Policy Matters: Innovation, Balkanization and the Government’s Role

Slides:



Advertisements
Similar presentations
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Advertisements

No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Fordham CLIP Information.
A New Framework for Protecting Consumers on the Internet Peter P. Swire Ohio State University & Center for American Progress Center for American Progress.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
CYBER & Product Liability & Professional Indemnity
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Access Control Enforcement Delegation for Information-Centric Networking Architectures N. Fotiou, G.F. Marias, G.C Polyzos.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Some Policy Issues on the Internet An Incomplete Collection of Issues that Policy Makers, Interest Groups, and Activists Care About and that Might Lend.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
In the Belly of the Breach: What Every In-House Counsel Needs to Know about Data Breach Response ACC International Legal Affairs Committee Legal Quick.
A First Course in Information Security
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Review of Legislative Framework for Electronic Communications A Mobile Perspective Rob Borthwick 4 February 2000.
LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Security and Ethics Privacy Employment Health Crime Working
LESSON 2: Internet, Computer Ethics and Security
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
MKTG 476 GOING ONLINE/LEGAL Lars Perner, Instructor 1 TAKING MARKETING TO THE NET Types/structuresTasks/functionsEntitiesGoals/objectives.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Click to edit Master title Information Security: A Discussion Wednesday, December 6, 2006 Bob Steadman Director, National IT Security Sobeys.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
By: Micah Stevens Identity Theft in the World Today.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Cyber crime and security issues
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
©Ofcom REGULATING THE MEDIA: WHAT ROLE FOR THE EU? European Parliament 17 October 2006 Chris Banatvala Director of Standards Ofcom.
Cyber Liability Insurance for an unsecure world
Securing Information Systems
Securing Information Systems
CS 2315 review.
Financial Institutions – Cyber Risk
Public Facilities and Cyber Security
MODUS OPERANDI OF CYBER CRIME
Securing Information Systems
DATA PRIVACY EMERGING TECHNOLOGIES by Virginia Mushkatblat
Cyber Crime Today we will look at: Different types of cyber-crime
DATA PRIVACY EMERGING TECHNOLOGIES by Virginia Mushkatblat
Chapter 9 E-Commerce Security and Fraud Protection
Sameer Sharma, ITU 7 August, 2018 Dhaka, Bangladesh.
Cyber Security 04/04/2019 STEP Mauritius 2019
Texas Assisted Living Association 2019 Conference
INTERNET SECURITY.
COSC-100 (Elements of Computer Science) Prof. Juola
MIS650 Introduction.
Presentation transcript:

Policy Matters: Innovation, Balkanization and the Government’s Role Privacy Symposium, Harvard 23 August 2007 Adam Golodner, Director Global Security & Technology Policy Cisco Systems, Inc.

Your Privacy Is my Security WTO Accession – encryption (and my flavor) Authentication//Anonymous Techno regulatory arbitrage afoot… Dare we look back?

Nothing New Under the Sun: Same Crimes, New Names Offline Online Commercial Security Commercial Security Vandalism, Graffiti, Worms, Viruses Theft, Fraud, Deceptive Trade Hacking, Spam, Phishing, Spyware Extortion, Piracy, Organized Crime DDoS, Intercept, ID Theft, Bots - CIP- Terrorism, Espionage Physical Attack, Insider, etc. National Security National Security Techniques Related—But Different Motivations, Legal Principles, Government Roles

A Three-Part Test for Policy Making 1. Innovation—Trust 2. Balkanization Innovation Balkanization Proper Role of Government Let’s look at each of these … 3. Proper Role of Government 4 4

The Impact on Innovation Public choice theory FCC to FTC? Breach notification And public choice theory & real harm FCC to FTC? (or EC, China, etc Breach Notification

The Balkanization of Technology and Business Use my flavor WAPI Data flow My values Balkanization Use my flavor Standards, data transfer, WTO sec. exception

Proper Role of Government Which aspect of “security” or “privacy”? What are the costs and benefits of intervention? Proper Role of Government What kind of ‘security’ or ‘privacy’? Costs, benefits, incentives and consequences

Policy Truism: Policy = Architecture = Innovation Impact Network-based security and privacy From passive to active Self-defending Interactive Interconnected Managed IP networks Global Policies must reflect: Security and privacy moves fast Unintended consequences Protecting innovation Don’t specify technologies Or pre-judge biz models Tying-up innovation makes us less, not more secure Virtualization Identity+Trust Web Filtering SMTP HTTP Port 80 Worm Mitigation Content Inspection Anti Spam Secure IP

We Must Do Something—Anything! It’s a Tragedy of the Commons! Fact or Fiction? We Must Do Something—Anything! It’s a Tragedy of the Commons!

How Do we Create a Global Framework? What historic precedents can we call on? Emerging frameworks London Action Plan for consumer protection MLATs Council of Europe Treaty on Cyber Crime OECD Privacy and Culture of Security ICN—International Competition Network model What are we missing? Historical precedents Nation states with different laws, values Shared basic principles – like crime Some differences real, at least for the mid-term Emerging frameworks London Action Plan for consumer protection MLATs Council of Europe Treaty on Cyber Crime OECD Privacy & consumer dispute resolution ICN – International Competition Network model ? Principles for off-line and on-line the same What precedent are we missing?

Build Upon Enduring Principles Perform Surgery as Needed What We Must Do Build Upon Enduring Principles Continue to Innovate Perform Surgery as Needed Do No Harm