Archive | Uncategorized RSS feed for this section

April 17 Panel 3




Wei-Chen Hung

The issue arising here is the legitimacy of Microsoft’s investigation which accessed the Hotmail content of a user who was tracking in stolen Microsoft source code. The purpose of Microsoft’s internal investigation is to search for evidence of theft of its trade secrets in a Hotmail account.…

Leave a comment Continue Reading →

April 10 Panel 4



Oliver Richards

The fallout of Edward Snowden’s revelations continue to echo throughout the world.  Under a threat by European Parliament to veto future trade agreements, the U.S. Department of Commerce announced that it will take another good look at its framework for US companies to receive so-called “safe harbor” status under EU law, allowing them to export the data collected about EU citizens to the US.…

Leave a comment Continue Reading →

April 3 Panel 5



Yali Hu

N.S.A. documents provided by the former contractor Edward J. Snowden indicate that N.S.A. has been conducted surveillance on the Chinese telecommunications giant, Huawei, a private company, since at least 2010 FISA cannot be applied as it is designed to govern the collection of “foreign intelligence” within the United States.…

Leave a comment Continue Reading →

March 27 Panel 06





Gabriel Gutiérrez

Documents Say NSA Pretends to be Facebook in Surveillance , from the Wall Street Journal’s Big Data Blog, written by Reed Albergotti and Danny Yadron

The article “reveals” that the NSA has disguised itself as Facebook to gain access to the computers of targets of investigations.…

Leave a comment Continue Reading →

13 March Panel 7



Jeffrey Ritholtz

The Obama administration has come under fire in recent weeks for its failure to publicize the “Certificates of Demonstrated Competence” that the State Department fills out and submits to the Senate Foreign Relations Committee prior to nomination hearings for foreign ambassador candidates.…

Comments Off Continue Reading →

February 27 Panel 08



Fanny Pelpel

This article deals with National Security Letters (NSL) and the gag order that is applied with regards to them in particular. This issue has generated a lot of tensions over the years, especially from a First Amendment perspective, leading some service providers such as Google, Facebook, Yahoo and Microsoft to file lawsuits before the Foreign Intelligence Surveillance Court.…

Comments Off Continue Reading →

February 20 PANEL 09




Yael Tzipori

On January 30, 2014, a judge of the Southern District of Texas determined that there is no reasonable expectation of privacy in the metadata embedded in a photograph posted on the Internet. The defendant in the case, United States v.

Comments Off Continue Reading →

February 13 PANEL 10




Angela Lelo

This article’s author discusses the influence that Sotomayor’s concurring opinion in U.S. v. Jones has already had on the White House, federal judges, and legal scholars. To recall, Sotomayor asserted in that case that the third party doctrine is no longer tenable in the digital age where individuals routinely convey a vast amount of information about themselves to third parties.…

Comments Off Continue Reading →

Agricultural Privacy?

Here’s the story I mentioned at PRG today about farmers giving their farm data to big agricultural companies for analytic purposes. I think the article calls to mind the lack of focus on non-urban subjects when we talk about surveillance and privacy, something I’ve been thinking about recently since many of my truckers come from rural backgrounds.…

Comments Off Continue Reading →

IAPP Westin Research Fellowships

Of possible interest from Omer Tene:  Established in 2013, the IAPP Westin Research Center was created to encourage and enable research and scholarship in the field of privacy. Each year, the IAPP welcomes two or more recent graduates to spend 12 months on site with our team, reporting to the VP of Research and Education, and working on a broad array of privacy research projects.…

Comments Off Continue Reading →