Blog

Author

Issue

The DMCA and Carterphone’s B-Side

The Copyright Office recently held its triennial hearings on exemptions to the Digital Millennium Copyright Act’s prohibition on circumventing technical protection measures for copyrighted works. The Office is charged under the DMCA with issuing exemptions for specific classes of works where non-infringing uses will be adversely affected by the prohibition. For most of the classes…

Read More

Groups Launch “Chain of Trust” Initiative to Combat Malware

Three of the world’s leading cybersecurity groups are launching a new initiative to combat malicious software or “malware” by establishing a “Chain of Trust” among all of the organizations and individuals that play a role in securing the Internet. Developed by the Anti-Spyware Coalition (ASC), National Cybersecurity Alliance (NCSA) and StopBadware.org, the Chain of Trust Initiative will link together security…

Read More

Craigslist Fights Back!

So, South Carolina Attorney General Henry McMaster, who had threatened to bring criminal charges against Craigslist by last Friday if the company failed to comply with his request to eliminate content he deemed objectionable to the fair citizens of his state, has apparently blinked. Meanwhile, Craigslist CEO Jim Buckmaster has fired back…

Read More

Lessons learned from Social Media governance

In the last six months, two of the most popular social networking platforms -Facebook and Twitter – announced policy changes, only to be forced to do an about-face less than 24 hours later due to an overwhelming backlash from users unhappy with the “behind closed doors” style of policy changes. In February, Facebook attempted to change its terms of service…

Read More

Report Spurs Discussion on Analytics and Privacy Rights

CDT released a report yesterday examining how federal government agencies can acquire important usage data from users of their websites while still respecting privacy rights.   In conjunction with the release of that report, CDT hosted a panel of privacy policy experts in a moderated discussion of the report’s findings.   The panel fielded questions from in-person attendees…

Read More

Cybersecurity Bill Jumpstarts Debate

The Cybersecurity Act of 2009, S. 773, introduced by Senators Rockefeller (D-WV) and Snowe (R-ME), has kicked off what promises to be an intense debate over the federal government’s cybersecurity policy. There’s broad consensus about the goal – better security for both governmental and private sector critical infrastructure information systems – but not much agreement about how to achieve…

Read More

Educating and Engaging Consumers in Health IT and Privacy

The health IT movement is fast and furious.  Paper-based health records are quickly moving online where health information can be collected, stored, and shared electronically. Policymakers are aware of the movement – the federal government just committed $19 billion in the economic recovery legislation for health IT efforts.   Providers for the most part are also in the know -…

Read More

Finding the ‘Meaning’ in Meaningful Use

Congress committed billions to health IT as part of the American Recovery and Reinvestment Act of 2009 (ARRA), and the U.S. Department of Health and Human Services (HHS) has officially entered rulemaking season on the health IT provisions.  Just two weeks ago, the agency posted guidance listing the technologies and methodologies that qualify as…

Read More