background preloader

Chilling Effects Clearinghouse

Chilling Effects Clearinghouse
March 26, 2014 by Chilling Effects StaffFor those of you who are following the ongoing controversy surrounding Twitter in Turkey, Chilling Effects is pleased to be able to host two new documents recently received by Twitter from various aspects of Turkish law enforcement and government. [Update 2013-03-26] A Turkish court has issued a temporary injunction on Wednesday ordering access to Twitter restored until it can deliver its full verdict on the ban. A joint project of the Electronic Frontier Foundation and Harvard, Stanford, Berkeley, University of San Francisco, University of Maine, George Washington School of Law, and Santa Clara University School of Law clinics. Do you know your online rights? Have you received a letter asking you to remove information from a Web site or to stop engaging in an activity? Are you concerned about liability for information that someone else posted to your online forum?

http://www.chillingeffects.org/

Related:  NeWeb Privacy

Internet Censorship - law & policy around the world Last Updated: 28 March 2002 This report contains information on government policy and/or laws regarding Internet censorship in various countries around the world. The information was compiled by EFA in March 2002 in response to a request from the Chair of a NSW Parliamentary Committee inquiring into a NSW Bill intended to censor the Internet (for background, see the Introduction section below). Contents: Introduction This report contains information on government policy and/or laws regarding Internet censorship in various countries around the world.

Consumer Reports WebWatch: The leader in investigative reporting on credibility and trust online Consumer Reports Web Watch was, until 2009, the Internet integrity division of Consumer Reports. The project was funded by grants from the Pew Charitable Trusts, the John S. and James L. Knight Foundation, and the Open Society Institute. We assisted Consumer Reports’ editorial division in evaluating the credibility of Web sites, we investigated Web sites on behalf of consumers, and we advocated for consumer-focused Internet policy and governance.

Wendy’s Blog: Legal Tags Law enforcement demands to domain name registrars were a recurring theme of the 42d ICANN public meeting, concluded last week in Dakar. The Governmental Advisory Committee (GAC) took every opportunity at its public meetings with GNSO and Board, and in its Communique to express dismay, disappointment, and demands for urgent action to “reduce the risk of criminal abuse of the domain name system.” This conversation about domain name abuse benefits from a multi-stakeholder environment, where it can include domain registrars, registrants, and Internet users, along with law enforcement representatives.

OpenID OpenID is an open standard and decentralized authentication protocol. Promoted by the non-profit OpenID Foundation, it allows users to be authenticated by co-operating sites (known as Relying Parties or RP) using a third party service, eliminating the need for webmasters to provide their own ad hoc login systems, and allowing users to login to multiple unrelated websites without having to have a separate identity and password for each.[1] Users create accounts by selecting an OpenID identity provider, and then use those accounts to sign onto any website which accepts OpenID authentication. The OpenID protocol does not rely on a central authority to authenticate a user's identity. Moreover, neither services nor the OpenID standard may mandate a specific means by which to authenticate users, allowing for approaches ranging from the common (such as passwords) to the novel (such as smart cards or biometrics).

Have You Been Writing Your Own Poetry? - Download Our Author's Guide At FriesenPress, we respect your privacy. Any and all personal information that we collect is strictly used for the purposes of conducting business with you. Under no circumstances will we ever sell or rent your personal information to any third parties. What information do you typically collect?

CIRT.net Nikto is sponsored by Netsparker, a dead accurate and easy to use web application security scanner. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Never Make a Promise You Can't Keep- Especially in Your Privacy Policy : Privacy Law Blog Expect the unexpected from your Web site privacy policy. In a handful of cases, including two which were recently decided, companies have been thwarted in various, unexpected ways by the commitments made in their online privacy policies. Are your intellectual property litigators reading your privacy policy? In FenF, LLC v. Healio Health, Inc., No. 5:08-CV-404 (N.D. OH July 8, 2010), the court held that a provision from a settlement agreement entered into by FenF, LLC (“FenF”), the plaintiff, and Healio Health, Inc.

Identity management system An identity management system refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity management. Additional terms are used synonymously with "identity management system" including: Access governance systemIdentity and access management systemEntitlement management systemUser provisioning system Identity management (IdM) describes the management of individual identities, their authentication, authorization, roles, and privileges [1] within or across system and enterprise boundaries[1] with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks.[2]

Anonymouse.org AnonWWW Many mice surf the web under the illusion that their actions are private and anonymous. Unfortunately, this is not the way it is. Every time you visit a site for a piece of cheese, you leave a calling card that reveals where you are coming from, what kind of computer you use, and other details. And many cats keep logs of all your visits, so that they can catch you!This service allows you to surf the web without revealing any personal information.It is fast, it is easy, and it is free!

The Orwell Project: Hasan Elahi’s Anti-Terrorism Art Nearly a decade after Mohammad Gulab and his fellow villagers rescued and protected wounded Navy SEAL Marcus Luttrell, they remain Taliban targets—but they’ve never regretted their kindness. Nearly eight-and-a-half years after Mohammad Gulab and his fellow villagers harbored and saved the life of a gravely wounded U.S. Navy SEAL, they say they are still proud of their courageous action and would do it again in spite of the disappointments and troubles that have followed. In the face of point-blank Taliban threats to overrun the small village of Sabray in remote Kunar Province, along the porous and mountainous frontier with Pakistan, the villagers bravely protected, gave first aid to, fed, and clothed Marcus Luttrell, the wounded Special Warfare Operator, the only survivor of a four-man SEAL patrol. The Taliban have made no secret that Gulab, his family and other villagers who assisted Luttrell remain marked men.

Related: