Policy Considerations RUCUS BOF IETF 71 - Philadelphia March 10, 2005 John Morris.

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

Freedom of Speech (Part 3)
AN OVERVIEW OF DATA PROTECTION LAW IN THE GCC NICK OCONNELL, Senior Associate – TMT JUNE 2013.
Impact of ICTs on women's participation in public and political life Association for Progressive Communications Women’s Rights Programme, January 2013.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
SOUTH AFRICA COMPLIANCE MATRIX MMA CATEGORY MMAWASPADMMADMASACPAPOPIECTA “Notice” Notice is an easily understandable and quickly discoverable description.
Fiducianet, inc. tm 1 Presented by H. Michael Warren, President fiducianet, inc. VoIP Technology Perspectives Law Enforcement Concerns & CALEA Compliance.
Free Speech and Censorship Sherwin Siy Staff Counsel Electronic Privacy Information Center.
Anonymity and SPAM The Good, the Bad and the Ugly!
Domain Name Registrant Data: The Privacy Questions Alan Davidson Center for Democracy and Technology
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Human Rights in the Digital Era Conference Net Neutrality Policy in the UK & the Citizen’s Interest in Neutral Networks Giles Moss Institute of Communications.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
© 2007 The MITRE Corporation. MITRE Privacy Practice W3C Government Linked Data Working Group Michael Aisenberg, Esq. 29 June 2011 Predicate for Privacy.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Number 10: To Respond or Not to DMCA Notices Pro –Good faith effort towards content owner concerns. –As a matter of policy and citizenship obligations.
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Legal Issues. Overview Standard Contract Terms of Social Networking Sites Government Content on a Third-Party Site Competitive Procurement Issues First.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities.
Freedom of Speech Computers in the World.
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
Respecting People's Privacy in Ministry 1. Context 2. Why should we bother? 3. APP Summary 4. Information Pathway.
Spam s By Jessica Romero CS-301. Spam s Spam s? Spam s? Is unsolicited and promotional sent to in bulk to multiple users.
1 AIPPI Forum 2011 Hyderabad, India, 15 October AIPPI Forum 2011 Hyderabad, India, 15 October 2011 Standardisation and Software Protection Strategies.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Reducing Unwanted Communications in SIP (RUCUS) BOF Hannes Tschofenig Francois Audet.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
The Data Protection Audit How to prepare What to expect The end results Dublin Chamber of Commerce, March 24 th.
September 2009Network Neutrality – the Norwegian ApproachPage 1 Network Neutrality – the Norwegian Approach Senior Adviser Frode Soerensen Norwegian Post.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
A policy framework for an open and trusted Internet
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Data Archives and the ethics of Research Data
General Data Protection Regulations
Mathew Norman, Policy & Public Affairs Officer, RLA Wales
General Date Protection Regulation
Richard Hill Partner, Hill & Associates
EU Data Protection Legislation
Presentation transcript:

Policy Considerations RUCUS BOF IETF 71 - Philadelphia March 10, 2005 John Morris

Overview Broad look at impact of laws Specific laws & policies Specific goals –“Requirements”?

Which laws? Why care? U.S. & E.U. Constitution & laws Why care? –Sometimes binding requirement –Sometimes useful –Often good policy and good practice

Will laws help fight against spam/spit/spim/sp…? Not much –Mainstream marketers generally follow laws –Law breakers (especially overseas) do not (e.g., U.S. “CAN-SPAM” law) Some –Can sometimes enforce expectations

Will laws hinder fight against spam/spit/sp…? Not much –Mostly decisions by private companies (not governments) –General support for fighting spam Possibly –Privacy restrictions Possibly a great deal –“Company town,” especially as IP- based communications become more and more pervasive

Can IETF help laws against spam/spit/sp…? Yes –Give users control –Allow users to set clear rules/expectations (this gives law something to enforce) But … –The solution set is likely to be mainly technical

Free speech concerns U.S. First Amendment –Even if not binding requirement on private companies, still good policy Some bulk is constitutionally-protected –E.g., political messages, and non- commmercial messages generally –Unclear whether imposed costs of spit/spim etc. might alter constitutional analysis –CAN-SPAM not yet challenged

Free speech (2) Rights to send & receive communications –Addressed by choice and consent –Maximize ability to “opt” in or out of spit/spim/etc. fighting –Maximize ability to fine tune control –As a fall back, ensure transparency and notice so users can understand what is being done Avoid “honeypot” for gov’t censorship Global/broad-based blacklist is problematic

Free speech (3) Anonymity is vital right –Very important in founding of U.S. Philadelphiensis - leading Anti- Federalist in 1787 Some “spoofing” is authorized One-to-one communications –Minimize burden, obstacles to one- to-one communications, EVEN unsolicited communications from unknown senders

Privacy concerrns Privacy of content –Some E.U. constraints on service providers viewing content Notice and consent is essential User control is very helpful –Some U.S. constraints on service providers disclosing content (but for network management, arguably can view content) Again, notice, consent & control –Avoid “honeypot” for gov’t surveillance

Privacy (2) Privacy of communication details - call detail (“CII” or “call identifying information in U.S. wiretapping/ CALEA contexts) –Again, notice, consent & control –Again, avoid “honeypot” for gov’t surveillance –“Subjects” are content

Goals Maximize user control Maximize transparency, notice & consent Avoid honeypots for government censorship or surveillance Permit anonymity Minimize burden on one-to-one communications

The end John B. Morris, Jr. Center for Democracy & Technology jmorris at cdt.org