades to federal agencies on their implementation of the bipartisan Federal Information Technology Acquisition Reform Act (FITARA), enacted in December 2014. Full Committee Chairman Jason Chaffetz (R-UT), IT Subcommittee Chairman Will Hurd (R-TX) and Ranking Member Robin Kelly (D-IL), and GovernmentContinue Reading

OMB – Federal Information Security Modernization Act Audit FY 2015

“In FY 2015 OPM was the victim of a massive data breach that involved the theft of sensitive personal information of millions of individuals. For many years we have reported critical weaknesses in OPM’s ability to manage its information technology (IT) environment, and warned that the agency was as an increased risk of a dataContinue Reading

PWC 2015 US CEO Survey

“For the first time in five years in PwC’s Annual Global CEO Survey, more business leaders rate the US as their most important market for overseas growth ahead of all others, including China’s. As the US recovery gains traction, it is gaining more adherents. Challenges remain, yet key measures of US economic health are improving.Continue Reading

Google – An Empirical Analysis of Email Delivery Security

Neither Snow Nor Rain Nor MITM…An Empirical Analysis of Email Delivery Security “The SMTP protocol is responsible for carrying some of users’ most intimate communication, but like other Internet protocols, authentication and confidentiality were added only as an afterthought. In this work, we present the first report on global adoption rates of SMTP security extensions,Continue Reading

Pew – Apps Permissions in Google Play Store

“Analysis of over 1 million apps in Google’s Android operating system in 2014 shows apps can seek 235 different kinds of permissions from smartphone users. The average app asks for five permissions.” “The findings in this study pertain specifically to apps running on the Android operating system. Pew Research Center examined the Android platform becauseContinue Reading

Password Security – How to Memorize a Random 60-Bit String

How to Memorize a Random 60-Bit String. Marjan Ghazvininejad, Kevin Knight – Information Sciences Institute, Department of Computer Science, University of Southern California: “User-generated passwords tend to be memorable, but not secure. A random, computer-generated 60-bit string is much more secure. However, users cannot memorize random 60- bit strings. In this paper, we investigate methodsContinue Reading

Victims of Identity Theft, 2014

Victims of Identity Theft, 2014 – Erika Harrell, Ph.D., – BJS Statistician “An estimated 17.6 million persons, or about 7 percent of U.S. residents age 16 or older, were victims of at least one incident of identity theft in 2014, the Bureau of Justice Statistics (BJS) announced today. These statistics were similar to those inContinue Reading