JAMES ORENSTEIN, Magistrate Judge:
In a sealed application filed on October 8, 2015, the government asks the court to issue an order pursuant to the All Writs Act, 28 U.S.C. § 1651, directing Apple, Inc. (“Apple”) to assist in the execution of a federal search warrant by disabling the security of an Apple device that the government has lawfully seized pursuant to a warrant issued by this court. Law enforcement agents have discovered the device to be locked, and have tried and failed to bypass that lock. As a result, they cannot gain access to any data stored on the device notwithstanding the authority to do so conferred by this court’s warrant. Application at 1. For the reasons that follow, I defer ruling on the application and respectfully direct Apple to submit its views in writing, no later than October 15, 2015, as to whether the assistance the government seeks is technically feasible and, if so, whether compliance with the proposed order would be unduly burdensome. If either the government or Apple wishes to present oral argument on the matter, I will hear such argument on October 22, 2015, at 12:00 noon.
… When planning a study, data scientists need to balance their desire to uncover new knowledge with the privacy of the people whom the data represent.
Salil Vadhan, a professor of computer science at Harvard University and former director of the Center of Research on Computation and Society, is among the researchers exploring an approach known as “differential privacy” that allows one to investigate data without revealing confidential information about participants. Initially introduced by Cynthia Dwork, Frank McSherry, Kobbi Nissim and Adam Smith, among others, in the mid-2000s, researchers continue to develop the concept today to apply it for real-world problems.
As the lead researcher for the National Science Foundation (NSF) supported “Privacy Tools for Sharing Research Data,” Vadhan and his team at Harvard are developing a new computer system that acts as a trusted curator — and identity protector — of sensitive, valuable, data. (The Sloan Foundation and Google, Inc. are providing the project with additional support.)
On October 6, 2015, California Governor Jerry Brown signed into law a trio of bills that is intended to clarify key elements of the state’s data-breach notification statute and provide guidance to persons, businesses, and state and local agencies that deal with electronically stored personal information. The bills, which were passed together as a single legislative package, will take effect on January 1, 2016.
- When you first tap the Moments tab at the bottom of the Twitter app
- For any Moment in progress, you can tap a button to add tweets about that Moment to your main timeline. Crucially, though, those tweets only persist for the duration of the event in question; the ‘Unfollow’, which is the most essential action when it comes to building a Twitter feed you actually read, is done for you
- Finally, in what was probably the biggest surprise in the product, there is a carousel at the top leading to more focused categories: Each of these categories includes not only ‘News’ or ‘Entertainment’ Moments that just happened, but also more timeless content, particularly in ‘Fun.’ Look carefully at those category titles, though — they sure look familiar: That’s right, Twitter just reinvented the newspaper. It’s not just any newspaper though — it has the potential to be the best newspaper in the world.