Privacy

Privacy Icon

Privacy

Topic Resources

Published: 
Thursday, September 1, 2011
Our colleague Harvey Grossman from Illinois was in Seattle yesterday to present the ACLU’s arguments at a federal appeals court hearing seeking to hold telecoms accountable for aiding the National Security Agency in its illegal spying program.  Here’s the ACLU of Illinois press release explaining the lawsuit and why it matters. 
Published: 
Friday, August 26, 2011
The Washington Supreme Court issued a great and unanimous ruling for disabled students this Thursday in a case (Dowler v. Clover Park School District)  in which the ACLU-WA submitted a friend-of-the-court brief.  The facts in the case were horrendous, and the federal Individuals with Disabilities Education Act (IDEA) was being used to stop the students from getting relief. 
Published: 
Friday, August 19, 2011
Too often, user privacy is an afterthought in the design of computer software and online services.  For companies, the costs in lost consumer confidence, fines, and corrective measures can be substantial. Everyday users pay a price as well, and for victims of domestic violence, political protesters, whistleblowers, and others whose safety and livelihood could hinge on their privacy, those costs can be devastating.
News Release, Published: 
Monday, August 8, 2011
The ACLU –WA and other privacy advocates have announced that Gibberbot, a secure instant messaging and chat app, is the winner of the 2011 Develop for Privacy Challenge. The Challenge co-sponsors made the announcement in a celebratory event at the DEFCON security conference.
News Release, Published: 
Wednesday, August 3, 2011

The ACLU-WA is seeking to learn when, why and how local law enforcement agencies are using cellphone location data to track Americans.  We’ve started with public records requests today to the cities of Bellevue, Tacoma, Yakima, and Spokane.

Published: 
Wednesday, May 4, 2011
There are some people who claim to never forget a face.  Now, what if that person was actually a government computer using advanced facial recognition technology?  Say Cheese!  Your picture has now been reduced to data and is being cross-referenced with databases across the world that can identify your face from the Internet before you’ve even finished smiling! 
Published: 
Thursday, February 10, 2011
Mozilla, the makers of the FireFox web browser, and Google have recently announced plans to incorporate “Do Not Track” features into their browsers.  What this means is that users are finally afforded a simple opportunity to opt out of having their Internet activities tracked by marketers.   While it is great to see these companies finally start to take consumer’s privacy seriously, these are by no means the only tools available to consumers. We’ve compiled a list of free or mostly free tools that are to install, either as an add-on to your current browser or as stand-alone software.  We’ve also included tools that you can use to privatize you mobile computing experience, regardless of whether it is an iPhone, Blackberry, Android, or Windows Phone 7 device.  
News Release, Published: 
Wednesday, February 9, 2011

The final settlement of a lawsuit in which the ACLU intervened will protect the privacy of what customers read, view, and listen to via their purchases on Amazon.com.

 

Published: 
Friday, February 4, 2011
    With all their convenience, smartphones can also collect and share vast amounts of data that can paint a detailed picture about someone’s life: your current location, where you have been, who you know, what you search for online, and more. Without strong privacy protections, smartphones and other mobile devices can pose a real threat to your privacy.
Published: 
Thursday, February 3, 2011
The Electronic Frontier Foundation (EFF) recently released a report on Patterns of Misconduct:  FBI Intelligence Violations from 2001 – 2008 that details the gross number of violations made during FBI investigations. Through a Freedom of Information request, EFF received nearly 2,500 pages of documents that include FBI reports to the Intelligence Oversight Board. Its analysis has revealed three categories of violations that occur with the most frequency. 

Pages