Profile cover photo
Profile photo
Jennifer Granick
1,607 followers
1,607 followers
About
Posts

Post has attachment

Post has attachment
My essay on online censorship, "How the law caught up with the internet" is now available - http://t.co/1GUXaEVY … via @indexcensorship

Join me and the Nolan Law Firm for this Yes on 34 Fundraiser on September 27th in Palo Alto. This could be the year we end the death penalty in CA - https://docs.google.com/open?id=0B2nNlp3KiRuKd015NnlUVFBsSkU

Post has attachment

Post has attachment
My thoughts on the ick that is today's US v. Skinner case: 6th Circuit Cell Tracking Case Travels Down the Wrong Road http://cyberlaw.stanford.edu/blog/2012/08/sixth-circuit-cell-tracking-case-travels-down-wrong-road#.UCsknnDKN1U.twitter

Post has attachment
My thoughts on the recent travesty that is the Al-Haramain opinion. 

Post has attachment
My latest blog post questions why we are extraditing a man for activities the Seventh Circuit just held lawful in Flava Works v. Gunter.  http://cyberlaw.stanford.edu/blog/2012/08/tvshack-extradition-case-tumbling-seventh-circuit-holds-linkingstreaming-lawful

Post has attachment
The revised Cybersecurity Act sponsored by Lieberman and Collins needs work.  It's provisions expand the government's ability to conduct network surveillance and interfere with the egalitarian flow of cybersecurity information.  The proposal should be amended to further narrow and clarify the circumstances under which otherwise illegal wiretapping and surveillance is allowed, to narrow the definition of "countermeasures" to only defensive actions that shield one's own machines, and to encourage declassification and publication of cyberthreat information. Click to read more.

Post has attachment
Cybersecurity Act Take 2 is here. What should we be looking for? http://cyberlaw.stanford.edu/blog/2012/07/new-cybersecurity-bill-available

As Congress reviews this or any other proposed bill, it should ask whether the law would improve widespread public disclosure of the kinds of information computer professionals actually use to improve network security.  Congress should ask whether our current laws interfere with such information sharing in any way, and if so, tweak just those provisions.  If the bill includes the words "notwithstanding any other law" and we don't know exactly why those laws are a problem, the bill should be rejected.  Finally, Congress should be aware of the ways in which the government currently uses cyberthreat information to favor some private partners or to bargain for the cooperation of corporate victims in unlawful extrajudicial surveillance. To avoid these abuses, the bill should encourage government to share cyberthreat information on an equal and non-discriminatory basis, except in special, narrow circumstances.

Post has attachment
What do you think?: Should federal cybersecurity standards be voluntary? | Alaska Dispatch: http://www.alaskadispatch.com/article/question-should-federal-cybersecurity-standards-be-voluntary#.UAdCf6BrgrE.twitter
Wait while more posts are being loaded