1 E-Courts: Toward Information Protection Management Structures Presentation to the RNSA Workshop “Social Implications of Security Measures” University.

Slides:



Advertisements
Similar presentations
A centre of expertise in data curation and preservation DCC Workshop: Curating sApril 24 – 25, 2006 Funded by: This work is licensed under the Creative.
Advertisements

Access to Court Records Developments in New Zealand.
Performance Framework Part 2 – Performance and Resource Management Multi Donor Trust Fund for Justice Sector Support in Serbia.
PLANNING AND IMPLEMENTING AN eAppeal: THE BRITISH COLUMBIA EXPERIENCE Tim Outerbridge, Law Officer, BC Court of Appeal Andrew Clark, Consultant.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Leveraging Assets: Experiences and challenges in ensuring finances, human resources, asset management and legislation enable a functioning health information.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
0 AT&L Service-oriented Architecture (SOA) Demonstration Briefing Presented: DAMIR Conference - October 30 and 31, 2007 Gary R. Bliss Acquisition Resource.
29 May 2006 Social Implications of National Security 1 Social Implications of Information Security Measures on Citizens and Business Research Network for.
Day: Thursday 10 th November Session: 14.30am Coordinators: Ian Williamson & Stig Enemark Topic:Components of the vision- break out groups.
CICT Policy Conference Implications of Private Equity Ownership of Information Infrastructure: The case of TDC Grit Munk, Danish Consumer Council.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
IT in Education. No. of Students Enrollment Rate Annual Increase Employees Schools Budget General Education 1,100,000 98,7% 6% 47, US$M.
The Trusted Digital Repositories Checklist Government Records and Archives Aspects Dr Stephen Ellis Assistant Director – General Government.
Project background: preserving legislative digital records Minnesota Historical Society National Digital Information Infrastructure and Preservation Program.
The Internet Ecosystem: players and actors
Proposed Whole of Government Direction for ICT Functional Leadership Workshop for monitoring departments 28 November 2013 John Roberts
Ganesh Prasad Bhatta (M.Sc., Land Administration) Chief Survey Officer, Survey Department February 8, 2013, Friday Spatially enabled e-governance: in the.
Chinese-European Workshop on Digital Preservation, Beijing July 14 – Network of Expertise in Digital Preservation 1 Trusted Digital Repositories,
Tourism Skills Delivery: Sharing Tourism Knowledge Online 1.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
ISSA European Network Technical Seminar on efficient e-services in Social Security Warsaw, 24 th of May 2012 Dr. Jens Bruhn Deutsche Rentenversicherung.
1 KEY PERSONNEL SUGGESTING FORMAT FELIX E.O OPATA MBA (STRATEGIC PLANNING & MGT.) BSC.HONS.(BIOMEDICAL SCIENCES) DIPLOMA MANAGEMENT (CAMB).
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Open Data from Reliable Records Anne Thurston. The Open Data movement, a key aspect of Open Government, is now a top development interest across the world.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
David N. Wozei Systems Administrator, IT Auditor.
Results of audit “Quality of public services in the information society” Markko Kard Alo Lääne The 9th Annual Meeting of the Representatives of the Baltic,
Evaluating trusted electronic documents Petr Švéda Security and Protection of Information ‘03 © 2003 Petr Švéda, FI MU.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
How OAIS and OA IR you? Developing workflows in publishing, promoting, and preserving faculty grey literature within a university Plato L. Smith II; Digital.
DIGITAL EVIDENCE BEFORE THE COURT: LAW, THEORY AND PRACTICE 2-3 April 2004 University of Wroclaw, Faculty of Law.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
International Telecommunication Union Accra, Ghana, June 2009 Towards Cyber Security - Kenyan Experience Christopher Kemei, Asst. Director Licensing.
Gateways Heather Brown Project Officer, State Library of S.A, for Business Information Program, University of S.A. and Assistant Director, Paper, Artlab.
ICT AND ALTERNATIVE DISPUTE RESOLUTION Knowledge Society and the Law Alberto Fortún© Consiglio Nazionale delle Ricerche Rome, 26 April 2004.
15th Pacific Basin Nuclear Conference, Sydney, 2006 Nuclear Regulatory Decision Making The Australian Context John Loy CEO Australian Radiation Protection.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
Session 7: Towards a more transparent and accountable public administration Central Electronic Registry of Public Procurement 8 th Quality Conference Ioannis.
OCLC Online Computer Library Center “HTTP 404: Not Found” Incentives to Preserve Government Information Brian Lavoie OCLC Research Sixth Annual State GILS.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Dariusz Maślak - Project Manager, IT Department, Appeal Court in Wrocław CEPEJ Plenary Meeting, 10 December 2015.
ACTIVITIES REPORT ALBANIA NATIONAL CHAMBER OF PRIVATE BAILIFFS.
Engaging the Judiciary/Policy makers in advocating for rights based approaches to HIV and TB Johannesburg, South Africa April 2015.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
Urban Infrastructure and Its Protection Responding to the Unexpected Interest Group Report.
Conference Pan-European eGovernment services for citizens & enterprises E.3 Services for enterprises Development and improvement of Information Systems.
Database Laboratory Regular Seminar TaeHoon Kim Article.
DATA COLLECTION AND RECORD MANAGEMENT PRESENTED BY: MRS OLUWAFOLAKEMI A. AJAYI DEPUTY BURSAR UNIVERSITY OF IBADAN 5 TH APRIL 2016.
Evolving Best Practice in Governance Policy Developing Consumer Confidence in Risk Analysis Applied to Emerging Technologies Department of food science.
ADDRESS BY MINISTER OF COMMUNICATIONS Dr Ivy Matsepe-Casaburri LAUNCH OF ELECTRONIC COMMERCE POLICY July 1999.
Barbara Sierman SCAPE Training Statsbiblioteket, Aarhus, November 2013 Preservation Policy in SCAPE.
Project Management PTM721S
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
DEPARTMENT OF CORRECTIONAL SERVICES
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Discussion of CRVS strategies
JRA3 Introduction Åke Edlund EGEE Security Head
Information Technology Controls
Computerized Systems in Clinical Research
Challenging Issues in small business/ ICT research Introduction to LIAISE Dr Rafael Paguio Victoria University ASEAN academic partnerships.
IMPLEMENTATION OF LAND POLICY INITIATIVE DECLARATION IN THE CONTEXT OF KENYA’S EXPERIENCE IN THE FORMULATION AND IMPLEMENTATION OF NATIONAL LAND POLICY.
E-Justice in Bulgaria Bogdan Petrov, Esq. CLICT Co-Founder & Expert
Cybersecurity in Belarus a general overview of support areas
Theme 1: Strengthening of local community structures
Public Key Infrastructure
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
Building trust in public sectors ict
National Student Enrollment Registry
Presentation transcript:

1 E-Courts: Toward Information Protection Management Structures Presentation to the RNSA Workshop “Social Implications of Security Measures” University of Wollongong 29 May 2006 Mark Burdon & Dr. Lauren May Information Security Institute (ISI) Queensland University of Technology

2 Introduction Electronic courts (e-courts) research Electronic courts (e-courts) research Relatively un-chartered territory Relatively un-chartered territory Background paper to raise potential IS issues Background paper to raise potential IS issues Lessons learnt - USA to Australia Lessons learnt - USA to Australia Develop IS management structures & standards Develop IS management structures & standards Specific to e-courts Specific to e-courts

3 Definitions Information protection is information security Information protection is information security Defining e-courts Defining e-courts The “paperless trial”, the web-based forum or the automated process? The “paperless trial”, the web-based forum or the automated process? “a body with an adjudicative function that makes use of ICTs to run proceedings.” “a body with an adjudicative function that makes use of ICTs to run proceedings.” Defining courtroom technology Defining courtroom technology …generic expression…numerous forms of technology…may or may not be present in a courtroom. (Lederer, 2005) …generic expression…numerous forms of technology…may or may not be present in a courtroom. (Lederer, 2005)

4 E-courts in Action Courtroom 21 - the “paperless court” Courtroom 21 - the “paperless court” e_45_2004.asp?pageid=666&co_pageid=2 e_45_2004.asp?pageid=666&co_pageid=2 e_45_2004.asp?pageid=666&co_pageid=2 e_45_2004.asp?pageid=666&co_pageid=2

5 Overview of Integrated E-courts

6 E-courts & IS – The US Experience National Center for State Courts (NCSC) National Center for State Courts (NCSC) E-courts Conference 2004 E-courts Conference 2004 Messing & Teppler Messing & Teppler Transparency and reliability challenges Transparency and reliability challenges Issues of trust and integrity of judicial orders Issues of trust and integrity of judicial orders Real-life Californian example Real-life Californian example “no longer can we presume courts have authoritative record … unless court computer security is technically assured” “no longer can we presume courts have authoritative record … unless court computer security is technically assured”

7 Implications for Australian E-courts QUT E-courts Conference - Caelli 2003 QUT E-courts Conference - Caelli 2003 SMH e-court layout SMH e-court layout Three potential issues Three potential issues End to end security End to end security Security of court archives Security of court archives Time/date stamping & electronic signatures Time/date stamping & electronic signatures Security issues to address Security issues to address

8 Preliminary Findings & Contentions Lack of formal research Lack of formal research Ad hoc development to process realignment Ad hoc development to process realignment Initially… limited ICT use – small risk Initially… limited ICT use – small risk Now…court systems re-aligning processes Now…court systems re-aligning processes Future…increasing risk Future…increasing risk Courts need total confidence in the integrity of their systems Courts need total confidence in the integrity of their systems Significant damage to court reputation Significant damage to court reputation Society trust in court decisions Society trust in court decisions Critical information infrastructure Critical information infrastructure

9 Next Steps ARC Linkage Grant ARC Linkage Grant Develop IS management structures Develop IS management structures Identify usage properties & match to IS techniques Identify usage properties & match to IS techniques “Lessons learnt” from the USA “Lessons learnt” from the USA Develop IS standards Develop IS standards Quality service of technology Quality service of technology Achieve fundamental security goals Achieve fundamental security goals A conceptual “set of standards” A conceptual “set of standards” Upper management to best practice checklist Upper management to best practice checklist

10 Summary ICT usage is increasing in courts ICT usage is increasing in courts National interest - integrity of E-court process National interest - integrity of E-court process System of certainty could become uncertain System of certainty could become uncertain Instability could weaken trust & confidence Instability could weaken trust & confidence IS framework vital to e-court development IS framework vital to e-court development While structures are constructed While structures are constructed Central and not afterthought Central and not afterthought Challenge automatic assumptions Challenge automatic assumptions Informed policy making about future of IS & e-courts Informed policy making about future of IS & e-courts

11 Thank You Questions? Questions?