PRIVACY + SECURITY BLOG

News, Developments, and Insights

high-tech technology background with eyes on computer display

The Future of the FTC on Privacy and Security

Future of the FTC

Co-authored by Professor Woodrow Hartzog

The Federal Trade Commission is the most important federal agency regulating privacy and security. Its actions and guidance play a significant role in setting the privacy agenda for the entire country. With the Trump Administration about to take control, and three of the five Commissioner seats open, including the Chairperson, a lot could change at the FTC. But dramatic change is not common at the agency. What will likely happen with the FTC’s privacy and security enforcement over the next four years?

Continue Reading

Free Download: The Future of Reputation: Gossip, Rumor, and Privacy on the Internet

 

Future of Reputation: Gossip, Rumor and Privacy on the Internet

 

I am now offering the full text of my book The Future of Reputation:  Gossip, Rumor, and Privacy on the Internet (Yale University Press 2007) online for FREE download.

Continue Reading

The Digital Person: Technology and Privacy in the Information Age

 

Digital Person: Technology and Privacy in the Information Age

 

I am now offering the full text of my book The Digital Person:  Technology and Privacy in the Information Age (NYU Press 2004) online for FREE download.

Continue Reading

The Funniest Hacker Stock Photos 3.0

Hacker Santa

It’s time for a third installment of the funniest hacker stock photos.  Because I create information security awareness training (and HIPAA security training too), I’m always in the hunt for hacker photos.   There are so many absurd ones that I can make enough Funniest Hacker Stock Photo posts to keep pace with Disney in making new Star Wars movies!

If you’re interested in the previous posts in this series see:
The Funniest Hacker Stock Photos 2.0
The Funniest Hacker Stock Photos 1.0

So without further ado, here are this year’s pictures:

Hacker Stock Photo #1

Funniest Hacker Stock Photo - TeachPrivacy Security Awareness Training

This hacker hacks the Amish way — without the use of technology or electricity.   Who needs a computer when a good old magnifying glass will suffice?  The key to this technique is to be very sneaky.  For seasoned hackers who steadfastly believe in doing things the old-fashioned way, this is how it is done!   As this hacker says: “Yes, grandson, we had to walk six miles in the snow and hack with magnifying glasses . . . you young folks have it so easy these days!”

Hacker Stock Photo #2

Funniest Hacker Stock Photo - TeachPrivacy Security Awareness Training

Why use just one magnifying glass when you can use two?  Magnifying glasses are really important to read tiny text on computer screens.  Figuring out how to enlarge the font in Windows can be tricky, and good hackers figure out “hacks” to make things faster and easier.

Hacker Stock Photo #3

Funniest Hacker Stock Photos -- TeachPrivacy Information Security Awareness Training

I’m not entirely sure what this guy is doing, but I presume that he’s so good of a hacker than he can hack with the screen facing in the wrong direction.  The only problem is that there’s nothing on his computer screen — I think he needs to stop smiling and start working a bit harder.

Hacker Stock Photo #4

Funniest Hacker Stock Photos

In an earlier edition of this series, I commented extensively on hacker gloves.  In this edition, it’s time to turn to the masks hackers wear.  I’ve always wondered why so many hackers wear masks.  Isn’t a good hacker supposed to be hard to trace?  After extensive research, I have learned that hackers wear masks because when they hack from halfway across the world and try to conceal their tracks, they might somehow mess up and accidentally expose their faces from their webcams.   Or, maybe it’s just a fashion statement.  I still have more research to do about this very important question — I’m just waiting for some funding to support this important research.

Regarding the mask above, it’s part of a new trend.  Ordinary hackers wear ninja masks, but that’s starting to become a bit passe among hacker fashion experts.  Trend leaders are wearing much more elaborate masks these days.

Continue Reading

Notable Privacy and Security Books 2016

Notable Privacy Security Books 2016 - TeachPrivacy 01

Here are some notable books on privacy and security from 2016. To see a more comprehensive list of nonfiction works about privacy and security, Professor Paul Schwartz and I maintain a resource page on Nonfiction Privacy + Security Books.

Continue Reading

When Do Data Breaches Cause Harm?

 

Harm has become the key issue in data breach cases. During the past 20 years, there have been hundreds of lawsuits over data breaches. In many cases, the plaintiffs have evidence to establish that reasonable care wasn’t used to protect their data. But the cases have often been dismissed because courts conclude that the plaintiffs have not suffered harm as a result of the breach. Some courts are beginning to recognize harm, leading to significant inconsistency and uncertainty in this body of law.

Continue Reading

Hacking Cartoon: All Too Easy

Cartoon Hacker Quits - TeachPrivacy Security Awareness Training

Hacking is easy.  My latest cartoon is based on the fact that many hacking attacks involve rather simple and common tactics.  Why try the hard stuff when the easy stuff works so well?  All it takes is for one person to fall for a social engineering trick, and the hackers can break in.

Continue Reading

Black Mirror: A Powerful Look at the Dark Side of Privacy, Security, and Technology

Black Mirror Review

In a series of posts, I have written about some of my favorite media regarding privacy and security: TV shows, movies, and novels. When I wrote about TV shows, a number of people recommended the show Black Mirror. I have now seen all the episodes thus far, and I am happily adding it to the list. Black Mirror is essential watching in the canon for anyone interested in privacy, security, technology, and the future.

Continue Reading

Cartoon on HIPAA Training

HIPAA Training Cartoon - Train without the pain

This cartoon depicts the way many people perceive HIPAA training.  But it doesn’t have to be this way. When most people hear HIPAA training they prepare themselves to slog through a boring lecture filled with tedious legalese.   Many have been subjected to hours of training that is overly technical, not useful for their jobs and not even close to being memorable.  I designed my HIPAA training to be different.  I believe that training should be fun and engaging.  It should have personality.  I avoid the wordy and needless filler material and focus on the key concrete things that people must know and do.

Continue Reading

HIPAA Cartoon on Social Media Use

HIPAA Cartoon Social Media

Here’s a cartoon on HIPAA and social media use to jump start your week.  You can’t think enough about HIPAA these days.  HIPAA audits are back, and OCR is having a vigorous enforcement year this year, something I plan to post about soon.

Continue Reading