The FTC Explores the "App-Gap"

We've already blogged generally about the Federal Trade Commission's "Exploring Privacy" roundtable, and asked you to sign onto the ACLU of Northern California's petition demanding more transparency about when and why companies share our information with the government and others. In this blog post we're going to focus on the privacy implications of social networking sites and the ways that third parties can access users' information without their knowledge or explicit consent.

By Nicole A. Ozer

Placeholder image

The FTC's "Watershed Moment In Privacy" - Don't Let Your Privacy Wash Away

On Thursday, the Federal Trade Commission (FTC) will be in California for the second of its "Exploring Privacy" roundtables. The ACLU will be there sounding the alarm about privacy implications of social networking and cloud computing services. (Check back here for blog posts drilling down into each of these services, with specific recommendations for how the FTC can improve privacy in these areas.) We want to make sure the FTC knows that the time is now to address growing online privacy issues.

By Nicole A. Ozer

Placeholder image

In Through the Law Enforcement Backdoor?

Computerworld is reporting that the hacking attack on Google (which prompted it to tell the Chinese government it would no longer censor on its behalf) exploited a system the company set up to help the government access its users' data:

By Nicole A. Ozer

Placeholder image

The Hard Numbers Behind Laptop Searches at the Border

Back in July 2008, Customs and Border Protection (CBP) issued a new policy regarding searches of documents and electronic devices at the border. CBP asserts it has the right to conduct these searches of any traveler – citizens and noncitizen alike "absent individualized suspicion," – meaning no suspicion of wrongdoing is even required to conduct a search. Despite an update to the policy in August 2009, everything from the photos of your kids on your camera phone to your company's trade secrets on your laptop, is fair game.

By Nicole A. Ozer

Placeholder image

Is Privacy on Facebook So Last Decade?

Over the past several years, there have been two reliable things about Facebook: it has often stated that privacy was important to the company – two years ago, privacy was "the vector around which Facebook operates" – and its actions have often contradicted that.

By Nicole A. Ozer

Placeholder image

Government Should Protect Civil Liberties While Protecting Safety

On January 5, President Obama addressed airport security in remarks responding to the Christmas Day attack on a plane headed for Detroit.

By Nicole A. Ozer

Placeholder image

ACLU Asks Congress for Protection From Behavioral Marketing Data Collection

The ACLU recently submitted a statement about behavioral advertising to the Joint Subcommittee Hearing of the House Energy & Commerce Committee. The statement explained that wide collection of personal information of a consumer "draws a personal portrait unprecedented in scope and detail" and asked Congress to pass laws that protect us from having this information accessed and used against us.

By Nicole A. Ozer

Placeholder image

Checking Your Privacy at the Border

With the holiday season underway, travelers are bracing themselves for the countless hassles that come with modern travel. Most have adapted to waiting on long security lines, taking off their shoes and parting with their bottled water. But international travelers often don't realize that they might also have to endure border officials viewing their Web histories. And their financial records. And their vacation photos.

By Nicole A. Ozer

Placeholder image

Facebook About-Faces on Friends Lists

Responding to public outcry over Wednesday's new privacy settings, Facebook backtracked today, announcing that it would allow users to hide their list of friends from both visitors to their profile and search results. However, you've still lost the ability to control this information: you can't select specific groups who can see your friends lists (it's either displayed or it isn't) and you can't prevent applications from accessing it no matter what.

By Nicole A. Ozer

Placeholder image