CURRENT LAWS, FUTURE LEGISLATION, AND PRIVACY ABUSES GROUP 21-22 Internet Privacy and Security Legislation.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Northside I.S.D. Acceptable Use Policy
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
THE LEGISLATIVE PROCESS
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
By Leo Koo and Chris Mendoza AP Government Mr. Lohman Period 4.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Basics of Privacy TC 310 June 16, Protections of Privacy Not explicitly protected (by Right)‏  Fourth Amendment is closest Penumbra Protection.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Internet regulation National limits of Internet Content.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer Legislation The need for computer laws Go to Contents.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
PROTECT IP ACT Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011 Presented by Vincent Feng and Roy Lin.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Internet Censorship Alex Lipp. The Bills in Congress PIPA — the Senate bill originally called the Protect IP Act. SOPA — the Stop Online Piracy Act —
Copyright 2006 Prentice Hall Prentice Hall PoliticalScienceInteractive Magleby et al. Government by the People Chapter 20 Special Topic The War on Terrorism.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
By Alec Sherwood, Billy Myers, Robin Roessner.  Bring attention to government proposed legislation  Talk about:  SOPA  PIPA  ACTA  CISPA  Database.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
SOPA, PIPA, & OPEN: What’s the Big Deal? Chris Sweet Technology and Pedagogy: Possibilities and Challenges January, 28 Illinois Wesleyan University.
STUDENT RIGHTS MINI-WRITE On a half sheet of paper write at least two paragraphs on the following questions: What rights do you have when you come to school?
Understanding the Constitution
Legislative Powers!.
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Courts System Search Warrants.
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
War on Terror.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Right to Privacy vs. National Security
Presentation transcript:

CURRENT LAWS, FUTURE LEGISLATION, AND PRIVACY ABUSES GROUP Internet Privacy and Security Legislation

What is Internet Privacy? Internet Privacy: “The right of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the internet.”  Wikipedia

Significant Legislation 1967 Katz v. United States 1986 – Electronic Communications Privacy Act Children Online Privacy Protection Act 2001 – PATRIOT ACT 2010 – Privacy Bill of Right 2012 – Cybersecurity Act / Secure It Act

Katz v. United States Does the right to privacy extend to telephone booths and other public places? Established the legal definition of “privacy” and “search.” Extended Fourth Amendment protection to all areas where a person has a “reasonable expectation of privacy.” Charles Katz had used a public pay phone booth to transmit illegal gambling wagers from Los Angeles to Miami Court rules 7-1 in favor of Katz  Wikipedia

Electronic Communications Privacy Act Enacted 1986 Boundaries for law enforcement to access personal electronic communication and stored electronic records Protects , pictures, and data from being accessed by law enforcement. Unlawful for an individual to reveal the information of electronic communications with the exception of a court order or subpoena Source: Wikipedia

Children Online Privacy Protection Act Federal Trade Commission creates COPPA, took effect in 2000 Limits the information gathered from children under 13 without parental consent Only personal information that is “reasonably necessary” for online activity Source: Wikipedia

PATRIOT Act President Bush responded to the 9/11 attacks with the “Uniting and Strengthening America by Providing Appropriate Tools Require to Intercept and Obstruct Terrorism Act” or Patriot Act Grants additional wiretapping and surveillance authority to federal law enforcement, removes barriers between law enforcement and intelligence agencies, and gives greater authority to the Attorney General to detain and deport aliens suspected of having terrorist ties Three key provision extended by President Obama  Roving wiretaps – US wiretap that follows a specific target  Searches of business records  Surveillance of “long wolves” – suspected of activity, but no link to group An “overboard and unjustified infringement of privacy, association, and due process rights.” - McCarthy, Michael T., 2002

Privacy Bill of Rights Developed by Obama Administration to suggest how companies should protect consumer online information 1 – Individual control 2 – Transparency 3 – Respect for context 4 – Security 5 – Access and Accuracy 6 – Focused collection 7 – Accountability Source: WhiteHouse.Gov

Current Cybersecurity Bills “Much of the debate so far has focused on whether proposed new regulations would be too onerous and costly for the private sector. Business interests have played a key role in crafting both proposals.” – Wall Street Journal Current legislation focuses on securing government networks and critical infrastructure Source: Wall Street Journal, March 9, 2012

Current Cybersecurity Bills Cybersecurity Act of 2012  Supported by President Obama, Sen. Susan Collins, Sen. Joseph Lieberman  Requires critical infrastructure companies to meet standards set by Department of Homeland Security  Free exchange of cyberthreat data between government and the private sector  Effectively gives cybersecurity power to Department of Homeland Security  Continuous monitoring of government networks for security gaps Source: Wall Street Journal, March 9, 2012

Current Cybersecurity Bills Secure it Act of 2012  GOP bill, response to Cybersecurity Act of 2012, sponsored by Sen. John McCain  Criminal Penalties for cybercrime particularly against critical infrastructure. Source: Wall Street Journal, March 9, 2012  “The Secure IT Act, would allow the NSA to collect the internet records of people who are not suspected of doing anything wrong. This unprecedented and broadly worded bill clears the way for internet providers, wireless carriers, and websites to share your personal information with military spy agencies.”  ACLU

Abuses of Privacy Robbins v. Lower Merion School District Google using Safari to plant illegal cookies

Robbins v. Lower Merion School District Two suburban Philadelphia high schools remotely activated webcams embedded in school-issued laptops while their students were at home Chat logs and records of visited websites kept 66,000 webshots and screenshots taken, including several of students in their bedrooms October 2010, school district agrees to settle for $610,000  wikipedia

Google using Safari to plant cookies Used special computer code to install “cookies” on devices set to block tracking Cookies are put onto Safari using an “iframe,” an invisible container that allows content from one website to be embedded within another site Google then inserted an invisible form into the container Google “submitted” the form automatically. From that point on, Safari behaves as though the user has filled something out intentionally, allowing Google to store the cookie on the user’s machine - 16 March, 2012 Wall Street Journal, Google in New Privacy Probes

Any society that would give up a little liberty to gain a little security will deserve neither and lose both  Benjamin Franklin

Question and Answers

Question 1 What does SOPA stand for A) Stop Online Privacy Act B) Stop Online Piracy Act C) Stop Online Piracy Administration

Question 1 What does SOPA stand for A) Stop Online Privacy Act B) Stop Online Piracy Act C) Stop Online Piracy Administration

Question 2 What does PIPA stand for? a) Protect intellectual property act b) Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act c) Protect IP Act d) B & C

Question 2 What does PIPA stand for? a) Protect intellectual property act b) Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act c) Protect IP Act d) B & C

Question 3 What companies protested SOPA A) Google B) Yahoo C) Facebook D) Twitter E) All of the Above

Question 3 What companies protested SOPA A) Google B) Yahoo C) Facebook D) Twitter E) All of the Above