Archives: Privacy and Security / Articles
Archives: Privacy and Security / Articles (page 2)
-
Apple’s Newest Acquisition Will Put Your Medical Records at Your Fingertips
Imagine having a medical emergency while you are on vacation, far from home and far from your usual healthcare service providers. You have a history of diabetes, cancer, hypertension, or…
-
Police Use 3D Technology to Access a Smartphone
A law enforcement agency in Michigan has figured out how to use 3D printing to unlock a deceased man’s smart phone. Police believe that the man, a murder victim, had…
-
Player Beware: Pokemon Go Can Place Your Personal Data at Risk
With great popularity comes great responsibility. Niantic and Nintendo have created an instantly successful smart phone app. With that instant success, though, comes significant risks, especially with the data Niantic…
-
How the FCC’s ISP Privacy Rule Focuses on the Wrong Thing
In its quest to protect consumer privacy, the Federal Communications Commission has failed to do one thing: Focus on consumer privacy. Instead, it focused on the Internet Service Provider; it…
-
Walmart v. Visa, Is the Retailer’s Suit about Protecting Customers or Money?
Is Walmart’s most recent lawsuit against Visa all about “protecting customers’ bank accounts,” or is Walmart using customer security as a trump card to hide the lawsuit’s financial motivations?…
-
Former FTC Officials Provide Their Perspective on the FCC’s Proposed ISP Privacy Rules
Until the Federal Communications Commission issued its Open Internet Order, the Federal Trade Commission acted as the Internet’s privacy enforcer. The FTC brought individualized enforcement actions against companies that clearly…
-
No One Is Immune from Cyberattacks
No industry is “bulletproof” when it comes to cybersecurity measures. The conclusion comes from Verizon’s 2016 Data Breach Investigations Report. The Report analyzed over 64,000 incidents. The 64,000 incidents…
-
House Judiciary Committee Unanimously Forwards the Email Privacy Act to the Full House
The Judiciary Committee of the United States House unanimously passed a substituted version of the Email Privacy Act. “Americans… are one step closer to having private and secure digital…
-
FBI vs. Apple: Effort to expand federal power won’t go away
No one wants to enable criminals and terrorists. But this debate was not about Apple’s cooperation with the FBI. It was, and still is, about radically expanding the power of the federal government and about keeping your personal information — financial, health, even photos and emails — secure from hackers, criminals and cyber terrorists.
-
Senators Threaten to Eradicate Device and End-to-End Encryption
The end of encryption as we know it is near if Senators Diane Feinstein and Richard Burr have their way. The two senators have been circulating proposed legislation, entitled…
-
Making the Internet of Things a Safer Place
The Internet of Things (IoT) is an exciting “place.” Innovators are developing revolutionary technologies that will reshape cars, workplaces, homes and lives. Some of these technologies are even now commonplace.
-
Federal Decision Threatens Apple Smartphone Encryption
A decision from a federal United States Magistrate Judge seriously threatens smartphone encryption by requiring Apple to build a “backdoor” to the iPhone for the Federal Bureau of Investigation…
-
Encryption is Not Preventing Law Enforcement from Investigating Crime
Law enforcement officials need backdoors to thwart encryption or else they will not be able to keep the public safe from terrorist attacks or crime. At least, that seems to…
-
House Judiciary Committee Moves on Email Privacy Act
In a press release earlier today, the House Judiciary Chairman announced the Committee would move forward with the Email Privacy Act (H.R. 699). The Email Privacy Act would amend…
-
Is Your Data Safe from the New Form of Government-Sanctioned Data Collection?
Electronic data can be revealing and intimate. Individuals should be secure and free from unreasonable government searches of their electronic data. When law enforcement engages in mass surveillance without appropriate…
-
“Do Not Track” and Do Not Regulate
If you enable “Do Not Track” functions on your web browser, does that mean websites will not use cookies or other analytic devices to gather data about you and your…
-
Uber and Lyft: Expanding Demand for Fare-Based Rides in Cities
Uber and Lyft both take business away from traditional taxis and increase overall demand for transportation-type companies. A study by the city of Portland, Oregon, as reported by…
-
Electronic Data Privacy in California – ALEC Member Helps Lead the Way
The privacy of electronically stored and transmitted data is important in today’s technological world. Many privacy advocates have argued for stronger civil liberty protections, and in California—the hub of technology—they…
-
Building a Better (Cyber) Wall
Perhaps Donald Trump is right. America needs to build a wall for better protection. The right type of wall, though, may not be physical. The wall needed is a “cyber” wall.
-
Internet Essentials Program Benefits American Education
ALEC lauds the benefits of digital learning in American education, such as customized learning programs for struggling students and more time for “higher-level discussions.” Additionally, technology in the classroom…