Eliminating Privacy Concerns for Online Access to Public Documents Nick Haralampopoulos April 16, 2003.

Slides:



Advertisements
Similar presentations
Are you being a safe and successful digital citizen? E-safety
Advertisements

1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
NAU HIPAA Awareness Training
Complying with Privacy to Enable Innovation & Research
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Security, Privacy, and Ethics Online Computer Crimes.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
CATEMA™ Career and Technology Education Management Application CATEMA™ Training Workshop Jefferson College Tech Prep Director: Sarah Bright.
1 for Real Estate An easy, fast, and cost effective way to organize documents associated to listings & client correspondence Real Estate Real Estate offices.
The Problem:  Many States now require that Petitions for Bankruptcy be filed completely online  All supporting documents must be scanned and uploaded.
Web Browser Security Team iBrowse Sha-Myra Richardson John Darr.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Grade 5 Student Assistants
Document Processing Ways to centralize and streamline your Endangered Species Act document processing procedures.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Finding Your Way around the Courthouse. Court Records Online – PACER - Public Access to Court Electronic Records – Case Management: CM/ECF – State Courts.
Checking Accounts 101 How much do you know about the most common form of bank account?
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
FINANCIAL PORTAL FOR BUSINESS CUSTOMERS. BTA-ONLINE SYSTEM FOR LEGAL ENTITIES БТА-ONLINE services of financing portal allows to make banking transactions.
April 23, Massachusetts’ New Data Security Regulations: Ten Steps To Compliance Amy Crafts
Internet and Computer Rules If you want to use the computers you need to follow the rules.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Advanced Civil Litigation Class 11Slide 1 Production of Documents Scope Scope Includes documents of all types, including pictures, graphs, drawings, videos.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Version Advanced User Training. Instructions This training module contains additional key concepts that are an extension to the concepts in the.
Wisconsin Judicial Conference November 11, 2015
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Brought to you by ince, an integrated communications agency Powered by intralinks SECURE ENTERPRISE COLLABORATION IN THE CLOUD.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
DIGITAL SIGNATURE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Information Systems Unit 3.
HIPAA Vs. Family Educational Rights and Privacy Act (FERPA) How do these laws impact Educational Settings?
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Important changes to Fuel Tax Reporting for INDEPENDENT BULK DEALERS.
Monsour Roi M. Monzon, RN.  What is Electronic Health Record?  Electronic Medical Record (EMR) vs Electronic Health Record (EHR)  Comparison with Paper-based.
Table of Contents  Protect patients and their personal health information  Became law in 1996.
Warrant Task Force Assessment 12/1/2009. WARRANT TASK FORCE ASSESSMENT: Please describe your agency. Please describe your agency. court47 (4 %) law enforcement1029.
Technology Transfer Office
how to use this document
DOCUSHARE AND THE TOWNSHIP OF TINY
Take Charge of your Finances
Americans with Disabilities Act (ADA) Training for Faculty
How much do you know about the most common form of bank account?
Erik Arneson, Executive Director
Take Charge of your Finances
Privacy of Client Data.
Policies 101 (Everything you never wanted to know)
Creating The Oregon State Electronic Documents Repository
The ABLE Act What it means for You and Your Family Achieve with us.
Americans with Disabilities Act (ADA) Training for Faculty
NO The Right to Say NO by Steven Powe
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Pennsylvania Economic Development Institute November 1, 2016
Protecting Your Credit
The new data protection rules
Protecting Yourself from Fraud including Identity Theft
Take Charge of your Finances
NO The Right to Say NO by Steven Powe
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Eliminating Privacy Concerns for Online Access to Public Documents Nick Haralampopoulos April 16, 2003

Online Access to Public Documents Public Records accessible via the Internet The Federal courts working together = Progress State courts –Development burden, Funding While each are at different stages which may cause future uniformity problems…a concern that they are both facing is trying to balance public access and privacy protection.

Public vs. Privacy Conceptually Public access to electronic court records provides a convenient way for the public to monitor the judicial system and ensure fairness and equality of its operations. Public advocates basic argument: – Public means Public- Content is same. Privacy advocates basic argument –Electronic format changes many aspects that cause significant privacy concerns. –Access part of the equation is cause for concern.

Thesis Even though significant privacy issues exist regarding online access to public documents, implementation of current suggestions will reduce privacy invasion to a minimal.

Public Argument Since the paper filed court documents are public documents and all of its contents are available for the public to see, then in electronic format the whole file should be available to the the public as well. –Same information should be available –Public right that nothing deemed public should be limited from the public

Privacy Argument More than substituting an electronic system for a paper based system –Careful planning is needed to achieve balance. –Can’t ignore that there are important differences between traditional and electronic records. –Depository vs. Publisher The access capability is unlimited, remote, anonymously, anyone at anytime.

Privacy Argument Paper-based has limitations –In person, in specific location, sign for it (sometimes), time consuming manual searches, and returning the file in tact all deter misuse. –Realize the great benefits of an online record Time saver, elimination of physical presence, simultaneous access, word searches. –Access is the key problem here

Without Access Restrictions Although technically public records, the ease of viewing opens the door to a great number of people. Ease of searching can motivate someone to take the time to search for personal information and even profit of it. –Physical and mental health records –Victim/witness information –Personal financial information –Sexual activities or act of infidelity revealed –A business's trade secrets etc.

Some Solutions Some courts charge a fee to obtain online access. –Hope is to deter misuse, but fee is minimal –Limits online benefits Passwords and Logons Identification –Eliminates Anonymous use –Who qualifies for a password? –Passwords could also be used for confidential documents only Redacting Requirement –Lawyers would be required to protect their client by blocking out private information –Great cost and time

My Suggestion Access is the problem so fix access. Limit the Who, Where, and How and leave the What alone…

My Suggestion- The Who The Who- instead of having unlimited access via the Internet for everyone. –Permanent password: (FOA) Attorneys, Government Agencies, Police. –Temporary password: (TOA) Parties of interest. Note: –Permanent passwords must be protected or face sanctions –An FOA user may download file, but must protect it or face sanctions Can it to other people under confidentiality,but cannot post it on any website

My Suggestions- The Where The Where- while the FOA users have remote access with their permanent passwords, the general public(GP) can still gain access through kiosks in the courthouses, libraries, or other licensed location of that state. –Each kiosks will have all the records of the state –There will be a help desk staff that provides info and serves as a supervisor to protect against misuse. –The GP user would have to sign in and show identification, and then will be able to use word search features, will be allowed to print, but will not be able to download a version. –This way the GP receives the increased access (not remote, but increased locations statewide), and the time saving benefits, but still has physical presence in front of a state official.

My Suggestions- The How The How- pertains to how it the will be regulated. Court should adopt new laws to allow for each user and search to be recorded. New laws should be passed under “cybercrime” or “anti-hacker” laws to prosecute any misuse of public record or any unauthorized access of public record. (ie a hacker illegally getting access from a remote location)

My Suggestions- The What The What- is the what information is posted online. Focus of most solutions. But, paper public records presently allow access to all that information anyway. –Tedious work of making sure no private inforamtion slips into the file (not to mention filtering all the existing paper files when they are transferred to electronic format) –Easier to simply limit who gets the info, and where and how they get it. –Forget the concerns about the what, if the concerns haven’t caused a change in the traditional paper file, why with the electronic format?

Conclusion Therefore, I confidently believe that once a uniform electronic document system makes it to the internet, then, with the implementation of current solutions (either mine or a something similar) the privacy concerns of online access would be minimized. Solutions exist, its just a matter of the committees agreeing on the solution.