Use Policies Deputy Attorney General Robert Morgester

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Consent.
News Gathering & the Law The Role of the First Amendment The text of the First Amendment, by its terms, says nothing about a right to gather news or a.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Civil Liberties and Public Policy Chapter 4. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against.
BELMONT UNIVERSITY AMERICAN INN OF COURT SEPTEMBER 9, 2014 PRESENTED BY KRISANN HODGES DEPUTY CHIEF DISCIPLINARY COUNSEL - LITIGATION BOARD OF PROFESSIONAL.
Successful Solutions Professional Development LLC A Basic Approach to Child Safety Chapter 4 Mandated Reporting Law.
Child Protection Policies Training Prepared by: SUNY Office of General Counsel SUNY Compliance Office 2015.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
HUMAN RESOURCES ISSUES American University March 9-14, 2003.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
1 Disclosing Student Personal Information to the Queensland Police Service 1-2 July 2008 RED/EDS Business Meeting.
INTERNET and CODE OF CONDUCT
 The 4 th Amendment limits the powers of government officials to search and seize individuals, their homes, their papers, and other property.  The 5.
Yes No Yes No Yes No Yes No Yes No Yes No Yes No.
EMPLOYER/EMPLOYEE PRIVACY RIGHTS
(Edited) WORKPLACE PRIVACY.
“How Private Is It?”.  Resources  Learning Opportunities  Reporting  Policies and Procedures.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
SPC Duckwiler, e:\adlaw\cp2.ppt OFFICE OF THE STAFF JUDGE ADVOCATE OVERVIEW Constitutional Basis Statutory Framework Regulations.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Electronic Use Policies.   Social Media  Internet.
Civil Liberties and Public Policy
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
1 VIDEO SURVEILLANCE (public/private areas) TOMÁŠ MIČO The Office for Personal Data Protection of the Slovak Republic.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
The Right to Privacy. No where in the Constitution are the words “right to privacy”
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Regulating Employee Use of Social Media Health Directors Legal Conference April 26, 2012 Diane M. Juffras School of Government UNC- Chapel Hill.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
North Carolina TASC Clinical Series Training Module Two: Confidentiality.
School District Records Lindsay Hale David Wheelus Assistant Attorneys General Open Records Division Views expressed are those of the presenter, do not.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Six: Warrantless Arrests and Searches This multimedia product and its contents are protected.
Data Practices in Minnesota December Outline for this presentation Minnesota data practices laws Classification of government data Government entity.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
The Bill of Rights and the Criminal Trial Process.
Indiana’s Access to Public Records Act Heather Willis Neal Indiana Public Access Counselor Presented to Indiana State Department of Health August 21, 2008.
The Investigation.  Right to remain silent  Right to an attorney  No interrogation should take place before they read  Are a result of the US Supreme.
Chapter 8: Investigative Constitutional Law Consent Charles L. Feer, JD, MPA Bakersfield College Department of Criminal Justice.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Search Warrants. A search warrant… is a legal order, signed by a judge, allowing law enforcement to search a particular area or premises. Search warrants.
Heartland Surgical Specialty Hospital, LLC v. Midwest Division, Inc 2007 WL (D. Kan. Apr. 9, 2007)
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Human Subjects Update E. Wethington, Chair, UCHS.
Group 3 Against the Proposed Amendments to Fed.R.Civ.Proc., Fed.R.Crim.Proc. & Fed.R.Evid.
The FBI Approach to Computer Investigations FBI Houston Cyber Division
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
The Health Information Protection Act. What is the Health Information Protection Act (HIPA)? HIPA is legislation that speaks to access to, and protection.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Nassau Association of School Technologists
Chicago, Illinois – August 4, 2012
Protection of CONSUMER information
Search and Seizure Concepts
Private Investigations vs. Public Investigations
Presentation transcript:

Use Policies Deputy Attorney General Robert Morgester

Use Policy Communicating the use policy –Word of mouth –Employee manuals –Banners Things that every good use policy should have....

The Good Policy Does the banner state that the use of the network constitutes consent to monitoring? –Helps establish consent for Provider monitoring Law enforcement monitoring

The Good Policy Does the banner state that the use of the network constitutes consent to retrieval and disclosure of information stored on the network ? –Helps establish consent to the retrieval and disclosure of such information and/or records

The Good Policy Does the banner state that the use of the network constitutes consent to retrieval and disclosure of information stored on the computer ? –Helps establish consent to the retrieval and disclosure of such information and/or records

Biby vs. Univ. of Nebraska Search of employee computer done in response to a civil suit. Employee sued for breach of privacy Court found: –No reasonable expectation of privacy because computer use policy indicated computer could be searched when university was responding to discovery –Concurring opinion noted that university policy were to some degree private

The Good Policy With government networks, does the banner state that the user of the network shall have no reasonable expectation of privacy in the network ? –Helps establish that user lacks a reasonable expectation of privacy pursuant to O’Conner v. Ortega (1987) 480 U.S –And what about that “C” drive?

The Good Policy In the case of non-government network, does the banner make clear that the network system administrator may consent to a law enforcement search? –Establishes system administrator’s common authority to consent to a search under United States v. Matlock (1974) 415 U.S –And what about that “C” drive?

The Good Policy Does the banner contain express or implied limitations or authorizations relating to the purpose of any monitoring / search, and what will be done with the fruits of any monitoring / search? –Do you want to limit why you can monitor? –Where do you want to be able to use the information found?

People v. Jiang (2002) 33 Cal.Rptr.3d 184 Suspect of a sexual assault had his work lap computer produced by court order. Incriminating files were marked “Attorney” –Agreement signed by defendant did not preclude personal use of the computer –Nor did in mention anything about the company copying or disclosing the contents of the computer

The Good Policy Does the banner state what users are unauthorized to access the network, and the consequences of unauthorized use of he network? –Makes it easier to establish unauthorized use?

The Good Policy Does the banner require users to click through or otherwise acknowledge the banner before using the network? –Makes it easier to establish the user actually received the notice.

Sample Banner WARNING! This computer system is the property of the United States Department of Justice and may be accessed only by authorized users. Unauthorized use of this system is strictly prohibited and may be subject to criminal prosecution. The Department may monitor any activity or communication on the system and retrieve any information stored within the system. By accessing and using this computer, you are consenting to such monitoring and information retrieval for law enforcement and other purposes. Users should have no expectation of privacy as to any communication on or information stored within the system, including information stored locally on the hard drive or other media in use with this unit (e.g., floppy disks, PDAs and other hand-held peripherals, CD- ROMs, etc.)

More Sample Banners Look for Appendix “A”

Bad Use Policy? Reasonable investigations into work related misconduct Search must be work related Search must be justified at its inception and permissible in scope –Reasonable grounds to believe evidence will be found –Search is limited in scope Must be “employer intrusion” rather then “police intrusion”