Privacy

Privacy / Recently Commented

Google Begins Publicly Sharing National Security Letters

In a note released this week, Google announced that it will begin publicly sharing National Security Letters (NSLs) it receives that have been freed of nondisclosure obligations either through litigation or legislation. more

Data Breaches and You: ISOC Global Internet Report 2016 Explains Critical Steps You Need to Take Now

Data breaches are the oil spills of the digital economy. Over 429 million people were affected by reported data breaches in 2015 -- and that number is certain to grow even higher in 2016. These large-scale data breaches along with uncertainties about the use of our data, cybercrime, surveillance and other online threats are eroding trust on the Internet. more

Several Models of Android Devices Discovered Collecting and Transmitting Sensitive Personal Data

Several models of Android mobile devices discovered containing firmware that collect sensitive personal data about their users and transmitted this sensitive data to third-party servers without disclosure or the users' consent. more

Global Internet Freedom Declines for Sixth Consecutive Year in 2016, Says Freedom House

"Internet freedom has declined for the sixth consecutive year, with more governments than ever before targeting social media and communication apps as a means of halting the rapid dissemination of information, particularly during antigovernment protests," according to the Freedom on the Net 2016 report released by Freedom House. more

Encrypted Email Sign Ups Have Doubled Since Trump Victory, Says PortonMail

Since Trump’s victory, the number of new users signing up for the Switzerland-based encrypted email service provider, ProtonMail, has doubled compared to the previous week, the company reported. more

What Steps Can Africans Take and Lead in Internet Governance and Social Justice?

Almost three years ago, I published a blog post on CircleID titled "Internet Governance: Why Africa Should Take the Lead." I argued that African Internet stakeholders use a 'wait and see approach' in matters as critical as Internet governance," and that African voices are missing in key Internet governance discussion fora. Additionally, I suggested that some reasons for this approach, including that Africa lacks well-trained Internet governance experts and Africans see foreign affairs and international relations as an East versus West dynamic. more

Can the Internet Work Across Borders?

On the face of it, the answer is a rather obvious and simple "yes"! The Internet obviously works across borders. Technically, it is a global network servicing its users wherever they may be on the planet. But it is this very nature -- the fact that the Internet is not bound to a specific country or territory -- which has more and more people asking themselves whether it can really work across borders. more

NIST Publishes Guide for DNS-Based Email Security, Draft Open for Public Comments

The National Cybersecurity Center of Excellence (NCCoE) has invited comments on a draft practice guide to help organizations improve email security and defend against phishing, man-in-the-middle, and other types of email-based attacks. more

The Effects of the Forthcoming FCC Privacy Rules on Internet Security

Last week, the Federal Communications Commission (FCC) announced new privacy rules that govern how Internet service providers can share information about consumers with third parties. One focus of this rulemaking has been on the use and sharing of so-called "Consumer Proprietary Network Information (CPNI)" - information about subscribers - for advertising. The Center for Information Technology Policy and the Center for Democracy and Technology jointly hosted a panel exploring this topic last May... more

Registration Operations Workshop at ICANN57 Hyderabad

Following a very successful series of workshops held during IETF meetings, the next Registration Operations Workshop (ROW) is now being held during the upcoming ICANN meeting in Hyderabad, India. While the previous workshops were of advanced topics attended by industry experts, the current one will be more of a tutorial and is open to all interested parties. more

FCC Approves New Privacy Rules Restricting Data Collection by Broadband Providers

The U.S. Federal Communications Commission today voted 3-2 to approve rules requiring broadband Internet Service Providers to provide customers more control over the use of their personal information. more

Amnesty International: Popular Mobile Apps Failing to Adopt Basic Privacy Protections

"Tech companies like Snapchat and Skype's owner Microsoft are failing to adopt basic privacy protections on their instant messaging services, putting users' human rights at risk," says Amnesty International. more

Building a Base of Knowledge for Advocacy Abroad in the Digital Age

Answering questions at the Internet Association's Virtuous Circle conference last week, Secretary Kerry presented the U.S. Department of State's effort to prioritize global digital economy issues abroad in order to reflect the growing importance of these issues in both economic and foreign policy. The State Department has made real progress on this initiative in the last year and hopes to continue our momentum going forward. more

European Court Declares Dynamic IP Addresses are Subject to Privacy Protection Rules

The Advocate General, top advisor to the European Court of Justice, has issued an opinion today about Internet anonymity, Electronic Privacy Information Center reports. more

UK Security Agencies Have Unlawfully Collected Data for 17 Years, Says Court

"British security agencies have secretly and unlawfully collected massive volumes of confidential personal data, including financial information, on citizens for more than a decade, top judges have ruled," according to a report published today in The Guardian. more