Content Types

Principles for Network Management, Limited Role For FCC

For several years now, the issue of Internet neutrality has been the subject of prominent and strident debate in telecom and Internet policy circles. In general terms, the issue concerns whether operators of broadband networks should be free to favor some traffic over others, or instead should be required to handle traffic in an essentially neutral manner. Since late 2007, the debate has focused in particular on what techniques…

Read More Read More

Treasury Proposes Forcing Credit Card Companies to Act as IRS Agents

In an effort to track down unreported small business income, the U.S. Treasury is calling on Congress to create a sweeping new program that would require all credit card companies to report the income of all merchants to the Internal Revenue Service. (1) Treasury Proposes Forcing Credit Card Companies to Act as IRS Agents (2) Treasury Proposal Mirrors Problems with Other Data Collection and Data Retention Schemes (3) Request…

Read More Read More

Legislation Needed to Correct Widespread Errors in use of National Security Letters

In reports issued in March 2007 and March 2008, the Department of Justice Inspector General (IG) found widespread errors and violations in the FBI’s use of National Security Letters to obtain bank, credit and communications records of U.S. citizens without judicial approval. CDT has called upon Congress to establish checks and balances for such government access to sensitive information. 1) Legislation Needed to Correct Widespread…

Read More Read More

Spyware Enforcement

  By now most computer users have become familiar with the term "spyware," largely because they or someone they know have experienced it first-hand. Computer users are increasingly finding programs on their computers that they did not know were installed and that they cannot uninstall, that create privacy problems and open security holes, that can hurt the performance and stability of their systems and that can lead them to mistakenly…

Read More Read More

Spyware Enforcement – Federal

Return to the complete report. Federal Spyware Case Summary   Case Behaviors considered illegal by the Department of Justice Laws invoked Status United States v. Jerome T. Heckenkamp   More information   Prosecutors alleged: • Installing on another user's computer an unauthorized computer program that was designed to intercept electronic communications containing usernames and passwords.   Defendant pled guilty to: • Engaging…

Read More Read More

CDT Joins Briefs Urging Courts to Properly Apply Section 230 of the CDA

On March 28, the Center for Democracy & Technology filed a friend-of-the-court brief in the Sixth Circuit case Doe v., arguing that §230 of the Communications Decency Act immunizes the website from being liable for an under-age user having lied about her age. This is the fourth amicus brief CDT has filed in favor of a broad reading of the 1996 law in recent months. CDT…

Read More Read More