You are here: 51勛圖 Washington College of Law Impact Initiatives Programs Tech, Law & Security Program

Tech, Law & Security Program

TLS Highlights

Necessity, Proportionality, and Executive Order 14086.

TLS Senior Project Director Alex Joel provides an in-depth explanation of泭how EO 14086 addresses the Schrems II concerns regarding necessity and proportionality.泭The terms necessary and proportionate have specialized meanings under the jurisprudence of the Court of Justice of the European Union and the European Court of Human Rights. The paper examines in depth how the EO articulates and explains those terms, interpreting them in light of U.S. law and legal traditions. View the report and the larger泭Privacy Across Borders Project 堯梗娶梗.泭

Content governance in the shadows: How Telcos & Other Infrastructure companies "Moderate" Online Content.

TLS Senior Fellow泭Prem M. Trivedi泭addresses significant policy challenges in online content governance activities by non-application layer internet infrastructure companies. In addition to exploring the nuances of the challenges, the paper makes recommendations for telcos to improve transparency about their practices and for how all non-application layer companies can consider substantive content governance principles. This paper is part of the TLS Addressing Harmful Content Online Project and is supported, in part, by the Anti-Defamation League. View the paper .泭

Data Localization and Government Access to Data Stored abroad: Discussion Paper 2.

The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaborationCIPL published a paper on the real life business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data. View the paper .泭

Combating Ransomware: One Year On.

This new paper revisits key ideas from the Combating Ransomware webinar series in view of ransomwares evolution over the past year; identifies progress that has been made in the fight against ransomware; and identifies actionable recommendations for the future. These include recommendations designed to strengthen cyber defense, cyber offense, law enforcement efforts, the U.S. cyber incident reporting regime, cryptocurrency efforts, and international efforts. This report was jointly authored by V. Gerald Comizio, Gary Corn泭(TLS Program Director), William Deckelman (TLS Advisory Board Member), Karl Hopkins (TLS Advisory Board Member), Mark Hughes, Patrick McCarty, Sujit Raman泭(TLS Senior Fellow), Kurt Sanger, Ari Schwartz, Melanie Teplinsky泭(TLS Senior Fellow), and Jackson Colling泭(former TLS Student Fellow). View the report .泭

Protecting Children in the Age of End-to-End Encryption.

Senior Project Director Laura Draper explores how to combat online child sexual exploitation and abuse when end-to-end encryption obscures the governments access.泭Conversations about online child sexual exploitation and abuse often devolve into no-win arguments about the merits (or lack thereof) of end-to-end encryption. TLS Senior Project Director Laura Draper sidesteps this debate in the new report, Protecting Children in the Age of End-to-End Encryption, by assuming end-to-end encryption is here to stay, and focusing on how we can collaborate to combat these harms. 泭View the project and report.泭

Sign up to receive event information and program news.