The Microsoft Ireland Case: A Clear Answer, An Uncertain Future

Last week, the U.S. Second Circuit handed Microsoft a decisive victory, holding that warrants for electronic content issued under the Stored Communications Act (SCA) cannot reach data located overseas. The court’s message was simple: SCA warrants cannot reach data outside the U.S. because Supreme Court precedent creates a presumption against extraterritoriality absent clear Congressional intent. However, the long-term implications of the case, and the future of law enforcement cross-border data requests, are still murky at best.

Read More

CDT Responds to BEREC’s Draft Net Neutrality Guidelines

CDT contributed actively to the TSM Regulation process from the publication of the Commission’s proposal in September 2013 until its adoption in late 2015. We welcomed the final text, and noted that while it could have been more precise on what services ISPs may run in addition to Internet Access Services, what traffic management practices are allowed, and how commercial practices such as zero-rating should be treated, the same can be said of the US Open Internet regulation. Regulators will need to deal with these complicated questions in an evolving technology and market environment.

Read More

Put It In The Vault: Why You Should Use a Password Manager

a good password may be all that stands between your account and someone taking over your account or getting access to the information in one of your online accounts. However, if you feel frustrated that a “good” password is often long, complex, and difficult to remember, you are not alone: research done by Microsoft has found that the average user has approximately 25 accounts with passwords. Remembering just one thing that is longer than about seven characters is difficult for the average person. A password manager is a piece of software that helps you generate long, complex passwords, then securely stores all of these passwords in an encrypted virtual container.

Read More

FCC Rules Reconcile Speech and Privacy, Must Support Security Research

Last week, CDT submitted its second set of comments to the Federal Communications Commission (FCC) as it considers a new rulebook for protecting consumer privacy in the use of broadband. The FCC’s Notice of Proposed Rulemaking (NPRM) on this issue is an important first step towards providing broadband consumers with the assurance they need that their ISP will not track their online activities – the websites they frequent, the apps they download, the searches they perform – or sell that information to third parties without their knowledge and consent. CDT previously submitted comments in this rulemaking process.

Read More

GNI Finds Member Companies In Compliance with Obligations

The Global Network Initiative released a report on the independent assessments of its member companies, Facebook, Google, LinkedIn, Microsoft and Yahoo!, finding each company in compliance with the GNI Principles and Implementation Guidelines. The assessments amount to a demanding inquiry into company practices and processes as they relate to decision making about free expression and privacy.

Read More

CDT Chimes In On Canada’s Differential Pricing Review

As US net neutrality laws gain steadier footing following the DC Circuit’s recent affirmation of the FCC’s Open Internet Order, Canadian regulatory officials are poised to review their own open internet rules at a series of public hearings this fall. As part of this review, CDT filed comments on differential pricing practices and offered our recent zero rating whitepaper as a framework for understanding the potential benefits and harms of differential pricing.

Read More

Think Differentially: Apple's Forward-Thinking Approach to Privacy in iOS 10

In the technology world, good design is driven by data, and companies often have to think critically about trade-offs between usability and privacy. Apple, which has been consistently innovative in its product design and in its approach to privacy, will deploy a technique known as differential privacy in iOS. Differential privacy allows user data to be examined in aggregate without revealing anything about a specific individual’s behavior.

Read More

How Not to Be a Jerk with Your Drone

In 2015, President Obama established a multi-stakeholder engagement process to ensure that privacy, civil rights, and civil liberties concerns are considered and addressed as drones are integrated into the airspace. The process culminated in a final consensus document supported by a diverse group. The gist of the consensus document is simple: don’t be a jerk with your drone. In fact, several of the document’s suggestions are easy, commonsense ways for drone operators to ensure that they use their devices in an ethical, safe way that is respectful of fellow members of society.

Read More