Andrea M. Matwyshyn

Last updated
Matwyshyn, Andrea M. (2009). Harboring Data: Information Security, Law, and the Corporation. Stanford University Press. ISBN   978-0-8047-7259-4.

Journal articles

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

The Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. Based in Washington, D.C., their mission is to "secure the fundamental right to privacy in the digital age for all people through advocacy, research, and litigation."

Center for Democracy & Technology (CDT) is a Washington, D.C.–based 501(c)(3) nonprofit organisation that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the internet for purposes of well-intent, while at the same time reducing its potential for harm. It advocates for transparency, accountability, and limiting the collection of personal information.

<span class="mw-page-title-main">Gene Spafford</span> American computer scientist

Eugene Howard Spafford, known as Spaf, is an American professor of computer science at Purdue University and a computer security expert.

Information security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

<span class="mw-page-title-main">Howard Schmidt</span> American computer security expert

Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.

<span class="mw-page-title-main">Cyberethics</span>

Cyberethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society. For years, various governments have enacted regulations while organizations have defined policies about cyberethics.

<span class="mw-page-title-main">Ari Schwartz</span> American adviser

Ari M. Schwartz is an American cybersecurity and technology policy expert. He is the former Special Assistant to the President and senior director for cybersecurity on the United States National Security Council Staff at the White House, having left the role in October 2015. Previously, Schwartz worked in both the Executive Branch and civil society as on cybersecurity, privacy, civil liberties, and policy. He is an advocate for vulnerability disclosure programs.

<span class="mw-page-title-main">Susan Landau</span> American mathematician and engineer

Susan Landau is an American mathematician, engineer, cybersecurity policy expert, and Bridge Professor in Cybersecurity and Policy at the Fletcher School of Law and Diplomacy at Tufts University. She previously worked as a Senior Staff Privacy Analyst at Google. She was a Guggenheim Fellow and a visiting scholar at the Computer Science Department, Harvard University in 2012.

<span class="mw-page-title-main">Peter Swire</span> American academic

Peter P. Swire is the J.Z. Liang Chair in the School of Cybersecurity and Privacy in the College of Computing at the Georgia Institute of Technology. Swire is also Professor of Law and Ethics in the Scheller College of Business and has an appointment by courtesy with the School of Public Policy. He is an internationally recognized expert in privacy law. Swire is also a senior fellow at the Future of Privacy Forum and has served on the National Academies of Science and Engineering Forum on Cyber Resilience. During the Clinton administration, he became the first person to hold the position of Chief Counselor for Privacy in the Office of Management and Budget. In this role, he coordinated administration policy on privacy and data protection, including interfacing with privacy officials in foreign countries. He may be best known for shaping the Health Insurance Portability and Accountability Act Privacy Rule while serving as the Chief Counselor for Privacy. In November 2012 he was named as co-chair of the Tracking Protection Working Group of the World Wide Web Consortium (W3C), to attempt to mediate a global Do Not Track standard. In August 2013, President Obama named Swire as one of five members of the Director of National Intelligence Review Group on Intelligence and Communications Technologies.

<span class="mw-page-title-main">Julie Brill</span> American lawyer

Julie Simone Brill is an American lawyer who serves as Chief Privacy Officer and Corporate Vice President for Global Privacy, Safety and Regulatory Affairs at Microsoft. Prior to her role at Microsoft, Brill was nominated by President Barack Obama on November 16, 2009, and confirmed unanimously by the US Senate to serve as Commissioner of the US Federal Trade Commission on March 3, 2010. Brill served as a Commissioner of the Federal Trade Commission (FTC) from 2010 to 2016.

Jeff Kosseff is a cybersecurity law professor at the United States Naval Academy. He was previously a journalist, and was a finalist for the Pulitzer Prize and recipient of the George Polk Award.

<span class="mw-page-title-main">Cyber Intelligence Sharing and Protection Act</span> Unpassed United States bill

The Cyber Intelligence Sharing and Protection Act was a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The stated aim of the bill is to help the U.S. government investigate cyber threats and ensure the security of networks against cyberattacks.

Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures. He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. The final committee report is available through the Cyber Security and Policy Institute of the George Washington University, and the building code through the IEEE.

<span class="mw-page-title-main">Bill Buchanan (computer scientist)</span> Scottish computer scientist

William Johnston BuchananOBE FBCS CEng PFHEA is a Scottish computer scientist. Buchanan is a professor in the School of Computing, Engineering and the Built Environment. He currently leads the Blockpass ID Lab and the Centre for Cybersecurity, IoT and Cyberphysical at Edinburgh Napier University. In 2017, he was appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security.

<span class="mw-page-title-main">Cybersecurity Information Sharing Act</span>

The Cybersecurity Information Sharing Act is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate on October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private businesses to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police.

The President's Commission on Enhancing National Cybersecurity is a Presidential Commission formed on April 13, 2016, to develop a plan for protecting cyberspace, and America's economic reliance on it. The commission released its final report in December 2016. The report made recommendations regarding the intertwining roles of the military, government administration and the private sector in providing cyber security. Chairman Donilon said of the report that its coverage "is unusual in the breadth of issues" with which it deals.

Privacy laws vary from state to state within the United States of America. Several states have recently passed new legislation that adapt to changes in cyber security laws, medical privacy laws, and other privacy related laws. State laws are typically extensions of existing United States federal laws, expanding them or changing the implementation of the law.

<span class="mw-page-title-main">Cybersecurity Law of the People's Republic of China</span> Law of China

The Cybersecurity Law of the People's Republic of China, commonly referred to as the Chinese Cybersecurity Law, was enacted by the National People’s Congress with the aim of increasing data protection, data localization, and cybersecurity ostensibly in the interest of national security. The law is part of a wider series of laws passed by the Chinese government in an effort to strengthen national security legislation. Examples of which since 2014 have included a Law on National Intelligence, the National Security of the People’s Republic of China and laws on counter-terrorism and foreign NGO management, all passed within successive short timeframes of each other.

Camille Stewart is an American technology and cybersecurity attorney, public speaker, and entrepreneur. She served as the Senior Policy advisor for the U.S. Department of Homeland Security under the Obama administration from 2015 to 2017 under the Barack Obama administration. She also served as the Head of Product Security Strategy Google after serving as the Lead for Security Policy & Election Integrity, Google Play & Android at Google.

References

  1. "Cybersecurity Expert Andrea Matwyshyn Offers Policy Suggestions for Improving Security". Archived from the original on 2018-11-25.
  2. "Andrea Matwyshyn". scholar.google.com. Retrieved 2021-05-02.
  3. "Professor Andrea Matwyshyn – key challenges for cyber security…". Oxford Martin School. Retrieved 2021-05-31.
  4. "MacCormick Conversations: Prof Andrea Matwyshyn with Ms Judith Rauhofer". media.ed.ac.uk. Retrieved 2021-05-31.
  5. "FTC Names Latanya Sweeney as Chief Technologist; Andrea Matwyshyn as Policy Advisor". Federal Trade Commission. 2013-11-18. Retrieved 2021-05-31.
  6. "Andrea Matwyshyn - Co-director, Northeastern University's Center for Law, Innovation and Creativity". CyberScoop. Retrieved 2021-05-31.
  7. "Statement of Dr. Andrea M. Matwyshyn Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies Committee on Homeland Security U.S. House of Representatives" (PDF).
  8. "The Future of Truth and Misinformation Online". Pew Research Center: Internet, Science & Tech. 2017-10-19. Retrieved 2021-05-31.
  9. "THE INTERNET OF BODIES". William & Mary Law Review. Archived from the original on 2020-09-19. Retrieved 2020-11-28.
  10. "The Internet of Bodies: Opportunities, Risk, and Governance" (PDF). Archived (PDF) from the original on 2020-10-31.
  11. "Decoder with Nilay Patel: Recode Decode: Andrea Matwyshyn on Apple Podcasts". Apple Podcasts. Retrieved 2021-05-31.
  12. PodcastOne. "PodcastOne: The Internet of Bodies: Human Potential and Security Pitfalls, Part 1". www.podcastone.com. Retrieved 2021-05-31.
  13. 1 2 "Andrea M. Matwyshyn CV". Penn State Law. Archived from the original on 2020-09-28.
  14. "Vitae". site. Retrieved 2021-05-31.
  15. "Silicon Ceilings: Information Technology Equity, the Digital Divide and the Gender Gap among Information Technology Professionals". Archived from the original on 2020-03-19.
  16. "Black Hat USA 2003 Topics and Speakers". www.blackhat.com. Retrieved 2020-11-28.
  17. "Dean Welcomes Students Back to Northwestern Law". Northwestern Law. Retrieved 2020-11-28.
  18. "Technology | Academics | Policy - Andrea Matwyshyn". www.techpolicy.com. Retrieved 2020-11-28.
  19. "UF law conference to address identity theft, data security - News - University of Florida". news.ufl.edu. Retrieved 2020-11-28.
  20. "Andrea M. Matwyshyn CV". Archived from the original on 2020-09-28.
  21. "Andrea Matwyshyn". cyberlaw.stanford.edu. Retrieved 2021-05-31.
  22. "FTC Names Latanya Sweeney as Chief Technologist; Andrea Matwyshyn as Policy Advisor". Federal Trade Commission. 2013-11-18. Retrieved 2020-11-28.
  23. Hill, Kashmir. "The FTC's Controversial Battle To Force Companies To Protect Your Data". Forbes. Retrieved 2020-11-28.
  24. "Fellows Program | Center for Information Technology Policy" . Retrieved 2020-11-28.
  25. "Voting-machine makers are already worried about Defcon". Engadget. 26 January 2018. Retrieved 2021-06-01.
  26. "Section 1201 Rulemaking: Sixth Triennial Proceeding to Determine Exemptions to the Prohibition on Circumvention" (PDF). Archived (PDF) from the original on 2020-10-16.
  27. "Andrea Matwyshyn - News @ Northeastern". news.northeastern.edu. 101. Retrieved 2021-05-31.
  28. "About – Center for Law, Innovation, and Creativity" . Retrieved 2020-11-28.
  29. "Andrea M. Matwyshyn". Penn State Law | University Park, Pa. 2019-07-01. Retrieved 2020-11-28.
  30. "Penn State Engineering: SEDTAPP Directory". www.sedtapp.psu.edu. Retrieved 2020-11-28.
  31. "People". PSU PILOT lab. Retrieved 2020-11-28.
  32. "FTC Twitter" . Retrieved 2022-06-21.
  33. "RVAsec" . Retrieved 2023-05-29.
  34. "Andrea Matwyshyn | Fulbright Scholar Program". www.cies.org. Retrieved 2020-11-28.
  35. "Cyber Risk Thursday: Internet of Bodies". Atlantic Council. 2017-09-21. Retrieved 2021-05-31.
  36. "MacCormick Fellow Seminar: Prof Andrea Matwyshyn". media.ed.ac.uk. Retrieved 2021-05-31.
  37. "Équipe Team". Centre Internet et Société (in French). Retrieved 2021-05-31.
  38. "Current Scholars in Residence | Scholars in Residence | The John W. Kluge Center at the Library of Congress | Programs at the Library of Congress | Library of Congress". Library of Congress. Retrieved 2020-11-28.
  39. "The Internet of Bodies: Opportunities, Risk, and Governance" (PDF). Archived (PDF) from the original on 2020-10-31.
  40. "Shaping the Future of the Internet of Bodies: New challenges of technology governance" (PDF). Archived (PDF) from the original on 2020-08-10.
  41. Society, IEEE Computer. "IEEE Computer Society's Top 12 Technology Trends for 2020". www.prnewswire.com (Press release). Retrieved 2020-11-28.
  42. "The Cybersecurity 202Network:/Connecting cybersecurity experts across government and industry in an ongoing survey". The Washington Post . Archived from the original on 2018-05-21.
  43. "Cybersecurity pioneer gives $1 million for Penn State Law gender equity lab | Penn State University". news.psu.edu. Retrieved 2021-03-06.
Andrea M. Matwyshyn
Academic background
Alma mater Northwestern University (BA, MA International Relations, JD, PhD Human Development and Social Policy)
Thesis Silicon Ceilings: Information Technology Equity, the Digital Divide and the Gender Gap among Information Technology Professionals  (2005)