Blog

Author

Issue

Rules of the Road: Net Neutrality’s Bright Line Protections

Broadly speaking, net neutrality rules are the protections that internet users have in their relationship with ISPs. In this context, the rules could be thought of as a Bill of Rights for users, enumerating fundamental individual rights that cannot be infringed upon by ISPs. As defined by the FCC, the three bright-line rules are as follows: No Blocking. No Throttling. No Paid Prioritization.

Read More

Twitter Transparency Report Shines a Light on Variety of Ways Governments Seek to Restrict Speech Online

Transparency isn’t an end in itself. Rather, it’s a crucial vehicle for understanding the forces that shape our online experiences. Twitter’s latest report breaks ground by publishing new data about the complex interactions that social media companies can have with governments who are seeking to restrict content online. In this post, we dig into the report and discuss what it reveals about the mounting pressure from governments that intermediaries face to censor user speech.

Read More

Another Invasive, Costly DHS Proposal Chilling Free Speech At the Border

Earlier this year, DHS proposed to begin requesting information pertaining to Chinese visitors’ social media identifiers. This is not the first time we have seen this type of proposal from DHS. In 2016, CDT and over 30 other organizations raised concerns that a DHS proposal asking people traveling to the U.S. through the Visa Waiver Program to volunteer information about their “online presence” and social media use amounted to an expansion of surveillance of U.S. visitors and residents alike. Last week, CDT argued that the new proposal would raise the same issues.

Read More

Three Core Security & Privacy Issues of Connected Vehicles

Connected vehicles have tremendous potential to reshape the transportation landscape – bringing important safety and efficiency benefits but also creating new security and privacy risks. In addition, there are long-standing security and privacy issues that, if not resolved, will be compounded with the continued trends towards greater use of software and connectivity in motor vehicles. Our comments focus on three main issues: the need for secure software, the increasing dependence on critical information infrastructures, and the need for greater transparency around data privacy.

Read More