IAPP Privacy News
Favicon for iapp.org

US Senate Hearing Explores Section 230 Reforms

A US Senate hearing explored potential reforms to Section 230 of the Communications Decency Act, which provides liability protections for online platforms. Lawmakers and experts discussed the law's impact on the digital ecosystem and its applicability to emerging technologies like AI, with a general sentiment favoring amendments over full repeal.

Priority review Notice Telecommunications
IAPP Privacy News
Favicon for iapp.org

White House AI Policy Recommendations

The White House has released its policy recommendations for federal AI regulation, emphasizing children's online safety, intellectual property, AI literacy, and preemption of state laws. The recommendations aim to establish a uniform national framework for AI development and use, fostering public trust and innovation.

Priority review Guidance Artificial Intelligence
Favicon for ago.vermont.gov

Marquis Software Solutions Data Breach Notice to Consumers

The Vermont Attorney General's Office has published a data breach notice from Marquis Software Solutions to consumers. The notice, dated March 16, 2026, informs consumers about a data security incident affecting their personal information. Specific details regarding the nature of the breach or affected data were not provided in the summary document.

Routine Notice Consumer Protection
NIST Publications
Favicon for www.nist.gov

NIST SP 800-81r3 Secure DNS Deployment Guide

NIST has published Special Publication (SP) 800-81r3, providing updated guidelines for securing Domain Name System (DNS) deployment. The guide aims to enhance network security by mitigating DNS misuse and misconfiguration, aligning with zero trust and defense-in-depth strategies.

Routine Guidance Cybersecurity
NIST Publications
Favicon for www.nist.gov

NIST White Paper on 5G Cybersecurity and Privacy Capabilities

NIST has published a white paper detailing "no Subscription Permanent Identifier (SUPI) based paging," a 5G capability designed to enhance user privacy and security by preventing identification and location by attackers. The paper encourages 5G network operators and organizations to verify the implementation of this privacy-enhancing feature according to 5G standards.

Routine Guidance Cybersecurity
NIST Publications
Favicon for www.nist.gov

NIST 5G Cybersecurity and Privacy Capabilities White Paper Series Introduction

NIST has published an introductory white paper for a new series on applying 5G cybersecurity and privacy capabilities. The series, developed by the National Cybersecurity Center of Excellence (NCCoE), will provide guidance and research findings based on implementations in a testbed environment.

Routine Guidance Cybersecurity
NIST Publications
Favicon for www.nist.gov

NIST Paper on 5G Hardware Security for Platform Integrity

NIST has published a white paper detailing the use of hardware-enabled security capabilities to ensure the integrity of 5G system platforms. The paper discusses security threats and how hardware roots of trust and remote attestation can mitigate them.

Routine Guidance Cybersecurity
NIST Publications
Favicon for www.nist.gov

NIST Paper on 5G Network Security Design Principles

NIST has published a white paper outlining design principles for commercial and private 5G network operators to enhance cybersecurity and privacy. The paper, part of a series, focuses on isolating different types of network traffic.

Routine Guidance Cybersecurity
NIST Publications
Favicon for www.nist.gov

NIST White Paper on 5G SUCI Encryption for Subscriber Identifier Protection

NIST has published a white paper encouraging 5G network operators to enable Subscription Concealed Identifier (SUCI) protection. This optional 5G capability enhances cybersecurity and privacy by encrypting subscriber identifiers, providing customers with improved protections.

Routine Guidance Cybersecurity
NIST Publications
Favicon for www.nist.gov

NIST White Paper on 5G Temporary Identity Reallocation for User Protection

NIST has published a white paper detailing how 5G networks reallocate temporary identities to protect subscriber privacy and security. The paper emphasizes that 5G standards explicitly require refreshing temporary IDs to prevent attackers from identifying and locating users, urging network operators to ensure their technologies comply with these standards.

Routine Guidance Telecommunications