The Sony Hack: A Warning for Internet Policy
The Sony incident reminds us again about the fragile yet constantly shifting state of cybersecurity and Internet policy. Clearly the international political ra…
The Sony incident reminds us again about the fragile yet constantly shifting state of cybersecurity and Internet policy. Clearly the international political ra…
In the previous blog, I noted that the logical next step in understanding “privacy as fairness” was to examine if it is possible to identify principles that wou…
I've been a CIS non-resident fellow (or now faculty afflilaite) now for a decade, beginning in 2004. I love being associated with CIS, and many of my close…
When I first started working on mutual legal assistance treaties (MLATs), they were seen as the less glamorous, hard-working cousin of extradition treaties. An…
November 2014 in Retrospect is available here: http://www.internetjurisdiction.net/observatory/retrospect/2014-november Retrospect is the monthly newsletter o…
Today, we launched CollabMark — a project to provide information about how open source and free culture communities can use trademarks. A project’s identity is…
As Congress winds down for the holidays, it delivers yet another lump of coal for the American people. Contained in the 2015 Intelligence Authorization Act is…
A few days ago, France joined the list of countries blocking access to The Pirate Bay. The High Court of Paris ordered ISPs to “implement all necessary measures…
Recently, the Paris Court of Appeals handed down a decision awarding €1.3M in damages to the French commercial TV broadcaster TF1 against DailyMotion, which fai…
On November 26, 2014, the European data protection authorities (DPAs) assembled in the Article 29 Working Party (WP29) adopted guidelines on the implementation…
Last evening the Senate voted 58-42 to delay implementation of the USA FREEDOM Act with the goal of reforming, albeit modestly, America's controversial dome…
Panel 2 of today's PCLOB public hearing explored privacy interests within a counterterrorism context with an emphasis on what impact technology has upon it.…