Law School Privacy and Security on the Internet: the Balance between National Interest, Individual Civil Liberties and the Global Society Ian King Law.

Slides:



Advertisements
Similar presentations
INTERNET GOVERNANCE WHAT DOES IT MEAN FOR AFRICA? ASHOK.B.RADHAKISSOON.
Advertisements

DIRECTORATE GENERAL FOR INTERNAL POLICIES Justice, Freedom & Security National Programmes for Mass Surveillance in EU Member States and Compatibility with.
Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
Lawful Access in the EU: The Pipe to the Cloud? Professor Peter Swire Ohio State University & Future of Privacy Forum Georgetown Law School Conference.
Armenia and Multistakeholder Model of Internet Governance Dr. Grigori Saghyan, ISOC AM Vice-President Lianna Galstyan, ISOC AM Board Member Lianna Galstyan,
Working Group Three Non-State and Multilateral Actors: examining roles and responsibilities This group considered the arguments for and against extending.
NIST Cryptographic Standards Process Review Tim Polk NIST November 7, 2013.
Surveillance and Privacy on the Internet Presented by Jill Homes and Marion Barry.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Communications Briefing: Navigating the clouds Sam Parr and Ian Walden Wednesday 21 October 2009, – 2.00 pm.
Legal Context Saskia Mermans  Ispa and the legislation  Legal Framework for the Internet: general observation  Highlights of the legislation.
Data Protection and Records Management
“ICANN Reform and Government Participation” Dr Paul Twomey Chair, Governmental Advisory Committee Tuesday, October 10, 2002 Mexico City.
3 Ethics and Privacy.
Innovating in the Digital Ecology: Social Issues and Consequences Professor Robin Mansell London School of Economics and Political Science HEPTech Academia.
Forensic Surveillance techniques Profiling techniques
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Use of telecommunications data in fighting crime legally and effectively.
10 March 2015 Barbora Bukovska, ARTICLE 19 Freedom of Expression: Jurisprudential trends Focus on surveillance.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
Whistle-blowing and the Law – Part I Gavin Millar QC and Dr Andrew Scott.
Computer Legislation The need for computer laws Go to Contents.
Judges and the judiciary — eg role of judiciary (adjudicating the meaning of law, presiding over the courts, sitting on government bodies). Relationship.
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
International Code of Conduct for Private Security Service Providers Anne-Marie Buzatu Privatisation of Security Programme Coordinator Geneva Centre for.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Energy from the Sea An International Law Perspective on Ocean Energy Utrecht, February 2014 The Increasing Role of Private Actors in the Offshore.
Internet Governance After the 2012 World Conference on International Telecommunication Regulations.
Information Governance Policies. Business Support and Corporate Information Resources Team… Working to create a knowledge led organisation Information.
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
Karen Sollins Principal Scientist, MIT CSAIL October 2, 2014 The New Normal in Privacy: discussion of a dilemma 10/2/14Karen Sollins: Privacy1.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Can Big Business be Controlled? Regulation.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Uberveillance Ubiquitous online surveillance and computer science - ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community.
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Communications Data Consultations on access and a Code of Practice for voluntary retention Simon Watkin Home Office.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
International Law in a Global Economy Chapter 24.
PRIVACY BY DESIGN FOR PUBLIC / PRIVATE PARTNERSHIPS FOR SECURITY EU FP7 TACTICS CCR Summit 2015, September 30t h 2015.
The concept of availability in the information society Peter A. Michael Data Protection Secretary Council of the European Union.
Governance and Sovereignty: North American Perspectives Prepared by Michael Mac Neil For International Dimensions of Internet and e-Commerce Regulation,
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
WHOIS Public safety and data protection requirements.
International Court of Justice Enforcing the Law?.
DR ANDREA MULLIGAN BARRISTER-AT-LAW LLB, LLM(HARV.), PH.D Safe Harbor and Schrems v DPC.
June 2010Stuxnet May 2011Implementing “Cookies” notification under the Privacy Directive Jan 2013ECC3 Feb 2013ISC Report on Access to.
Computing, Ethics and The Law
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Data protection—training materials [Name and details of speaker]
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Introduction to Human Rights The Human Rights Act and Human Rights Based Approaches.
Internet Governance in November 2016
Surveillance around the world
Tele2 & Watson: What now? European Criminal Law Association IALS
Introducing GDPR: How the General Data Protection Regulation transforms the world Laura Mudd November 2016.
An Introduction to ICANN
Dealing with human sources of information in the CMA
Forth International Forum
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
TAYLORS LECTURES SOURCES OF LAW.
Internet Technological Evolution and the Role and Impact of ICANN
CYBERSPACE: CAN FRAGMENTATION BE STOPPED
The Global Governance of Privacy Actors, Mechanisms, and Perspectives
Law Education.
Presentation transcript:

Law School Privacy and Security on the Internet: the Balance between National Interest, Individual Civil Liberties and the Global Society Ian King Law School Staffordshire University 1

Law School Context The Internet has become unconsciously ubiquitous: 2

Law School More Data = More Surveillance 3

Law School Covert Surveillance NSA programme to break encryption makes “vast amounts” of data “exploitable” NSA spends $250M a year to covertly influence technology companies’ product designs to insert backdoors GCHQ working to find routes into encrypted traffic on major service providers 4

Law School Surveillance by Law Data Protection & Investigatory Powers Act: Royal Assent 17 July 2014 Powers for data retention and interception of communications Provides for extra-territoriality of interception where services provided to users in the UK S.4(6): RIPA obligation may be imposed on and notice given to persons outside the UK (and may be so imposed or given in relation to conduct outside the UK) 5

Law School Non-government Surveillance 6

Law School Who’s in Control? US government National governments European data protection authorities European Court of Justice International organisations e.g. UN, ITU Technical infrastructure authorities e.g. ICANN, FCC Service providers: Google, Apple, Microsoft, Facebook etc. 7

Law School But… The Internet is extraterritorial and limitless – not designed to facilitate national regulation State powers are by their nature territorial and limited – although doesn’t stop governments trying to be extra-territorial 8

Law School Creating Order from Chaos? Some principles (in an ideal world?!) International No single government with a pre-eminent role Multi-stakeholder Public-private partnership Decentralised Rights based Is this realistic? Or desirable? Will governments and big business voluntarily give up control? 9

Law School Or Should we prefer Chaos? 10