Jan. 28, 2004UCB Sensor Nets Day1 TOWARD A LEGAL FRAMEWORK FOR SENSOR NETWORKS Pamela Samuelson, Law/SIMS UCB Sensor Nets Day January 28, 2004.

Slides:



Advertisements
Similar presentations
Socioeconomics knowledge cafe Wrap-up. Agreed the list of socioeconomic themes/issues that have dependencies with RWI research priorities Standardization.
Advertisements

The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
Using Information at the University University Secretarys Office
Hart District Acceptable Use Policy Acceptable Use Policy.
ONLINE PRIVACY & DATA PROTECTION VERINE ETSEBETH.
BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework.
NAU HIPAA Awareness Training
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
Creating a Winning E-Business Second Edition
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
CODE OF ETHICS South Australian Public Sector Public Sector Act, 2009.
Domain Name Registrant Data: The Privacy Questions Alan Davidson Center for Democracy and Technology
Basics of Privacy TC 310 June 16, Protections of Privacy Not explicitly protected (by Right)‏  Fourth Amendment is closest Penumbra Protection.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Privacy as an International Information Issue MD823 October 18, 2004.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Data Protection Act. Lesson Objectives To understand the data protection act.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
National Smartcard Project Work Package 8 – Security Issues Report.
In the Belly of the Breach: What Every In-House Counsel Needs to Know about Data Breach Response ACC International Legal Affairs Committee Legal Quick.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Mechanism Design for Voluntary Supply Chain Responsibility Initiatives Bruce Paton San Francisco State University Greening of Industry Network Conference.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Electronic Use Policies.   Social Media  Internet.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Media Literacy: Australian context & framework Nerida O’Loughlin General Manager, Outputs Division International Media Literacy Research Forum May 15 th,
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
+ Eyes in The Sky: Drones, Data and Privacy Unmanned Aircraft Association of Ireland 21 August 2015 Joseph Dalby & John Wright twitter:
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Data Protection Act AS Module Heathcote Ch. 12.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
RFID ( Electronic Tags ) Legal problems in Japan Takato Natsui Professor, Meiji University, Japan Practicing Lawyer (Asuka Kyowa Law Firm, Tokyo) Copyright.
Privacy and the Law in Demand Response Energy Systems Deirdre K. Mulligan, Jack I. Lerner Erin Jones, Jen King, Caitlin Sislin, Bethelwel Wilson, Joseph.
HIPAA Privacy The Morning After Panel What do we do now? William R. Braithwaite, MD, PhD (moderator) Washington, DC Ross Hallberg, Corporate Compliance.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems Marc Langheinrich - Swiss Federal Institute of Technology, Zurich Whitney Hess.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Personal data protection in research projects
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
1 Administrative Simplification: The Last Word National HIPAA Summit 8 Baltimore, MD March 9, 2004 William R. Braithwaite, MD, PhD “Doctor HIPAA”
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Data Protection GCSE ICT Mrs N Steventon-2005.
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Other Sources of Information
D3 Confidentiality.
TRUST:Team for Research in Ubiquitous Secure Technologies
Information management and communication
Regulating the Digital Economy
Presentation transcript:

Jan. 28, 2004UCB Sensor Nets Day1 TOWARD A LEGAL FRAMEWORK FOR SENSOR NETWORKS Pamela Samuelson, Law/SIMS UCB Sensor Nets Day January 28, 2004

Jan. 28, 2004UCB Sensor Nets Day2 IS FRAMEWORK POSSIBLE? Some existing laws will apply depending on nature of the sensor network deployment Some existing laws may not apply because they were adopted for different contexts Some new laws or regulations may be needed if sensor networks present issues existing laws don’t readily address Privacy most obvious issue, but others too

Jan. 28, 2004UCB Sensor Nets Day3 CONTEXT Redwoods going wireless –Trespass may apply if deploy sensor networks on owned land without permission –Environmental (if clutter of dead-ones?) Golden Gate Bridge –Sensing wind/weather data cf. sensing Fast- Track devices –EU: would need to get permission for collection/use of Fast-Track data

Jan. 28, 2004UCB Sensor Nets Day4 OTHER CONTEXTS Smart Buildings –Again, depends on what data being sensed Privacy if presence of humans Potential liability if bad data on structural integrity –Security responsibilities as to data collected Medical personalization –Privacy obvious but as to what/whom/purpose? –Confidentiality of doctor/patient relationship –Guardianship issues vis a vis families –Liability issues if bad data causes

Jan. 28, 2004UCB Sensor Nets Day5 WHAT ABOUT? Telecommunications laws (use of spectrum, FCC might have a role in regulating technology and uses)? Electronic Communications Privacy Act? Suppose wireless technology privacy law adopted for cellphones (what application to sensor networks? Computer Fraud & Abuse Act? Draft WIPO Broadcasting Treaty? EU Database Protection?

Jan. 28, 2004UCB Sensor Nets Day6 MODES OF REGULATION Norms (e.g., fair information practices) Market –Bad publicity, good publicity –Major purchasers influencing the market Technology –Encryption –Standards Law and policy

Jan. 28, 2004UCB Sensor Nets Day7 MODES OF LAW & POLICY Contracts/licenses (private regulation) Gov’t induced self-regulation (we will regulate unless you behave as we want you to) Bully pulpit (gov’t official speaks out on policy) Subsidies, taxes, other inducements Legislation –Can’t do X (no monitoring in bathrooms) –Must do Y (build tappable digital telephone system) Duties imposed by common law (keep in confidence if disclosed in confidence; fiduciary)

Jan. 28, 2004UCB Sensor Nets Day8 PRIVACY EVOLVING Initially, private property was key to privacy (what you do in privacy of your own home no one else’s business—Stanley v. GA) Trespass to land: property right in home; no need to prove harm; inviolability (may be relevant to sensor network deployment) Olmstead to Katz: gov’t tapping telephone call Olmstead: no trespass, so no 4 th A violation Katz: 4 th A protects people, not places; reasonable expectation of privacy in phone booth

Jan. 28, 2004UCB Sensor Nets Day9 TECHNOLOGY & EXPECTATIONS No need for law to protect privacy if technology doesn’t enable violation of it If advance in technology enables surveillance/monitoring, does privacy interest erode in the face of it? (not reasonable to expect privacy if technology enables violation?) Kyllo v. US: 4 th A violated by use of heat-sensing technology not in common use Wiretap law: illegal to intercept wire or electronic communication (even if it’s easy to do)

Jan. 28, 2004UCB Sensor Nets Day10 FAIR INFORMATION PRACTICES Limitations on collection of data (only what need); destroy data after need is fulfilled Right to collect data for specific purpose only; if want to reuse for other purpose, you have to get new permission Notice and choice Right of access to check data Obligations to keep data accurate, secure Accountability if screw up

Jan. 28, 2004UCB Sensor Nets Day11 SENSOR NETS POOR FIT? Data collection is norm Absence of cues that signal data collection Porous barriers between public and private spaces Everyone is a potential data collector New kinds of data “sensed” created, stored Increased ability to create patterns, knowledge out of seemingly unrevealing bits of data Once data collected, reuses easy but difficult to regulate (detect?)

Jan. 28, 2004UCB Sensor Nets Day12 MORE ON POOR FIT? Ability to influence behavior/alter environment in real-time based on data that may not meet definitions of personal info found in traditional data protection statutes Always on, broad accessibility Unclear responsibilities (duties of care owed to whom? Oops, sensors didn’t detect me in the building when earthquake; was this negligence?)

Jan. 28, 2004UCB Sensor Nets Day13 CONCLUSION Possible to build sensor networks in socially responsible way Law may provide helpful framework, but is also quite a blunt instrument Technology design may be better to protect privacy, other social interests California legislators/policymakers may be receptive if we can think of good framework