Andrea M. Matwyshyn

Last updated
Matwyshyn, Andrea M. (2009). Harboring Data: Information Security, Law, and the Corporation. Stanford University Press. ISBN   978-0-8047-7259-4.

Journal articles

Related Research Articles

The Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. Based in Washington, D.C., their mission is to "secure the fundamental right to privacy in the digital age for all people through advocacy, research, and litigation." EPIC believes that privacy is a fundamental right, the internet belongs to people who use it, and there's a responsible way to use technology.

Center for Democracy & Technology (CDT) is a Washington, D.C.-based 501(c)(3) nonprofit organisation that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the internet for purposes of well-intent, while at the same time reducing its potential for harm. It advocates for transparency, accountability, and limiting the collection of personal information.

<span class="mw-page-title-main">Gene Spafford</span> American computer scientist

Eugene Howard Spafford, known as Spaf, is an American professor of computer science at Purdue University and a computer security expert.

A privacy policy is a statement or legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. Personal information can be anything that can be used to identify an individual, not limited to the person's name, address, date of birth, marital status, contact information, ID issue, and expiry date, financial records, credit information, medical history, where one travels, and intentions to acquire goods and services. In the case of a business, it is often a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information is collected, and whether it is kept confidential, shared with partners, or sold to other firms or enterprises. Privacy policies typically represent a broader, more generalized treatment, as opposed to data use statements, which tend to be more detailed and specific.

Information security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

<span class="mw-page-title-main">Howard Schmidt</span> American computer security expert (1949 - 2017)

Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.

<span class="mw-page-title-main">Cyberethics</span> Ethics of online activities

Cyberethics is "a branch of ethics concerned with behavior in an online environment". In another definition, it is the "exploration of the entire range of ethical and moral issues that arise in cyberspace" while cyberspace is understood to be "the electronic worlds made visible by the Internet." For years, various governments have enacted regulations while organizations have defined policies about cyberethics.

<span class="mw-page-title-main">Ari Schwartz</span> American adviser

Ari M. Schwartz is an American cybersecurity and technology policy expert. He is the former Special Assistant to the President and senior director for cybersecurity on the United States National Security Council Staff at the White House, having left the role in October 2015. Previously, Schwartz worked in both the Executive Branch and civil society as on cybersecurity, privacy, civil liberties, and policy. He is an advocate for vulnerability disclosure programs.

<span class="mw-page-title-main">Susan Landau</span> American mathematician and engineer

Susan Landau is an American mathematician, engineer, cybersecurity policy expert, and Bridge Professor in Cybersecurity and Policy at the Fletcher School of Law and Diplomacy at Tufts University. She previously worked as a Senior Staff Privacy Analyst at Google. She was a Guggenheim Fellow and a visiting scholar at the Computer Science Department, Harvard University in 2012.

<span class="mw-page-title-main">Peter Swire</span> American academic

Peter P. Swire is the J.Z. Liang Chair in the School of Cybersecurity and Privacy in the College of Computing at the Georgia Institute of Technology. Swire is also Professor of Law and Ethics in the Scheller College of Business and has an appointment by courtesy with the School of Public Policy. He is an internationally recognized expert in privacy law. Swire is also a senior fellow at the Future of Privacy Forum and has served on the National Academies of Science and Engineering Forum on Cyber Resilience. During the Clinton administration, he became the first person to hold the position of Chief Counselor for Privacy in the Office of Management and Budget. In this role, he coordinated administration policy on privacy and data protection, including interfacing with privacy officials in foreign countries. He may be best known for shaping the Health Insurance Portability and Accountability Act Privacy Rule while serving as the Chief Counselor for Privacy. In November 2012 he was named as co-chair of the Tracking Protection Working Group of the World Wide Web Consortium (W3C), to attempt to mediate a global Do Not Track standard. In August 2013, President Obama named Swire as one of five members of the Director of National Intelligence Review Group on Intelligence and Communications Technologies.

<span class="mw-page-title-main">Julie Brill</span> American lawyer

Julie Simone Brill is an American lawyer who serves as Chief Privacy Officer and Corporate Vice President for Global Privacy, Safety and Regulatory Affairs at Microsoft. Prior to her role at Microsoft, Brill was nominated by President Barack Obama on November 16, 2009, and confirmed unanimously by the US Senate to serve as Commissioner of the US Federal Trade Commission on March 3, 2010. Brill served as a Commissioner of the Federal Trade Commission (FTC) from 2010 to 2016.

Jeff Kosseff is a cybersecurity law professor at the United States Naval Academy. He was previously a journalist, and was a finalist for the Pulitzer Prize and recipient of the George Polk Award.

<span class="mw-page-title-main">Cyber Intelligence Sharing and Protection Act</span> Unpassed United States bill

The Cyber Intelligence Sharing and Protection Act was a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The stated aim of the bill is to help the U.S. government investigate cyber threats and ensure the security of networks against cyberattacks.

Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures. He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. The final committee report is available through the Cyber Security and Policy Institute of the George Washington University, and the building code through the IEEE.

The National Cyber Security Hall of Fame, founded by Larry Letow and Rick Geritz, was established in 2012 to recognize the contributions of key individuals in the field of cyber security; its mission statement is, Respect the Past – Protect the Future. According to its website, it is designed to honor the innovative individuals and organizations which had the vision and leadership to create the fundamental building blocks for the cybersecurity Industry. The organization also highlights major milestones in the industry's 40-year history through a timelineArchived 2013-12-30 at the Wayback Machine representation, which includes inductees and their corresponding accomplishments.

<span class="mw-page-title-main">Cybersecurity Information Sharing Act</span>

The Cybersecurity Information Sharing Act is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate on October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private businesses to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police.

Privacy laws vary from state to state within the United States of America. Several states have recently passed new legislation that adapt to changes in cyber security laws, medical privacy laws, and other privacy related laws. State laws are typically extensions of existing United States federal laws, expanding them or changing the implementation of the law.

<span class="mw-page-title-main">Cybersecurity Law of the People's Republic of China</span> Law of China

The Cybersecurity Law of the People's Republic of China, commonly referred to as the Chinese Cybersecurity Law, was enacted by the National People’s Congress with the aim of increasing data protection, data localization, and cybersecurity ostensibly in the interest of national security. The law is part of a wider series of laws passed by the Chinese government in an effort to strengthen national security legislation. Examples of which since 2014 have included the data security law, the national intelligence law, the national security law, laws on counter-terrorism and foreign NGO management, all passed within successive short timeframes of each other.

Camille Stewart is an American technology and cybersecurity attorney, public speaker, and entrepreneur. She served as the Senior Policy advisor for the U.S. Department of Homeland Security under the Obama administration from 2015 to 2017 under the Barack Obama administration. She also served as the Head of Product Security Strategy Google after serving as the Lead for Security Policy & Election Integrity, Google Play & Android at Google.

Gregory Falco is an American inventor and researcher. Falco is a professor at Cornell University. He is a pioneer in the field of cybersecurity research and its aerospace applications. Falco is the founding chair of IEEE's Standard for Space System Cybersecurity and the NATO Country Project Director for the NATO Science for Peace and Security effort to reroute the internet to space.

References

  1. "Cybersecurity Expert Andrea Matwyshyn Offers Policy Suggestions for Improving Security". Archived from the original on 2018-11-25.
  2. "Andrea Matwyshyn". scholar.google.com. Retrieved 2021-05-02.
  3. "Professor Andrea Matwyshyn – key challenges for cyber security…". Oxford Martin School. Retrieved 2021-05-31.
  4. "MacCormick Conversations: Prof Andrea Matwyshyn with Ms Judith Rauhofer". media.ed.ac.uk. Retrieved 2021-05-31.
  5. "FTC Names Latanya Sweeney as Chief Technologist; Andrea Matwyshyn as Policy Advisor". Federal Trade Commission. 2013-11-18. Retrieved 2021-05-31.
  6. "Andrea Matwyshyn - Co-director, Northeastern University's Center for Law, Innovation and Creativity". CyberScoop. Retrieved 2021-05-31.
  7. "Statement of Dr. Andrea M. Matwyshyn Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies Committee on Homeland Security U.S. House of Representatives" (PDF).
  8. "The Future of Truth and Misinformation Online". Pew Research Center: Internet, Science & Tech. 2017-10-19. Retrieved 2021-05-31.
  9. "THE INTERNET OF BODIES". William & Mary Law Review. Archived from the original on 2020-09-19. Retrieved 2020-11-28.
  10. CNBC. "The next generation of the 'Internet of Bodies' could meld tech and human bodies together". www.cnbc.com. Retrieved 2024-06-03.
  11. "The Internet of Bodies: Opportunities, Risk, and Governance" (PDF). Archived (PDF) from the original on 2020-10-31.
  12. "Decoder with Nilay Patel: Recode Decode: Andrea Matwyshyn on Apple Podcasts". Apple Podcasts. Retrieved 2021-05-31.
  13. PodcastOne. "PodcastOne: The Internet of Bodies: Human Potential and Security Pitfalls, Part 1". www.podcastone.com. Retrieved 2021-05-31.
  14. 1 2 "Andrea M. Matwyshyn CV". Penn State Law. Archived from the original on 2020-09-28.
  15. "Vitae". site. Retrieved 2021-05-31.
  16. "Silicon Ceilings: Information Technology Equity, the Digital Divide and the Gender Gap among Information Technology Professionals". Archived from the original on 2020-03-19.
  17. "Black Hat USA 2003 Topics and Speakers". www.blackhat.com. Retrieved 2020-11-28.
  18. "Dean Welcomes Students Back to Northwestern Law". Northwestern Law. Retrieved 2020-11-28.
  19. "Technology | Academics | Policy - Andrea Matwyshyn". www.techpolicy.com. Retrieved 2020-11-28.
  20. "UF law conference to address identity theft, data security - News - University of Florida". news.ufl.edu. Retrieved 2020-11-28.
  21. "Andrea M. Matwyshyn CV". Archived from the original on 2020-09-28.
  22. "Andrea Matwyshyn". cyberlaw.stanford.edu. Retrieved 2021-05-31.
  23. "FTC Names Latanya Sweeney as Chief Technologist; Andrea Matwyshyn as Policy Advisor". Federal Trade Commission. 2013-11-18. Retrieved 2020-11-28.
  24. Hill, Kashmir. "The FTC's Controversial Battle To Force Companies To Protect Your Data". Forbes. Retrieved 2020-11-28.
  25. "Fellows Program | Center for Information Technology Policy" . Retrieved 2020-11-28.
  26. "Voting-machine makers are already worried about Defcon". Engadget. 26 January 2018. Retrieved 2021-06-01.
  27. "Section 1201 Rulemaking: Sixth Triennial Proceeding to Determine Exemptions to the Prohibition on Circumvention" (PDF). Archived (PDF) from the original on 2020-10-16.
  28. "Andrea Matwyshyn - News @ Northeastern". news.northeastern.edu. 101. Retrieved 2021-05-31.
  29. "About – Center for Law, Innovation, and Creativity" . Retrieved 2020-11-28.
  30. "Andrea M. Matwyshyn". Penn State Law | University Park, Pa. 2019-07-01. Retrieved 2020-11-28.
  31. "Penn State Engineering: SEDTAPP Directory". www.sedtapp.psu.edu. Retrieved 2020-11-28.
  32. "People". PSU PILOT lab. Retrieved 2020-11-28.
  33. "FTC Twitter" . Retrieved 2022-06-21.
  34. "RVAsec" . Retrieved 2023-05-29.
  35. "Andrea Matwyshyn | Fulbright Scholar Program". www.cies.org. Retrieved 2020-11-28.
  36. "Cyber Risk Thursday: Internet of Bodies". Atlantic Council. 2017-09-21. Retrieved 2021-05-31.
  37. "MacCormick Fellow Seminar: Prof Andrea Matwyshyn". media.ed.ac.uk. Retrieved 2021-05-31.
  38. "Équipe Team". Centre Internet et Société (in French). Retrieved 2021-05-31.
  39. "Current Scholars in Residence | Scholars in Residence | The John W. Kluge Center at the Library of Congress | Programs at the Library of Congress | Library of Congress". Library of Congress. Retrieved 2020-11-28.
  40. "The Internet of Bodies: Opportunities, Risk, and Governance" (PDF). Archived (PDF) from the original on 2020-10-31.
  41. "Shaping the Future of the Internet of Bodies: New challenges of technology governance" (PDF). Archived (PDF) from the original on 2020-08-10.
  42. Society, IEEE Computer. "IEEE Computer Society's Top 12 Technology Trends for 2020". www.prnewswire.com (Press release). Retrieved 2020-11-28.
  43. "The Cybersecurity 202Network:/Connecting cybersecurity experts across government and industry in an ongoing survey". The Washington Post . Archived from the original on 2018-05-21.
  44. "Cybersecurity pioneer gives $1 million for Penn State Law gender equity lab | Penn State University". news.psu.edu. Retrieved 2021-03-06.
Andrea M. Matwyshyn
Academic background
Alma mater Northwestern University (BA, MA International Relations, JD, PhD Human Development and Social Policy)
Thesis Silicon Ceilings: Information Technology Equity, the Digital Divide and the Gender Gap among Information Technology Professionals  (2005)