Springtime for CISPA
Spring is here. The flowers are in bloom, the days are longer, and Congress queues up for another legislative proposal to 'address' cybersecurity in the…
Spring is here. The flowers are in bloom, the days are longer, and Congress queues up for another legislative proposal to 'address' cybersecurity in the…
Yesterday afternoon, the White House put out a statement describing its view of vulnerability disclosure: the contentious issue of whether and when government a…
<!--/*-->/* ><!--*/ <p>P { margin-bottom: 0.08in; }A:link { }<br> /<em>--><!</em>/<br> Shortly after a…
Over at Just Security, I have a new piece on the Washington Post's interesting story about the increasingly aggressive role some federal magistrate judges a…
Cross-posted from Netarchitecture.org Wednesday's press reports of the new network neutrality rules proposed by FCC Chairman Wheeler have been met with ang…
This week I had a request for privacy information that went something like this: I am starting a new project and expect people to search my name online. There…
Last week, Intel’s director of security policy and global privacy officer, David Hoffman, wrote a Harvard Business Review piece announcing that “Privacy is a Bu…
Today the Fourth Circuit refrained from deciding the first legal challenge to government seizure of the master encryption keys that secure our communications wi…
If US law enforcement officers want to access your private emails, they need to follow the requirements in the Electronic Communications Privacy Act. ECPA is a…
Today I filed comments with the Privacy and Civil Liberties Oversight Board (PCLOB) in connection with its hearing on section 702 of the FISA Amendments Act. Th…
The Federal Trade Commission’s (FTC) resounding victory over Wyndham Worldwide Corporation in a U.S. District Court paves the way for increasing privacy and dat…
The Federal Trade Commission’s (FTC) resounding victory over Wyndham Worldwide Corporation in a U.S. District Court paves the way for increasing privacy and dat…