Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

Health Care and Cyber Security: Increasing Threats Require Increased Capabilities

KPMG – “Four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyber-attacks. At the core of the increased risk to healthcare organizations is the richness and uniqueness of the information that the health plans, doctors, hospitals and other providers handle. Apart from typical financial fraud, there is also the possibility of medical insurance fraud, or, in the case of providers, attacks on computer-controlled medical devices. As this is the largest part of the U.S. economy and a safeguard of peoples’ well-being, healthcare is a matter of national security. Despite such significant repercussions of a cyber-attack, the healthcare sector lags in terms of its preparedness for cyber threats. As recent events have made clear, protecting information is not easy. Hackers will find opportunities to exploit flaws in the way healthcare organizations currently fund, manage, enable, organize and implement their information protection capabilities. In terms of technical capabilities, the healthcare industry is behind other industries in protecting its infrastructure and electronic protected health information (ePHI) – as commonly seen in the use of outdated clinical technology, insecure network-enabled medical devices, and an overall lack of information security management processes…”

Americans’ Views on Mobile Etiquette

August 26, 2015, Americans’ Views on Mobile Etiquette ‘Always on’ mobile connectivity poses new challenges for users about when to be present with those nearby or engaged with others on their screens. By Lee Rainie and Kathryn Zickuhr “Cellphones and smartphones have become a mainstay in the lives of many Americans, and this has introducedContinue Reading

Mobile Messaging and Social Media 2015

Pew Report – Mobile Messaging and Social Media 2015 – August 19, 2015: “In today’s world, people — particularly young people — are continually finding and adapting new ways of communicating electronically to fit their needs. Case in point: 2015 marks the first time Pew Research Center has asked specifically about mobile messaging apps asContinue Reading

Professor Latanya Sweeney Launches New Privacy and Technology Journa

EPIC – “Harvard Professor Dr. Latanya Sweeney has launched Technology Science, a new online journal for “original material dealing primarily with a social, political, personal, or organizational benefit or adverse consequence of technology.” Among other papers, Technology Science currently features research on Facebook Messenger’s geolocation collection and disclosure, medical privacy, and price discrimination in internationalContinue Reading

Appeals Court Upholds FTC’s Data Security Authority

EPIC – “A federal appeals court ruled that the Federal Trade Commission can enforce data security standards. In FTC v. Wyndham, the agency sued Wyndham hotels after the company exposed financial data of hundreds of thousands of customers. The company argued that the FTC lacked authority to enforce security standards, but the court disagreed. EPICContinue Reading

FCW obtained official timeline of OPM data breach

FCW.com: “An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data and the government’s step-by-step response. It illuminates a sequence of events that lawmakers have struggled to pin down in public hearings with Obama administration officials. The timeline makes clear that the heist of dataContinue Reading

ICO orders removal of Google search results

UK’s Information Commission’s Office– August 20, 2015: “Google Inc has been ordered to remove nine search results after the ICO ruled that they linked to information about a person that was no longer relevant. The ICO ruling concerns nine links that are part of the list of results displayed when a search is made byContinue Reading

Review Federal Agencies on Yelp

Yelp Official Blog: “We are excited to announce that Yelp has concluded an agreement with the federal government that will allow federal agencies and offices to claim their Yelp pages, read and respond to reviews, and incorporate that feedback into service improvements. We encourage Yelpers to review any of the thousands of agency field offices,Continue Reading

How Victims Can Regain Control Mitigate Threats in Wake of OPM Breach

 “In June 2015, the Nation learned that the personnel records of 21.5 million United States citizens had been exfiltrated by an unknown adversary from the Office of Personnel Management, one of the largest known breaches in the history of the U.S. Government.  The immediate public outcry included congressional hearings attributing the breach to OPM administrators andContinue Reading

Smithsonian Institution’s Plan for Increased Public Access to Results of Federally Funded Research

“PURPOSE: This document outlines the Smithsonian Institution’s plan to provide increased public access to certain peer-reviewed scholarly publications and supporting digital research data that arise from research funded, in whole or in part, by a federal funding source (hereinafter “Federally Funded Research Materials” or “FFRM”), consistent with the principles of access under the Office ofContinue Reading

Invincea 1H 2015 Advanced Endpoint Threat Report

Nextgov: “Malicious code Russians reportedly used to jimmy open a White House network and malware Chinese hackers reportedly used to rupture insurer Anthem’s network were similar — and free, according to new research…The Anthem hackers compromised the Social Security numbers and other personal information of about 80 million customers. The White House hackers infiltrated anContinue Reading

The Internet of Things and 5G Networks

TechCrunch: “…Now with the leap to 5G networks, we can start to completely reshape entire industries, and rethink how we run our cities and manage critical national infrastructures. 5G will be a far more capable network than its predecessors; it will deliver speeds of up to 10 Gigabits per second (Gbps), which is 40 timesContinue Reading