Related Posts

Decoding Tech Policy for Startups and Entrepreneurs

The range of technology policy issues at play for any company today can seem daunting. To help startups and entrepreneurs navigate the policy landscape and make responsible data decisions, CDT has created a suite of resources on the various laws and policy that may relate to their businesses.

Read More

States Take Steps to Limit School Surveillance of Student Social Media Pages

It’s no secret that schools across the country regularly monitor students’ social media pages. In Florida and California, for example, school districts hire “social media listening” services to monitor students’ pages for threats of violence. Federal student privacy laws do not address social media surveillance, and few state laws prevent schools from accessing content students post on social media pages that are not private.

Read More

Collection of Biometric Data Poses Serious Privacy and Personal Security Risks

Fingerprints. Iris scans. Blood samples. These types of data, referred to as biometric identifiers, are some of the most sensitive forms of identification in existence. Once biometric data is breached, improperly shared, or used for tracking, it’s very difficult for an individual to regain control and prevent misuse. Regulatory proposals that require the collection of biometric samples need to be re-evaluated in an era in which such data is collected from many more individuals — and in which that data is much more vulnerable.

Read More

FCC Should Act to Protect Broadband Customers’ Data

CDT and 58 other organizations submitted a letter to the Federal Communications Commission (FCC) calling on the agency to initiate a rulemaking to protect the privacy of broadband Internet customers. CDT believes that establishing broadband privacy rules under the FCC’s Title II authority is a critical step toward securing Internet users’ privacy online. We urge the Commission to take that step as soon as possible.

Read More

Replacing the Safe Harbor – Robust privacy protections in a new EU-US data transfer agreement

Much has been written and said about the Decision by the Court of Justice of the EU (CJEU) in the Schrems case, invalidating the European Commission’s Safe Harbor Decision, and its implications. Recently, EU and US negotiators have briefed the press and stakeholders about the progress towards a new data transfer agreement to replace the defunct Safe Harbor decision. A…

Read More

CDT Proposes Privacy Best Practices for Drones

Drones are a promising technology with great commercial and social potential. Since drones can also operate as a flying platform for sophisticated sensors – such as hi-res cameras, facial and license plate recognition, or cell tower emulators – drones can also erode individual privacy. CDT is proposing comprehensive voluntary privacy best practices for private use of drones, with the goal of credibly safeguarding individual privacy while enabling a wide range of private drone uses.

Read More

Student Privacy Ought To Be Protected Comprehensively

Schools have largely embraced education applications, websites, and devices as means for improving classroom instruction and administration. However, there seems to be a trend in company policies and proposed laws toward drawing sharp, inflexible lines between products that are “for education” and those that are not. However, it’s clear that this line is often blurred. A number of existing student privacy bills arguably would not address these gray areas.

Read More

Finding Solutions to Privacy and Security Challenges in the On-Demand Economy

Many of the companies that are pioneers in the “on-demand” space are proving popular around the globe, but as these companies enter into traditionally regulated spaces, questions about the user privacy and security are cropping up – for both providers and consumers. Importantly, these companies often have far more data on consumers than traditional entities. As a result of this mass amount of new data, a number of vital questions must be addressed.

Read More

Cross-Device Tracking Requires Strong Privacy and Security Standards

Users are also being tracked across devices through the use of ultrasonic inaudible audio beacons, which link devices that are close in proximity to one another. Audio beacons are deployed when a user encounters an ad online and the advertiser drops a cookie on the computer while also playing an ultrasonic audio sound through the use of the speakers on the computer or device.

Read More