UNSW CLE 19 July 20011 Privacy and Law enforcement in the on-line world – the bigger picture. Nigel Waters Convenor, Australian Privacy Charter Council.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
Professor John McMillan AO Australian Information Commissioner Balancing open access and privacy protection.
Simon Bronitt and James Stellios ANU College of Law, The Australian National University Regulating Telecommunications Interception and Access: A Seachange.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Privacy Rights Under Pressure  Innovations in technology: photography, audio recording, motion pictures, computers, telecommunications, digital data,
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Data Protection and Records Management
Lawful Access/Interception: Global Cooperation and Collaboration Anthony M Rutkowski.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Health Data Flows: Where PETs Can Help PORTIA Workshop on Sensitive Data July 8, 2004 Anna Slomovic, PhD Electronic Privacy Information Center.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Privacy and Data Protection Issues for UCLA Christine Borgman, Professor Information Studies.
Training on Data Protection Roles of the Data Protection Office.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
1 CRIMINAL LAW (FORENSIC PROCEDURES) AMENDMENT BILL [B ]: ISSUES FOR CONSIDERATION AND COMPARATIVE ANALYSIS 6 October 2009 Sueanne S. Isaac.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Anonymity, Security, Privacy and Civil Liberties
Internet Security for Small & Medium Business Week 6
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Information Governance Policies. Business Support and Corporate Information Resources Team… Working to create a knowledge led organisation Information.
Lecture 11: Law and Ethics
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Environmental Management System Definitions
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Data Protection and Records Management. Key Responsibilities - Record Management Keep Information Accurate Disclose only if compatible with purpose for.
ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen.
Can there be privacy in networks ? Dr. Alexander Dix Berlin Commissioner for Data Protection and Freedom of Information Chairman of the International Working.
Communications Data Consultations on access and a Code of Practice for voluntary retention Simon Watkin Home Office.
2002 Symantec Corporation, All Rights Reserved The EU Regulations and IT security An industry perspective Ilias Chantzos, Government Relations EMEA Terena.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Digital evidence in criminal proceedings: legal considerations Arkadiusz Lach Department of Criminal Procedure Faculty of Law University of Nicolaus Copernicus.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Tara George Amber Gardner Jennifer Shorter. Advantages Many employers run software that searches for offensives words and highlights problematic s.
Freedom of Information Act ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
1 Office of the Information Commissioner of Canada September 28, 2010 Balancing Openness and the Public Interest In Protecting Information Vanessa R. Brinkmann.
František Nonnemann Skopje, 9th October 2012 JHA DP aspects related to provision of information about public figures in CZ.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Surveillance around the world
Director, Regulation and Strategy
Data Protection Act and Other Laws
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Interpreting Privacy Principles: Chaos or Consistency?
School Searches and You
Presentation transcript:

UNSW CLE 19 July Privacy and Law enforcement in the on-line world – the bigger picture. Nigel Waters Convenor, Australian Privacy Charter Council Pacific Privacy Consulting UNSW CLE Seminar – eSecurity & eCrime 19 July, 2001

UNSW CLE 19 July Introduction Narrow battles vs big picture Incremental loss of privacy Regulability of cyberspace depends on architecture – (Lessig 1999) –Choice to be made –Fully informed debate or vested interests –Globalistation

UNSW CLE 19 July Security & Privacy Can co-incide –Audit trails Security independent of type of information With Personal information, tension arises –Security vs other privacy principles –Employees and customers/public

UNSW CLE 19 July Powers to invade privacy Legal entities – arguments for transparency, but powers now being used against individuals Business/personal distinction blurring –ABN holders Privacy laws have no effective limiting function in the face of other laws

UNSW CLE 19 July Search and Communications Interception powers Inconsistent approach to electronic data vs physical intrusion – why? –Eg: ATO, Centrelink ‘notices’ –Even looser controls in IPP11, NPP2 Telecommunications –Warrants for content (but not all?) –Certificates –On request

UNSW CLE 19 July Interception Warrants Progressive weakening of controls –Judges to AAT members –Named person warrants –Period of warrant –Range of offences –No of agencies –More agencies with direct access

UNSW CLE 19 July Computer access warrants Introduced for ASIO Proposed extension to all investigatory agencies under Crimes & Customs Acts ? (Cybercrime Bill 2001) Major concerns about data integrity – question evidentiary value? Same issue in NZ

UNSW CLE 19 July Application of powers Specific investigations vs intelligence gathering - routine surveillance, matching Requirement to retain records Best protection is destruction Once available – pressure for access –Census –Proposed requirement on ISPs?

UNSW CLE 19 July Identification? Pressure to identify in more contexts Justification ? –ID fraud ? Often, real need is authentication PKI – muddled motives and application Privacy issues Privacy Commissioner Guidelines

UNSW CLE 19 July Data-matching Reversal of onus of proof AUSTRAC example –Subjective? –Disproportionate? Tendency for subjective norms to replace objective criteria

UNSW CLE 19 July Conclusion Common theme: Control vs freedom How much risk to tolerate? Difficult at individual program level –will always favour greater control Reject technological determinism Fall back on basic principles No Constitutional/BoR protection Can only question each proposal