Header graphic for print
Steptoe Cyberblog

Category Archives: Privacy Regulation

Subscribe to Privacy Regulation RSS Feed

Steptoe Cyberlaw Podcast – Interview with Phyllis Schneck

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest this week is Dr. Phyllis Schneck, the Deputy Undersecretary for Cybersecurity for the Department of Homeland Security’s National Protection and Programs Directorate (NPPD).  She and Marc Frey, Senior Director in Steptoe’s DC office and former Chief of Staff at DHS’s Office of Policy Development, discuss the status of cybersecurity legislation and DHS’s highest… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Orin Kerr

Posted in China, Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest this week is Orin Kerr, professor of law at George Washington University and well-known scholar in computer crime law and Internet surveillance.  Orin is our second return guest, and he demonstrates why, opining authoritatively on the future of NSA’s 215 program and the “mosaic” theory of fourth amendment privacy as well as joining… Continue Reading

Inside Europe’s Censorship Machinery

Posted in International, Privacy Regulation, Security Programs & Policies

Three months ago, I tried hacking Google’s implementation of Europe’s “right to be forgotten.”  For those of you who haven’t followed recent developments in censorship, the right to be forgotten is a European requirement that “irrelevant or outdated” information be excluded from searches about individuals.  The doctrine extends even to true information that remains on… Continue Reading

Steptoe Cyberlaw Podcast – Interview with David Hoffman

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

We’re back!  After a much needed hiatus, during which we shared wilderness paths with bison, woke up to wolf cries, and celebrated the value of ibuprofen, the Steptoe Cyberlaw Podcast is back on the net. The hiatus allows us to cover this month in NSA, which is a good thing, because the Snowden News Machine… Continue Reading

As Evidence Mounts, It’s Getting Harder to Defend Edward Snowden

Posted in Cybersecurity and Cyberwar, Data Breach, Privacy Regulation, Security Programs & Policies

The evidence is mounting that Edward Snowden and his journalist allies have helped al Qaeda improve their security against NSA surveillance.  In May, Recorded Future, a predictive analytics web intelligence firm, published a persuasive timeline showing that Snowden’s revelations about NSA’s capabilities were followed quickly by a burst of new, robust encryption tools from al… Continue Reading

Verizon’s Response to Orin Kerr’s Posts on the Microsoft Search Warrant Case

Posted in International, Privacy Regulation, Security Programs & Policies

As our readers and podcast listeners know, Steptoe filed an amicus brief for Verizon Communications Inc. in the case in which Microsoft has moved to vacate a search warrant seeking emails located in Ireland.  The issue in the case is whether a US search warrant can be used to obtain the content of emails stored… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Richard Danzig

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Wow, that was quick. I haven’t even turned on the air conditioning at home yet, and already we’ve done the last podcast of the summer.  The Steptoe Cyberlaw Podcast will go on hiatus for August and return after Labor Day! This week in NSA: The Senate Judiciary Committee, the most anti-NSA of the Senate committees… Continue Reading

A Privacy Law’s “Unintended” But Remarkably Convenient Results

Posted in Privacy Regulation

HIPAA is an arguably well-intentioned privacy law that seems to yield nothing but “unintended” consequences.  I put “unintended” in quotes because the consequences are often remarkably convenient, at least for those with power.  I’m not sure you can call something that convenient “unintended.” The problem has gotten so bad that even National Public Radio and… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Orin Kerr

Posted in China, Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest this week is noted computer law guru Orin Kerr, and the podcast is a deep dive into technology and law. This Week in NSA:  Snowden claims without substantiation that NSA employees are passing naked pix around.  And Greenwald’s venture reports that GCHQ has developed the ability to send spam and to rig web… Continue Reading

Steptoe Cyberlaw Podcast – Interview with David Medine

Posted in Cybersecurity and Cyberwar, Data Breach, International, PCLOB, Privacy Regulation, Security Programs & Policies

Our guest this week is Chairman of the Privacy and Civil Liberties Oversight Board (PCLOB), David Medine. We do a deep dive into the 702 program and the PCLOB’s report recommending several changes to it. Glenn Greenwald’s much-touted “fireworks finale” story on NSA may have fizzled, but this week David and I deliver sparks to… Continue Reading

Steptoe Cyberlaw Podcast – Interview with David Heyman

Posted in Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest this week is David Heyman, who recently completed a tour as DHS’s Assistant Secretary for Policy (my old job). David has had a long and productive career in homeland security, in government, and in the private sector. We take a tour of DHS’s horizon, covering DHS’s impressive progress in cybersecurity implementation, the Quadrennial… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Dmitri Alperovich

Posted in China, Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

This week in NSA: We take a look at the other half of the Lofgren amendment, which prohibits NSA and CIA from asking a company to “alter its product or service to permit electronic surveillance.”  So if Mullah Omar orders a phone from Amazon, the government can’t ask Amazon to put a bug in it… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Ralph Langner

Posted in Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

This week in NSA: The House passes an NDAA amendment to regulate “secondary” searches of 702 data, and the prize for Dumbest NSA Story of the Month Award goes to Andrea Peterson of the Washington Post for exposing NSA’s shocking use of “Skilz points” to encourage its analysts to use new tools to do their… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Paul Rosenzweig

Posted in China, Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

Our guest for the week, Paul Rosenzweig, is as knowledgeable as anyone about cybersecurity and intelligence law.  He blogs on the topics for Lawfare, writes for the Homeland Security Institute, consults for Red Branch Consulting, and lectures for the Great Courses on Audible. So this week we let him comment on the stories of the… Continue Reading

China’s Use of Privacy Law Raises Questions for Privacy Advocates

Posted in China, International, Privacy Regulation

China seems to have found a reliable legal tool for suppressing dissent.  A prominent Chinese human rights lawyer, Pu Zhiqiang, has been arrested after a meeting in a private home to commemorate the 25th anniversary of the killings at Tiananmen Square.  The charge?  “Illegal access to the personal information of citizens,” a crime punishable by… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Congressman Mike Pompeo

Posted in Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

This week’s interview is with Rep. Mike Pompeo, a member of the House Intelligence Committee who joined the House in 2010 after three careers, any one of which would have been enough for an ordinary man.  First in his class in West Point, he left the Army to study law at Harvard, where he made… Continue Reading

The NYT makes the case for surveillance cameras

Posted in Privacy Regulation

The ACLU and EPIC have campaigned long and hard against surveillance cameras in public spaces, and they’ve had considerable success — despite a paucity of actual serious privacy abuses.  So it’s worth remembering that all this privacy theater imposes real costs on crime victims. This story, headlined “After Boy and Girl Are Stabbed, Anger Over… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Ron Deibert

Posted in Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

We begin this week’s podcast with Edward Snowden’s NBC interview and the kerfuffle over his claim to have raised concerns about the agency’s intelligence programs before he launched his campaign of leaks.  That leads us (or me, at least) to a meditation on Snowden’s style of truth-telling, which turns out to be almost indistinguishable from,… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Peter Schaar

Posted in China, Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

Our podcast this week unpacks the European Court of Justice ruling on the right to be forgotten.  We interview Peter Schaar, a proponent of the right to be forgotten and an eminent former data protection chief.  From 2003 to 2013 Peter was the Federal Commissioner for Data Protection and Freedom of Information.  He is currently… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Shane Harris

Posted in China, Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

For the first time, we begin the podcast not with NSA on the defensive, but with breaking news of an American counterattack on Chinese cyberspying – the indictment of several PLA members for breaking into US computers to steal commercial information. Our guest for the day, Shane Harris, is ideally suited to analyze the case…. Continue Reading