by Julia Bernd | Feb 23, 2015 | Blog, Project News, Resources/How-Tos
Each year, high-school students in the Berkeley Foundation for Opportunities in Information Technology (BFOIT) enrichment program participate in internships at ICSI and UC Berkeley. Last August, interns Alexis Conway and Isha Doshi worked with the Teaching Privacy...
by Itzel Martinez | Feb 16, 2015 | Blog, Privacy Requires Work
The Federal Communications Commission has been working on new rules to regulate the Internet. For the last year, F.C.C. Chairman Tom Wheeler’s goal has been to reach net neutrality, meaning an open Internet. This open Internet order would give the Federal...
by Itzel Martinez | Feb 9, 2015 | Blog, Information Is Valuable, Privacy Requires Work, Sharing Releases Control
Facebook’s new privacy policy was implemented on January 30, 2015. Concerns have been raised in Europe by Johannes Caspar, the privacy regulator in Hamburg, Germany, that this new Facebook privacy policy might breach the German Data Protection Law....
by Itzel Martinez | Feb 5, 2015 | Blog, Information Is Valuable, Privacy Requires Work, Someone Could Listen
President Obama has proposed a $14 billion budget to spend on cybersecurity in fiscal year 2016. Obama stated in his proposal that “No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets or invade the privacy of American...
by Itzel Martinez | Feb 2, 2015 | Blog, Online Is Real, You Can't Escape
With the release of the movie The Interview, Sony Pictures suffered substantially from attacks by hackers, including leakage of internal data from the company and threats of violence against movie theaters who choose to play the movie. Despite the efforts of the group...
Recent Comments