Information Security - Building Trust in Cyberspace iLaw Eurasia eGovernance Academy Tallinn 13-17 December 2004 James X. Dempsey Center for Democracy.

Slides:



Advertisements
Similar presentations
WTO, Trade and Environment Division
Advertisements

Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
CHAPTER 4 E-ENVIRONMENT
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Information Security Policies and Standards
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
INTERNET and CODE OF CONDUCT
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
National Smartcard Project Work Package 8 – Security Issues Report.
HUMAN RIGHTS BASED APPROACH See Me Brewing Lab Cathy Asante.
Legislation, Regulation, Guidelines
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Ioannis Iglezakis Directive on privacy and electronic communications.
Amicus Legal Consultants THE DEPLOYMENT OF SPECIAL INVESTIGATIVE MEANS IN PROACTIVE ANTI-CORRUPTION INVESTIGATIONS.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
DG Information Society The EU and Data Retention Data Retention Meeting London, 14 May 2003 Philippe GERARD, DG Information Society The positions.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Protection of Personal Information Act An Analysis on the impact.
ROMANIA NATIONAL NATURAL GAS REGULATORY AUTHORITY Public Service Obligations in Romanian Gas Sector Ligia Medrea General Manager – Authorizing, Licensing,
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Digital Single Market Valentinas KVIETKUS Baltic Assembly, Ryga
Surveillance around the world
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Data Protection: EU & International
General Data Protection Regulation
Data Protection Legislation
Bob Siegel President Privacy Ref, Inc.
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
The activity of Art. 29. Working Party György Halmos
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
The E-Commerce Act and the Right to Privacy
Presentation transcript:

Information Security - Building Trust in Cyberspace iLaw Eurasia eGovernance Academy Tallinn December 2004 James X. Dempsey Center for Democracy & Technology

The Elements of Trust Online 1. Protection of government secrets Protection of national security information Other sensitive government information 2. Protection of intellectual property- business secrets 3. Cybersecurity –Communications network reliability –Critical infrastructure protection -power, water –Cybercrime 4. Communications privacy 5. Data privacy (privacy of personally identifiable information) 6. E-signature and authentication 7. Consumer protection 8. Accuracy of information, defamation

Government secrets Protection of national security information –Definition: information generated by the government and its contractors, which, if publicly disclosed, will harm the national security. –Important question: Can the judiciary or some other independent official review and overturn the decision of the Executive Branch to keep information secret. Other sensitive government information Criminal investigative information Private information about individuals in the hands of the gov’t Gov’t secrets online and off are defined the same. Many countries deal with these issues in Freedom of Information law:

Cybersecurity Many communications networks and other critical infrastructures are privately owned Cybersecurity is shared responsibility of gov't, service providers, software and hardware makers, and users (large and small). Cybersecurity strategy has many components: –industry standards and sound technology design –information sharing about threats/vulnerabilities (CERTs) –awareness, education of all users –R&D –criminal law –liability of computer/software makers under civil law?

Cybersecurity Guidelines OECD Guidelines for Security of Information Systems and Networks APEC Strategy and Statement on the Security of Info and Communications Infrastructure EU - Council Resolution 28 OAS E-Japan Priority Policy Program (cybersecurity incorporated) Australia E-Security National Agenda US National Strategy to Secure Cyberspace & E-Government Act (cybersecurity included)

Common Themes in Int’l Guidelines Public-Private Partnerships Public Awareness Guidelines, International Standards Information Sharing Training and Education Respect for Privacy Vulnerability Assessment, Warning and Response International Cooperation

Gov’t Must Get Its Own House In Order Government should not dictate security technologies to industry until it has solved its own problems (that is, probably never) US E-Gov Act - Title III - limited to government systems - focuses on process, not technologies –Periodic assessment of risk –Adoption of policies and procedures –Chief Security Officer for every agency –Security awareness training –Detecting and responding to attacks –Annual reports to Congress on progress –Independent security evaluation –Office of Management and Budget (White House) authority Similar requirements may be appropriate for private sector, especially financial sector, medical data

Privacy is an Element of Cybersecurity “Protection of privacy is a key policy objective in the European Union. It was recognized as a basic right under Article 8 of the European Convention on human rights. Articles 7 and 8 of the Charter of Fundamental Rights of the EU also provide the right to respect for family and private life, home and communications and personal data.” Communication from the Commission on Network and Information Security (2001)

OECD Cybersecurity Guidelines Emphasize Privacy Principle 5: “Security should be implemented in a manner consistent with the values recognised by democratic societies including the freedom to exchange thoughts and ideas, the free flow of information, the confidentiality of information and communication, the appropriate protection of personal information, openness and transparency.”

Cybercrime Crimes against computers or communications –Interference with availability or integrity of data destroying data, altering data –Interference with availability of service Denial of service attacks –Interception of data in transit (unauthorized access to comms) –Unauthorized access to data (cyber trespass) CIA - Confidentiality, Integrity, Availability Crimes using computer –Fraud, dissemination of pornography, copyright infringement –Should not be treated as separate crimes Crimes where evidence is in computer –Any crime COE Convention on Cybercrime - good model, approach with caution

Criminal Law Has Limited Effect Under US law, such an is absolutely illegal Falsified header information - criminal and civil violation Hijacking another computer to send spam - criminal and aggravated civil violation Possible falsification of domain name registration information - criminal violation No valid physical address - civil violation No opt-out - civil violation Deceptive subject heading - civil violation Possible address harvesting - aggravated civil violation The solution to the cybercrime problem requires: International cooperation. Better technology design Education of users.

Phishing message  Message purporting to be from eBay  Threatens account termination  Asks user to update information  Uses eBay and Trust-e logos for legitimacy  Links to non-ebay site

Web site Looks like legitimate ebay site Asks for account and credit card info Sends info to phisher and not ebay

Intercepted Phishing s Source: MessageLabs Intelligence Annual Security Report. December 6, 2004

Investigation of Cybercrime To investigate cybercrime and crimes facilitated by computer, law enforcement agencies need access to –content of communications; –transactional (or traffic) data; –stored data; –data identifying subscriber (e.g., name)

COE Cybercrime Treaty - Art. 15 “Each party shall ensure that the establishment, implementation and application of the powers and procedures provided for in this section are subject to conditions and safeguards provided for under its domestic law, which shall provide for adequate protection of human rights and liberties …. “Such conditions and safeguards shall, as appropriate in view of the nature of the procedure or power concerned, inter alia, include judicial or other independent supervision, grounds justifying application, and limitation of the scope and the duration of such power or procedure.”

Surveillance Standards –Standards specified in legislation –Independent approval (preferably judicial) –Limited to serious crimes –Strong factual basis –Exhaustion of other approaches –Surveillance limited scope and duration –Minimization - evidence of wrongdoing –Use limitation - criminal justice and national security –Notice to target after completion of investigation –Redress for violations of standards European Court of Human Rights

Elements of Surveillance Law - Real-Time Interception -ECHR Standards for interception must be spelled out clearly in legislation, with sufficient precision to protect against arbitrary application. Approval should be obtained from an independent official (preferably a judge). Only for the investigation of serious offenses. Only upon a strong factual showing of reason to believe that the target of the search is engaged in criminal conduct. Only when it is shown that other less intrusive techniques will not suffice.

Elements of Surveillance Law -2 Each surveillance order should cover only specifically designated persons or accounts. The rules should be technology neutral – all one-to-one communications should in general be treated the same, whether they involve voice, fax, images or data, wireline or wireless, digital or analog. The scope and length of time of the interception should be limited. The surveillance should be conducted in such a way as to reduce the intrusion on privacy to the minimum necessary to obtain the needed evidence.

Elements of Surveillance Law -3 Information seized or intercepted for criminal investigative purposes may not be used for other ends (except national security). Summary reports back to the approving judge. In criminal investigations, all those who have been the subject of interception should be notified after the investigation concludes, whether or not charges result. Personal redress should be provided for violations of the privacy standards.

Transactional Data Also known as traffic data - connection data, dialed numbers, IP addresses, time, date, duration …. Disclosure implicates privacy interests. Malone, ECHR. But real-time surveillance may be authorized under a standard lower than that applicable to content interception and for all crimes. Internet poses special challenge: drawing line between content and traffic data. COE, Explanatory Report, para. 227.

Stored Data May be content or traffic data. Data stored with user - treated like any other evidence in the home or office and subject to protections accorded written documents. Data stored with service provider or other third party - disclosure generally implicates privacy interests. Distinction may be drawn between immediate seizure and procedures for delivery to government: –Immediate seizure usually requires highest form of approval. –Voluntary disclosures by service providers permitted in some cases - exceptions should be narrowly drawn.

Data Retention Should service providers be required to keep traffic data beyond time needed operationally? EU law permits but does not require states to adopt data retention laws. COE Cybercrime Treaty does not require companies to retain data or modify their systems to facilitate interception. US law does not require data retention. US law and the COE treaty provide for data preservation upon government request, with disclosure based on appropriate authorization.

Encryption On balance, strong encryption contributes to security and prevention of crime more than it facilitates crime OECD Guidelines and 1998 EC report supported availability of encryption. Canada, Germany, Ireland, France, Belgium, US, among others have eliminated or loosened restrictions on encryption. “The use of encryption technologies … [is] becoming indispensable, particularly with the growth in wireless access.” EC Commun- ication, Creating a Safer Info Society, 2001.

Anonymity In order to … enhance the free expression of information and ideas, member sates should respect the will of users not to disclose their identity.” COE Declaration, “An increasing variety of authentication mechanisms is required to meet our different needs in the environments in which we interact. In some environments, we may need or wish to remain anonymous.” EC Communication, "People who have been stealing our movies believe they are anonymous on the Internet. They are wrong. We know who they are, and we will go after them.” MPAA Pres. Dan Glickman, Washington Internet Daily, Nov 5, 2004

Summary Privacy and security are two sides of the same coin. Cybercrime legislation is one component of cybersecurity. Government will need access to communications and data, subject to procedural safeguards. Network security is the shared responsibility of the gov’t and the private sector. –Gov't protects its own networks, contributes to awareness, info sharing R&D. Government should not impose technical mandates. Laws will not make computer networks more secure. The problem of cybersecurity will be solved only when makers of computer technology build more secure systems and when owners, operators and users of computer systems operate their systems in more secure manner.

Consumer Privacy Consumer privacy protection in the US and Europe, as well as under the guidelines of the OECD, is based on the following principles: –Notice and Consent –Collection Limitation –Use/Disclosure Limitation –Retention Limitation –Accuracy –Access –Security –Enforcement EU data protection directive, 95/46/EC, html (unofficial) html

EU Electronic Communications Privacy Directive Article 4 - a provider of a publicly available electronic communications service must take appropriate technical and organizational measures to safeguard the security of its services. Article 5 - Member States are required to adopt national legislation to ensure the confidentiality of communications. –Expressly extends this confidentiality obligation to traffic data. –Such laws should prohibit listening, tapping, storage or other kinds of interception or surveillance of communications without the consent of the users concerned or pursuant to strictly limited legal authority, as permitted under Article 15 Article 9 - location data can be collected and used only in anonymous form or with the consent of users to the extent and for the duration necessary for the provision of value added services –

EU Electronic Communications Privacy Directive Article 6 - As a general rule, traffic data must be erased or made anonymous when it is no longer needed for the purpose of the transmission of a communication. –Limited data storage for billing permitted. Article 7 - Subscribers have the right to receive non- itemized bills if they do not want records kept of their calling behavior. Article 8 - Where Caller ID is offered, the service provider must offer calling parties, free of charge, the possibility to easily block presentation of the calling line number on a per-call and per-line basis. Must offer the called party the possibility to reject incoming calls where presentation of Caller ID has been blocked by the calling party.

EU Electronic Communications Privacy Directive Article 15 (1) provides that Member States may adopt legislative measures to restrict the scope of rights and obligations provided in Articles 5 (confidentiality of communications, 6 (automatic erasure of transactional data), 8 (regarding caller ID) and 9 (regarding location information) when the restriction constitutes a necessary, appropriate and proportionate measure within a democratic society to safeguard national security, defense, or public security or for the prevention, investigation, detection and prosecution of criminal offenses or to prevent unauthorized use of the electronic communications system. –

Privacy by Design Building privacy into the technology. Collection limitation –Don’t transmit, collect, retain, or share data unless essential –Example: Log retention Authentication ≠ Identification –Limit personally identifiable data –Allow for anonymity, pseudonymity, proxies, trust agents Enhance user control

Privacy by Design P3P - the Platform for Privacy Preferences User control E.g., Wireless location: Handset versus network Privacy Enhancing Technology Encryption Anonymizers Free or pre-paid services Cash - the best privacy technology in the world

Spam Percentage in Source: MessageLabs Intelligence Annual Security Report. December 6, 2004

EU Electronic Communications Privacy Directive Spam - opt-in (prior relationship - opt-out) Traffic data marketing - opt-in Cookies - opt-out –clear and precise information on their purposes and the opportunity to refuse them. Directories - opt-out Data retention - permitted but not required for law enforcement or national security - disclosure requires independent approval Directive 2002/58/EC /telecoms/regulatory/new_rf/index_en.htm /telecoms/regulatory/new_rf/index_en.htm

Consumer Protection Success of e-commerce depends on legal system recognizing and promptly enforcing electronic contracts (business to business and business to consumer) Consumer protection includes –Prohibition on misleading advertising –Regulation of consumer financial services and credit –Rules against fraudulent billing –Complaint resolution –Right to refund if goods are not delivered or defective

Consumer Protection Before closing contract, consumer should be provided –Identity and address of supplier –Description of goods and their price –Procedure for payment, delivery and performance (if buying a service) –Notice of “right of withdrawal” European Parliament & Council Directive 97/7/EC (17 February 1997) on the protection of consumers in respect of distance contracts – mmerce/3information/law&ecommerce/legal/documents/319 97L0007/31997L0007_en.htmlhttp://europa.eu.int/information_society/topics/ebusiness/eco mmerce/3information/law&ecommerce/legal/documents/319 97L0007/31997L0007_en.html European Parliament & Council Directive 2000/31/EC (8 June 2000) on electronic commerce – _31ec/2000_31ec_en.pdfhttp://europa.eu.int/ISPO/ecommerce/legal/documents/2000 _31ec/2000_31ec_en.pdf

Electronic Signatures Four sets of issues –“Writing” –“Signature” –Identity –Confidentiality, integrity, non-repudiation Definitions Electronic signature - any authentication by electronic means. Digital signature - specific kind of e-signature using encryption. First step - assess the legal barriers to online commerce

E-Signatures - Int’l Models Model Law for Electronic Commerce developed by the United Nations Commission on International Trade Law (UNCITRAL)  UNCITRAL Model Law on Electronic Signatures  EU E-Signature Directive These models recommend a very complicated structure - they try to solve all problems at once, including the very difficult question of stranger-to-stranger transactions

Electronic Signatures  The focus on e-signature laws is often misplaced. E- signature legislation is not the most important policy reform needed to support e-commerce and ICT development.  For e-commerce to flourish, other legal reforms are needed.  Banking Reforms  Credit cards  Electronic Funds Transfer  Redress  Consumer Protection Rules  Enforcement of Contracts - Judicial System  A simple e-signature law based on “business choice” can resolve most of the basic questions facing e- commerce.

Electronic Signatures Most B2B commerce is not between strangers. Most B2C commerce does not draw trust from the signature. It is very hard, and probably not necessary, to solve the pure stranger-to- stranger

Simple Approach to Electronic Signatures “Business choice:” Parties to a transaction should be allowed to adopt any technology they mutually agree upon in conducting their e-commerce activities. Limit government involvement Avoid government involvement in e-commerce systems that would limit the development of competition or market choice, e.g. licensing requirements.  Technology neutrality - National e-signature laws should not exclusively require any particular technology for creating electronic signatures. OK: presumption of legal validity to electronic signatures that use PKI technology. Not acceptable to make PKI the only legally recognized technology for e-signatures. Except: government may require particular standards or technologies (e.g., PKI) in interactions with government.

More Information Global Internet Policy Initiative (GIPI) Center for Democracy and Technology(CDT) Information Technology Security Handbook infoDev project, World Bank (Dec. 2003) International Guide to Combatting Cybercrime American Bar Association (2003)