Open Data Day

You must have played with lego sometime in your life. Have you ever thought about how each block has versatility to integrate into different structures? That’s how open data works – only instead of toys, with them we can build reality portraits. On that special Open Data Day – that is on it’s 9th edition…

Details

Changes in the Brazilian Law on Access to Public Information: Bureaucracy reduction or transparency restricting?

Top trend on the Brazilian Twitter last Thursday, 24/01, amendments to Decree 7.724 / 12 that regulates the Brazilian Law on Access to Public Information during the interim presidency of president Hamilton Mourão generated wide alert. The main controversy was that from the new possibility of the commissioned servers classify information as secret or top…

Details

Memes, YouTube and copyright: The European Union Directive and its possible impacts

Following the entry into force of the law of protection of personal data with the greatest international repercussion – the General Data Protection Regulation – the European Parliament approved a directive with a great financial impact on the revenues of large online content providers such as Facebook, Youtube and Google. The Directive on Copyright in…

Details

Online secrecy, criminal investigations and international cooperation

This paper results from the request made by the Institute for Research on Internet and Society for admission as ‘Amicus Curiae’, as well as the memorial filed in this condition, in order to assist the Federal Supreme Court in the assessment of the Declaratory Action for Constitutionality (ADC) n. 51, filed by the Federation of…

Details

Anti-Crypto Bill in Australia: a brief analysis of the Access and Assistance Bill and its most controversial aspects

The Parliament of Australia has passed a bill the obliges technology businesses to weaken encryption on its products and services. The legislation, which has been branded “Anti-Crypto bill” by its critics, compels companies to provide law enforcement with access to encrypted user data, even if it requires the introduction of vulnerabilities in the system. Such…

Details