In an effort to be more transparent and participatory governments are making more data publicly available in machine-readable formats and under open licenses, but such noble aims are not immune to privacy issues, says a paper published June 18 in Future Internet, a Switzerland-based scholarly journal.
"Unlike passwords, fingerprints cannot be changed. If hackers get hold of a digital copy of your fingerprint, they could use it to impersonate you for the rest of your life, particularly as more and more technologies start relying on fingerprint authentication," his letter says.
The House Intelligence Committee approved the USA Freedom Act May 8, setting the stage for a vote on the House floor.
The bill "unequivocally ends bulk collection," said its sponsor, Rep. Jim Sensenbrenner (R-Wisc.), today during markup.
Police don't need a warrant to look through the papers and photographs that individuals have in their possession at the time of arrest. "I'm not sure that the expansion of volume increases the invasion of privacy," argued Edward DuMont, California's solicitor general. "The digital format should not make a difference."
Global Internet stakeholders are anticipating more accountability and broader participation in Internet governance once the Internet Corporation for Assigned Names and Numbers transitions from U.S. control.
Enforcement actions by the Federal Trade Commission have laid a foundation for establishment of data stewardship standards controlling cloud services that involve processing personal data, say two academics.
Application programming interfaces can allow third-party developers to build apps and tools that interact with government data and forms. The Education Department says it's interested both in read-only APIs, which would let tools push out information, and read-write APIs that would let users complete forms through third-party tools.
Sharing of cyber threat information by the Homeland Security Department with the private sector presents some modest privacy risks, says the departmental privacy office.
GAITHERSBURG, Md. – As the privacy field seeks greater precision in a bid to make technical implementation of privacy controls a possibility, it should be cautious about the metrics it adopts, warns a computer scientist.