A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Privacy’ Category

Privacy Concerns in the Sharing Economy: The Case of Uber 

By Sabreena Khalid – Edited by Insue Kim

Recent revelations about Uber’s disconcerting use of personal user information have exposed the numerous weaknesses in Uber’s Privacy Policy. The lack of regulation in the area, coupled with the sensitive nature of personal information gathered by Uber, makes the issue one requiring immediate attention of policy makers.

Read More...

Posted On Dec - 17 - 2014 Comments Off READ FULL POST

Congress Fails to Pass Act Limiting Collection of Phone Metadata

By Henry Thomas – Edited by Paulius Jurcys

The Senate failed to reach closure and bring the USA FREEDOM Act to a vote. The Act would have extended provisions of the Patriot Act, but would have sharply curtailed the executive’s authority to collect phone conversation metadata. While the bill had broad popular support, the vote failed largely along party lines, passing the onus of drafting and approving a new bill onto the next congressional session.

Read More...

Posted On Dec - 1 - 2014 Comments Off READ FULL POST

U.S. Marshals Service Uses Airborne “Dirtboxes” to Collect Cell Phone Data

By Katherine Kwong – Edited by Mengyi Wang

The U.S. government has been using “dirtboxes” to collect cell phone data. The program, designed for criminal suspect surveillance, is accused of also collecting cell phone data on numerous Americans not suspected of any crime. While many commentators express concern about the program’s legality, others argue that the program is an effective method of catching criminals.

Read More...

Posted On Nov - 25 - 2014 Comments Off READ FULL POST

Silk Road 2.0 Takedown Indicates Law Enforcement May Have Developed a Method to Trace Hidden Tor Websites

By Steven Wilfong — Edited by Travis West

The complaint filed against Blake Benthall, the alleged operator of Silk Road 2.0, indicates that the FBI identified a server that was used to host the popular drug market website, despite the fact that the website’s location was hidden by the Tor anonymity software.  Law enforcement may have developed a method of compromising Tor anonymity, a possibility that would prove useful in future operations, but that also raises concerns for legitimate users.

Read More...

Posted On Nov - 19 - 2014 Comments Off READ FULL POST

Court Rules Police May Compel Suspects to Unlock Fingerprint-Protected Smartphones

By Ken Winterbottom – Edited by Yixuan Long

A Virginia state trial court ruled that the police may constitutionally order a suspect to unlock a fingerprint-protected smartphone, but that a password-protected phone falls under the aegis of the Fifth Amendment privilege against self-incrimination.

Read More...

Posted On Nov - 12 - 2014 Comments Off READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Unknown

Federal Circuit Flas

By Ken Winterbottom J.P. Morgan Appeal Dismissed for Lack of Jurisdiction In ...

Photo By: darkuncle - CC BY 2.0

Pass the Patented Pe

  [caption id="attachment_3359" align="alignleft" width="150"] Photo By: darkuncle - CC BY ...

th

Stephen Hawking™:

By Amanda Liverzani – Edited by Saukshmya Trichi Application Stephen Hawking is ...

Unknown

Flash Digest: News i

By Jeanne Jeong European Regulators and Watchdogs Increase Investigation of “Technology ...

1000

Australian Parliamen

By Jenny Choi – Edited by Katherine Kwong Telecommunications (Interception and ...