PRIVACY + SECURITY BLOG

News, Developments, and Insights

Does Anything Really Disappear from the Internet?

I just posted about the Wayback Machine and that got me wondering whether anything really disappears from the Internet when it is deleted. Certainly, a ton gets archived in the Wayback Machine as well as in Google cache and in RSS readers. Of course, if something appears on the Internet, somebody could see it and copy it […]

Article III Groupie Disrobed: Thoughts on Blogging and Anonymity

“Article III Groupie” is the pseudonym for the mysterious author of a wildly popular blog about the federal judiciary, Underneath Their Robes. The blog is a lighthearted and witty discussion of the federal judiciary, chronicling the lives of judges and law clerks. Article III Groupie (or A3G for short) describes herself as an attorney from a Top 5 […]

FTC: Letting Experian Keep the Spoils

Suppose a company engages in an unfair and deceptive trade practice. It makes about $1 billion. The FTC investigates. A settlement is reached for a fine of $1 million and refunds to only some customers — yielding a net penalty of several million dollars — just a fraction of the spoils. That’s deterrence . . […]

ChoicePoint: More Than 145,000 Victims?

ChoicePoint just won’t be outdone. They were, after all, the company that started all the extensive attention on data security breaches. Back in February 2005, ChoicePoint announced that it had improperly sold personal data on about 145,000 people to identity thieves. Pursuant to a California data security breach notice law, ChoicePoint notified the affected individuals […]

Hi-Tech Rat Race: Law Enforcement Surveillance and New Technology

Brian Bergstein writes in an AP article about the issue of law enforcement surveillance and technology: With each new advance in communications, the government wants the same level of snooping power that authorities have exercised over phone conversations for a century. Technologists recoil, accusing the government of micromanaging — and potentially limiting — innovation. Today, this tug […]

National Security Letters

Did you know that the FBI can issue a letter to an Internet Service Provider or a financial institution demanding that they turn over data on a customer? The letter doesn’t require probable cause. No judge must authorize the letter. The FBI simply issues the letter and gets the information. There’s a gag order, too, […]

Using Lawsuits to Unmask Anonymous Bloggers

An interesting recently-filed lawsuit raises the issue of whether a company can file a lawsuit just to find out the identity of an anonymous blogger in order to fire him. The case involves an employee of Allegheny Energy Service who posted an anonymous comment to a Yahoo! message board devoted to his company. He made the posting […]