Any real answer leads to the obligations of the designers of devices and systems. When one of the emerging “driverless cars” collides or harms passengers, who is at fault? When a current-day extortionist software freezes your laptop files, who is at fault? The designers and those who deploy the devices are at fault. But, what […]
A few insightful studies of intellectual property abuses and patent infringement defenses have highlighted the role of patent trolls and patent pools. The litigation between patent holders and those accused of infringement is resolved in district courts where large, unproductive process costs and awards eventually hit consumers. Part of these problems seems to be fostered […]
Senators Hatch, Coons and Heller have introduced the LEADs Act in the Senate. The bill would establish a framework for how the U.S. government can access data stored abroad during the course of a criminal investigation. Alan Daley’s new piece, published in today’s Daily Caller, discusses why this bill is so important in protects U.S. economic interests abroad.
Actions by Facebook, Google and Apple have made it very difficult, perhaps impossible, for law enforcement and NSA to obtain the content of cell-phone calls and Facebook’s WhatsApp messaging. The moves were technically simple, but required a marketing decision that they would gain more in public approval for supporting privacy than they would lose through […]
Each month, the Bureau of Labor Statistics (BLS) reports on new jobs, unemployment and other measures about the labor force. At least 200,000 new jobs per month are needed to keep pace with labor force growth. But that paints an incomplete picture. The quality of jobs created and lost each month matters a lot. Well-paying […]
On January 27, the House Subcommittee on Commerce, Manufacturing and Trade will host a hearing to discuss solutions to the ever-growing problem of cybercrime. The Committee has recognized the need for a solution that could help alleviate the consequences consumers face in the event of a data breach. Chip and PIN technology is one such […]
There are persisting frictions among the public and policymakers regarding three privacy orientations: those who rank privacy above security, those who rank transparency of information above privacy, and those who rank security above privacy. These tribal orientations cannot be localized into “no go” neighborhoods, so we cannot “opt out” from the consequences of each orientation. The […]