NETWORK WARS P resentation to the 11th CACR Information Security Workshop & 3rd Annual Privacy and Security Workshop Privacy and Security: Totally Committed.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Confidentiality and HIPAA
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Police Integration & Oversight Canadian Association of Civilian Oversight in Law Enforcement June 2009.
Supporting and Protecting Adults From Harm Community Planning Board 10 th November 2011 Wendy Hinnie.
Complying with Privacy to Enable Innovation & Research
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Freedom of Information What does it mean for us? Introductory Training Session.
The Adult Support and Protection (Scotland) Act 2007 (“the Act”) Level 1.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
INTERNET and CODE OF CONDUCT
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Brad Butt MP February 10, – criminalize the advocacy or promotion of terrorism offences in general; – counter terrorist recruitment by giving our.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
1 OVERVIEW PRESENTATION FREEDOM OF INFORMATION (SCOTLAND) ACT 2002.
Legal Aspects of Computer System Security “Security - Protecting Our Resources”
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Other Laws (Primarily for E-Government) COEN 351.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Institute for Security Studies Institute for Security Studies Submission on the Anti-Terrorism Bill Some Comments and Suggested Approaches.
Unit 2 Human Rights Part 3 Civil and Human Rights.
ISPs – Internet’s Secret Police? Ian Kerr Canada Research Chair in Ethics, Law & Technology Université D’ Ottawa University of Ottawa Faculté de droit.
The law on Intermediary Liability in India
1 FINANCIAL INTELLIGENCE CENTRE AMENDMENT BILL Briefing to the Select Committee on Finance 10 June June 2008.
Stalking Awareness And Prevention Francis A. Arenas, Esq.
WELCOME BACK! ADMIN. LAW UNIT 6 ANN SANOK. THIS WEEK We look at an agency’s power to conduct inspections or to compel acts by individuals or companies.
Confidentiality of Government Records and Reasons for Refusal Presentation to Boards and Committees 18 th November 2008 Carole Excell FOI Unit.
POLICE POWERS ARREST.
TOURISM BILL “ THE CONTENTS ” Friday; 17 May 2013.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
PRESENTATION TO SELECT COMMITTEE ON SECURITY AND CONSTITUTIONAL DEVELOPMENT  CONSIDERATION BY PARLIAMENT OF PROCLAMATIONS IN TERMS OF SECTION 26 OF THE.
July 051 LIABILITY ISSUES FOR COAL MINE SURVEYORS Australian Institute of Mine Surveyors Seminar Catherine Bolger Association of Professional Engineers,
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 The Public Interest Disclosure (Whistleblower Protection) Act.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
Indiana’s Public Access Laws Heather Willis Neal Indiana Public Access Counselor Indiana Association of Cities and Towns Red Flag and Sunshine Workshop.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
Practical Analysis of Obstacles Encountered by Legal Services as Part of Access to Information Requests Presentation to the Canadian Institute at the Conference.
Andrea Neill Assistant Information Commissioner of Canada CAPA Conference Ottawa November 23,
TERRORIST FINANCING  Terrorist Financing Offence  Terrorist Financing Sanctions  Non-profit Organisations Desiree A. Downes Gogontle K. Gatang Attorney.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
Surveillance around the world
The Military Ombudsman Bill [B9 of 2011]
Wyoming Statutes §§ through
PRESENTATION TO SELECT COMMITTEE ON SECURITY AND CONSTITUTIONAL DEVELOPMENT 9 FEBRUARY :00 -11:30 PROCLAMATIONS BY THE PRESIDENT UNDER SECTION 26.
Data protection issues in regulatory investigations
Restrictions, including those restrictions permitted by the European Convention on Human Rights POLICE POWERS ARREST.
Move this to online module slides 11-56
11 Safeguarding Vulnerable Adults
PRESENTATION OF MONTENEGRO
Data protection & FOIA considerations
Telecommunications for Disaster Relief in Canada
Presentation transcript:

NETWORK WARS P resentation to the 11th CACR Information Security Workshop & 3rd Annual Privacy and Security Workshop Privacy and Security: Totally Committed November 7, 2002

2 Network Wars Richard C. Owens Executive Director Centre for Innovation Law and Policy 78 Queen’s Park Toronto, ON M5S 2C5 Canada Ph: (416) Fax: (416)

3 Anti-terrorism Plan: Canada’s Response to Terror Plan? Pre/post Sept. 11 amalgam of programmes Bill C-36, Anti-terrorism Act (“ATA”). Public Safety Act (PSA). Convention on Cybercrime. International Convention for Suppression of Terrorism Financing Other Activities\Budget Allocations\ Programmes.

4 Anti-terrorism Plan Focus on: –effects on protection of personal information –effects on information technology government ISP’s/Private sector Centre for Innovation Law and Policy is a multi disciplinary institute for the study of laws related to innovation--including computer laws.

5 Anti-terrorism Act ATA introduced October 15, Highly controversial; debate limited and Bill passed. Security of Freedom conference and book-- University of Toronto Faculty of Law.

6 Anti-terrorism Act Extremely complex bill; amends many other pieces of legislation, intermixes section numbers. 146 sections.

7 ATA: Security of Information Act The Security of Information Act is entirely new legislation to replace the outdated and unused Official Secrets Act. Not just restrictions on “official secrets”-- includes sections dealing with “economic espionage”.

8 ATA: Security of Information Act (continued) Offence of “Communicating a Trade Secret” Every person commits an offence who, at the direction of, for the benefit of, or in association with, a foreign economic entity, fraudulently or without colour of right and to the detriment of Canada’s economic interests, international relations or national defence or national security, (a) communicates a trade secret to another person, group or organisation; or (b)obtains, retains, alters or destroys a trade secret.

9 ATA: Security of Information Act (continued) Definition of “Trade Secret” Any information, including a formula, pattern, compilation, program, method, technique, process, negotiation position or strategy or any information contained or embodied in a product, device or mechanism that: (a) is or may be used in trade or business; (b) is not generally known in that trade or business; (c) has economic value from not being generally known; and (d) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

10 ATA: Security of Information Act (continued) -- First Canadian statutory definition of trade secret. –First Canadian criminalization of release of trade secrets. –Very broad provision--could easily include permitting the download of restricted software. –“Foreign economic entity” includes “an entity that is controlled, in law or in fact, or is substantially owned, by a foreign state or a group of foreign states”--I.e., most universities and university spin-off’s Retention alone constitutes the offence.

11 ATA (continued) (Act also criminalises release of information relating to a patent assigned to the Minister of Defence under the provisions of section 20 of the Patent Act, as well as information relating to the terms of the assignment of the patent).

12 ATA: Security of Information Act (continued) Increasing the Capacity of a Foreign Entity 16(1) Every person commits an offence who, without lawful authority, communicates to a foreign entity or to a terrorist group information that the Government of Canada or of a province is taking measures to safeguard if (a) the person believes or is reckless as to whether the information is information that the government of Canada or of a province is taking measures to safeguard; and (b) the person intends, by communicating the information, to increase the capacity of a foreign entity or terrorist group to harm Canadian interests or is reckless as to whether the communication of the information is likely to increase the capacity of a foreign entity or terrorist group to harm Canadian interests.

13 ATA: Security of Information Act (continued) –“Lawful authority” is a high standard. –“Taking measures to safeguard” is a very low standard. –“Foreign entity” is very broadly defined to include any state controlled enterprise.

14 ATA: Security of Information Act (continued) – Another offence is that of “Harming Canadian interests” 16(2) – essentially similar components as 16(1); this offence needs to result in actual harm to Canadian interests, but has lesser intention requirement.

15 ATA: Security of Information Act (continued) Harming Canadian Interests: Every person commits an offence who, intentionally and without lawful authority, communicates to a foreign entity or a terrorist group information that the Federal or a provincial government is taking measures to safeguard if (a) the person believes or is reckless as to whether the information is information that the government is taking measures to safeguard; and (b)(b) harm to Canadian interests results. No “telecommunications exemption” exceptions for professionals; no exceptions for public interest advocacy; no exceptions for business people acting in their own enlightened self interest.

16 ATA: Criminal Code Orders to Block and or Delete Content (320.1): If a judge is satisfied by information on oath that there are reasonable grounds for believing that there is material that is hate propaganda within the meaning of subsection 320(8) or data within the meaning of 342.1(2) that makes hate propaganda available, that is stored on, and made available to the public through a computer system within the meaning of subsection 342.1(2) that is within the jurisdiction of the court, the judge may order the custodian of the computer system to: (a) give an electronic copy of the material to the court; (b) ensure that the material is no longer stored on and made available through the computer system; and (c) provide information necessary to identify and locate the person that posted the material.

17 ATA: Criminal Code (continued) Orders to Block and or Delete Content (continued) -CCTA (Canadian Cable Television Association) submissions suggested removing the words “stored on and”, because of the difficulty of assuring that all content was removed from mirror sites, caches, backup servers and the like. -Breach of the order can result in contempt of court penalties. -One Al Quaeda-linked site taken down

18 ATA: Criminal Code (continued) Orders to Block and or Delete Content (continued) –Related to Canada’s laws against hate propaganda, sections , of the Criminal Code.

19 ATA: Communications Security Establishment The ATA includes entirely new legislation governing the CSE, the equivalent of the NSA in the United States. Purpose of the CSE is: (a) to acquire and use information from the global information infrastructure for the purpose of providing foreign intelligence, in accordance with Government of Canada intelligence priorities; (b) to provide advice, guidance and services to help ensure the protection of electronic information and of information infrastructures of importance to the Government of Canada; and (c) to provide technical and operational assistance to federal law enforcement and security agencies in the performance of their lawful duties.

20 ATA: Communications Security Establishment (continued) CSE is intended to collect foreign intelligence from the “global information infrastructure”, which is defined to include: –…electromagnetic emissions, communications systems, information technology systems and networks, and any data or technical information carried on, contained in or relating to those emissions, systems or networks. However, there are new privacy restrictions on the CSE,as a result of its new ability to intercept signals of Canadian origination (hitherto restricted by the Criminal Code).

21 ATA: Communications Security Establishment (continued) Such interceptions can be authorised by the minister (and they will be), if: –The Interception is necessary –The information could not be readily obtained by other means –consent could not be readily obtained –satisfactory measures are in place to ensure that only essential information will be used or retained; [n.b.--not intercepted] –satisfactory measures are in place to protect the privacy of Canadians [in the minister’s discretion, subject to commissioner [supernumerary judge] oversight.

22 ATA: Communications Security Establishment (continued) These arise from the fact that protecting Canada’s networks, CSE will be intercepting communications directed to damaging Canada’s networks, which cannot in advance be known to originate in Canada. The address or packet address may indicate Canadian origination and the information therein may therefore be protected by Canada’s privacy laws.

23 ATA: Communications Security Establishment (continued) As yet, no experience with how this section will be applied--meetings are going on now within the federal government.

24 ATA: Federal Privacy Legislation Federal privacy legislation requires disclosure of information held about an individual to that individual upon request. The Anti-terrorist Act, by introducing a new section 38 of the Canada Evidence Act, grants the Attorney General the discretionary power to issue a certificate overriding a court order for disclosure of information. The Federal Privacy Act is also amended to provide for the confidentiality of information which is a subject of a certificate under section 38. Prevents “back door” release of information from another jurisdiction; limits oversight by Privacy Commissioner.

25 ATA: Canadian Human Rights Act ATA (amends the Canadian Human Rights Act section 88) to provide: (2) For greater certainty, subsection (1) applies in respect of a matter that is communicated by means of a computer or a group of interconnected or related computers, including the Internet, or any similar means of communication, but does not apply in respect of a matter that is communicated in whole or in part by means of the facilities of a broadcasting undertaking. Removed ambiguity from Canadian Human Rights Act with which Canadian Human Rights Commission wrestled in the Zundel case.

26 ATA: Criminal Code Additions to section 83 to the Criminal Code provide for offenses relating to financing terrorism. Extremely broad: Every one who, directly or indirectly, wilfully and without lawful justification or excuse, provides or collects property intending that it be used or knowing that it will be used, in whole or in part, in order to carry out (a) an act or omission that constitutes an offence referred to in subparagraphs (a)(i) to (ix) of the definition of “terrorist activity'” in subsection 83.01(1); or (b) any other act or omission intended to cause death or serious bodily harm to a civilian or to any other person not taking an active part in the hostilities in a situation of armed conflict, if the purpose of that act or omission, by its nature or context, is to intimidate the public, or to compel a government or an international organization to do or refrain from doing any act, is guilty of an indictable offence and is liable to imprisonment for a term of not more than 10 years.

27 ATA: Criminal Code is similar, but makes to a person who “makes available property or financial or other related services” Every one who, directly or indirectly, collects property, provides or invites a person to provide, or makes available property or financial or other related services (a) intending that they be used, or knowing that they will be used, in whole or in part, for the purpose of facilitating or carrying out any terrorist activity, or for the purpose of benefiting any person who is facilitating or carrying out such an activity; or (b) knowing that, in whole or part, they will be used by or will benefit a terrorist group, is guilty of an indictable offence and is liable to imprisonment for a term of not more than 10 years.

28 ATA: Criminal Code refers to everyone who “uses” or “possesses” property knowing it will be used. These sections are extremely broad; could apply to an Internet services provider providing a website for an organization subsequently deemed to be a terrorist organization. As one commentator said, “Could apply to serving food in a restaurant”.

29 Public Safety Act(#1) Omnibus legislation amending several acts. Amends Aeronautics Act to permit communication of the names of U.S. bound passengers. Amendments to the National Defence Act provides authority to the Canadian Forces to protect their computer systems and networks from attack or manipulation. Revisions to Immigration Act require transportation companies to provide information to the government about passengers on route to Canada. (now part of Immigration and refugee protection Act) Reintroduced October 31, 2002

30 Other Parts of the Plan Convention on cybercrime. –Consultation on Lawful Access International convention for suppression of terrorism financing.

31 Other Parts of the Plan OCIPEP--Office of Critical Infrastructure Protection and Emergency Preparedness –Y2K threat (remember?). –Coordinates cyber security exercises with the United States. –Provides technical advice, R&D, etc. –Monitors cyber attacks and other threats to government systems and issues alerts –Coordinates federal response to threats/incidents –Publicises system vulnerabilities. –Efforts criticised by Auditor General

32 Other Parts of the Plan (continued) Systems integrity testing services, CSE. Cooperation on security amongst government, private sector. Cooperation on protocols for release of information in accordance with privacy legislation, telecommunications regulation and criminal procedure. (Consurtation on Lawful Access.

33 For Much More Information...