Technology companies say they will use the Internet of Things to improve our energy usage, health, security, and lifestyle and habits. In reality, companies such as Apple and Google want to learn all they can about us so that they can market more products and services to us -- and sell our data to others.
It now seems that the Office of Personnel Management, which had outsourced its data storage to other Federal agencies, has lost an astonishing 18 million personnel records, including most of those involving security clearances.
Who owns data? How should data privacy be defined and protected? And what is the potential for regulation to support or impede the growth of digital data businesses? Those were among the tough questions panelists grappled with at the Techonomy Policy 2015 event last week.
As cybercriminals become more skilled, the privacy practices at many organizations have not kept apace. In data that I've compiled, I found this to be the case at many state treasuries where the data exposed provides fraudsters with a crime exacta: claiming money that no one will ever miss and gathering various nuggets of personal data that can help facilitate other types of identity theft.
Unfortunately, we see an alarming amount of revenge porn cases every month. Based on our experience working with this issue, we put together a guide that can hopefully inform, prevent, or at least help the victims of revenge porn fight back.
That so many states are taking this issue seriously is tremendous progress. It is crucial, however, to ensure that the laws being passed truly protect victims and that they are clear, principled, and constitutionally sound. Unfortunately, many of these state laws do not fulfill these criteria.
Given an explicit threat to destroy "local and proud" industries in Germany, it's hardly surprising that antitrust authorities are taking action. It might be time for communities and industries outside Silicon Valley to rise up and demand U.S. policymakers take action as well to protect local jobs and fight economic concentration.
There are three reasons why the situation is so dire and why it was a piece of cake for hackers to rip off more than 4 million personnel records from the little known but important Office of Personnel Management (OPM).
In the future, what countries do with digital weapons may be more destructive than boots on the ground or drones in the sky.
Wealth. We all want it, work for it and strive for it throughout lives and careers. Reputation. We all have one. It us up to us to define it,...
Instead of debating the artifact of police body cameras, it may be more valuable to answer the following: If we live in a world of accepting surveillance as a part of normal 21st century life, what does this then mean for police body cameras?
The omnipresence of the Internet in modern society makes most digital policy issues transversal. Yet, a transversal approach is more an exception than a rule in digital policy, on both national and international level.
It's one of the Supreme Court's most famous, controversial and consequential decisions. On June 7, 1965, the Court in Griswold v. Connecticut struck down legislation prohibiting the use of contraceptives, relying in part upon a "right of privacy" that appears nowhere in the text of the Constitution.
There is one area in which Apple and Cook are being coy and its time for Americans to call the tech giant out on that.
Will Ackerly, the founder and CTO of Virtru, left the NSA in 2012 to solve a big problem: securing personal digital communications.
If you are married or in a relationship and suspect that your spouse or partner may be unfaithful to you, this article is going to make you very happy and scurrying to get a quick peek at your beloved's phone.