Patent Litigation: Slow, Costly, Error-Prone

Man Walking Steps

A few insightful studies of intellectual property abuses and patent infringement defenses have highlighted the role of patent trolls and patent pools. The litigation between patent holders and those accused of infringement is resolved in district courts where large, unproductive process costs and awards eventually hit consumers. Part of these problems seems to be fostered […]

Second Attempt at Privacy and Justice

Man Walking Steps

Senators Hatch, Coons and Heller have introduced the LEADs Act in the Senate. The bill would establish a framework for how the U.S. government can access data stored abroad during the course of a criminal investigation.  Alan Daley’s new piece, published in today’s Daily Caller, discusses why this bill is so important in protects U.S. economic interests abroad.   

Decryption versus Track Record Issues

computer spy

Actions by Facebook, Google and Apple have made it very difficult, perhaps impossible, for law enforcement and NSA to obtain the content of cell-phone calls and Facebook’s WhatsApp messaging. The moves were technically simple, but required a marketing decision that they would gain more in public approval for supporting privacy than they would lose through […]

When Creative Destruction Strikes Near Home

education-header

Each month, the Bureau of Labor Statistics (BLS) reports on new jobs, unemployment and other measures about the labor force.  At least 200,000 new jobs per month are needed to keep pace with labor force growth.  But that paints an incomplete picture.  The quality of jobs created and lost each month matters a lot.  Well-paying […]

ACI Statement on the Upcoming Cybercrime Hearing

credit card 1140x445

On January 27, the House Subcommittee on Commerce, Manufacturing and Trade will host a hearing to discuss solutions to the ever-growing problem of cybercrime. The Committee has recognized the need for a solution that could help alleviate the consequences consumers face in the event of a data breach. Chip and PIN technology is one such […]

Rigidity in Privacy, Transparency and Security

private sign 1140x445

There are persisting frictions among the public and policymakers regarding three privacy orientations: those who rank privacy above security, those who rank transparency of information above privacy, and those who rank security above privacy. These tribal orientations cannot be localized into “no go” neighborhoods, so we cannot “opt out” from the consequences of each orientation. The […]

Should Government and the Private Sector Cooperate In Cybersecurity?

computer spy

The public was offended when NSA coopted RSA’s encryption products and we were disappointed when some social media firms shared their customer’s private data with government, other firms, and law enforcement.  It’s not acceptable for government and industry to cooperate against the public at large, but when we face genuine national security threats, most of […]

Negative Impact of Regulations on Innovation

technology-header

In mobile wireless and Internet markets, consumers deserve the final say on which constructive innovations, new product features and infrastructure should survive. In those markets, consumers notice the rapid pace of change and while they may not use every innovation that comes along, they welcome the steady stream of appealing changes and increased value from […]