Newly Released State Department Report Is Highly Critical of Hillary Clinton’s Private Email Usage CLINTON EMAIL REPORT May 26, 2016 | Ben Booker Sources:

Slides:



Advertisements
Similar presentations
Staff Development Emergency Operations 1. Identify 5 purposes of the offender/student grievance process Identify 5 grievable issues Identify 12 non-grievable.
Advertisements

MASTER AGREEMENT TRAINING – ARTICLE 5 UNION RIGHTS and REPRESENTATION CBT LESSON 2 OFFICIAL TIME and TRAVEL Release procedures.
INTRODUCTION TO PUBLIC DISCLOSURE RESPONSE Paula Adams, King County Public Disclosure Officer.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Complaint Handling NYS LTCOP conference Objectives Provide clarification on the program philosophy concerning complaints and complaint resolution.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
RVCC FACULTY FERPA WORKSHOP OCTOBER 2011 DAN PALUBNIAK REGISTRAR
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Module 55–1 Difficult Customers & Situations Module 5.
Training module for Supervisors and Managers. Define Sexual Harassment and offensive behaviors that can be considered harassment. Explain the statutory.
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
FERPA: Protect our Students by Protecting their Records Prepared by Rebekah D. Mathis-Stump, JD.
Network security policy: best practices
Access & Privacy Chairs’ Compliance Workshop January 10, 2013.
Building Bridges for a Better Tomorrow MASFAA 2005 Late Stage Delinquency Assistance: A Bridge Over Troubled Water Mark Walsh Amy Kerwin FSA Default Prevention.
Securing Information in the Higher Education Office.
NHS England & Customer Contact Centre FOI Introduction 2013.
USD Sexual Harassment You may not know what it is………. You may not know what it is………. But you know how it makes you feel!!! But you know how it makes you.
Best Practices for Graduate Supervision December 10, 2014 Your Role in Graduate Studies.
Company LOGO Data Privacy HIPAA Training. Progress Diagram Function in accordance Apply your knowledge Learn the Basics Orientation Evaluation Training.
Using FOIA for investigations IRE Better Watchdog Workshop St. Louis Jennifer LaFleur, ProPublica.
Office of Inspector General (OIG) 2015 Florida Annual Assessment and FSAA Meeting.
Test Security June 26, >
Communication to support Workforce and Succession Planning.
Overview of DWS Medical Programs and Application Process Medicaid 101 and Application Pathway.
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
ICU and Forensics. 1.Describe information which should be consistently communicated by healthcare providers for those patients thought to be injured due.
Child Find and Children who are Homeless JENNIFER HILER WYOMING DEPARTMENT OF EDUCATION DIVISION OF INDIVIDUAL LEARNING.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
“A teacher is fired because there’s a picture of this teacher holding alcohol drinks on her MySpace page” Skylar, Will Y., Steven.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
CJ317: Computer Forensics
Publication Schemes Natasha Bodden Freedom of Information Unit November, 2009.
COMMUNITY VISITOR TRAINING Quality Lifestyle Support Enhancing the Lives of Individuals.
1 © 2008 EAPtools.com Investigating Complaints and Incidents Properly.
 Canada Occupational Health and Safety Regulation 20 (Part XX) was proclaimed dealing with Violence Prevention in the Work Place.  Work Place Violence.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Training for Medication Assistants Module One What is delegation? What is Medication Assistant Training?
© BMY Limited 2006 Bmycharity Gift Aid Presentation – 28 June Bmycharity – who we are 2.What we do to help 3.Flexible options to meet your needs.
THE DATA REVOLUTION Molly Elgin-Cossart Senior Fellow, New York University Center on International Cooperation.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Fraud Risk – some context first Year ending September 2015 there were 604,601 fraud offences reported (ONS) The National Fraud Indicator report in 2013.
Collecting Copyright Transfers and Disclosures via Editorial Manager™ -- Editorial Office Guide 2015.
The Georgia Open Records Act and ferpa
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
The Criminal Background Check Process HR Policy Section III.B Criminal history background checks must be performed on all Hourly Student Employees.
Nassau Association of School Technologists
The Criminal Background Check Process
Americans with Disabilities Act (ADA) Training for Faculty
Security and Integrity of the NYS Testing Program
How to Plan for College: After you Apply
“Trump fires FBI Director”
Washington State Office of the Family and Children’s Ombuds
Reducing Retaliation Claims Through Good Employment Practices
Graduate Assistant Unionization
President Trump Delivers Address
The goal of today’s training
Professional Standards Unit
EMPLOYEE RIGHTS & DISCIPLINE
Trump fires FBI director
Records Management New policies and procedures
Americans with Disabilities Act (ADA) Training for Faculty
Family Education Rights and Privacy Act
FERPA, Title IX, and Title IV Conflicts
Presidential Approaches to Cybersecurity
THE POST HOC FALLACY and THE 2016 Presidential Campaign
INTRODUCTION TO PUBLIC DISCLOSURE RESPONSE
Federal Programs
Presentation transcript:

Newly Released State Department Report Is Highly Critical of Hillary Clinton’s Private Usage CLINTON REPORT May 26, 2016 | Ben Booker Sources: Steven Lee Myers and EricLichtblau, “Hillary Clinton is Criticized For Private s in State Dept. Review,” The New York Times, May 25, 2016; Ryan Browne and Evan Perez, “State Department Report Slams Clinton Use,” CNN, May 25, 2016; Office of the Inspector General, “Office of the Secretary: Evaluation of Records Management and Cybersecurity Requirements,” U.S. Department of State, May 2016.; Edward Boatman, “Approve,” Noun Project, May 26, 2016; Jason Dilworth, “State of the Union,” Noun Project, May 26, 2016; TNS, “Hacked,” Noun Project, May 26, Main Findings From the Report Hillary Clinton did not ask for approval before setting up private server Clinton violated Department rules by not turning over records immediately after leaving office, waiting until late 2014 instead In Jan. 2011, Clinton’s private server was shutdown due to a hacking attempt Clinton used private server to avoid having to turn over some of her personal records for public disclosure State Department has poor handling of sensitive records

Report’s Main Criticisms Focus on Security Concerns and Clinton’s Violation of State Department Procedure CLINTON REPORT May 26, 2016 | Ben Booker Sources: Steven Lee Myers and EricLichtblau, “Hillary Clinton is Criticized For Private s in State Dept. Review,” The New York Times, May 25, 2016; Ryan Browne and Evan Perez, “State Department Report Slams Clinton Use,” CNN, May 25, 2016; Office of the Inspector General, “Office of the Secretary: Evaluation of Records Management and Cybersecurity Requirements,” U.S. Department of State, May Clinton Sets Up Private Server Without State Department Permission Secretary of State Hillary Clinton set up a private address and private server to handle official government business. According to the report, she did not ask State Department officials if this met security standards. If she did ask, the report claims, the State Department would have denied her request Hillary Clinton ed Deputy Stating She Wanted Private To Avoid Personal Records Being Accessible and Released Under the Freedom of Information Act (FOIA) A deputy suggested Clinton use a State address. Clinton declined replying, “I don’t want any risk of the personal being accessible.” Attempted Hack on Clinton Private Server Prompts Shutdown An attempted hacker targeted Clinton’s server. Although the hack was unsuccessful, concerns over the system’s safety prompted the security contractor to shut down the server for the day. Clinton Turned Over s From Time At State Department Clinton began turning over 50,000 s from her time at the State Department. According to State Department rules, Clinton should have turned over records immediately after she left office in Jan Nov Jan Late 2014 Timeline of Major Events in State Department Report Impact on Clinton Campaign Hillary Clinton has publically stated she would be compliant and assist with any investigations into her records. However, this State Department report said that Clinton and her top senior aides refused to comment or be interviewed for the investigation. The State report also undercuts Clinton’s narrative that she was compliant with State Department policy when she set up the private server. Both of these contradictions will further reinforce the public’s perception of her as dishonest and untrustworthy. Although Trump is seen as even more untrustworthy, he will use this report to further drive the narrative that Clinton is not to be trusted and is an unreliable leader.