Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

ProPublica – Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking

Julia Angwin: “When Google bought the advertising network DoubleClick in 2007, Google founder Sergey Brin said that privacy would be the company’s “number one priority when we contemplate new kinds of advertising products.” And, for nearly a decade, Google did in fact keep DoubleClick’s massive database of web-browsing records separate by default from the names and other personally identifiable information Google has collected from Gmail and its other login accounts. But this summer, Google quietly erased that last privacy line in the sand – literally crossing out the lines in its privacy policy that promised to keep the two pots of data separate by default. In its place, Google substituted new language that says browsing habits “may be” combined with what the company learns from the use Gmail and other tools.  The change is enabled by default for new Google accounts. Existing users were prompted to opt-in to the change this summer…”

Report – Unregulated Police Face Recognition in America

Center on Privacy & Technology at Georgetown Law, The Perpetual Line-up, 2016: “There is a knock on your door. It’s the police. There was a robbery in your neighborhood. They have a suspect in custody and an eyewitness. But they need your help: Will you come down to the station to stand in the line-up?… Continue Reading

Privacy International challenge of UK hacking operations

PCWorld: “The U.K.’s spy agencies breached the European Convention on Human Rights for years by secretly collecting almost everything about British citizens’ communications except their content, a U.K. court has ruled. However, now that the U.K. government has admitted what it is doing, the collection is legal, the Investigatory Powers Tribunal ruled Monday. It has… Continue Reading

USSS Faces Challenges Protecting Sensitive Case Management Systems and Data

“We performed this audit as a follow-up to a September 2015 Office of Inspector General (OIG) investigation regarding United States Secret Service (USSS) employees improperly accessing and distributing sensitive information onthe agency’s Master CentraIndex (MCI) mainframe system. Our objective was to determine whether adequate controls and data protections were in place on systems to which… Continue Reading

Fortune – Publishing Hacked Private Emails Can Be a Slippery Slope

“It may be hard for the media to resist a big email dump, but there are long-term risks. Regular dumps of classified documents and other internal communications have become a fixture of modern life, thanks in part to stateless—and frequently lawless—entities like WikiLeaks. But is publishing those leaks always the right thing to do? That’s… Continue Reading

ACLU confronts social media companies sharing data with law enforcement surveillance developer

“The ACLU of California has obtained records showing that Twitter, Facebook, and Instagram provided user data access to Geofeedia, a developer of a social media monitoring product that we have seen marketed to law enforcement as a tool to monitor activists and protesters. We are pleased that after we reported our findings to the companies,… Continue Reading

Bloomberg Law – Privacy Laws Around the World

ABA Journal – “Development of international privacy laws and regulations with critical impact on the global economy been extremely active over the last several years. Privacy Laws Around the World [download requires registration] to access common and disparate elements of the privacy laws from 61 countries…the report includes expert analysis on privacy laws in Europe… Continue Reading

NIST study – Security Fatigue

Security Fatigue, Issue No. 05 – Sept.-Oct. (2016 vol. 18) ISSN: 1520-9202 pp: 26-32 DOI Bookmark: “Security fatigue has been used to describe experiences with online security. This study identifies the affective manifestations resulting from decision fatigue and the role it plays in users’ security decisions. A semistructured interview protocol was used to collect… Continue Reading

Five EFF Tools to Help You Protect Yourself Online

“… five of EFF’s many technology tools and projects. In different ways, they all function to increase your security on the Internet—with the implicit assertion that personal privacy is at the foundation of that security.” Continue Reading

AP investigative research on abuse of law enforcement systems and personal data

Via EFF re AP research: ” For more than a year, EFF has been investigating how police in California misuse the state’s law enforcement database with little oversight from officials. An investigation published by the Associated Press today shows that abuse of law enforcement systems is a nationwide problem.  The AP’s investigation analyzed records from all 50 states… Continue Reading

Translating Research for Action: Ideas and Examples for Informing Digital Policy

“The Berkman Klein Center for Internet & Society is pleased to release this series of papers, which aims to build a bridge between academic research and policymaking in the networked world by helping to identify opportunities in key areas related to digital technology and innovation. The series builds on the Center’s commitment to exploring new ways… Continue Reading

Federal Information Security: Actions Needed to Address Challenges

Federal Information Security: Actions Needed to Address Challenges, GAO-16-885T: Published: Sep 19, 2016. Publicly Released: Sep 20, 2016. “Cyber incidents affecting federal agencies have continued to grow, increasing about 1,300 percent from fiscal year 2006 to fiscal year 2015. Several laws and policies establish a framework for the federal government’s information security and assign implementation… Continue Reading