Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.

Slides:



Advertisements
Similar presentations
Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
Advertisements

Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
"Security and Privacy After September 11: The Healthcare Example Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP April.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
Introduction to Legal Issues on Social Media & the Federal Government Peter Swire Ohio State University Center for American Progress DHS Conference June.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
The Need for Government-Wide Privacy Policy Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP DHS Privacy Advisory Committee.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
In Harmony, In the Cloud: Harmonizing Data Protection Rules In a Cross-Border World Steve Mutkoski Worldwide Director Policy Microsoft Corporation.
Information Technology Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia.
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the.
Conference – 7-8 August, 2013 Presented by David Melnick | pg 1 Employee Privacy and Organizational Security: August 8th, 2013 Addressing.
Welcoming the Equality Act 2010 Equality Law Conference 8 December 2010 John Wadham Group Legal Director Equality and Human Rights Commission.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
Security & Privacy After Snowden: The Review Group & the USA Freedom Act Gartner Security & Risk Management Summit Peter Swire Senior Counsel, Alston &
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Law and Ethics Implications of the President’s Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
The President's NSA Review Group: The Technology Issues" Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Can We Have EHRs and Privacy Too? Dr. Alan F. Westin Professor of Public Law and Government Emeritus, Columbia University; Principal, Privacy Consulting.
By: Kevin Ferrone Bob Cardarelli Linda Carter Globalization Expansion of Balk Inc.
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Business Implications of the President’s NSA Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Prof. Blair MacIntyre Prof. Peter Swire CS4803 & 6725; MGT4803 & 8803 January 5, 2015 Information Security Strategies and Policy.
Where Did HIPAA Come From? “HIPAA Then and Now” Peter Swire Georgia Tech Scheller College of Business Alston & Bird LLP IAPP-Las Vegas 2015.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Yangon, Myanmar, November 2013 Cybersecurity-Related Standardization Initiatives in the EU and the U.S.: Lessons for Developing Countries Nir Kshetri.
Larry Clinton Operations Officer Internet Security Alliance
The Internet of Things and Consumer Protection
U.S. Department of Education Safeguarding Student Privacy Melanie Muenzer U.S. Department of Education Chief of Staff Office of Planning, Evaluation, and.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
By: Kevin Ferrone Bob Cardarelli Linda Carter Globalization Expansion of Balk Inc.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
By: Kevin Ferrone Bob Cardarelli Linda Carter Globalization Expansion of Balk Inc.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
PP 620: Public Policy and Health Administration Unit One Seminar Kris R. Foote, J.D., M.P.A., M.S.W. Kaplan University.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
Nassau Association of School Technologists
Bellwork Think about this…. Historical Event
Michael Wright • Chief Security Officer • Tech Lock
Peter Swire Holder Chair of Law and Ethics
Surveillance around the world
European Insurance and Occupational Pensions Authority Introduction
North Carolina Law Review Symposium
By: Eamon Callahan and Wilston Johnston
"Security and Privacy After September 11: The Healthcare Example”
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
U.S. Intelligence Oversight Reforms & the Cloud Act
“Court Records and Data Privacy: Online or Over the Line?”
Peter Swire Engage CISO Roundtable with the
Shandong University of Finance and Economics, China
Presentation transcript:

Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics

Overview of the Talk  My background for compliance  President Obama’s Review Group on Intelligence & Communications Technology  Privacy, Cyber-security & Compliance  Data breach – Target, HIPAA  Big data – new White House report  Government access to your data post-NSA  Global challenges to your business models

Swire Background for Compliance  Clinton administration:  Chief Counselor for Privacy  Government’s own use of personal information  Web site policies and congressional oversight  88/89 = flunk (?)  HIPAA, GLBA, online privacy, government access  Morrison & Foerster,  Advisory boards on privacy & cyber-security:  Microsoft, Intel, start-ups  Practical compliance for government & industry  Can provide that to clients going forward

Creation of the Review Group on Intelligence and Communications Technology  Snowden leaks of 215 and Prism in June, 2013  August – Review Group named  Report due in December  5 members

December 2013: The Situation Room

Our assigned task  Protect national security  Advance our foreign policy, including economic effects  Protect privacy and civil liberties  Maintain the public trust  Reduce the risk of unauthorized disclosure

Our Report  Meetings, briefings, public comments  300+ pages in December  46 recommendations  Section 215 database “not essential” to stopping any attack; recommend government not hold phone records  Pres. Obama speech January  Adopt 70% in letter or spirit  Additional recommendations under study

RG: One Internet, Multiple Equities  The same Internet for:  Intelligence, law enforcement  E-Commerce  Free speech & political dissent  All the fun stuff – cat videos  Military theaters of combat

Some Effects Since June  U.S. intense debates post-Snowden about surveillance vs. privacy, civil liberties, and other values  Effects on allies – Merkel, Brazil  Cloud computing & other U.S. business interests  Marketers: “US cloud providers have to give all the customer data to the NSA, so buy our local services”  Internet governance  U.S. Internet Freedom agenda vs. surveillance  U.S. leadership in Internet governance under new challenge

Addressing National Security  Unanimous report, signed off by 30-year veteran of the CIA & a top anti-terrorism official  We had expert staffing and briefings by the agencies  RG Rec 15: we recommended fixing a gap in current NSA authorities when a suspect enters US and hasn’t been picked up yet by the FBI

Addressing Privacy & Civil Liberties  RG: Numerous proposed changes to U.S. law and institutions:  End current Section 215 program (and administration now agrees)  More judicial oversight  Public advocate participates in the secret court  Stronger tech capability for the court and the Privacy & Civil Liberties Oversight Board  In my view, significant progress and Congress may go further

Addressing Business & the Economy  Greater inclusion of economic policy-makers in a range of settings  RG Rec 9: Address the top IT industry request – transparency report  DOJ agreement with companies in January

Addressing Foreign Affairs/Allies  RG Rec 19: New process for surveillance of foreign leaders  Presidential Policy Directive 29:  Historically, for surveillance, countries have provided much stronger protections for their citizens than in other countries  PPD-29 a milestone, with “minimization” of data for non-US persons  Big new software project to build that  Details far from clear, but a notable shift

Summary on One Internet, Multiple Equities  In addition to national security, have crucial other equities:  Strengthen cyber-defense  Privacy & civil liberties  Business and the economy  Allies  Internet governance  Make US policy in the context of these other equities

Overview of the Talk  Background for compliance  President’s Review Group  Privacy, Cyber-security & Compliance  Data breach  Big data  Government access  Global challenges

Data Breaches  Growing compliance issue  Target’s breach  Stock price down; CEO gone  Many lawsuits  Admitted knew of security weakness but thought it wasn’t worth implementing fix …  HIPAA and online health records since 2009  NY Presbyterian Hospital and Columbia, $4.8 million  EU: IT sector now and everyone later

Compliance and Data Breaches  Need tech & lawyers & compliance people  Before the breach  Draft cyber policies  Assign responsibilities  Follow them  After the breach  Draft the notice to consumers: law  Forensics/tech  Opportunity for new compliance regime

Big Data, Analytics & Compliance  How many of you have big data or analytics initiatives now in your company?  To date: quant experts & marketing  Tomorrow: source of privacy & security risk  Data breach  Podesta Big Data report  Transparency & follow your stated policies  Discrimination (Boston potholes story)  If identified data to third parties, may be your responsibility – contracts, de-identify the data  Big trends tend to become compliance issues

Government Access to Company Data  Since 9/11 – how can we help?  Post-Snowden – more caution unless legally required  Non-US customers – don’t store in the US to avoid giving to the NSA  Microsoft cloud server in Ireland  DOJ wants the there  Magistrate said US legal process applies  On appeal

Government Access & Compliance  Your policies on handing it over:  At your discretion?  Only when legally mandated?  Prior notice to customers?  Enterprise & non-US customers wanting stronger assurances  How create compliance with your policies?  E.g., former government IT person or prosecutor is your employee and wants to help the police  Shifting to post-Snowden business realities

Global Compliance Challenges  EU Privacy Directive since 1998  Draft Regulation to strengthen seemed to be blocked  Post-Snowden, vote in EU Parliament  Now 100+ countries with privacy legislation  Wave of national cybersecurity legislation  Last week: Google lost “right to be forgotten” case  Search engines (at least) must suppress links unless public’s right to know outweighs privacy considerations  Great uncertainty how this right will apply

Privacy compliance and global challenges  Companies would like to have legal harmonization EU/US/Asia  Not on the horizon  Even harder post-Snowden when EU is angry on privacy  If no harmonization, develop compliance strategy:  When to have separate systems US and outside?  When to level up to EU rules?  When to adopt risk-based approach to historically modest EU fines?

Conclusion (1)  Change in assumptions post-Snowden for government access  Data breaches & Big Data increasing issues in private sector  Global compliance challenges with 100+ laws  Who has visibility into the privacy and cyber-security risks facing your company?  Map the data flows  Update your policies about data flows  Build and enforce compliance systems  Be informed about the risks and manage them

Conclusion (2)  Data a larger and larger part of the value of your company  Risks to data become more material  Privacy and security will continue to grow as compliance issues  Get your team for tech + law + compliance  Be ready for the challenges to come  At least the issues are really interesting!  Thank you.

Contact Information  Professor Peter Swire    Ph: