CIS in the news.

  • Artificial intelligence debate flares at Google

    Date published: 
    June 5, 2018

    "“We are calling on Google not to make weapons because Google has a special relationship with the public in virtue of the kind of personal data they are collecting — through our email, through Google Maps, through Android systems, through internet searches and all sorts of things,” said Peter Asaro, an associate professor at Stanford who co-chairs the International Committee for Robot Arms Control."

  • Business startups are on the rise, helped by Internet tools

    Date published: 
    June 4, 2018

    "But lately, startups have learned to use the internet to their advantage whenever possible. “The climate for startups has improved since 2010,” Elizabeth Townsend Gard. social entrepreneurship professor at Tulane University, said last week. “With today’s Internet tools, you can start a business much more quickly and less expensively, and can often do it without a lawyer, an accountant or a web designer.” She unveiled a podcast with students early this year in far less time than it took to launch a bigger business in 2015."

  • Send us your naked photos to help block revenge porn, Facebook invites users

    Date published: 
    June 3, 2018

    ""The project responds to a real need," says Danielle Citron, a law professor at the University of Maryland, and one of the leading figures in the crusade to battle revenge porn. "Victims' groups were telling Facebook that there were individuals who received threats that images they shared in confidence would be posted online."

    Citron, who has worked closely with Facebook's global safety team, says, "The company is working hard to mitigate real harms in the most secure way it can.""
  • At Albany Law, intersection of immigration, human and civil rights discussed

    Date published: 
    June 1, 2018

    "Which somewhat answers an umbrella question Margaret Hu of Washington and Lee University School of Law posed to the panel: Who deserves to be an American?

    "There are immigrants who are trying to naturalize or have the dream of becoming Americans," she said. "What do we allow as a country? When can you claim the mantel of being able to carry forward the American dream when those who control the rhetoric deny access to being able to claim that part of the dream?"

  • T-shirt maker sinks rival with dubious trademark of 150-year-old nautical icon

    Date published: 
    May 31, 2018

    "Another law professor, Annemarie Bridy of the University of Idaho, lamented gCaptain's situation.

    "It's a shame, really, to see people with meritorious defenses give up solely because they can't afford their day in court," she emailed Ars. "But that's how trademark bullying and IP trolling work. Right holders know that it's much cheaper and less stressful for an accused infringer to capitulate or settle than it is to try to win a case in federal court."

  • Autonomous Vehicles: Safety, Risk, and the Law

    Date published: 
    May 31, 2018

    "The observations from Smith, who holds dual degrees in law and engineering, were particularly insightful. He started by challenging widely held perceptions about the law. Many media articles mention states or cities that have passed a law authorizing autonomous vehicles, or something of the like, as if permission is needed. “We shouldn’t assume that we need a law to do something.” Smith pointed out that many of the early tests in California were before the state passed an explicit law.

  • California Senate Passes SB 822, the ‘Gold Standard’ of State Net Neutrality Laws

    Date published: 
    May 30, 2018

    "For starters, the bill was specifically crafted to challenge the federal government’s authority to enact net neutrality laws.  Contributors include Barbara van Schewick, a Stanford Law School professor, and the legal team at the Electronic Frontier Foundation (EFF).  Both groups have built upon the laws passed by both Washington State and Oregon, with an eye towards creating a fierce legal challenge to the FCC."

  • What's Next: Max Schrems and Why Your Privacy Policy Still Doesn't Cut It

    Date published: 
    May 30, 2018

    "akeaway: Public data, of course, is already public. But now providers have an obligation to package it up and ship it over to defense counsel, notes Riana Pfefferkorn of Stanford Law School’s Center for Internet and Society. “Providers are now on notice that they’re presumably going to get a lot more of these types of subpoenas.”"

  • California’s State Senate Is About to Vote on SB 822 — the Strongest State Net Neutrality Law Yet

    Date published: 
    May 29, 2018

    "The Electronic Frontier Foundation (EFF) has called SB 822 the ‘gold standard’ of net neutrality bills.

    That’s because it’s specifically crafted to challenge the federal government’s authority to enact net neutrality laws.  Noted contributors include Barbara van Schewick, a Stanford Law School professor, and the team of lawyers at EFF.  Both groups have built upon the laws passed by both Washington State and Oregon, with an eye towards creating a fierce legal challenge to the FCC."

  • How hackers can exploit devices used at home

    Date published: 
    May 28, 2018

    "“The more we delegate, the more there is opportunity for hackers that make it a valuable target,” said Jennifer King, director of consumer privacy at Stanford’s Center for Internet and Society.

    “The second you use some software to link everything to your house to some online account to something else, then it becomes valuable — in ways we don’t necessarily see, but hackers can definitely find those connections and try to figure out a way to exploit it," King said."

  • Ransomware attacks such as at South Bend's Allied Physicians are becoming common

    Date published: 
    May 26, 2018

    "“It would be hard to prove that records haven’t been made,” said Scott Shackelford, a cybersecurity expert and associate professor of business law and ethics at Indiana University’s Kelley School of Business.

    SamSam works by gaining access to a computer system and encrypting all of the data so that it is useless unless a ransom is paid. Once that happens — generally with Bitcoin or some other type of cryptocurrency — thieves provide a key to unlock the data.

  • Most U.S. Adults in Poll Unwilling to Share Personal Data for Ads to Keep a Service Free

    Date published: 
    May 25, 2018

    "As Jennifer King, director of consumer privacy at Stanford University’s Center for Internet and Society, points out, timing is everything.

    She said it is “an incredible coincidence” that the news about the Cambridge Analytica breach came out around the same time that GDPR was getting ready to be implemented “because it has shone the light on the threat third-party data collectors pose in the ecosystem,” she said Monday by phone.