Telecom Forum – February 2016: Law Regulation and Enforcement Flexible or over-compliant: The role of telecommunications operators in electronic law enforcement.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

The Managing Authority –Keystone of the Control System
Fostering worldwide interoperabilityGeneva, July 2009 Lawful Interception and Data Retention Presenter: Mike Sharpe, VP ETSI ESP Source: Peter van.
Enhancing ethical culture through ethical decision-making Ethics training.
GATS & Telecom Transparency. Key Ingredients for Reform }Clearly set out policies in laws, regulations, licenses, contracts }Make all processes open.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
1 Auditing in the Public Interest Records Management in the Victorian Public Sector Audit objective Audit had two objectives : The first objective was.
GReening business through the Enterprise Europe Network EN Giovanni FRANCO European Commission Enterprise and Industry EN
1 ETSI and Lawful Interception Robin Gape Chair TC Sec WG LI.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
Implementing Human Service Worker Safety Regulations
Supplier Ethics: Program Checklist
1 E-Procurement in Azerbaijan Republic Challenges and perspectives Elshad Samedzade, PHD & Arzu Aliyev
National Smartcard Project Work Package 8 – Security Issues Report.
“Framework for mainstreaming Ireland's experience" Siobhan Barron Director National Disability Authority Ireland.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
The Services Charter of Eustat Cristina Prado / Alicia Barriocanal Helsinki, May 5 th, 2010.
IDEA 2004 Procedural Safeguards: Legal Rights and Options Mississippi Association of School Superintendent Spring, Mississippi Department of Education.
G17: Recordkeeping for Business Activities Carried out by Contractors Patrick Power, Manager Government Recordkeeping Programme Archives New Zealand.
Welcome To the Objectives Pillar Workshop Introduction Business need Target Audience - technical and professional staff who support decision maker.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
Joint Forum of Financial Market Regulators Guidelines for Capital Accumulation Plans November 2004 The Impact DC Plan Sponsors G3-PD Colin Ripsman Toronto.
BOARD OF NURSING. CONTENTS What is board of nursing? Roles of board of nursing. Criminal liability. Code of ethics.
Risk Management, Assessment and Planning Committee III-4.
Cybersecurity Governance in Ethiopia
Module 2 Slide 1 NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 2 A The Independent Regulator.
Utah Communications Agency Network UCAN Governance Structure.
UNIVERSITY POLICE Budget Authority Training 2014 Chief of Police Mike Medders.
Interagency Cooperation Dr Laura Cleary. Scope Terminology Rationale Benefits National Security Strategy & Border Management: Two Examples Critical Factors.
Planning appeals Peter Ford Head of Development Management Planning Committee Training – 30 th July 2015.
STATE OF ARIZONA BOARD OF CHIROPRACTIC EXAMINERS Mission Statement The mission of the Board of Chiropractic Examiners is to protect the health, welfare,
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Frameworks for the Access and Use of Administrative Data, With the Example of Current Practice in the UK Steven Vale Office for National Statistics UK.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
Dallas Independent School District Technology Plan Ronald R. Pugh ET8011 May 15, 2011.
Conference on Labor Markets, Growth and Poverty Reduction Strategies Thessaloniki, May 27-28, 2005 Stojan Trajanov State Advisor Ministry of Labour and.
Guide - Recordkeeping for business activities carried out by contractors Natalie Dewson Senior Advisor Government Recordkeeping Programme Archives New.
CALEA IMPLEMENTATION IN VoIP NETWORKS By Cemal Dikmen, Ph.D. General Manager Lawful Intercept Products SS8 Networks, Inc. Thursday - 02/24/05, 8:15-9:00am.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Integrated and Planned Enforcement of Environmental Law Phare Twinning Project CZ03/IB/EN/01 1 EMS as part of Integrated permitting and inspections Rob.
AML O FFICER STR working Committee. S UBJECTS Technical aspects Aspects of day-to-day compliance AML Officer duties & responsibility Challenging facing.
OFFICIAL – SENSITIVE English Language Requirement for Public Sector Workers Draft Code of Practice Consultation.
INTRODUCTION TO DATA PROTECTION An overview of the Irish Data Protection legislation.
ICASA and USSASA Predetermined Objectives – 2013/14 March 2013 Portfolio committee.
Guidelines for the Organization of Practical Placements for Students (PPS) Code of Practice for Actors Gregory Makrides – European Association of Erasmus.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Chapter 8 Auditing in an E-commerce Environment
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
The Construction Team Module #1 Prepared by Dr. Randy R. Rapp July 2005.
Policy vs. Administrative Regulation, the Ongoing Question Jim Williams – Policy Analyst Texas Association of School Boards Policy Service.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
First ARF Inter-sessional Meeting on non proliferation Beijing, China 1-3 July 2009 First ARF Inter-sessional Meeting on non proliferation Beijing, China.
Vienna 14 March 2006 Andrew J. Popham Vice-President of FEE Partner, PricewaterhouseCoopers LLP The New Directive on Statutory Audit in the EU.
IAEA International Atomic Energy Agency. IAEA Outline Responsibilities and functions of the regulatory body Objectives of regulatory functions Organizational.
Safeguarding Adults Care Act 2014.
Implementation of legislation (Chapter 47) By Haley Court.
When things go wrong: reducing the risk of FCA enforcement action Birmingham 2016 Insurance and Financial Services Conference Wednesday, 18 June 2016 Jonathan.
Preparing for Operations: Staff Training for MHSA Supportive Housing Anne Cory Corporation for Supportive Housing January 6,
Kelsey Bretz. FBI history Authorization Apple UDIDs Acceptable use of information? Conclusion References.
Integrated permitting and inspections
Promoting Evidence-Based Policymaking by Sharing State Administrative Data Dr. Marty Romitti January 25, 2017.
Surveillance around the world
Working together, looking forward: 20 years of DLM DLM Forum Annual General Meeting Athens, 10-11th June 2014.
Principles of Administrative Law <Instructor Name>
Improving data quality
GDPR PERSONDATAFORORDNINGEN I PRAKSIS
Introduction to Fiscal Policy Program
Presentation transcript:

Telecom Forum – February 2016: Law Regulation and Enforcement Flexible or over-compliant: The role of telecommunications operators in electronic law enforcement Dr Rob Nicholls, UNSW Business School

Issues Formal relationship between law enforcement agencies and telecommunications operators Law enforcement liaison units within telecommunications operators Delivery of metadata Delivery of content Denial of access The risk of “capture”

Formal relationship between agencies and operators 3 Ongoing Request Warrant or order HI1 HI2 HI3 Contract, regulation, legislation Telecommunications metadata or IRI Content of message Network operator Law enforcement agency ETSI model of “handover interfaces”

Law enforcement liaison units within operators Operator Customer interface Law enforcement agency Operations Operator Legal, policy and governance Law enforcement agency Technical Liaison Unit

Delivery of metadata Lines of communications established before request Clarity on the face of the request Clear instructions or procedures for delivery Analysis responsibility lies with law enforcement agencies Need clear boundaries of authority for access to stored metadata and real-time metadata Independent and regular reporting on process including aggregated statistics annually from Attorney General (or equivalent)

Delivery of content Clarity on the face of the warrant or order Clear instructions or procedures for delivery Regular communications as to renewal or revocation of the warrant/order Independent and regular reporting on process: –Attorney General (or equivalent) on facts –Ombudsman on process

Denial of access Who is responsible for crime prevention? Limits on the reasons for denial of access Example using website takedown or filter: –Crime – what level of crime? –Culture – what are the cultural norms? –Religion – who is the relevant authority? –Civil wrongs – Telco or web host as target? All issues can be solved by a rules-based process – but rules can be inflexible when new threats are identified

Clear rules Rotation of staff Reinforcement of operator (rather than LEA) culture Understanding and communication with LEAs Regular training on legal obligations The risk of “capture” Law enforcement agency Operations Law enforcement agency Operations Law enforcement agency Technical Law enforcement agency Technical Liaison Unit

Telecom Forum – February 2016: Law Regulation and Enforcement Flexible or over-compliant: The role of telecommunications operators in electronic law enforcement Dr Rob Nicholls, UNSW Business School