New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar 035158/UE 141 MMM – Spring 2008 Solving Crimes using Referent.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
2005. Why is it necessary When person lacks capacity physicians have power and influence over them which could be abused 30% pts on acute medical wards.
Why Won’t You Talk to Me? The Crown perspective
The rights of families and youth living in rental housing in Virginia Protecting Families and Children from Homelessness Using Landlord/Tenant Law to Prevent.
What Are Rights and Responsibilities?
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
1 Fourth and Fifth Amendments Police State – country where military or law enforcement are in power and abuse power Warrant – document that gives law enforcement.
1 PROCEDURAL DUE PROCESS. 2 Texas Education Agency provides Notice of Procedural Safeguards Rights of Parents of Students with Disabilities Download this.
Security, Privacy, and Ethics Online Computer Crimes.
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
The Bill of Rights.
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
Ancestry.com What there is on the site What is pay to view What is free.
The First 10 Amendments to the Constitution
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Data Protection Act. Lesson Objectives To understand the data protection act.
Chapter 3- American Free Enterprise
CONSTITUTIONAL LAW 1.6 FIFTH AMENDMENT. Fifth Amendment "No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment.
Security Services Constitutional Issues in Private Security.
Due Process and Equal Protection
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Commercialization of R&D Results: How to Prepare For The Early Stages.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Legal and Ethical Issues in Computer Security
© Oklahoma State Department of Education. All rights reserved.1 Housing Alternatives Standard Renting vs. Buying.
“10 Big Myths about copyright” Presented By: Brenton Barnes Summer 06.
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
HOOVER CITY SCHOOLS In-Service Training: Annual Review of.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
Special Education 101 Elementary Dept. Chair 1/27/2009 Confidentiality.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
2. Securing the crime scene CSP. Call out crime scene investigators are never the first officers to a crime scene may not even be called out to some incidents.
Constitutional Roots  By 1790, all 13 original states ratified the Constitution  Many people did not believe the Constitution did enough to protect.
By Tyler Daniels.  Privacy  - Employers monitoring employees every move  - Can get employees fired for doing things they didn’t know were being monitored.
Easy Read Summary Mental Capacity Act Mental Capacity Act A Summary The Mental Capacity Act 2005 will help people to make their own decisions.
Rights of Citizens. Citizenship A citizen is a native or naturalized member of a state or nation who owes allegiance to its government and is entitled.
Texas Law Enforcement Best Practices Mid Year Training Conference.
Unit 2 – Legal Issues facing the Investigator.  Agency resources from a federal, state, or local level that could assist the investigator  Legal issues.
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
Ann Marie Perez Professor CRIMINAL PROCEDURE WEEK 1 - UNIT 1.
Clearing Permissions for my manuscript What do I need to know and what do I do? Emily Hall Rights Manager
Chapter 6.2.  Define the freedoms that are protected by the First Amendment.  Summarize the amendments that protect against abuse of power by the government.
Illegal Immigrants in the US - What to do with them?
Legal and Ethical Issues in Computer Security Csilla Farkas
Other Bill of Rights Protections Ch. 4, Les. 2. Rights of the Accused  The First Amendment protects five basic freedoms  Equally important is the right.
Crime Scene Basics Forensic Science.
I can understand that sources of law include The Constitution, The Charter of Rights and Freedoms, Treaties, statutes, and common law. I can understand.
Making Public Policy. What is Public Policy? A government plan of action to solve a problem that people share collectively or that they cannot solve on.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 7 Search Incident to a Lawful Arrest, Hot Pursuit Criminal Justice Procedure.
FERPA Family Educational Rights and Privacy Act of 1974 (also known as the Buckley Amendment)
RACIAL DISPARITIES IN THE LAW Created by: Cathi, Nicole, Eunice and Jeanell.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Unit 4 Seminar. Tell me what the Miranda warning is and what it means to you.
What's The Penalty For Graffiti In Buffalo?
Nassau Association of School Technologists
Technology Transfer Office
FAIR CONGRESSIONAL DISTRICTS FOR OHIO
Keeping Students and Families Safe: Healthcare Breakout Session
The Bill of Rights The First 10 Amendments to the Constitution
FAIR CONGRESSIONAL DISTRICTS FOR OHIO
Confidentiality It’s the Law!.
FERPA Family Educational Rights and Privacy Act of 1974
File Stream and Team Drives
Constitution and Bill of Rights.
Making Public Policy.
Pre-Trial Procedures Search and Seizure.
Constitution and Bill of Rights.
Search laws CLU3ME: Unit #3 - Day Five.
School Searches and You
Presentation transcript:

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent Tracking A Privacy Secure Infrastructure for the Implanted Chip Problem April 9, 2008 Werner CEUSTERS Center of Excellence in Bioinformatics and Life Sciences Ontology Research Group University at Buffalo, NY, USA

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Assignment Propose an infrastructure for the implanted chip problem such that there is no privacy issue or loss of freedom without sacrificing any of the benefits stated under ‘good reasons’. Submit by on February 11 at the

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Response overview S52/13 S42/12 S102/12 S32/11 S72/11 S21/31

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Response (2) Being as your parents have control over you until you are 18, it should be up to them whether or not you have the chip implanted and used. If they choose to have the chip they obviously want all of the benefits; so from the time you are born until you are 18 the chip should be activated all the time so that parents can keep track of you. After the age of 18 you would have some control over the chip. However, there should be certain guidelines that allow you to deactivate it. For instance, if you have a criminal record by 18 there should be a requirement to keep the chip active always. But in general there should be certain points where the chip doesn’t follow your every move. There should be a way to put in addresses of family members and your house or significant others houses where you dont need to be tracked and the chip will shut off. When you venture out in public though the chip should always be on so as to ensure that people are always safe. By doing this there will be some privacy but yet you will still be protected.

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Response (3) A very complex system could be created to retrieve personal data but to also keep legal freedoms and privacy. All of the sensors set up around the country will be linked to a central system that collects all the data. Only the personnel of this company will have access to it. It will be protected by a strict firewall so no hacking could occur. Data will be collected and stored in a central database. If the federal or local authorities are looking for someone supposes a felon they give the Tracking Company a name. They enter it in the mega database and retrieve all the information. For the company to do this they will need a document similar to a present day warrant to justify the search. This way no ones privacy is violated except through the order of a district attorney similar to a search warrant.

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Response (4) I have been racking my mind for nearly a week about how one could put in place a system in which all humans had chips implanted within them and could be traceable at a distance of 35 ft anywhere in the world. It just can't see how someone could actually do it without trampling on the individual's rights and freedoms. I don't think it's possible, which i think is why such an event wouldn't occur.

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Response (5) The loss of freedom and the lack of privacy being the biggest issues with the implanted chip problem, there could however be some way to avoid these issues and enjoy the good part of the implanted chip. One thing that can be invented with the implanted chip is a privacy policy. It will be a very good idea if the population is convinced that even though they are being watched, their account cannot be accessed by anybody else unless there is a problem. The implanted chip can be a good idea if all of the records are kept confidentially by the government and not publicize. This can help the implanted chip avoid the issues of loss of freedom because we can still do what we want in our own privacy and be safe at the same time knowing that only the police is watching everyone else’s move.

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Response (7) The benefits and problems of an implanted tracking device are quite evident, as established in class and through prior assignments. In order to preserve the ability to more easily locate an individual who might be missing, wanted for a crime etc., and prevent undesirable use of the technology, to harm and individual or aid in crime ect., the technology would need to be exclusively available to the government. In order to protect an individual’s privacy, court approval fro tracking would be necessary through a process similar to the granting of a warrant. While it is inevitable that this technology could not be completely managed and accessed exclusively by the government in a just fashion, these precautions would be necessary to best avoid the potential negative uses of an implanted racking chip.

New York State Center of Excellence in Bioinformatics & Life Sciences R T U Response (10) I believe that if we get the chips implanted we wont necessarily need to have sensors every 35 feet or so as stated in class. You could place the sensors every 35 feet or so on roads, in street lamps or on mailboxes and any other government owned property. In cities you wouldn’t necessarily need them everywhere, only at the entrances/exits of stores and office buildings. They could be put in medal detectors already in place at entrances to buildings. This way you at least know the person went in/out of that place. You leave the tracing of people on private property up to the owner security. For example if a retail store wants the technology they can pay to have it installed. You could give handheld sensoring devices to law enforcement and other government agencies so they could identify any suspicious person(s) themselves not relying on fixed sensors. Anywhere else thought to be essential could be taken through eminent domain. As I stated in class this is the law in which the government has the right to take over private property if it is more beneficial to the public as a whole that they do so.