Chapter 20 - Third-Party Records and Data Mining

Slides:



Advertisements
Similar presentations
Remedies Against Govt Defendants – Some Basics 11 th amendment bars suits against the State, unless Lawsuit is against state officer in their official.
Advertisements

Richard Warner USA Patriot Act: Money Laundering Provisions.
Litigation Holds: Don’t Live in Fear of Spoliation Jason CISO – University of Connecticut October 30, 2014 Information Security Office.
Responding to Subpoenas Springfield Metropolitan Bar Association Doug Healy March 25, 2013.
Update on Alabama Appellate Practice & Procedure: Avoiding Malpractice When Handling Appeals DEBORAH ALLEY SMITH.
© 2007 Morrison & Foerster LLP All Rights Reserved Attorney Advertising The Global Law Firm for Israeli Companies Dispute Resolution in the United States.
Judicial Review. Basic Requirements Court must have jurisdiction Plaintiff must state a recognized cause of action and seek a recognized remedy This is.
Is Your Claim Ready for Prime Time? Ripeness Finality Exhaustion.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
© 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
Drawbacks of Cloud-Delivered Content for Consumers.
Class 7 Internet Privacy Law Your Digital Afterlife.
DATA PRIVACY PERSONNEL FILES “P-FILE”. Wisconsin Public Records Wisconsin Statue – Wisconsin Statue – Wisconsin Statue 230 Wisconsin.
ROCKDALE MEDICAL CENTER April 17 th,  Add in good faith………….  Follow policies  Seek guidance  Document.
Class 11 Internet Privacy Law Government Surveillance.
Chapter 8 Part III. Reports and Subpoenas 2 3 Government as Database A primary function of the federal government is collecting information. Information.
Access to Judicial Review Part III. Ripeness Is Abbott "Ripe"? Ripeness deals with whether the case and controversy is sufficiently far along that the.
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
Chapter 20 - Third-Party Records and Data Mining Part I.
The Right to Privacy. No where in the Constitution are the words “right to privacy”
WELCOME BACK! ADMIN. LAW UNIT 6 ANN SANOK. THIS WEEK We look at an agency’s power to conduct inspections or to compel acts by individuals or companies.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Illinois Freedom of Information Act The Basics of FOIA 2015.
FOIA 101 Office of Open Government Traci L. Hughes, Esq. –
A firm that had its secure system hacked could have the right to investigate the person who sent s into the hacked system, the sender’s ISP.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Patent Settlements, Risk, and Competition Mark R. Patterson Fordham University School of Law Patent Settlements: The Issues Beyond the “Reverse Payment”
DEALING WITH VARIATIONS E.M.M.B. EKANAYAKE BSc(Hons)QS, MRICS, MCIArb, MAACEI (Chartered Quantity Surveyor & Claims/Contracts Specialist) by Under FIDIC.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Nassau Association of School Technologists
Surveillance around the world
Litigation Holds: Don’t Live in Fear of Spoliation
Chapter 9: Internet Law, Social Media, and Privacy
College of Nursing December 13, 2006 John O. Cates
Chapter 10 Cyberlaw, Social Media, and Privacy
Cloud computing and government surveillance
Obligations of Educational Agencies: Parents’ Bill of Rights
Chapter 6—Medical Records and Informed Consent
Uses Uses of cryptography Lab today on RSA
Recognition and Enforcement of Foreign Judgments and Arbitral Awards
Family Educational Rights and Privacy Act (FERPA) Online Training
COMPUTER PRIVACY.
GDPR General Data Protection Regulation EU: Coming May 25, 2018
Law of Evidence Burden and standard of proof.
Litigation Holds: Don’t Live in Fear of Spoliation
is not secure is not secure..
Protection of News Sources
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Managing Student Records Legally and Effectively
Chapter 6 - Access to Judicial Review
CIVIL LAW.
The Litigation Process
Sources of Law Legislature – makes law Executive – enforces law
The Judicial System I. There are 2 separate court systems in the U.S.
The University of Adelaide, School of Computer Science
The Legal System.
Lecture 6 The Legislature
Good Spirit School Division
The Judicial System I. There are 2 separate court systems in the U.S.
Government Data Practices & Open Meeting Law Overview
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Chapter 23 Government Regulation and Administrative Law
Chapter 10 Agreement.
Presentation transcript:

Chapter 20 - Third-Party Records and Data Mining Part I

Smith v. Maryland Looking back at this case, what is the court really saying about a reasonable expectation of privacy? What does the court see within the ambit of a reasonable expectation of privacy? Is it really an original intent approach, i.e., is the court looking to what the founders through of as personally private? Has the Court always recognized a right of privacy beyond 4th amendment searches?

What would Jefferson have seen within the scope of privacy? Letters? His personal dwelling? His dealings with his bank?

Does the Public's Expectation of Privacy Match the Court's? If your employer can read it, can the government? Banking records? Transactions in general? Do you think the general public thinks their banking records are private? Their email? Their tweets? Why are transactions so valuable for intelligence? Should the use of encryption be seen as probable cause for the government to go after the contents of the communication?

Warshak v. U.S., 490 F.3d 455 (6th Cir.(Ohio) Jun 18, 2007) Plaintiff seeks a declaratory judgment (facial challenge) that the provisions of the Stored Communications Act (SCA) allowing administrative subpoenas to his ISP for his emails is unconstitutional. Plaintiff learned that emails had been released to the government and sought declaratory judgment and an injunction on behalf of himself and all other email users.

The Expectation of Privacy in Email Why are analogies between ISPs and the post office misguided? Why is there no expectation of privacy in bank records? How does this court see email as different from bank records? What about email in the hands of a recipient?

The Nature of the Expectation How much of this expectation of privacy is due to statutes? What if those changed? What if the court said they did not apply for national security investigations? Do you have an expectation of privacy if there are any exceptions?

The Contract with the ISP Why does the contract with the ISP matter? What about email on the employer's computer? What about email on the University system? Does it matter whether the ISP really looks at the email, or only has the right to? What about gmail - how is Google like the NSA when it comes to email?

Warshak v. U.S., 532 F.3d 521 (6th Cir.(Ohio) Jul 11, 2008) The appeals court vacated the previous opinion It applied an Abbott Labs analysis and rejected the facial challenge to the SCA It found that the plaintiff had not made a proper showing under Abbott of imminent harm It found that he had two ways of attacking the subpoenas Motion to exclude evidence Bivens action Are these satisfactory?