Content Types

CDT Comments to FTC: Boosting Privacy by Design and Data Security Guidance

The following comments to the FTC address (1) how the Commission can use its Section 5 authority to address the role of design in privacy, (2) the Commission’s rulemaking and enforcement under COPPA, (3) the tools and resources necessary for the Commission to effectively hold industry accountable, and (4) recommendations for developing the Commission’s data security regime.

Read More Read More

Letter to Newman & Saunders re: New York City’s Automated Decision Systems Task Force

Dear Task Force Chairs Newman and Saunders: The undersigned organizations and individuals write to offer recommendations to the Automated Decision Systems Task Force, which is mandated by Local Law 49 of 2018. This is an important opportunity to ensure that emerging technologies, like automated decisions systems, are adopted and implemented fairly and equitably to serve all New Yorkers.

Read More Read More

BSides 2018 Presentation – Engaging Policymakers at the State Level, Election Cybersecurity

Maurice Turner, Senior Technologist at the Center for Democracy and Technology, presented this at the 2018 BSides Las Vegas Conference. The presentation, titled Engaging Policymakers at the State Level, explored how and why communities can benefit from adopting cybersecurity practices through the example of the electoral process.

Read More Read More

Infosec Toolkit for Election Volunteering

From federal data breaches to foreign governments phishing political campaigns to malware shutting down city services, our nation is under attack. You can help – starting right in your own community. Local and state officials are working to build a more resilient electoral process, but their capacity is limited. They need civic-minded infosec professionals to combine their knowledge and talents as technical volunteers for Election Day and beyond. The information below will help you understand the election process and provide tips on how you can get involved.

Read More Read More

Comment on USTelecom Petition to FCC

USTelecom petitioned the FCC to stop enforcing requirements (known as forbearance) that allow smaller ISPs to access broadband infrastructure at wholesale rates. In order for the petition to succeed, USTelecom has to provide evidence to meet statutory requirements and demonstrate that forbearance is in the public interest. In this comment, we address how USTelecom did not provide enough evidence to meet these requirements; and conclude that the petition should be denied.

Read More Read More

Tech Explained: the Glossary

We’ve created a new series of blogs and resources, entitled “Techsplanations,” with the goal of providing folks with a better understanding of the technologies that shape our everyday lives. Please utilize this glossary as a reference for the key terms and concepts we mention.

Read More Read More

Response to DOJ Letter on DMCA Exemptions for Security Researchers

On June 28, CCIPS of the Department of Justice sent a letter to the Copyright Office, voicing its support for CDT’s request that the Office expand an exemption under Section 1201 of the DMCA that allows computer security researchers to find and repair flaws and vulnerabilities in programs without running afoul of copyright law. To express our appreciation for both the letter and the Copyright Office’s willingness to accept it into the record for this exemption proceeding, we and our colleagues at the Samuelson-Glushko Technology Law & Policy Clinic submitted a response.

Read More Read More

Letter to Armed Services Committee on the Email Privacy Act

We, the undersigned civil society organizations, companies and trade associations, write to express our support for the Email Privacy Act which was recently included in the House passed version of the National Defense Authorization Act for Fiscal Year 2019. The Act updates the Electronic Communications Privacy Act, the law that sets standards for government access to private internet communications, to reflect internet users’ reasonable expectations of privacy with respect to emails, texts, notes, photos, and other sensitive information stored in “the cloud.”

Read More Read More