Information technology lets people learn about one another on a scale previously unimaginable. Information in the wrong hands can be harmful. Scholars on this site consider problems of privacy, fraud, identity, and security posed by the digital age.
“Technologies have become cheaper and more powerful. And more and more of us today have publicly available images of ourselves and our faces online. The opportunities for surveillance have become commonplace and nearly ubiquitous.” — name, position, institution
“Companies have tracked employee phone and computer use for years, but these apps “take employee surveillance to a new level.” — Lorrie Faith Cranor, Professor of Engineering & Public Policy, Carnegie Mellon University
“We have nowadays protocols, which allow for certain data to be verified, and used, without compromising individual's identity” — Alessandro Acquisti, Professor of Information Technology and Public Policy, Carnegie Mellon University
“I think that it is high time that we have national privacy legislation that would reach consumer deceiving and unfair practices by companies around privacy.” — Ryan Calo, Professor of Law, University of Washington
“This is such a terrifying assault on intimate privacy. It incentivizes spying and exposure of women and girls and their intimate relationships and reproductive life that is unfathomably troubling.” — Danielle Citron, Professor of Law, University of Virginia
“The net result of the new Texas law will be to chill all speech, online and off.” — Eric Goldman, Director of the High Tech Law Institute, Santa Clara University
“Using the human body for discriminating among people is something that we should not do.” — Joseph Turow, Professor of Media Systems & Industries, University of Pennsylvania
“Consider, too, the discrimination that can take place if voice profilers follow some scientists’ claims that it is possible to use an individual’s vocalizations to tell the person’s height, weight, race, gender, and health.” — Joseph Turow, Professor of Media Systems, Annenberg School for Communication
“If the proposals are passed, said Tene, it will create a “vast regulatory ecosystem.” — Omer Tene, Vice President, Chief Knowledge Officer, IAPP
“In this changed regulatory setting, there is a market opportunity for Tim Berners-Lee's firm and others to offer individuals better ways to control their data.” — Peter Swire, Law and Ethics Professor , Georgia Tech
Select an Issue
TAP Academics
View all academics with expertise in Privacy and Security
TAP Blog
Professors Daniel Solove and Woodrow Hartzog present some key quotes from their new book, BREACHED! Why Data Security Law Fails and How to Improve It (Oxford University Press, 2022).
May 20, 2022
View all blog posts about Privacy and Security
Upcoming Events
Conversations on the Datafied State - Part Three: Race Surveillance, Resistance
May 25, 2022,
15th Annual Privacy Law Scholars Conference
June 2, 2022, Boston MA
11th Annual ASU-Arkfeld eDiscovery, Law and Technology Conference
October 11, 2022, Phoenix, Arizona
View all upcoming events about Privacy and Security
Fact Sheets
There are a number of privacy issues related to how online companies collect, store, use and share personally identifiable information; and how consumers are informed about what is done with their information online.
View all fact sheets about Privacy and Security
Featured Article
Some legal norms direct organizations to limit use of data, but others compel use of data to benefit the public. Data collectors may serve as information fiduciaries, obligated to act in users’ interests.
View all articles on Privacy and Security