Issues

Privacy and Security

Information technology lets people learn about one another on a scale previously unimaginable. Information in the wrong hands can be harmful. Scholars on this site consider problems of privacy, fraud, identity, and security posed by the digital age.

Back to main Privacy and Security page

TAP Blog

Professor Nicholas Economides, Stern School of Business at NYU, and his co-author Ioannis Lianos, University College London and Hellenic Competition Commission, examine the collection of personal information from online platforms, such as Google and Facebook, from an antitrust perspective.
Take a look at the top viewed blog posts from this past year that have been written by TAP scholars.
George Washington University law professor Daniel Solove provides his list of notable books on privacy and security from 2019.
Harvard Business School professor Shane Greenstein provides a tongue-in-cheek look at notable information technology events and people from 2019.
Professor Daniel Solove discusses strategies for sustaining compliance with the GDPR, CCPA, and forthcoming regulations.
Professor Ed Felten and his research colleagues at Princeton’s Center for Information Technology Policy identify issues with data breach notifications that make it possible for “scammers to create fake phishing emails, potentially victimizing users twice.”
Professor Eric Goldman, Santa Clara University, provides a look into the four amicus briefs filed in support of a panel review of the Ninth Circuit’s ruling in Enigma v. Malwarebytes. This is a Section 230(c)(2) opinion that creates significant problems for anti-spyware/spam/virus vendors.
In “Algorithmic Impact Assessments under the GDPR: Producing Multi-layered Explanations”, Colorado Law Professor Margot Kaminski and Gianclaudio Malgieri, Vrije Universiteit Brussel, explore how a Data Protection Impact Assessment (DPIA) links the two faces of the GDPR’s approach to algorithmic accountability: individual rights and systemic collaborative governance.
Contextual integrity (CI) was first proposed by Helen Nissenbaum in 2004 as a new framework for reasoning about privacy. Discussing how CI can inform policy and system design, and how the theory can be refined, operationalized, and applied to emerging technologies was the focus of the 2nd Symposium on Applications of Contextual Integrity.


Numerous colleagues have paid tribute to Professor Ian Kerr over the past month. TAP presents a few of the tributes that express how deeply his friendship, mentoring, scholarship, and zest for life are missed.

Results 11 - 20 of 399
|< < 1 2 3 4 5 > >|

Upcoming Events

[Online] 2020 Privacy Law Scholars Conference

June 4, 2020, See event website

PrivacyCon 2020

July 21, 2020, Washington, DC

9th Annual BCLT Privacy Law Forum: Silicon Valley

October 9, 2020, East Palo Alto, CA

Fact Sheets

Social Networking

Social networking websites are places on the Internet where people can connect with those who share their interests. Additionally, they can function as economic “platforms” that serve different groups of many users, including consumers, advertisers, game developers, and others. 

Quote

The Privacy Issues of Letting Big Tech Tackle the Pandemic

"Those who champion the use of smartphone tracking often ignore that the countries that successfully curbed their pandemics used smartphone apps alongside rigorous testing and aggressive physical-distancing measures." — Ryan Calo, Co-director, University of Washington Tech Policy Lab
M. Ryan Calo
The Globe and Mail
April 23, 2020

Featured Article

Free Speech is a Triangle

Increasingly, nation-states censor speakers by co-opting the expertise of internet-based businesses like Google. Defending free speech means resisting this type of censorship, and protecting users from manipulative uses of data.

By: Jack M. Balkin