A woman who argued that providing a password to authorities was a violation of her Fifth Amendment rights has filed an appeal in her case and is now also citing the Fourth Amendment.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
A federal court has agreed to an accelerated briefing schedule in a privacy case that could affect the rollout of Google's new privacy policies.
The Electronic Privacy Information Center is suing the Federal Trade Commission in federal court to compel the agency to stop Google from rolling out its new privacy policies.
The government's National Strategy for Trusted Identities in Cyberspace takes its most important step to date by releasing recommendations for turning the effort over to the private sector.
The Mozilla Foundation is inviting all email providers to adopt its BrowserID technology and begin validating their users' log-ins to Web sites that support the protocol.
Six trends will dominate the identity landscape in 2012, according to Gartner. Three are new and three are holdovers from 2011. The trends challenge not only the way IT thinks about identity and how to manage it, but in the technologies and standards available to implement it.
The effort to create a national identity infrastructure is starting to take shape as $10 million is ear-marked to fund pilot programs that may well form the foundation of the National Strategy for Trusted Identities in Cyberspace (NSTIC).
The Electronic Privacy Information Center has filed a Freedom of Information request to see Google's mandated privacy report to the Federal Trade Commission, which is part of April settlement with the agency.
Facebook has drawn the attention from the IETF with a new proprietary extension it developed for an emerging authentication protocol. The extension alters the way user permissions are set for long-life access tokens.