Government Information

Earl Gregg Swem Library

Facial Recognition Technology: Commercial Uses, Privacy Issues, and Applicable Federal Law

Categories: Laws/Regulations,Privacy,Science/Technology

Examines uses of facial recognition technology, privacy issues, proposed best practices and industry privacy policies, and applicable privacy protections under federal law.  From the Government Accountability Office


Stored Communications Act: Reform of the Electronic Communications Privacy Act (ECPA)

Categories: Privacy,Telecommunications/Internet

Provides background information on the purpose of the act, which provides privacy protection for electronic communications but also allows for government access to such communications, and reviews reform proposals to strengthen privacy provisions. From the Congressional Research Service, posted by the Federation of American Scientists


Domestic Drones and Privacy: A Primer

Categories: Laws/Regulations,Privacy,Science/Technology

Examines the potential privacy issues relating to domestic drone use, including what privacy means in the context of aerial surveillance and what entity should be responsible for regulating drones and privacy.  Also covers current UAS uses, the privacy interests affected by these uses, and potential approaches to UAS privacy regulation.  From the Congressional Research Service, posted by the Federation of American Scientists


Cybersecurity and Information Sharing: Legal Challenges and Solutions

Categories: Homeland Security,Laws/Regulations,Privacy,Property Rights,Telecommunications/Internet,Terrorism

In view of frequent cyberattacks on government and private web sites, experts have urged greater public-private cooperation and sharing of cyber-threat intelligence.  This report examines various legal issues that confront such information  sharing, such as privacy and tort laws and intellectual property concerns.  From the Congressional Research Service, posted by the Federation of American Scientists


The Darknet and Online Anonymity

Categories: Great Britain,Privacy,Science/Technology,Telecommunications/Internet

Technologies that allow Internet users to be anonymous help citizens protect their security but also facilitate organized crime such as the Silk Road drug market.  This report discusses the challenge of preventing such crimes without compromising other uses of anonymity technology.  From the Parliamentary Office of Science and Technology


Anthem Data Breach: How Safe is Health Information Under HIPAA?

Examines whether the security standards required by the Health Insurance Portability and Accountability Act are sufficient to protect sensitive patient health information in the wake of the Anthem incident.  From the Congressional Research Service, posted by the Federation of American Scientists


Recommendations Assessment Report

Categories: Civil/Human Rights,Govt Secrecy,Privacy,Spying/Intelligence,Telecommunications/Internet

22 recommendations directed at the executive branch, Congress, and the Foreign Intelligence Surveillance Court on the implementation of provisions of the PATRIOT Act, specifically the Section 215 Telephone Records and the Section 702 Surveillance programs.  Scolds the administration for not ending the NSA’s telephone records program.  From the Privacy and Civil Liberties Oversight Board


Executive Order: Promoting Private Sector Cybersecurity Information Sharing

Categories: Civil/Human Rights,Headlines,Homeland Security,Privacy,Science/Technology,Telecommunications/Internet

Promotes the voluntary creation of private/public Information Sharing and Analysis Organizations to counter cybersecurity threats. Also calls for the government to select a nongovernmental organization to serve as the Standards Organization which will identify a set of common cybersecurity standards.  From the White House


Next Page »