Woman pleading Fifth in password case loses appeal
A federal court denies a woman's appeal in a case where she said turning over her password to decrypt files was a violation of her Fifth Amendment rights.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
A federal court denies a woman's appeal in a case where she said turning over her password to decrypt files was a violation of her Fifth Amendment rights.
A privacy group replies to the Federal Trade Commission's request to dismiss a lawsuit seeking a court ruling to compel the federal agency to enforce a consent order levied against Google as part of a privacy case settlement.
Google defends its forthcoming privacy policy changes in a report to the FTC saying that no new data sharing will take place. One privacy agency says Google did not answer all the questions it was required to address.
A woman who argued that providing a password to authorities was a violation of her Fifth Amendment rights has filed an appeal in her case and is now also citing the Fourth Amendment.
A federal court has agreed to an accelerated briefing schedule in a privacy case that could affect the rollout of Google's new privacy policies.
The Electronic Privacy Information Center is suing the Federal Trade Commission in federal court to compel the agency to stop Google from rolling out its new privacy policies.
The government's National Strategy for Trusted Identities in Cyberspace takes its most important step to date by releasing recommendations for turning the effort over to the private sector.
The Mozilla Foundation is inviting all email providers to adopt its BrowserID technology and begin validating their users' log-ins to Web sites that support the protocol.
Google doesn't have a lot of patience for European regulators who asked the search giant to "pause" the roll out of its new privacy policy, set to launch March 1, so they can explore "possible consequences."
Six trends will dominate the identity landscape in 2012, according to Gartner. Three are new and three are holdovers from 2011. The trends challenge not only the way IT thinks about identity and how to manage it, but in the technologies and standards available to implement it.
The effort to create a national identity infrastructure is starting to take shape as $10 million is ear-marked to fund pilot programs that may well form the foundation of the National Strategy for Trusted Identities in Cyberspace (NSTIC).
The Electronic Privacy Information Center has filed a Freedom of Information request to see Google's mandated privacy report to the Federal Trade Commission, which is part of April settlement with the agency.
Facebook has drawn the attention from the IETF with a new proprietary extension it developed for an emerging authentication protocol. The extension alters the way user permissions are set for long-life access tokens.
The digital age is launching an assault on privacy as we've known it. As social sites collect more and more data how will attitudes toward privacy change. And what can be done from a self-regulation, legal and end-user stand point to put more control back into the hands of consumers.
The Mozilla Foundation is finally testing its BrowserID authentication system, but a missing part of the architecture used to validate a user's credentials is a big gap the Foundation must address.
Security
Enterprise Software
Security
Seven ways identity, access management will change in the enterprise
Security
It's not about what Obama says, it's what enterprises must do
Security