Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.

Slides:



Advertisements
Similar presentations
Privacy Laws and First Amendment Content Professor Peter P. Swire Ohio State University John Marshall Symposium on Copyright & Privacy Conference November.
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Employment Law for BUSINESS sixth edition
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
A closer look at privacy How Brandeis’s theories have affected media law.
Legal Considerations in Obtaining Electronic Evidence in Online Investigations CSC 486/586 1.
Plain View Doctrine 1.Item is positioned easily in an officer’s sight. 2.Officer is legally in a position to notice. 3.The discovery of the item is inadvertent.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law.
1 ISPs and Federal Privacy Law: Everything You Need to Know About the Electronic Communications Privacy Act (ECPA) Mark Eckenwiler Computer Crime and Intellectual.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
1 Fourth and Fifth Amendments Police State – country where military or law enforcement are in power and abuse power Warrant – document that gives law enforcement.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
INVASION OF PRIVACY What is freedom of the press? Should there be limits on the press? Are there aspects of the media essential to freedom of the press?
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
1 Marc J. Zwillinger Elizabeth Banker Zwillinger Genetski LLP April 7, 2011.
(Edited) WORKPLACE PRIVACY.
Privacy: Law, Values, Norms
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
EMPLOYEE PRIVACY RIGHTS
Chapter 4 Torts and Cyber Torts
Chapter 18 - The Fourth Amendment and National Security.
Class 11 Internet Privacy Law Government Surveillance.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Use Policies Deputy Attorney General Robert Morgester
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Data Protection Act AS Module Heathcote Ch. 12.
Practicing In Harmony with HIPAA The views and opinions expressed in the presentation are those of the presenter, and not necessarily official positions.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Criminal Justice process Introduction to Criminal process.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
The Warrant Process Chapter Three All Images © Microsoft Corporation Written by Karmel Tanner May 2010.
Criminal Justice Process Whodunnit: The Investigation.
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
What does it all mean?! The 4th Amendment to the U.S. Constitution guarantees freedom from unreasonable search and seizure. This means that law enforcement.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
The Investigation.  Right to remain silent  Right to an attorney  No interrogation should take place before they read  Are a result of the US Supreme.
KAPLAN UNIVERSITY Josephine Kerr Constitutional Law February 3, :00 p.m.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Criminal Justice Process: The Investigation
Surveillance around the world
Copyright 2015 McGraw-Hill Education. All rights reserved
The 4th Amendment Notes 5-3.
How Does Electronic Surveillance Work Legally?
Data Protection Legislation
Protection of News Sources
The 4th Amendment Notes 5-3.
Laws Governing Police Surveillance
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Lesson 6-1 Civil Law (Tort Law).
Employment Law for BUSINESS sixth edition
Chapter 23 Government Regulation and Administrative Law
Presentation transcript:

Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion Breach of confidence Intrusion on seclusion Public disclosure of private facts MisappropriationFalse light Unauthorized disclosure of sensitive information Improper Proper Common lawStatutes TrespassCFAAHIPAAECPAGLB CFAAHIPAAECPAGLB Common lawStatutes Negligence Warshak v. U. S. Whom may I exclude? Whom must I let in? Whom must I exclude?

Processing AggregationSecondary use Exclusion Publicity to private life U. S. Dept. of Justice v. Reporters Committee Russell v. Gregoire Paul P. v. Verniero

Harms ActualPotential EconomicDignitaryLoss of freedomIncreased riskBalance of power changes Legally recognized Not legally recognized

Privacy Perplexities We apply the label “invasion of privacy” to a wide variety of different types of harms. A company sells customer information despite its promise to the contrary. A newspaper publishing a rape victim’s name. Both are invasions of privacy in the sense that they involve unwanted disclosures of information; however, the tradeoffs between harms and benefits are very different.

Different Tradeoffs The company was able to sell its customers’ information because such information is of considerable value for marketing and business planning. –In considering whether to enforce the promise not to sell the information, one key question is whether the interest of the customers in non-disclosure outweighs the economic value of the information. Publishing the name of the rape victim, in contrast, causes great, enduring emotional harm. –The harm would seem clearly to outweigh the general public’s interest in newsworthy facts. In general, “privacy” involves a vast array of different tradeoffs between different harms and interests.

Warshak Issues: What Are We Talking About? The Statute is 18 USC §§ 2510 – This is Title III of the Omnibus Crime Control and Safe Streets Act of 1996 (Pub. L. No , 82 Stat. 211). This referred to both as the Wiretap Act and as the ECPA. –ECPA because the Electronic Communications Privacy Act of 1986 (Pub. L. NO , 100 Stat. 1848) amended Title III to include coverage of electronic communications. –Given the amendment, the “Wiretap Act” reference is inaccurate.

Warshak v. U. S. What hurdle does the government have to get over to get access to s? The highest hurdle is the requirement of a warrant: requires probable cause to think a crime is being committed. –May obtain the warrant, and get the s without notice to the individual against whom the warrant is directed A lower hurdle is a court order “specific and articulable facts showing reasonable grounds to believe” that the communications are “relevant” to an ongoing criminal investigation. –Question in Warshak: do you have to give notice to the target before obtaining the information? –Answer: Yes.

What Are We Talking About? The Electronic Communications Privacy Act 1986 also added 18 USC §§ 2701 – 2709, §§ 2711 – 12. Some refer to this as the ECPA. I will use “Wiretap Act” for 18 USC §§ 2510 – 2522, and “ECPA” for 18 USC §§ 2701 – 2709, §§ 2711 – 12.

Warshak v. U. S. ECPA §2703(b): Search warrant without notice to the subscriber; or, a grand jury or administrative subpoena with notice; or a court order with notice. The court order may be issued if the government provides “specific and articulable facts showing reasonable grounds to believe” that the communications are “relevant” to an ongoing criminal investigation.