CALEA Status Overview Common Solutions Group September 20, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.

Slides:



Advertisements
Similar presentations
Pervasive Wireless Solutions © Copyright IBM Corporation 2004 IBM La Gaude Smart Home / Intelligent Building Jean-Michel Corrieu IBM Europe Technical Manager.
Advertisements

1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The.
EduCause LI Overview February 2007
Springfield Technical Community College Security Awareness Training.
RBA Securitisation System Technical Delivery Forum
Security Professionals Workshop: Legal Issues in Computer and Network Security Peter C. Cassat.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
CALEA Panel Internet2 Member Meeting December 6, 2006.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Latham & Watkins operates as a limited liability partnership worldwide with an affiliate in the United Kingdom and Italy, where the practice is conducted.
04/07/06 DePaul University - Teaching and Technology Conference Remote Networking Labs for Hands-on Exercises James Yu, Ph.D. Scholl of CTI DePaul University.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Interim Text to Information & Training for TelecommunicatorsInformation & Training for Telecommunicators Version 2 August 26, 2013.
CALEA: The Communications Assistance for Law Enforcement Act Doug Carlson, Executive Director, Communications and Computing Services, NYU Mark Luker, Vice.
Creative Support Solutions CDG User Group CABS Information.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
CALEA Discussion Network Policy Council February 4, 2007.
E-Invoicing & Legal Aspects RA42 Presentation Michael Uebber, LH SIS – Simplified Interline Settlement.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
CPS Acceptable Use Policy Day 2 – Technology Session.
Presented by: Heather Ward and Jason Cook Date: October 28, 2011 Presented by: > Proprietary and Confidential. For FAA Use Only. The Value of Private Loan.
Latham & Watkins operates as a limited liability partnership worldwide with an affiliate in the United Kingdom and Italy, where the practice is conducted.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
OSC (Ohio Supercomputer Center) 1224 Kinnear Road, Columbus, OH (614) www.osc.edu THIRD FRONTIER OVERVIEW OPLIN MEETING April.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Chapter 2: Resolving conflict: non-legislative methods Resolving conflict: non-legislative methods What is a conflict? Conflict resolution Non-legislative.
CALEA Communications Assistance for Law Enforcement Act October 20, 2005.
CALEA and J-STD-025 revisions. CALEA  Communications Assistance for Law Enforcement Act (1994)  Standardized access to telecommunications systems using.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
YEAR 2000 STATUS Peter Georges Year 2000 Project Manager March 4, 1998.
Negotiation Issues with State Government Amy G. Herman, Contract Negotiator.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
The Year of Implementation and Value Creation!Global Gaming Expo 2006 Good Things Happen When We All Pull Together The World of Transport.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Communications Assistance for Law Enforcement Act & Higher Education: or How I Learned to Stop Worrying and Love Wiretaps Terry Hartle American Council.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
Suspicious Activity Reporting Reporting with Safety Kevin Whelan US Department of Treasury
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
A Solution Perspective An Open Source Collaborative and Foundational Solution Targeted at Non-OECD Member Countries February 9, 2016.
New Jersey Employee Residency Requirements S 1730 Signed into Law 5/17/2011.
CALEA: The Big Picture for Higher Education ICPL June 28, 2006 Steve Worona EDUCAUSE
CALEA Update Paul Schopis August 9, CALEA Community Assistance to Law Enforcement Agencies.
Fresno County Department of Child Support Services Employer Workshop Welcome.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Information Compliance in Complaint Handling Ombudsman Association May 2013 Graham Smith – Deputy Information Commissioner and Director of Freedom of Information.
New Jersey’s College & Universities integrating technologies into instruction, research and public service through an enhanced statewide data/video network.
Information Security Planning Considerations for Telecommuting
After the FCC Form 471 E-rate Program Applicant Training
OFFICE OF DISPUTE RESOLUTION
Read this to find out how the internet works!
Vpn’s Virtual private network is a private network that extends across a public network or internet which enables people to send and receive data across.
Presentation transcript:

CALEA Status Overview Common Solutions Group September 20, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University

2 What’s the status? Legal challenges to the FCC expansion of CALEA to broadband were not won – but there were some benefits Court agreed that internal portions of private networks cannot be required to comply with CALEA – at most, compliance required only at gateway Value of gateway intercept May 14, 2007, remains the date for CALEA compliance Title 18 obligations to assist Law Enforcement with intercepts has not changed

3 What’s the status? (continued) Uncertainty about which networks and institutions are exempt from CALEA Uncertainty about what “compliance” means Uncertainty about systems and services available to implement compliance

4 Exempt/Non-Exempt Tests (per ACE perspective) Does the organization “support” the connection to the Internet? “Support” is undefined What is meant by Internet is unclear Is it a “private network”? “Private network” is undefined

5 What is compliance? Not yet defined FCC/DOJ looking to industry and Law Enforcement to work together to develop “safe harbor” standards Completed by end of year?

6 Systems and services for compliance Institution complies using own equipment Intercept capabilities (routers, probes) Format data and send to Law Enforcement Agencies (mediation device) Trusted Third Parties (NeuStar, VeriSign, etc.) handle as a service EDUCAUSE CALEA Tech. group gathering information on what is available and/or planned by vendors

7 Suggestions for actions Meet with your legal department and come to agreement on exempt/non-exempt status If not exempt, follow-up on compliance requirements and options when available Watch EDUCAUSE web site for best practices for complying with existing Title 18 requirements and consider implementing

8 Related issues Possible new legislation Network authentication of terminals on campus (e.g., 802.1x) Data retention of logs and other records

9 Discussion