Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

The Basics for Information Technologies and Higher Education
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
THE USA PATRIOT ACT AND THE DOMESTIC WAR ON TERROR Essential Questions: What limits should be put on the executive branch to carry out the domestic war.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Anti-Terrorism Legislation and Campus Computing Tracy Mitrano, Cornell Barbara Simons, Stanford Rodney Petersen, Maryland Copyright Tracy Mitrano, Rodney.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
1 PROCEDURAL DUE PROCESS. 2 Texas Education Agency provides Notice of Procedural Safeguards Rights of Parents of Students with Disabilities Download this.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Police and the Law 1 1 Police and the Constitution 10.1 Chapter 10 Police and the Law Chapter 10 Police and the Law.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, This work is the intellectual property of the authors. Permission is granted.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Federal Bureau of Investigation
Other Laws (Primarily for E-Government) COEN 351.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
JUSTICE  The principle of fairness: the idea of moral equality. Criminal Justice Today  The proper ordering of things and persons within a society.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Human Subjects Update E. Wethington, Chair, UCHS.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Bellwork Think about this…. Historical Event
Surveillance around the world
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Educause/Internet 2 Computer and Network Security Task Force
Legal Implications.
Protection Or Violation ?
Lesson # 7 A Practical Guide to Computer Forensics Investigations
How Does Electronic Surveillance Work Legally?
Confidentiality October 14, 2005.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Essentials of the legal environment today, 5e
Laws Governing Police Surveillance
THE CRIMINAL JUSTICE PROCESS: THE INVESTIGATIVE PHASE
The University of Adelaide, School of Computer Science
Government Data Practices & Open Meeting Law Overview
Texas Search and Seizure
Government Data Practices & Open Meeting Law Overview
Chapter 4: Federalism Section 3
Chapter 4: Federalism Section 3
Chapter 4: Federalism Section 3
Presentation transcript:

Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University Copyright Tracy Mitrano, 2002. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Policy Implications for Higher Education The USA-Patriot Act Policy Implications for Higher Education

USA-Patriot Act: Basics Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Acts Signed into law on October 26, 2001 One of the longest pieces of emergency legislation passed in one of the shortest periods of time in American history Copyright Tracy Mitrano 2002

USA-Patriot Act: Basics Ten Sections covering a variety of areas, including banking, money laundering, surveillance, border protection, victims’ support, information sharing within the infrastructure and the strengthening of criminal laws against terrorism. Severability clause To protect against the whole the potential constitutional violation of a single section Copyright Tracy Mitrano 2002

Issues for Higher Education: (Not Including Bio-terrorism) Family Education Records Privacy Act New “emergency” exception For terrorism specifically No notice to student Foreign Intelligence Surveillance Act “Hostile foreign power” No traditional constitutional protection Business records Disclosure illegal Copyright Tracy Mitrano 2002

Copyright Tracy Mitrano 2002 IT Systems Two most common questions: Does Patriot Act require re-architecting of system? No, but can with specific authorization for pen registers and trap and trace Compensation offered Does Patriot Act require retention of logs? Not as a rule, but up to 180 days with authorization Copyright Tracy Mitrano 2002

ECPA: To Whom Does It Apply? Statutory Language: “…providers of Internet service to the public” Does it apply to colleges and universities? No case law on point Anderson Consulting: EPCA does not apply Digital Millennium Copyright Act as potential “safe harbor” model of distinction between students and staff/faculty? Areas where there is service to the public, i.e. list serves? General Rule Act as if it does, but hold question as potential defense Copyright Tracy Mitrano 2002

Issues for Higher Education Electronic Communications Privacy Act New “emergency” disclosure “Danger to life and limb New “required disclosure” “Rubber-stamping subpoenas” Below “probable cause” “Routing:” Pen registers and trap and trace devices Content is the constitutional question Copyright Tracy Mitrano 2002

Issues for Higher Education Electronic Communications Privacy Act Computer Trespass Owner/Operator consent for federal intervention So long as owner/operator reasonably believes investigation is relevant to computer trespass Investigation of it and no other No authorization required No limits set, e.g. stop No restraint on return with authorization based on information gathered during the invited investigation No guarantee it is constitutional Sunset provision Copyright Tracy Mitrano 2002

Copyright Tracy Mitrano 2002 Policy Implications Electronic Communications Privacy Act Routing procedures for request of legal papers Procedures for “emergency” disclosure Police IT officials, potential damage control Procedures for computer trespass Disallow random requests Identify offices to be notified Identify officers to be consulted Identify check-list of issues to consider Copyright Tracy Mitrano 2002

Copyright Tracy Mitrano 2002 Policy Implications What are the issues to consider for computer trespass? Why federal intervention? Insufficient resources at home Help in investigation Connections to other cases In concert with the degree of damage In contemplation of civil action for damages Find the perpetrator Copyright Tracy Mitrano 2002

Copyright Tracy Mitrano 2002 Policy Implications What are the issues to consider for computer trespass? How well can your organization control the investigation? Previous relationship and experience with federal investigators Degree of oversight afforded your organization Check points in the investigation Ability established at the outset to call off at any time Copyright Tracy Mitrano 2002

Copyright Tracy Mitrano 2002 Policy Implications What are the issues to consider for computer trespass? Constitutionality of the measure No fourth amendment protections Innocent defendant and false prosecution Guilty defendant and the exclusionary rule Potential civil liability for university Copyright Tracy Mitrano 2002

Copyright Tracy Mitrano 2002 Conclusion Should Americans find that the Patriot Act is being used against us instead of for us, we must revisit it in the name of the constitution. In the meantime… Copyright Tracy Mitrano 2002

Copyright Tracy Mitrano 2002 Conclusion Policy, protocols and procedures that engage the law in concert with the special mission of American higher education and the particular cultures of our colleges and universities go a long way to preserve our traditional autonomy. www.cit.cornell.edu/oit/PatriotAct/ (Full presentation available at this site.) Copyright Tracy Mitrano 2002