Skip to main content

Our Work

Our Work

Who Has Your Back? 2015: Protecting Your Data From Government Requests

We live digital lives—from the videos shared on social networks, to location-aware apps on mobile phones, to log-in data for connecting to our email, to our stored documents, to our search history. The personal, the profound, and even the absurd are all transcribed into data packets, whizzing through the fiber-optic...

Special 404: What You Won't Find in the U.S. Special 301 Report

Every year, the United States publishes a report on countries that, in the opinion of the U.S. Trade Representative (USTR), fail to give “adequate and effective” protection to U.S. holders of intellectual property rights. This Special 301 Report names and shames nations that do not meet a vague and impossibly...

Defend Innovation: How to Fix Our Broken Patent System

The "Defend Innovation" whitepaper is the culmination of two-and-a-half years worth of research, drawing from the stories, expertise, and ideas of more than 16,500 people who agree that the current patent system is broken. Split into two parts, the report covers both the challenges facing innovators under the current patent...

Unintended Consequences - 16 Years Under the DMCA

The “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. The law was ostensibly intended to stop copyright infringers from defeating anti-piracy protections added to copyrighted works. In practice, the anti-circumvention provisions have been used...

Open Wi-Fi and Copyright: A Primer for Network Operators

Every day cafes, airports, libraries, laundromats, schools and individuals operate “open” Wi-Fi routers, sharing their connection with neighbors and passers-by at no charge. The City of San Francisco recently deployed a free, public Wi-Fi network along a three-mile stretch of Market Street. Sometimes people use those connections for unauthorized activities...

Who Has Your Back? 2014: Protecting Your Data From Government Requests

We entrust our most sensitive, private, and important information to technology companies like Google, Facebook, and Verizon. Collectively, these companies are privy to the conversations, photos, social connections, and location data of almost everyone online. The choices these companies make affect the privacy of every one of their users. So...

Who Has Your Back? 2013

When you use the Internet, you entrust your conversations, thoughts, experiences, locations, photos, and more to companies like Google, AT&T and Facebook. But what do these companies do when the government demands your private information? Do they stand with you? Do they let you know what’s going on? In this...

When the Government Comes Knocking, Who Has Your Back? 2012

When you use the Internet, you entrust your online conversations, thoughts, experiences, locations, photos, and more to companies like Google, AT&T and Facebook. But what happens when the government demands that these companies to hand over your private information? Will the company stand with you? Will it tell you that...

Know Your Rights!

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. This is sensitive data that's worth protecting from prying eyes - including those of the government. The Fourth Amendment to the Constitution protects you from unreasonable government searches and seizures...

Pages

Back to top

JavaScript license information