By PAUL MOZUR
Industry groups say provisions could be used to force companies to allow third-party access to systems, provide encryption keys or even hand over source code.
Published: July 2, 2015 at 08:00PM
from NYT Technology http://ift.tt/1KuOxA8
via IFTTT