Blog

State-Level Cyber Security Efforts: The Garden State Model

No state has emerged as "the" model for cyber security policy and information sharing; nor is any likely to - given the varying needs, resources, and strategic priorities of the many states.  Rather, as Justice Brandeis suggested, we've seen in cyber security a classic example of the complexities of federalism and the "laboratories of democracy."  That said, the Garden State has shown thoughtfulness and innovation in its recent policy and organizational choices related to cyber security.   In rec

The big bad wolf to the . . . rescue?

If you work in technology, the big bad wolf can be your best friend. Read below to find out why.

A few days ago, the U.S. Supreme court denied Google's appeal from a decision by the United States Court of Appeals for the Federal Circuit which found that source code -- written instructions that run computer software -- can be protected by copyright law. In so doing, the nation's highest court left in tact a ruling by the Federal Circuit which found Google could have infringed the copyright to Oracle's software programming platform. 

“Tool Without a Handle”: 21st Century Data Privacy – A Quantum Puzzle – Part 2

In this part 2, I describe a quantum principle – the familiar “uncertainty principle” – and how it applies to privacy law and policy considerations. In particular, I observe that the process of managing data respectfully creates something of a quantum paradox. The paradox is a form of an “uncertainty” principle, whereby to better afford privacy for certain data, one in fact needs to know additional information about the data subject

Pages

Subscribe to Stanford CIS Blog