Content Types

Testimony of Deven McGraw

Testimony of Deven McGraw before the House Energy and Commerce Committee on the Discussion Draft of Health Information Technology and Privacy Legislation .

Read More Read More

Privacy Principles for Digital Watermarking

CDT released a paper this week offering a set of principles for addressing potential privacy considerations when deploying digital watermarking technology. As explained in greater detail below, digital watermarking technology embeds information, in machine-readable form, within the content of a digital media file (for example, a movie, song, or photograph). (1) CDT Offers Privacy Principles for Digital Watermarking (2) Basics of Digital Watermarking Technology…

Read More Read More

Principles for Network Management, Limited Role For FCC

For several years now, the issue of Internet neutrality has been the subject of prominent and strident debate in telecom and Internet policy circles. In general terms, the issue concerns whether operators of broadband networks should be free to favor some traffic over others, or instead should be required to handle traffic in an essentially neutral manner. Since late 2007, the debate has focused in particular on what techniques…

Read More Read More

Treasury Proposes Forcing Credit Card Companies to Act as IRS Agents

In an effort to track down unreported small business income, the U.S. Treasury is calling on Congress to create a sweeping new program that would require all credit card companies to report the income of all merchants to the Internal Revenue Service. (1) Treasury Proposes Forcing Credit Card Companies to Act as IRS Agents (2) Treasury Proposal Mirrors Problems with Other Data Collection and Data Retention Schemes (3) Request…

Read More Read More

Legislation Needed to Correct Widespread Errors in use of National Security Letters

In reports issued in March 2007 and March 2008, the Department of Justice Inspector General (IG) found widespread errors and violations in the FBI’s use of National Security Letters to obtain bank, credit and communications records of U.S. citizens without judicial approval. CDT has called upon Congress to establish checks and balances for such government access to sensitive information. 1) Legislation Needed to Correct Widespread…

Read More Read More

Spyware Enforcement

  By now most computer users have become familiar with the term "spyware," largely because they or someone they know have experienced it first-hand. Computer users are increasingly finding programs on their computers that they did not know were installed and that they cannot uninstall, that create privacy problems and open security holes, that can hurt the performance and stability of their systems and that can lead them to mistakenly…

Read More Read More

Spyware Enforcement – Federal

Return to the complete report. Federal Spyware Case Summary   Case Behaviors considered illegal by the Department of Justice Laws invoked Status United States v. Jerome T. Heckenkamp   More information   Prosecutors alleged: • Installing on another user's computer an unauthorized computer program that was designed to intercept electronic communications containing usernames and passwords.   Defendant pled guilty to: • Engaging…

Read More Read More