31 March 2003 1 CMU Sustainable Computing Consortium, Tempe, Arizona Trust in Mobile & Context-Aware Computing: Legal Perspectives W. Scott Blackmer, Esq.

Slides:



Advertisements
Similar presentations
UN Comprehensive Study on Cybercrime
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
CHAPTER Current Future Contract Law for E-Commerce Current Future Contract Law for E-Commerce 9.
Confidentiality, Ethics, Privacy, and Access REPORT FROM CONFIDENTIALITY, ETHICS, PRIVACY AND ACCESS Group B.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
E-Commerce: Legal and Practical Issues Legal Issues: Security – December 2, 2005 Stephen M. Foxman Philadelphia.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
ESIGN 101 Ken Moyle Margo Tank David Whitaker Chief Legal Officer
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Legislation, Regulation, Guidelines
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Business Law for the Entrepreneur and Manager
(Edited) WORKPLACE PRIVACY.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Other Laws (Primarily for E-Government) COEN 351.
Chapter 14 E- Contracts. 2 Chapter Objectives 1. Discuss whether shrink-wrap and click- on agreements are enforceable. 2. Describe the nature and function.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
ELECTRONIC BUSINESS TRANSACTIONS Issues Covered in Chapter –Jurisdiction –Infringement and Cybersquatting –Internet Privacy and Database Protection –E-Commerce.
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
The Model Rules of Professional Conduct and Electronic Tools: How Ethical Rules Must Adapt to Address Current and Forthcoming Technologies By Melissa Freeman.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Business Law with UCC Applications,13e Written Contracts and Cyber-Commerce Chapter 11 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies,
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Electronic Records Management Alan Cameron Records Management Consultant.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Chapter 12 E-Contracts.  What are some important clauses that offerors should include when making offers to form e-contracts?  What are shrink-wrap.
Chapter 10 Cyberlaw, Social Media, and Privacy
Data Protection Act and Other Laws
Electronic Transactions & Authentication
E&O Risk Management: Meeting the Challenge of Change
eSignature, Forms Management and Systems Integration
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Move this to online module slides 11-56
Legislation, Regulation, Guidelines
Mandatory Breach Reporting (isn’t *that* bad)
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Legal Terms electronic commerce (p. 284) electronic signature (p.286)
Presentation transcript:

31 March CMU Sustainable Computing Consortium, Tempe, Arizona Trust in Mobile & Context-Aware Computing: Legal Perspectives W. Scott Blackmer, Esq.

31 March 2003 CMU Sustainable Computing Consortium, Tempe, Arizona2 Legal Aspects of Trusted Computing Identification & Authentication –Who is responsible, for what messages or acts; appropriate levels of authentication and formality –Contracts, torts, defamation, IPR, criminal law Proof & Non-Repudiation –Evidence stored and protected, links to disclosures and terms, indication of assent Privacy & Security –Enforcing promises and mandatory standards –Often requires role-level access Protection of Consumers, Children –Disclosures, descriptions, warranties, and restrictions Jurisdiction –Context-aware systems may provide more certainty

31 March 2003 CMU Sustainable Computing Consortium, Tempe, Arizona3 Electronic Contracting The stage is set for m-commerce US federal E-SIGN (2000), UETA, UCC Art. 2, UCITA all recognize e-signatures, e-contracts, e-records, e-agents; technology-neutral Exceptions for certain transactions (land, wills, etc.) Consumer consent required for e-records E-records must be accurate, accessible Similar laws worldwide, based on UNCITRAL model law on e-commerce EU E-Signatures Directive (1999) adds legal presumptions for “advanced” e-sigs using an approved method or certification authority

31 March 2003 CMU Sustainable Computing Consortium, Tempe, Arizona4 Privacy & Security Increasingly mandatory US: Diverse federal and state laws –telecom and cable subscribers, telemarketing, fax ads, spam –intercepts and unauthorized access –financial and health records, children online –FTC, state, and private litigation on fraud, unfair practices EU: general and communications data protection directives; widely copied Context-awareness means more personal data, more risk of loss, theft, misuse: with greater knowledge comes greater responsibility Newer privacy laws, contracts include security obligations and standards

31 March 2003 CMU Sustainable Computing Consortium, Tempe, Arizona5 Location-Based Services & Surveillance The rules are not mature US e-911 mandate; Korea, etc. – beginning to see LBS issues on confidentiality, advertising, records EU Privacy and Electronic Communications Directive (effective Oct. 2003): –opt-in consent for ads and value-added mobile services –no surveillance beyond stated purposes or police powers New government surveillance powers in US, Europe; duty to cooperate and report Untested scope of US privacy torts, computer crimes Employer surveillance & monitoring unresolved RFID and GPS chips raise new issues of notice, consent, and purpose-limitation