Data security expert calls for stronger cybersecurity laws
"As we become an increasingly digitally connected world, the loss of privacy and security are almost inevitable. But if we don’t adopt stronger data securi…
"As we become an increasingly digitally connected world, the loss of privacy and security are almost inevitable. But if we don’t adopt stronger data securi…
"Arvind Narayanan, a computer science professor at Princeton University and an expert on internet privacy, correctly captured my angst when he told me that…
Abstract: Although it might puzzle or even infuriate data scientists, suspicion about big data is understandable. The concept doesn’t seem promising to most pe…
Neil M. Richards Washington University in Saint Louis - School of Law Woodrow Hartzog Samford University - Cumberland School of Law; Stanford Law School Cent…
Daniel J. Solove George Washington University Law School Woodrow Hartzog Samford University - Cumberland School of Law; Stanford Law School Center for Intern…
"Jonathan Mayer, a computer scientist and lawyer at Stanford who has studied the security practices of education technology startups, says he’s been horrif…
"“Suppose a person logs in from a public wireless network, such as at a coffee shop or airport,” said Jonathan Mayer, a lawyer and computer science graduat…
"“Apple have not been as engaging with stakeholders as some other companies,” Calo says of Apple’s transparency about its cybersecurity and privacy. “On th…
"Stanford doctoral candidate Jonathan Mayer claims to have found several security weaknesses in the online course platform Coursera. Mayer, who is set to…
""It's a bad interpretation of the statute," Christopher Sprigman, a law professor at New York University, told Mashable. "This is just…
Cross-posted from LinkedIn. This post was co-authored by Professor Daniel Solove. The long-awaited federal district court opinion in FTC v. Wyndham was finall…
Third-party data service providers, especially providers of cloud computing services, present unique and difficult privacy and data security challenges. While m…