Aug 312013
 
 August 31, 2013  Court, Surveillance

I’m still waiting for Orin Kerr’s promised blog post about a federal court ruling in Kansas this week, but Somini Sengupta has this in the New York Times:

Can law enforcement obtain a search warrant to dig through a vast trove of e-mails, instant messages and chat logs because they have reasonable suspicion that the owners of those accounts robbed computer equipment from a private company?

No, according to a ruling by a federal judge in Kansas earlier this week.

The case is significant in that it limits what constitutes unreasonable search and seizure, as protected by the Fourth Amendment, in the age of big data. The magistrate judge, David J. Waxse, denied the government’s search warrant requests on the grounds that it has to be particular and“reasonable in nature of breadth.”

Read more in the NY Times. The case is In the matter of applications for search warrants for  information associated with  target email accounts/Skype  account.

Aug 312013
 
 August 31, 2013  Laws

Mali Friedman writes:

Last week the California Senate unanimously approved a bill requiring that operators of commercial websites and online services that collect personal information disclose how they respond to “do-not-track” signals from web browsers and whether they allow third parties to engage in online tracking.  The legislation, which was introduced by Assemblyman Al Muratsuchi, has been sponsored by CA Attorney General Kamala Harris.

Read more on InsidePrivacy.

Aug 312013
 
 August 31, 2013  Business, Laws, Non-U.S., Online

June Wei writes:

In June, we reported on China’s draft Provisions on the Protection of the Personal Information of Telecommunications (the “Personal Information Provisions”), which will regulate the collection and use of personal information by providers of telecommunications, Internet and information services within China.  The Personal Information Provisions will come into force on September 1, affecting a wide range of consumer-facing websites, including corporate sites, product information sites, and social media pages.

Read more on Chronicle of Data Protection.

Aug 312013
 
 August 31, 2013  Online

Derrick Harris writes:

… In order to highlight what’s possible, a group of researchers from the International Computer Science Institute has released a new tool called “Ready or Not” that lets you enter any Twitter or Instagram username and see every place that user has been and what they’ve tweeted while there. It also includes a chart that shows how frequently users are at certain locations at certain times of day. The thought of this information getting into the hands of the wrong person — or, if you’re just into having some semblance of a private life, the thought that it exists — is a pretty troubling proposition.

The Ready or Not tool, ISCI researcher Gerald Friedland acknowledged, certainly engages in a bit of fear-mongering; but that’s the point

Read more on GigaOm.

Related:  See the Teaching Privacy web site.