Data Privacy

EU Court Adviser: Privacy Activist Cannot File Class Action Against Facebook Ireland

EU Court Adviser: Privacy Activist Cannot File Class Action Against Facebook Ireland

Last Tuesday, EU Advocate General Michal Bobek said that privacy activist Max Schrems cannot file a class action suit against Facebook Ireland in an Austrian court. He is, however, entitled to sue the company in his own country only on his behalf. Bobek added that consumers would just choose the country where the court would most likely be in their favor, if the suit is to continue as a class action. Schrems is alleging that Facebook had violated privacy rules and is demanding $576 in damages for each of the 25,000 signatories in his lawsuit. Source: Reuters

Google Cracks Down on Apps That Abuse Accessibility Services

Google Cracks Down on Apps That Abuse Accessibility Services

Google recently warned developers that apps which use accessibility services outside of its intended purpose will be banned from Play Store. In a Reddit post, a developer showed an email from Google which instructed him to explain to users how his app uses the ‘android.permission.BIND_ACCESSIBILITY_SERVICE’ to aid users with disabilities. It also said that apps which fail to comply within 30 days will be removed from Google Play. Accessibility services is an API which makes it easier for users with disabilities to perform tasks on a device such as filling out forms automatically, but it also often exploited by malicious […]

“Engineer Mode” in Oneplus Phones Can Root Device, May Be Used as Backdoor

“Engineer Mode” in Oneplus Phones Can Root Device, May Be Used as Backdoor

A mobile security researcher recently divulged in a tweet that most, if not all, OnePlus mobile phones come with an app called ‘EngineerMode’ which can be used to root the device. The researcher, which goes by the handle “Elliot Alderson” said that the EngineerMode APK had all the features of a diagnosis app that only OnePlus engineers would have access to. Alderson added that given its permissions, the app can potentially be converted into a backdoor by attackers which can lead to catastrophic consequences. OnePlus CEO Carl Pei thanked the researcher via Twitter and assured that the company will be […]

Shanghai to Build Massive Data Trading Platform to Boost Tech Hub Status

Shanghai to Build Massive Data Trading Platform to Boost Tech Hub Status

In an interview with the South China Morning Post, Chief executive of Shanghai Data Exchange Corp Keven Tang Qifeng revealed that his company is planning to set up a massive electronic data trading platform which will boost Shanghai’s profile as a major tech hub. He added that even today, there is already a strong demand for trading of data sets, and the company is looking to capture around one -third of the national trading volume by 2020 where the market is expected to grow to around $15 billion. In addition to its efforts to stay at the forefront of China’s […]

How Privacy is Used to Commit Crimes

The tension between privacy and security has been the subject of countless debates.1 While unfettered privacy may be prone to abuse impairing the state’s capacity to police unlawful activity, an uncontrolled government would result in tyranny.2 This article will look at how the abuse of the right to privacy facilitates the commission of crime. A. Restrictions on Searches and Seizures The 1987 Constitution protects the right of the people to be secure in their houses, papers, and effects.3 This mantle of protection is essential for the citizens to enjoy their autonomy and exercise their right to privacy.4 Protection is granted […]

Chrome Adds New Security Features to Fight “Malvertising”

Chrome Adds New Security Features to Fight “Malvertising”

Last Thursday, Google announced plans for three new security features for Chrome that will help stop sneaky redirections by spammy and malicious websites. One of the features to be implemented in Chrome 64 will block iframe redirects that use Javascript codes to redirect users to a malicious page. Gary Warner, Director of Research in Computer Forensics at the University of Alabama at Birmingham (UAB) called it a “huge help” in the fight against malvertising. Another feature will block “tab-unders”, or web pages that open links in new tabs, which then redirect the original tab to a new URL. This is […]

Civil Rights Groups Take UK Intelligence to Court for Surveillance Accusations

Civil Rights Groups Take UK Intelligence to Court for Surveillance Accusations

Last Tuesday, the European Court of Human Rights (ECHR) heard three separate cases brought by civil rights groups accusing UK intelligence agencies of bulk interception of private communication. Seven judges in Strasbourg considered claims that raised questions on how the GCHQ, MI5 and MI6 share surveillance information with the US and other governments. The investigatory powers tribunal (IPT) has already previously ruled on one of the claims where it found the UK surveillance regime to be unlawful. The groups argue that the agencies’ interception of communications on an international scale violates the  individual’s privacy rights and freedom of expression, and […]

FBI Fails to Crack Texas Shooter’s Phone

FBI Fails to Crack Texas Shooter’s Phone

The FBI revealed last Tuesday that it was unable to access the contents of the Texas church shooter’s mobile phone due to encryption. According to FBI special agent Christopher Combs, the phone has already been sent to Quantico for further analysis. He said that the contents of gunman Devin Kelley’s phone could help uncover his motive, but it is now increasingly difficult for authorities to crack encrypted phones because of advancements in technology. Combs added that he is not going to tell what kind of phone Kelley had, since it may just prompt other potential criminals to purchase the same […]

Shape Security Launches Tool that Blunts Impact of Leaked Passwords

Shape Security Launches Tool that Blunts Impact of Leaked Passwords

Shape Security, a company composed of ex-Google employees and Department of Defense officials, recently launched a product that can mitigate the effects of stolen passwords from massive breaches. The tool called Blackfish works by identifying “credential stuffing” activities where where hackers use scripts to try the leaked passwords by bulk. Once Blackfish detects such activity, it will mark the passwords as compromised. In addition to Blackfish, the company is also creating a customer network to create a collective defense system against such activity. Source: TechCrunch

Data Privacy Principles and Rights

The Data Privacy Act of 2012 (hereinafter, DPA or Act) is the Philippines’ first data privacy law. This  landmark legislation is instrumental in obtaining the needed investments for the Philippine’s booming information technology-business process outsourcing (IT-BPO) industry.1 The industry involves the heavy processing of confidential and personal information.2 With the DPA, information collected is safeguarded from security incidents.3 In order to protect data privacy, an entity covered by the Act must, among other things, observe the data privacy principles4 and uphold the rights of the data subject5. I. Data Privacy Principles There are four general principles with respect to the […]

Read more about the Data Privacy practice at Disini & Disini Law Office