New Irish Warrant Case Decision – Again – Points to Need for Congressional Action to Update ECPA

posted by in Data January 27, 2017

The importance of this week’s decision by the Second Circuit to deny rehearing in Microsoft’s Irish warrant case has less to do with the action in court and more to do with what happens next. Specifically, with what happens in Congress. Last July, a panel of the Second Circuit held that a warrant issued by […]

Read More

A Positive Step in the Encryption Debate

posted by in Cybersecurity, Privacy December 21, 2016

The members of the House Encryption Working Group took on a seemingly impossible task this year when they set out to bridge the gap between the two sides of this noisy and difficult debate. That makes the result of their work – a series of balanced findings that summarizes their careful consideration of these issues […]

Read More

It’s Time to Move the Encryption Discussion Forward

posted by in Cybersecurity, Data, Privacy November 15, 2016

The encryption discussion in Washington has been locked in a polarized stalemate for months — with loud voices on distant ends deeply dug in. Encryption is a complex issue that affects a range of global stakeholders, from governments to businesses to individuals. The ideal solution needs to consider all legitimate sides of the argument and […]

Read More

Encryption: Securing Our Data, Securing Our Lives

posted by in Cybersecurity, Data June 1, 2016

Encryption impacts our daily lives from the moment we get up in the morning to the moment we fall asleep. When we log into work from home, use a credit card to pay for lunch, or just text a friend, encryption is keeping our data secure. Encryption is also keeping us safe by protecting critical […]

Read More

New BSA Survey: Organizations Can Combat Cyberattacks by Avoiding Unlicensed Software

Organizations worried by the ever-increasing threat of cyberattacks should start by looking inward. One of the first, critical steps an organization needs to take is to ensure that all of the software running on its own network is legitimate and fully licensed. Doing so matters, as highlighted in Seizing Opportunity Through License Compliance, this year’s […]

Read More

Is It Time to Pop the Champagne for ECPA?

posted by in Cybersecurity, Data, Privacy April 26, 2016

It generally isn’t a good idea to celebrate before a vote in Congress. But it also isn’t generally the case that the House is voting on a measure that is sponsored by nearly three-quarters of its Members. That is the situation this week, with a vote coming on the Email Privacy Act — a bill […]

Read More

A Call for Creative Solutions

posted by in Cybersecurity, Privacy November 24, 2015

The November 13 attacks in Paris were tragic, and our hearts and thoughts are with the people of Paris. We stand ready to work with law enforcement to prevent future such horrific incidents. Such efforts will require creative solutions that benefit public safety as well as online security. There has been a good deal of […]

Read More

Effective Information Sharing Legislation Needed to Combat Cyber Attacks

posted by in Cybersecurity July 22, 2015

It’s not hard today to find news accounts of how America’s digital networks are under siege.  Cyber criminals are at work, hoping to extract valuable data from consumers, businesses, and government organizations and to shut down or disrupt our critical infrastructure. One way to combat these attacks is allowing businesses and the government to share […]

Read More

Accepting Director Comey’s Call for a Public Debate on Encryption

posted by in Cybersecurity, Privacy July 8, 2015

FBI Director James Comey published a column on July 6, 2015, calling for a robust public debate about the benefits and costs of strong encryption that protects users’ privacy and overall network security. I join Director Comey in that call. The law enforcement community has raised legitimate concerns about their ability to access information stored […]

Read More

The State of Cybersecurity in APAC

posted by in Cybersecurity June 30, 2015

News of cyber attacks dominate today’s headlines. No country is safe from malicious cyber actors. In a world where cyber threats are constant, it is important to understand both how governments are addressing cybersecurity challenges and steps they can take to do better. Today, BSA | The Software Alliance released its first Asia-Pacific (APAC) Cybersecurity […]

Read More