Blog

Author

Issue

Only Humans Need Apply: Job Prospects Following Advances in AI

Last week, in response to a Request for Information from the White House Office of Science and Technology Policy, CDT submitted a report on “Preparing for the Future of Artificial Intelligence” (“AI”). Our comments focused on how the government can reduce inequality in the workforce and promote societal progress as AI advances. CDT believes in the power of AI, and suggests policy improvements specifically to: (1) use AI for public good, (2) address social and economic implications caused by AI, and (3) harness AI with scientific and technical training.

Read More

Community, Identity, Speech, and Power

As we look forward to our next twenty years, we must ask ourselves: Are we achieving our goal of promoting an empowering internet that truly enables individual users to speak and be heard, to exercise control over their online identity, and to connect with one another in pursuit of a sense of belonging and community? This year, CDT is launching a long-term focus on these and other questions whose common theme is “Community” online.

Read More
techprom-2016-logo-microsoft

The Microsoft Ireland Case: A Clear Answer, An Uncertain Future

Last week, the U.S. Second Circuit handed Microsoft a decisive victory, holding that warrants for electronic content issued under the Stored Communications Act (SCA) cannot reach data located overseas. The court’s message was simple: SCA warrants cannot reach data outside the U.S. because Supreme Court precedent creates a presumption against extraterritoriality absent clear Congressional intent. However, the long-term implications of the case, and the future of law enforcement cross-border data requests, are still murky at best.

Read More
BEREC

CDT Responds to BEREC’s Draft Net Neutrality Guidelines

CDT contributed actively to the TSM Regulation process from the publication of the Commission’s proposal in September 2013 until its adoption in late 2015. We welcomed the final text, and noted that while it could have been more precise on what services ISPs may run in addition to Internet Access Services, what traffic management practices are allowed, and how commercial practices such as zero-rating should be treated, the same can be said of the US Open Internet regulation. Regulators will need to deal with these complicated questions in an evolving technology and market environment.

Read More
2015-07-20-password-security_sq

Put It In The Vault: Why You Should Use a Password Manager

a good password may be all that stands between your account and someone taking over your account or getting access to the information in one of your online accounts. However, if you feel frustrated that a “good” password is often long, complex, and difficult to remember, you are not alone: research done by Microsoft has found that the average user has approximately 25 accounts with passwords. Remembering just one thing that is longer than about seven characters is difficult for the average person. A password manager is a piece of software that helps you generate long, complex passwords, then securely stores all of these passwords in an encrypted virtual container.

Read More
2015-10-09-FCC_sq

FCC Rules Reconcile Speech and Privacy, Must Support Security Research

Last week, CDT submitted its second set of comments to the Federal Communications Commission (FCC) as it considers a new rulebook for protecting consumer privacy in the use of broadband. The FCC’s Notice of Proposed Rulemaking (NPRM) on this issue is an important first step towards providing broadband consumers with the assurance they need that their ISP will not track their online activities – the websites they frequent, the apps they download, the searches they perform – or sell that information to third parties without their knowledge and consent. CDT previously submitted comments in this rulemaking process.

Read More

GNI Finds Member Companies In Compliance with Obligations

The Global Network Initiative released a report on the independent assessments of its member companies, Facebook, Google, LinkedIn, Microsoft and Yahoo!, finding each company in compliance with the GNI Principles and Implementation Guidelines. The assessments amount to a demanding inquiry into company practices and processes as they relate to decision making about free expression and privacy.

Read More
Canada

CDT Chimes In On Canada’s Differential Pricing Review

As US net neutrality laws gain steadier footing following the DC Circuit’s recent affirmation of the FCC’s Open Internet Order, Canadian regulatory officials are poised to review their own open internet rules at a series of public hearings this fall. As part of this review, CDT filed comments on differential pricing practices and offered our recent zero rating whitepaper as a framework for understanding the potential benefits and harms of differential pricing.

Read More
Apple

Think Differentially: Apple's Forward-Thinking Approach to Privacy in iOS 10

In the technology world, good design is driven by data, and companies often have to think critically about trade-offs between usability and privacy. Apple, which has been consistently innovative in its product design and in its approach to privacy, will deploy a technique known as differential privacy in iOS. Differential privacy allows user data to be examined in aggregate without revealing anything about a specific individual’s behavior.

Read More