Information technology lets people learn about one another on a scale previously unimaginable. Information in the wrong hands can be harmful. Scholars on this site consider problems of privacy, fraud, identity, and security posed by the digital age.
"I’m always nervous about any service provider that wants my password. That’s fundamentally insecure." — Lorrie Cranor, Professor of Computer Science, Carnegie Mellon University
"In the US, the legal options are small but potent if (big if) one has the funds to hire an attorney and one can find the creator. Defamation and intentional infliction of emotional distress are potential claims." — Danielle Citron, Professor of Law, University of Maryland
"Since the company has one of the largest name-face databases in the world and the power to infer significant things about people whom it identifies, it’s especially important that it craft and execute appropriate policies for face recognition. All users should be able to access the same easy-to-use setting for preventing Facebook from recognizing them in photos and videos, and for deleting their templates." — Evan Selinger, Professor of Philosophy, Rochester Institute of Technology
This article reports the plea bargain for Christopher Cleary, a man arrested for a history of terrorizing women he met over the internet. The plea deal with fits a pattern of lenient punishments common for cyberstalking and online harassment cases. Cyber law expert Danielle Citron, University of Maryland, is quoted.
For most people, that effort — to change how they search, how they buy stuff, how they connect with others and absorb news — is just too great. "There’s a sense that the fight to protect your data is unwinnable. You’d have to learn about other tools, it’s costly in time, and it might not even help, because your data is already out there." — Alessandro Acquisti, Professor of Information Technology, Carnegie Mellon University
"A billion isn't what it used to be. The problem with Facebook writing a check is that it’s the cost of doing business and not a deterrent." — William Kovacic, Professor of Law, George Washington University
"Our choice architectures are just completely muddled and clouded by the little tricks companies play to get you to consent, even though you may not want to." — Paul Ohm, Professor of Law, Georgetown University
"The fact is that if you want to target political advertisements precisely to move voters who have expressed interest in particular issues or share certain interests, there is an ideal tool to use that does not rely on pseudoscience. It’s called Facebook." — Siva Vaidhyanathan, Professor of Media Studies, University of Virginia
"Filing false info with the FTC and other regulators can be criminally prosecuted. Under other statutes, there is sometimes a specific standard articulated for personal liability. A great deal will have to do with Zuckerberg’s personal direction of decisions." — Chris Hoofnagle, Professor of Law, University of California, Berkeley
"When you look at the ways that WhatsApp has been abused and hijacked in India and Brazil, it’s clear that it’s a powerful engine for spreading dangerous propaganda. It’s also clear that there’s not much Facebook can do about that, because all the messages are encrypted. Facebook can’t measure the problem or filter for the problem." — Siva Vaidhyanathan, Professor of Media Studies, University of Virginia
Select an Issue
TAP Academics
View all academics with expertise in Privacy and Security
TAP Blog
Santa Clara internet law scholar Eric Goldman writes about California AB2408, proposed legislation intended to address social media platforms that are addictive to children.
August 5, 2022
View all blog posts about Privacy and Security
Upcoming Events
4th Annual Symposium on Applications of Contextual Integrity
September 22, 2022,
11th Annual ASU-Arkfeld eDiscovery, Law and Technology Conference
October 11, 2022, Phoenix, Arizona
View all upcoming events about Privacy and Security
Fact Sheets
There are a number of privacy issues related to how online companies collect, store, use and share personally identifiable information; and how consumers are informed about what is done with their information online.
View all fact sheets about Privacy and Security
Featured Article
Increasingly, employers use applications and wearable technologies to monitor employees at work. Monitoring systems raise new legal issues related to privacy rights, discrimination, and worker safety.
August 14, 2019
View all articles on Privacy and Security