Related Posts

Your Chance to Say No to Proposed Social Media Questioning on US Customs

DHS recently issued a proposal to ask tourists on visa waivers to share their “online presence” on the I-94W and the online application for the Electronic System for Travel Authorization, including the social networks they use and their corresponding “identifiers”—their handles or account names. CDT thinks this is a bad idea and is planning to file public comments with U.S. Customs and Border Protection explaining why.

Read More

Send CDT to SXSW 2017

In 2015 and 2016, CDT made a splash at SXSW, but we think the third time is the charm. We have five great panels in store for Austin in 2017, but we need your help to get us there. The PanelPicker is now open through September 2 — vote for CDT! Here are our submissions.

Read More

Self-Driving into the Future: Putting Automated Driving Policy in Top Gear

There are a number of pressing issues in autonomous vehicle policy. First, the regulation of semi-autonomous cars and what standards manufacturers should be held to. Second, the concept of including black boxes in cars, and dealing with other privacy-related issues arising from the development of self-driving cars. And finally, the conversation around developing infrastructure to facilitate the growth of autonomous cars.

Read More

All Bots Must Die: How a New Senate Bill to Combat Botnets Could Put Privacy at Risk

How should the US government deal with the very serious threats posed by botnets? Senators Whitehouse (D-RI), Graham (R-SC), and Blumenthal (D-CT) believe a solution is their Botnet Prevention Act, which was introduced in May. While much of the bill may sound reasonable at first pass, it contains a number of provisions that pose cybersecurity and privacy risks.

Read More

Community, Identity, Speech, and Power

As we look forward to our next twenty years, we must ask ourselves: Are we achieving our goal of promoting an empowering internet that truly enables individual users to speak and be heard, to exercise control over their online identity, and to connect with one another in pursuit of a sense of belonging and community? This year, CDT is launching a long-term focus on these and other questions whose common theme is “Community” online.

Read More

FCC Rules Reconcile Speech and Privacy, Must Support Security Research

Last week, CDT submitted its second set of comments to the Federal Communications Commission (FCC) as it considers a new rulebook for protecting consumer privacy in the use of broadband. The FCC’s Notice of Proposed Rulemaking (NPRM) on this issue is an important first step towards providing broadband consumers with the assurance they need that their ISP will not track their online activities – the websites they frequent, the apps they download, the searches they perform – or sell that information to third parties without their knowledge and consent. CDT previously submitted comments in this rulemaking process.

Read More

GNI Finds Member Companies In Compliance with Obligations

The Global Network Initiative released a report on the independent assessments of its member companies, Facebook, Google, LinkedIn, Microsoft and Yahoo!, finding each company in compliance with the GNI Principles and Implementation Guidelines. The assessments amount to a demanding inquiry into company practices and processes as they relate to decision making about free expression and privacy.

Read More

Think Differentially: Apple's Forward-Thinking Approach to Privacy in iOS 10

In the technology world, good design is driven by data, and companies often have to think critically about trade-offs between usability and privacy. Apple, which has been consistently innovative in its product design and in its approach to privacy, will deploy a technique known as differential privacy in iOS. Differential privacy allows user data to be examined in aggregate without revealing anything about a specific individual’s behavior.

Read More

How Not to Be a Jerk with Your Drone

In 2015, President Obama established a multi-stakeholder engagement process to ensure that privacy, civil rights, and civil liberties concerns are considered and addressed as drones are integrated into the airspace. The process culminated in a final consensus document supported by a diverse group. The gist of the consensus document is simple: don’t be a jerk with your drone. In fact, several of the document’s suggestions are easy, commonsense ways for drone operators to ensure that they use their devices in an ethical, safe way that is respectful of fellow members of society.

Read More

Two Factors are Better Than One

You may have heard how important it is to have a strong password. However, passwords can still be stolen or an attacker can scam you into giving them your password. To guard against this threat, many websites now offer multi-factor authentication. While different sites may refer to this feature differently, such as two-step login or two-factor sign-in or even login approvals, it has the same goal: to keep you safer online.

Read More