PRIVACY + SECURITY BLOG

News, Developments, and Insights

high-tech technology background with eyes on computer display

Article III Groupie Disrobed: Thoughts on Blogging and Anonymity

David Lat Article III Groupie Underneath Their Robes Blog

“Article III Groupie” is the pseudonym for the mysterious author of a wildly popular blog about the federal judiciary, Underneath Their Robes. The blog is a lighthearted and witty discussion of the federal judiciary, chronicling the lives of judges and law clerks. Article III Groupie (or A3G for short) describes herself as an attorney from a Top 5 law school who works at a “large law firm in a major city, where she now toils in obscurity.” She writes: “During her free time, she consoles herself through the overconsumption of luxury goods. Her goal in life is to become a federal judicial diva.” Her identity has long remained shrouded in secrecy.

As she describes her blog:

Continue Reading

FTC: Letting Experian Keep the Spoils

Free Credit Report

Suppose a company engages in an unfair and deceptive trade practice. It makes about $1 billion. The FTC investigates. A settlement is reached for a fine of $1 million and refunds to only some customers — yielding a net penalty of several million dollars — just a fraction of the spoils. That’s deterrence . . . FTC style!

Continue Reading

ChoicePoint: More Than 145,000 Victims?

ChoicePoint Data Breach

ChoicePoint just won’t be outdone. They were, after all, the company that started all the extensive attention on data security breaches. Back in February 2005, ChoicePoint announced that it had improperly sold personal data on about 145,000 people to identity thieves. Pursuant to a California data security breach notice law, ChoicePoint notified the affected individuals in California. Soon afterwards, many states started thinking: Geez, we’d like our citizens to be informed too. They put up a fuss, and ChoicePoint voluntarily agreed to notify all of the 145,000 people it said were affected. Many states subsequently passed data security breach notification laws similar to California’s.

Continue Reading

National Security Letters

National Security Letter - NSL

Did you know that the FBI can issue a letter to an Internet Service Provider or a financial institution demanding that they turn over data on a customer? The letter doesn’t require probable cause. No judge must authorize the letter. The FBI simply issues the letter and gets the information. There’s a gag order, too, preventing the institution receiving the letter from mentioning this fact.

Continue Reading

Hi-Tech Rat Race: Law Enforcement Surveillance and New Technology

Facial Recognition

Brian Bergstein writes in an AP article about the issue of law enforcement surveillance and technology:

With each new advance in communications, the government wants the same level of snooping power that authorities have exercised over phone conversations for a century. Technologists recoil, accusing the government of micromanaging — and potentially limiting — innovation.

Today, this tug of war is playing out over the Federal Communications Commission’s demands that a phone-wiretapping law be extended to voice-over-Internet services and broadband networks.

Opponents are trying to block the ruling on various grounds: that it goes beyond the original scope of the law, that it will force network owners to make complicated changes at their own expense, or that it will have questionable value in improving security.

No matter who wins the battle over this law — the Communications Assistance for Law Enforcement Act, known as CALEA — this probably won’t be the last time authorities raise hackles by seeking a bird’s eye view over the freewheeling information flow created by new technology.

 

Continue Reading

Using Lawsuits to Unmask Anonymous Bloggers

Anonymous Bloggers

An interesting recently-filed lawsuit raises the issue of whether a company can file a lawsuit just to find out the identity of an anonymous blogger in order to fire him.

The case involves an employee of Allegheny Energy Service who posted an anonymous comment to a Yahoo! message board devoted to his company. He made the posting from his home computer. In the post, he attacked the company’s management as well as the company’s diversity program, using a racial slur in the process.

Continue Reading

Free Credit Reports: My Exciting Adventure

Credit Report

Under the federal Fair and Accurate Credit Transactions Act of 2003, the credit reporting agencies must provide a yearly free credit report to individuals who request it. This was one of the benefits given to consumers by the law in return for extending the federal preemption of certain state law regulations.

Continue Reading

Genetic Testing: Further Debate with Richard Epstein

Privacy of Genetic Information

Richard Epstein has posted a reply continuing our debate over whether employers should be able to use genetic testing information to make employment decisions regarding employees. Here are the posts in our debate so far:

1. Solove, IBM vs. NBA: Using Employee Genetic Information

2. Epstein, Two Cheers for Genetic Testing

3. Solove, A Reply to Richard Epstein on Genetic Testing

4. Epstein, A Third Cheer for Genetic Testing

Continue Reading