Amie Stepanovich
Amie Stepanovich works to ensure that laws and policies on surveillance and cybersecurity recognize and respect human rights. At Access Now, Amie manages and develops the organization's U.S. policy and leads global projects at the intersection of human rights and government surveillance. Previously, Amie was the Director of the Domestic Surveillance Project at the Electronic Privacy Information Center, where she testified in hearings in both the Senate and the House of Representatives, as well as in State legislatures. Amie is a board member of the Internet Education Foundation. She was a liaison to the American Bar Association's Cybersecurity Working Group and co-chaired the 2014 Computers, Freedom, and Privacy Conference. Amie was named as a Privacy Ambassador by the Information and Privacy Commissioner of Ontario, Canada and was recognized in 2014 as one of Forbes magazine’s 30 under 30 leaders in Law and Policy. She has a J.D. from New York Law School, and a B.S. from the Florida State University.
Recent Events and Presentations
Debate: Should the U.S. Copy the EU’s New Privacy Law?
The European Union’s new privacy law, the General Data Protection Regulation (GDPR), went into effect on May 25, 2018. Pressure is mounting for lawmakers to take a position.
Protecting the Freedom to Encrypt
ITIF and the Fourth Amendment Advisory Committee hosted an expert panel discussion on how policymakers can protect consumer and business access to encryption and put in place policies that both encourage advances in cryptography and protect the rule of law.
Crypto Wars 2.0: How Should The U.S. Balance Privacy and National Security?
Recent reports suggest the U.S. government wants to ban strong encryption, a policy that could spell disaster for both U.S. competitiveness and civil liberties. Can policymakers reconcile the needs of law enforcement with good cybersecurity practices? Join ITIF for a lively panel discussion.
Has the NSA Won the Crypto Wars?
Panelists will explore the impact of allegations that the NSA has deliberately introduced vulnerabilities in cryptographic protocols.