A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Privacy’ Category

Privacy Concerns in the Sharing Economy: The Case of Uber 

By Sabreena Khalid – Edited by Insue Kim

Recent revelations about Uber’s disconcerting use of personal user information have exposed the numerous weaknesses in Uber’s Privacy Policy. The lack of regulation in the area, coupled with the sensitive nature of personal information gathered by Uber, makes the issue one requiring immediate attention of policy makers.

Read More...

Posted On Dec - 17 - 2014 Add Comments READ FULL POST

Congress Fails to Pass Act Limiting Collection of Phone Metadata

By Henry Thomas – Edited by Paulius Jurcys

The Senate failed to reach closure and bring the USA FREEDOM Act to a vote. The Act would have extended provisions of the Patriot Act, but would have sharply curtailed the executive’s authority to collect phone conversation metadata. While the bill had broad popular support, the vote failed largely along party lines, passing the onus of drafting and approving a new bill onto the next congressional session.

Read More...

Posted On Dec - 1 - 2014 Add Comments READ FULL POST

U.S. Marshals Service Uses Airborne “Dirtboxes” to Collect Cell Phone Data

By Katherine Kwong – Edited by Mengyi Wang

The U.S. government has been using “dirtboxes” to collect cell phone data. The program, designed for criminal suspect surveillance, is accused of also collecting cell phone data on numerous Americans not suspected of any crime. While many commentators express concern about the program’s legality, others argue that the program is an effective method of catching criminals.

Read More...

Posted On Nov - 25 - 2014 Add Comments READ FULL POST

Silk Road 2.0 Takedown Indicates Law Enforcement May Have Developed a Method to Trace Hidden Tor Websites

By Steven Wilfong — Edited by Travis West

The complaint filed against Blake Benthall, the alleged operator of Silk Road 2.0, indicates that the FBI identified a server that was used to host the popular drug market website, despite the fact that the website’s location was hidden by the Tor anonymity software.  Law enforcement may have developed a method of compromising Tor anonymity, a possibility that would prove useful in future operations, but that also raises concerns for legitimate users.

Read More...

Posted On Nov - 19 - 2014 Add Comments READ FULL POST

Court Rules Police May Compel Suspects to Unlock Fingerprint-Protected Smartphones

By Ken Winterbottom – Edited by Yixuan Long

A Virginia state trial court ruled that the police may constitutionally order a suspect to unlock a fingerprint-protected smartphone, but that a password-protected phone falls under the aegis of the Fifth Amendment privilege against self-incrimination.

Read More...

Posted On Nov - 12 - 2014 Add Comments READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
91ea09a6535666e18ca3c56f731f67ef_400x400

Privacy Concerns in

By Sabreena Khalid – Edited by Insue Kim Following scandals earlier ...

free-speech

San Francisco Court

By Jens Frankenreiter – Edited by Henry Thomas S. Louis Martin ...

European union concept, digital illustration.

EU Unitary Patent Sy

By Saukshmya Trichi – Edited by Ashish Bakshi Advocate General’s Opinion ...

computer-typing1

California Sex Offen

By Jesse Goodwin – Edited by Michael Shammas Doe v. Harris, ...

nsa-tracking-phone-records-325x337

Congress Fails to Pa

By Henry Thomas – Edited by Paulius Jurcys USA FREEDOM Act ...