
Privacy Engineering Research and the GDPR: A Trans-Atlantic Initiative
With this event, we aim to determine the relevant state of the art in privacy engineering; in particular, we will focus on those areas where the “art” needs to be developed further. The goal of this trans-Atlantic initiative is to identify open research and development tasks, which are needed to make the full achievement of the GDPR’s ambitions possible.

Location Controls in iOS 11 Highlight the Role of Platforms
[…] just a notification, it’s also feature—it makes it easy to return to the app after leaving it to take a call or do something else on the phone. For these reasons, industry sources are noting that most location-based mobile marketing are unlikely to be affected. We agree, although it’s worth noting that there are […]

Privacy Scholarship Research Reporter: Issue 2, July 2017 – Artificial Intelligence and Machine Learning: The Privacy Challenge
[…] problems of three basic types: (1) data privacy problems; (2) boundary management problems; and (3) social/relational problems. Technological design can ward off, if not fully prevent, a number of these harms. We propose five principles for home robots and privacy design: data minimization, purpose specifications, use limitations, honest anthropomorphism, and dynamic feedback and participation. […]

Honoring Jessica Rich
[…] reports on data brokers, the Internet of Things, Cross Device Tracking, Big Data, mobile security, and kids’ apps. Prior to being named Director, Jessica served in a number of senior roles at the FTC, including Deputy Director of the Bureau, Associate Director of the Division of Financial Practices, and Acting Associate Director of the […]

WannaCry About Backdoors
[…] a back door in, that back door’s for everybody, for good guys and bad guys.” Strong encryption is permitted even under the 1994 U.S. law that requires phone companies to build their networks to respond to court orders. As the ACLU’s Chris Soghoian has emphasized, that law “explicitly protected the rights of companies that […]

Consumer Genetic Testing: Beginning to Assess Privacy Practices
[…] information without explicit permission, the ability to delete their information, and promises to only use the data for the expected purposes. FPF has begun discussions with a number of consumer genetics companies and hopes to share best practices guidance in the upcoming months. But before we begin, there are some useful lessons that FPF […]

Homomorphic Encryption Signals the Future for Socially Valuable Research on Private Data
[…] of a fully homomorphic cryptosystem have been dancing in cryptographers’ heads for thirty years. I never expected to see one. It will be years before a sufficient number of cryptographers examine the algorithm that we can have any confidence that the scheme is secure, but — practicality be damned — this is an amazing […]

"Your Phone May Be Tracking Your Every Move; Here's How to Stop It"
During the International Association of Privacy Professional’s Global Privacy Summit 2017, FPF’s CEO, Jules Polonetsky, took a moment to speak with NBC 4 Los Angeles about the privacy implications of granting apps permission to track your location.

The Top 10: Student Privacy News (April – May 2017)
The Future of Privacy Forum tracks student privacy news very closely, and shares relevant news stories with our newsletter subscribers.* Approximately every month, we post “The Top 10,” a blog with our top student privacy stories.

Privacy Scholarship Research Reporter: Issue 1, May 2017 – Algorithms: Privacy Risk and Accountability
[…] as the Shapley value, previously applied to measure influence in voting. Further, since transparency reports could compromise privacy, we explore the transparency-privacy tradeoff and prove that a number of useful transparency reports can be made differentially private with very little addition of noise. Our empirical validation with standard machine learning algorithms demonstrates that QII […]