Indian election win threatens biggest biometrics bank – tech – 20 May 2014 – New Scientist, 20 May 2014

Malavika Jayaram, a privacy researcher at Harvard University, says Aadhaar makes people who are vulnerable take responsibility for preventing fraud.”You are shifting the burden of responsibility onto the person who is weakest in the chain, expecting the least sophisticated in the system to make sound technical decisions about when to use biometrics,” she says. “It’s insane.”

via Indian election win threatens biggest biometrics bank – tech – 20 May 2014 – New Scientist.

Crossing Boundaries to Enforce Boundaries | Harvard Law Today, 15 May 2014

Young, along with David Gobaud ’15 and Lindsay Lin’15, is working on “Developing Big Data Analysis Tools,” aka Big Data, one of five DPSI projects that are bringing together students, researchers, and staff from across Harvard University to focus on the challenges and opportunities posed by technology in educational settings. Housed in the Berkman Center for Internet & Society, the initiative is headed by Professor of Practice Urs Gasser LL.M. ’03, and evolved from conversations between Gasser and Dean Martha Minow about the future of education and the role of technology.

via Crossing Boundaries to Enforce Boundaries | Harvard Law Today.

Privacy TBD: In the online space, what is private may depend on who you are and where you live | Harvard Law Today, 15 May 2014

As Professor of Practice Urs Gasser LL.M. ’03 sets up his PowerPoint and students deploy their notebooks and laptops, a riff of music drifts by. The tune soon reveals itself as a jazz version of the Beatles classic “Here, There and Everywhere”—a title that’s evocative of the global subject covered in this seminar, Comparative Online Privacy.

via Privacy TBD: In the online space, what is private may depend on who you are and where you live | Harvard Law Today.

Google EU Ruling: ‘Right To Be Forgotten’ Decision Underscores Differences In US, Europe Data Privacy Laws, 13 May 2014

On Tuesday, the EU essentially said that it agreed with that decision, allowing the case to set a precedent for blocking search engine access to public information while leaving the host untouched. “It’s an incredibly big deal,” Jeff Hermes, director of the Digital Media Law Project at Harvard University, said. “Search engines are still important as an index to the Internet. It’s like if you tucked information into a book in the library and then removed the card catalog, to use a very 20th century analogy.”

via Google EU Ruling: ‘Right To Be Forgotten’ Decision Underscores Differences In US, Europe Data Privacy Laws.

Europeans can now request information about themselves be removed from the web | Public Radio International, 13 May 2014

But Zittrain says the opinion from the court doesn’t clearly state what would be considered content that should be taken down. For example he says, in this case, the court document mentions the name of the plaintiff and clearly states he wanted the removal of information explaining he sold his house to resolve debt issues.

via Europeans can now request information about themselves be removed from the web | Public Radio International.

A canary in the coal mine… and in your Mac | Marketplace.org, 13 May 2014

According to Jonathan Zittrain, Professor of Law at Harvard and co-founder of the Berkman Center for Internet and Society, it’s not only a clever way to let customers know if their information may have been acquired by the NSA, but also a way for the private sector to agitate Government agencies on the issues involved in privacy.

via A canary in the coal mine… and in your Mac | Marketplace.org.

Reinventing the internet: A political protocol to protect the internet, and where to find it — Tech News and Analysis, 7 May 2014

The most level-headed response to the outcry came from Jonathan Zittrain, a computer science and law professor at Harvard, who pointed out that it would be hard for the U.N. or anyone else to exert control over the internet for the simple reason that it’s not really something that can be owned in the first place:

via Reinventing the internet: A political protocol to protect the internet, and where to find it — Tech News and Analysis.