TAP Blog

Posts by Chris Hoofnagle
University of California, Berkeley professor Chris Hoofnagle looks beyond the platform-advertiser relationship at Facebook and Google, and examines the developer-platform incentives within these companies.
Berkeley privacy law professor Chris Hoofnagle shares the history of the FTC’s “KidVid” campaign to rein in advertising to children; and he outlines the relevance of the campaign today, forty years after its inception.
Berkeley privacy law scholar Chris Hoofnagle explains how using a “deterrence by denial” strategy has been having surprising results in policing cybercrime.
UC Berkeley law professor Chris Hoofnagle explains how and why platforms, such as Facebook, pay developers with your personal data.
Berkeley Center for Law & Technology's Chris Hoofnagle announces the release of his new book, “Federal Trade Commission Privacy Law and Policy.”
Chris Hoofnagle, Berkeley Center for Law & Technology, discusses the effort of some U.S. technology companies to kill rights of redress for privacy and consumer protection law violations.
Chris Hoofnagle, Berkeley Center for Law & Technology, examines why the marketplace is littered with failed companies that tried to sell privacy-protective services to consumers.
The hype over “big data” masks important public policy discussions, and encourages the release of data without a careful examination of its implications. In an effort to examine the civil rights, human rights, security, and privacy issues that arise from “open data” datasets, The Berkeley Center for Law & Technology and Microsoft have issued a request for proposals.
On the internet, "sponsored by" may mean that the article was written for an advertiser.
Many campuses have decided to outsource email and other services to “cloud” providers. Berkeley has joined in by migrating student and faculty to bMail, operated by Google. In doing so, it has raised some anxiety about privacy and autonomy in communications. In this post, I outline some advantages of our outsourcing to Google, some disadvantages, and how we might improve upon our IT outsourcing strategy, especially for sensitive or especially valuable materials.
Page: 1, 2, 3