Governments are increasingly seeking to leverage consumer geolocation and other mobile device data to assist with fighting the spread of COVID-19, as cases continue to mount globally. Location data can be of significant value to public health models, such as models that determine areas where social-distancing measures are needed or test whether such measures are […]
The White House
President Obama Announces Cybersecurity National Action Plan
On February 9, 2016, President Barack Obama unveiled his new Cybersecurity National Action Plan (CNAP), a comprehensive approach to confront cybersecurity challenges. As articulated in the CNAP Fact Sheet released by the White House, CNAP takes “near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public […]
FTC Updates IdentityTheft.gov Website
The Federal Trade Commission (FTC) has announced updates to the IdentityTheft.gov website aimed at making the site more useful to victims of identity theft. The changes will enable consumers to quickly file complaints and develop a personalized recovery plan after answering a number of questions on the site. “Our hope is that this is going […]
White House Releases Report on Big Data and Differential Pricing
The White House Council of Economic Advisors recently released a report titled “Big Data and Differential Pricing.” “Differential pricing” refers to the practice of charging different prices to different groups of people for the same (or similar) products or services. The White House report explores the uses of big data for differential pricing, including the […]
NIST releases final Cybersecurity Framework
The National Institute of Standards and Technology (“NIST”) has released the final version of the much-anticipated Framework for Improving Critical Infrastructure Cybersecurity (the “Framework”). The Framework was developed by NIST at the direction of President Obama’s February 12, 2013, Executive Order 13636, “Improving Critical Infrastructure Cybersecurity” (the “Executive Order”). The Framework largely retains the structure […]