Tag: Privacy
Tag: Privacy
-
Pennsylvania COVID-19 Data Breach Highlights Privacy Concerns for State Run Tracking Apps
A person’s digital privacy is essential in today’s information age. People should be vigilant about who has access to their data. During this COVID-19 pandemic, some have voluntarily provided health…
-
Solving a Perceived Privacy Problem: How the Market Reacts to Innovate Solutions in the Absence of Government Action
Markets innovate in the absence of government action. The Federal Communications Commission attempted to regulate Internet Service Provider (ISP) privacy during the Obama administration because it claimed that ISPs…
-
Crying “Privacy” is Not Enough to Support a Lawsuit
A judge in the U.S. District Court for the Northern District of Illinois handed down a decision that may impact future state, or even federal, privacy legislation. Through the…
-
Security and Systematic Flaws Allowed Anyone to Track Any Cell Phone in Real Time
Local law enforcement agencies may have been able to access cell phone location data without a warrant, according to stories exploding across the media. At the heart of the…
-
Principles on Online Privacy
Principles on Online Privacy The American Legislative Exchange Council acknowledges that a market environment is essential for future success of the Internet. The proposed set of policies accounts for…
-
How the FCC’s ISP Privacy Rule has an Eye toward the Past, Not toward the Present or the Future
When is a privacy rule not about privacy? The Federal Communications Commission (FCC) recently finalized proposed rules regarding what Internet Service Providers (ISPs) must do regarding consumer information. The rules…
-
An Act Relating to Unmanned Aircraft Systems – Establishing Statewide Standards, Protecting Privacy, and Ensuring Public Safety
Preamble A bill to provide for the operation and regulation of unmanned aircraft systems in this state; to provide for the powers and duties of state and local governmental officers…
-
Player Beware: Pokemon Go Can Place Your Personal Data at Risk
With great popularity comes great responsibility. Niantic and Nintendo have created an instantly successful smart phone app. With that instant success, though, comes significant risks, especially with the data Niantic…
-
Model Act for Digital Contents Warrants
Title – Digital Contents Warrants Section 1 – Search warrant for content of electronic communications Definitions. As used in this section, unless the context otherwise requires: “Contents”, when used with…
-
Fantasy Sports Contests Act
Section 1 – Definitions. As used in this Act, unless the context requires otherwise: “Confidential Information” shall mean information related to the play of a Fantasy Contest by Fantasy Contest…
-
How the FCC’s ISP Privacy Rule Focuses on the Wrong Thing
In its quest to protect consumer privacy, the Federal Communications Commission has failed to do one thing: Focus on consumer privacy. Instead, it focused on the Internet Service Provider; it…
-
Former FTC Officials Provide Their Perspective on the FCC’s Proposed ISP Privacy Rules
Until the Federal Communications Commission issued its Open Internet Order, the Federal Trade Commission acted as the Internet’s privacy enforcer. The FTC brought individualized enforcement actions against companies that clearly…
-
Senators Threaten to Eradicate Device and End-to-End Encryption
The end of encryption as we know it is near if Senators Diane Feinstein and Richard Burr have their way. The two senators have been circulating proposed legislation, entitled…
-
Why the FCC’s Plan to “Protect” Consumer Privacy is Misguided
So much for a regulatory light touch. The Federal Communications Commission outlined a plan to require major Internet Service Providers (ISPs) to disclose, in detail, how they use consumer…
-
Making the Internet of Things a Safer Place
The Internet of Things (IoT) is an exciting “place.” Innovators are developing revolutionary technologies that will reshape cars, workplaces, homes and lives. Some of these technologies are even now commonplace.
-
Federal Decision Threatens Apple Smartphone Encryption
A decision from a federal United States Magistrate Judge seriously threatens smartphone encryption by requiring Apple to build a “backdoor” to the iPhone for the Federal Bureau of Investigation…
-
Encryption is Not Preventing Law Enforcement from Investigating Crime
Law enforcement officials need backdoors to thwart encryption or else they will not be able to keep the public safe from terrorist attacks or crime. At least, that seems to…
-
Is Your Data Safe from the New Form of Government-Sanctioned Data Collection?
Electronic data can be revealing and intimate. Individuals should be secure and free from unreasonable government searches of their electronic data. When law enforcement engages in mass surveillance without appropriate…
-
DEA Data Collection Program Served as Model for NSA Program
“The wicked flee when no man pursues,” according to the book of Proverbs. USA Today recently reported that the United States Drug Enforcement Agency maintained a domestic wiretapping program…
-
Grady v. North Carolina – Satellite Based Monitoring Programs Are Searches
A decision announced by the Supreme Court earlier this term may force states to re-evaluate their Satellite Based Monitoring (SBM) programs for repeat criminal offenders. Last week, the Court determined…