Tag: Privacy
Tag: Privacy (page 2)
-
Changes to the Federal Rules of Criminal Procedure Allows the FBI to Install Malware on Computers
Have you ever accidentally downloaded malware? Under proposed amendments to the Federal Rules of Criminal Procedure, the malware on your computer may provide the Federal Bureau of Investigation the…
-
Operating on Constitutional Boundaries – Is There a Need for Legislative Updates to Electronic Privacy Protection Laws?
Long gone are the days when law enforcement surveillance meant officers with cameras standing on corners wearing trench coats, hats and sunglasses. Now law enforcement can use thermal imaging cameras…
-
Guest post: Crafting strong educational policies while protecting student data
By: Mary Gifford, Senior Vice President of Academic Policy and External Relations, K12 In September 2013, Oklahoma passed a bill safeguarding student data, and since then, student and…
-
Smartphone Meets the Fourth Amendment
This appeared on GreenvilleOnline.com July 12, 2014. Many of us are never far from our cell phones. For all their utility, cell phones are poorly locked portals that…
-
John Stephenson Testimony on Electronic Data Privacy Protection
On March 20, 2014 ALEC Communications and Technology Task Force Director John Stephenson was asked to testify in front of the South Carolina House Judiciary’s Constitutional Laws Subcommittee hearing on…
-
New Hampshire Can Lead on Privacy Protection
This appeared in the New Hampshire Union Leader on February 13, 2014. In the wake of the NSA scandal, American citizens demand Congress take a hard look at…
-
Government Threatens Montanans Privacy
By: Representative Daniel Zolnikov, House District 47, Billings Heights We take privacy for granted. Too often we mistakenly assume that we are the only ones privy to our personal information.
-
Texas’ E-Mail Privacy – A Template for the Nation
By: Ron Yokubaitis, co-CEO of Golden Frog, Inc. On June 14, 2013 Texas Governor Rick Perry signed into law, HB2268, a bill requiring Texas law enforcement officials to…
-
Abuse and Misuse of Personal Information
Executive Summary: Advances in technology provide a number of useful products and services that can either enhance or threaten personal privacy, depending on how these products or services are used and for…