Commentary

[How to] Be Confident Storing Information in the Cloud

Over the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is only increasing as organizations try to manage the data growth by moving it to the cloud. It’s clear that storage administrators must regain control of information to reduce costs and recovery times while complying with regulatory compliance standards, including […]

March 29, 2011 · 0 comments · Commentary

Google Books Decision: “The Privacy Concerns are Real”

A federal district court in New York today issued a long-awaited ruling in the Google Books case, Authors Guild v. Google, rejecting the proposed settlement between the parties. EFF participated in the case as counsel to a collection of authors and publishers, including Michael Chabon, Jonathan Lethem and Cory Doctorow, who objected to the settlement based on concerns about reader […]

March 23, 2011 · 0 comments · Commentary

An Introduction to the Federated Social Network

Lately, EFF’s work to protect rights and liberties in the online world has focused rather heavily on social networking sites and their policies. The logic is borne out by the numbers — Facebook and Twitter combined claim hundreds of millions of worldwide users, so advocating for stronger privacy and less censorship from these kinds of websites will mean a better […]

March 22, 2011 · 0 comments · Commentary

Tracking Protection Lists: A privacy enhancing technology that complements Do Not Track

Yesterday, Microsoft released version 9 of Internet Explorer, which includes two significant new privacy features: Tracking Protection Lists (TPLs) and a Do Not Track (DNT) header that allows users to request that websites not track them. We’ve written about the virtues of the Do Not Track header previously. In this post we’ll look more closely at privacy blacklists, a category […]

March 17, 2011 · 0 comments · Commentary

HHS Should Require the Encryption of Portable Devices

Many companies use encryption on their portable devices, but the continuing parade of health data breaches demonstrates that too many organizations have yet to do the same. The U.S. Dept. of Health and Human Services (HHS) should consider revising the Security Rule to outright require encryption for portable devices containing the protected health information of 500 or more patients. Setting […]

March 16, 2011 · 0 comments · Commentary

The Open Source trials: hanging in the legal balance of copyright and copyleft

For those meddling in open source software affairs, compliance with licenses is a very hot topic. In the last 2 years we have witnessed the licensing FUD (Fear, Uncertainty & Doubt) giving way to legal clarity with more and more relevant cases proving the acceptance of open source licenses by legal systems around the world. The secrets of Copyright – […]

March 16, 2011 · 0 comments · Commentary