(Image: Shutterstock)

An effort to block or delay changes to Rule 41 of the Federal Rules of Criminal Procedure failed to pass the Senate floor, causing the changes to the rule to go into effect on Dec. 1. The changes will allow law enforcement to obtain warrants to search computers in an unknown location and to search any device that the hacker has broken into, potentially granting access to multiple privately owned computers with one warrant. […]

(Image: Shutterstock)

Edward Snowden, the NSA contractor responsible for leaking information about the U.S. government’s mass surveillance program in 2013, spoke about the impact that President-elect Donald Trump could have on online privacy: “What we need to start thinking about now is not how we defend against a President-elect Trump, but how we defend the rights of everyone everywhere.”






[…]

(Photo: Shutterstock)

Yahoo last year produced a software program that would search customer emails for information specified by U.S. intelligence officials, according to a report by Reuters. Rep. Ted Lieu, D-Calif., condemned such actions, calling them “Big Brother on steroids.”






[…]

(Photo: Shutterstock)

The Children’s Online Privacy Protection Act , a rule passed in 1998 dictating that parents must grant consent before allowing their children under 13 to access certain websites, must adapt as technology develops, the FTC said.






[…]

(Image: Shutterstock)
(Photo: Shutterstock)
(Image: Shutterstock)

Members of Congress are working to pass the Kelsey Smith Act, which would give law enforcement access to phone location data in some emergency situations, despite claims from privacy groups that the law could be abused.






[…]

(Photo: Shutterstock)

Due to the breadth and depth of cyberattacks and breaches in the Federal government, most especially the Office of Personnel Management, agencies should be implementing a policy of zero trust when it comes to who is accessing their data, according to Rep. Jason Chaffetz, R-Utah. His committee released a report titled “The OPM Data Breach: How the Government Jeopardized Our National Security for More than a Generation.”






[…]

(Illustration: Shutterstock)
(Image: Shutterstock)
1 2 3 4