Concerned about Artificial Intelligence? Microsoft chat robot goes nuts
A chat bot released by Microsoft this Wednesday, was taken down on Thursday because her self-learning capabilities had turned her...
Blog
Remember that NYC Taxi data set that allowed you to see who visited a gentlemen’s clubs and which celebrity took a taxi where? Reddit user uluman now seems to have found a way to distinguish Muslim taxi drivers from the set. More…
big data, deanonymization, open data, privacy, sensitive data
Blog
I’ve been meaning to blog about the Privacy Roundtable for a while and now with the New Year and all I’m finally getting around to it. The Privacy Roundtable is – similarly to the iii – an interdisciplinary group of PhD students (there are eight of us to be precise: Lea Aeschlimann, Rehana Harasgama, Flavius Kehr, Christoph Lutz, Veselina Milanova, Severina Müller, Pepe Strathoff & Aurelia Tamò) from the University of St.Gallen who meet more or less regularly to talk about privacy issues of our day and age.
Interdisciplinary, Law, privacy, Psychology, Sociology
Blog
Two weeks ago the Article 29 Working Party (WP29) issued Guidelines on the Implementation of Google Spain judgment.
Let’s have a look at how often the WP29 elaborates on the delicate balance between oblivion, erasure or forgetting and the individuals’ right to freedom of expression. More…
Data Protection, Freedom of Expression, privacy, right to be forgotten, Right to Remember
Blog
(Disclaimer: I first wanted to name this post “Applying dynamics of urban sociology to the Internet”… I think “The Ghettoization of Facebook” is much sexier, though)
Can we analyze the digital sphere with the same concepts that have proved helpful in describing urban developments in the “real world”? Yes, we can! Today, I want to apply two such concepts to the Internet: gentrification and ghettoization.
More…
Blog
Everyone is familiar with this scenario: you want to browse onto a particular website but instead a message pops up warning you that the security certificate of the site is no longer valid. What do you do now? Continue?
More…
Certificate Authorities, Digital certificates, privacy, security
Blog
A nightmare from the Internet of Things has arrived just in time for Christmas: images from thousands of internet-connected cameras from all over the world are publicly available, online, and ready for anyone to easily view. In September, MailOnline reported about an unspecified website that allows ‘home hackers’ to spy on people through internet-connected cameras. About a week ago, Motherboard‘s Joseph Cox also reported on the website without explicitly mentioning the website’s URL in his article. However, by linking to a WHOIS-record of the website’s domain name, Cox gave away the website’s URL. are now reporting about the website and mention the website’s URL: insecam.com.
From pictures of backyards to schoolyards, detention centres to daycare centers, and even living rooms, you can watch them all on insecam.com. After browsing the website for a while, I saw many pictures of recognizable people having a coffee or working at their office. Below are some less-intrusive examples that hopefully still illustrate the magnitude of the privacy problems at issue.
Blog
Fame is often a subjective inquiry. A famous person to one person can be a stranger to another. Someone considered famous in one country can be an average citizen in another. But Google, while implementing the Court of Justice of the European Union’s (CJEU) ruling in Google, Inc. v. Mario Costeja González regarding the right to be forgotten, has attempted to make an objective determination of who the public considers famous. More…
Court of Justice, EU, Fame, Famous people, Google, R2bf, right to be forgotten, Spain
Blog
Not all of U.S. President Barack Obama’s campaign promises have come to fruition. Remember Obama’s 2007 pledge to lead the most transparent administration in history? Seven years later, excessive prosecutions and threats under the Espionage Act, pressures on reporter James Risen to reveal his confidential sources, and resistance to Freedom of Information Act requests, among other measures, have proven that Obama has not lived up to his campaign rhetoric concerning transparency and press freedoms. More…
Amazon, Fast lanes, FCC, internet, Net neutrality, Netflix, Obama, Open Internet, Tom Wheeler
Blog
Damian George and I recently published an article on the right to be forgotten respectively the right of oblivion and erasure in the Journal of Intellectual Property, Information Technology and Electronic Commerce Law (JIPITEC). In this publication we discuss different cases handled by French, German and Italian courts and attempt to understand how the different legal backgrounds have led to a diverse implementation of the European data protection principles into national legislation.
We draw different insights from our comparative case law analysis and would like to share some of them here. More…
Data Protection, ECJ C-131/21, Erasure, Notice and Take Down, Oblivion, right to be forgotten
Blog
As the usage of Apps and other web-based services grows on a daily basis, using data as a currency has been the talk of the town – or more the globe. According to IBM which was quoted in an article written in 2013 by three consultants working for Deloitte: “Ninety percent of the data in the world today was created in the last two years” and “Between now and 2020, the global volume of digital data is expected to multiply another 40 times or more”. More…
Blog
By the end of this year the Internet may kill you, and it won’t be due to heart failure from binge-watching Netflix shows. has stated that 2014 will witness the first ‘cyber murder,’ or a murder committed through a hacked internet-connected device. As the Internet of Things grows, and items such as houses, cars, and health devices become “smart” and increasingly connected by the Internet, flaws in cyber security and the ever-present ingenuity of cyber hackers has become a real threat to personal security.
cyber-security, Europol, hacking, Homeland, internet, privacy
Blog
It is October 5, and as I type this article, the entire online gadget world is craving for one of the most awaited products to launch in 2015. Yes, I am referring to the Apple Watch, pitched during the Apple even in Cupertino on September 9 earlier this year. Apple spared no marketing gimmicks in its attempts to draw global attention to next generation ‘wearable technology’. For instance, watching the Apple Watch video on their website makes me think of something Salman Khan once said in one of his Youtube videos: “If this doesn’t blow your mind, then you have no emotion.” More…
Blog
Drones are in the news. Or more accurately, their pilots and the people annoyed by them. The French Local has a story about an Israeli tourist flying a drone over the Notre Dame Cathedral in Paris:
“The 24-year-old tourist had launched the drone, equipped with a Go-Pro camera, above the famous Gothic church on Wednesday morning, and sent it hovering over the historic Hotel Dieu hospital and a police station, a police source told AFP.”
The French police arrested him and made him spend the night in jail. The Israeli tourist was also given a hefty fine for “operating an aircraft non-compliant with safety laws.”
Another drone-story takes place not in a public space, but in the privacy of someone’s backyard. CBS Philadelphia reports about a New Jersey man being accused of shooting down his neighbor’s drone.
More…
Blog
Blog
The CJEU’s decision in the Case of Google Spain, Google v. AEPD has caused a lot of discussion around the globe (See both Anna’s and Stefan’s blog about the decision). Search Engines, especially Google, have called for guidance on how to decide whether information connected to a person’s name is
“inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes of the processing at issue carried out by the operator of the search engines”
and thus has to be deleted. More…
Google, Google Spain, privacy, right to be forgotten
Blog
The first celebrity photo hack has already received a great deal of attention, and the second hack has gotten only slightly less. Much has already been thoughtfully written about the first hack, the celebrity women exposed by the hack (forbes), and the legal, security, and privacy implications (Apple states no iCloud breach). Stefan might be poised to speak with the most authority about the legal defense of copyright, and I urge anyone curious about current research into Revenge Porn and copyright in the United States to check out the work of Levendowski on this topic (see here).
More…
Blog
A dataset released by the New York City Taxi and Limousine Commission is causing quite some uproar in the privacy community. The set contains details about every yellow cab ride in New York in 2013, including the pickup and drop off times, locations, fare and tip amounts, as well as anonymized (hashed) versions of the taxi’s license and medallion numbers. The dataset was not released voluntarily by the Commission, but was acquired through a Freedom of Information request.