Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Public Records Office Indiana Access to Public Records Act and Responding to Subpoenas Employee Training.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Fiducianet, inc. tm 1 Presented by H. Michael Warren, President fiducianet, inc. VoIP Technology Perspectives Law Enforcement Concerns & CALEA Compliance.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
1 Regulatory Framework for C&I Regimes Presented by Andrew Kwan ITU Consultant Conformity and Interoperability Training for ARB Region on Type Approval.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
CALEA: The Communications Assistance for Law Enforcement Act Doug Carlson, Executive Director, Communications and Computing Services, NYU Mark Luker, Vice.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
Privacy Issues in Libraries and Research Collections Eileen Brady Washington State University Libraries Margaret Schroeder The Oriental Institute.
Federal Bureau of Investigation
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Other Laws (Primarily for E-Government) COEN 351.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Cyber Security Training Assessment for Indian Army Cyber security for Social Networking 18 February 2015 Command HQ complex, Delhi Cantt.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
CALEA Status Overview Common Solutions Group September 20, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Communications Assistance for Law Enforcement Act & Higher Education: or How I Learned to Stop Worrying and Love Wiretaps Terry Hartle American Council.
Information Privacy: Public Policy and Institutional Policies Wendy Wigen Policy Analyst, EDUCAUSE Copyright Wendy Wigen, This work is the intellectual.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Imperfect Ideologies Modern Challenges to Liberalism in an Evolving World Michael Blouin.
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Legislative Powers!.
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Surveillance around the world
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Lesson # 7 A Practical Guide to Computer Forensics Investigations
How Does Electronic Surveillance Work Legally?
Intercepting Communications
Confidentiality October 14, 2005.
Electronic Surveillance, Post 9/11
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Presentation transcript:

Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE

Introduction How is law enforcement going to operate in an electronic and interconnected world? What role will institutions of higher education play conducting monitoring and surveillance on behalf of the government? What is the legal framework that will govern law enforcement and intelligence access to information?

Current Legal Framework Bush Administration Policy U.S. Constitution –4 th Amendment: protection against “unreasonable search and seizure” Federal Law –Foreign Intelligence Surveillance Act (FISA) –Title 18 of U.S. Code –Electronic Communications Privacy Act (ECPA) –FERPA, HIPAA, GLB Act, etc. State Law

USA PATRIOT Act Uniting and Strengthening America (USA) by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Sunset Provisions: –e.g., emergency disclosures of without a court order, interception of computer trespasser communications without a court order, lowering standard for pen registers and trap and trace devices under FISA, access to business records under FISA, etc. Permanent Provisions –e.g., pen registers for the Internet, National Security Letter exceptions to privacy laws, definition of domestic terrorism, sneak and peek searches, etc.

Communications Assistance for Law Enforcement Act (CALEA) Requires facilities based internet service providers to standardize their equipment to facilitate wiretaps. By Court decision: private networks are exempt: –Are you a private network? –Do you support the connection to the commercial ISP?

To comply or not to comply? Don’t support the connection Support the connection Private Network Exempt Compliance required at gateway Public Network Exempt * Full compliance required

Mandatory Data Retention Why is data retention necessary or desirable? (i.e., what is the problem we are trying to solve?) Scope: –What data is to be retained? –Who should data retention requirements apply to? How do we accomplish the desired goals?

Policy Issues Do these laws: 1.Pose a threat to personal privacy and security? 2.Undermine public trust in the Internet? 3.Impact competitiveness and innovation? 4.Show promise of being effective? 5.Create undue burden and expense?

Practice Implications Take stock of logging and monitoring practices Establish privacy policies and practice “data minimization” Secure information captured and retained Develop and enforce internal policies and procedures for use of information

Responding to “Compulsory Legal Requests for Information” Designate or person or office to receive all requests and coordinate responses –Not just an IT issue! –Someone knowledgeable of basic issues –Develop working relationships with others Types of compulsory legal requests Common issues Reference Guide Resources

CALEA Technical Requirements Status of Trusted Third Party Providers Status of equipment venders Standards process “Without standards, there is no safe harbor”

CALEA Security and Personnel Requirements A (telecommunications carrier) shall: 1. Appoint a single point of contact 2. Establish standard operating procedures 3. Report any act of compromise 4. Maintain secure and accurate records

Conclusion How law enforcement will operate in an electronic and interconnected world The role that institutions of higher education will play in conducting monitoring and surveillance on behalf of the government The emerging legal framework that will govern law enforcement and intelligence access to information

Discussion For more information, contact: Rodney Petersen, Wendy Wigen,