CDT hopes the administration champions this approach, and as the public interest privacy legislation principles demonstrate, there are many organizations that stand ready to work with the NTIA and Congress to propose concrete language to these ends.
On Friday, November 9, 2018, EFF submitted a letter in response to the U.S. Department of Commerce's request for comment on "Developing the Administration's Approach to Consumer Privacy," urging the agency to consider any future policy proposals in a users' rights framework.
The report raises questions about whether the FBI is fully complying with PPD-28 as well as whether it’s seeking to carve out certain surveillance activities from the directive’s modest requirements:
It fits into a narrative building for a long time about the existential threat to US national security posed by Chinese telecom companies like Huawei and ZTE.
Risk and outcome-based approaches have been successfully used in cybersecurity, and can be enforced in a way that balances the needs of organizations to be agile in developing new products, services, and business models with the need to provide privacy protections to their customers, while also ensuring clarity in legal compliance.
Customers might want to consider the fact that the US government can do as it pleases – with your data whether it is stored in the cloud, or sitting inside your own company walls.
If signed, the order would represent a significant escalation of Trump’s antipathy toward Google, Facebook, and other social media companies, whom he has publicly accused of silencing conservative voices and news sources online.“Social Media is totally discriminating against Republican/Conservative voices," Trump said on Twitter in August.
Foremost among these generals were Keith Alexander, who became National Security Agency (NSA) chief and James Clapper, who had climbed the ranks of the secret military spying community to become director of national intelligence.
WASHINGTON — The Trump administration and its closest intelligence partners have quietly warned technology firms that they will demand “lawful access” to all encrypted emails, text messages and voice communications, threatening to compel compliance if the private companies refuse to voluntarily provide the information to the governments.
“We are committed to being part of the process and a constructive part of the process,” said Dean Garfield, president of a leading tech industry lobbying group, the Information Technology Industry Council, which is working on proposals for the federal law.