Download presentation
Presentation is loading. Please wait.
Published byJayson Bridges Modified over 9 years ago
1
Legal, Policy and Regulatory Challenges for IT Executive Leadership/Seminars on Academic Computing Tracy Mitrano Cornell University Executive Leadership/Seminars on Academic Computing Tracy Mitrano Cornell University
2
Internet & IT Policy Law NormsArchitectureMarket
3
Big “P” and Little “p” Policy Big “P” policy involves external issues, such as national security, electronic surveillance laws, privacy, or digital copyright. USA-Patriot Act http://www.cit.cornell.edu/oit/policy/PatriotAct/ http://www.cit.cornell.edu/oit/policy/PatriotAct/ Digital Copyright http://www.cit.cornell.edu/oit/policy/copyright/ http://www.cit.cornell.edu/oit/policy/copyright/ Privacy in the Electronic Realm http://www.cit.cornell.edu/oit/policy/privacy/ http://www.cit.cornell.edu/oit/policy/privacy/ CALEA: Communications Law Enforcement Assistance Act http://www.cit.cornell.edu/oit/policy/calea/ http://www.cit.cornell.edu/oit/policy/calea/ Big “P” policy involves external issues, such as national security, electronic surveillance laws, privacy, or digital copyright. USA-Patriot Act http://www.cit.cornell.edu/oit/policy/PatriotAct/ http://www.cit.cornell.edu/oit/policy/PatriotAct/ Digital Copyright http://www.cit.cornell.edu/oit/policy/copyright/ http://www.cit.cornell.edu/oit/policy/copyright/ Privacy in the Electronic Realm http://www.cit.cornell.edu/oit/policy/privacy/ http://www.cit.cornell.edu/oit/policy/privacy/ CALEA: Communications Law Enforcement Assistance Act http://www.cit.cornell.edu/oit/policy/calea/ http://www.cit.cornell.edu/oit/policy/calea/
4
Little “p” Policy Little “p” policy is institutional policy. Preservation and protection of institutional interests and assets If your policy does not stand up to this test, best to rethink Cornell Model Centralized University Policy Office http://www.policy.cornell.edu/ http://www.policy.cornell.edu/ Famous “policy on policies!” http://www.policy.cornell.edu/vol4_1.cfm http://www.policy.cornell.edu/vol4_1.cfm Balance of statement and procedure At the institutional level of procedure, but not backline Little “p” policy is institutional policy. Preservation and protection of institutional interests and assets If your policy does not stand up to this test, best to rethink Cornell Model Centralized University Policy Office http://www.policy.cornell.edu/ http://www.policy.cornell.edu/ Famous “policy on policies!” http://www.policy.cornell.edu/vol4_1.cfm http://www.policy.cornell.edu/vol4_1.cfm Balance of statement and procedure At the institutional level of procedure, but not backline
5
Go to law school, Tracy! Relationship between higher education and the government, market, social norms and technology is growing increasingly complicated and will become even more so given the international nature of communications technologies.
6
Why so much legal and regulatory activity? Information technologies driving force of American (and global) economy since 1990’s Personal computer + network systems = communications Innovation offers untapped potential New distribution methods Entertainment media Publishing Communications Education, too! Information technologies driving force of American (and global) economy since 1990’s Personal computer + network systems = communications Innovation offers untapped potential New distribution methods Entertainment media Publishing Communications Education, too!
7
Transformative Effects on… Revenue Commercialization of the Internet since going public in early 1990’s created new business models Google and advertising Merchandise distribution, i.e. shopping! Amazon Buying and bargaining eBay Entertainment We’re waiting :-) Government In the midst of a historic national deficit, watch for an Internet tax sometime near you soon! Revenue Commercialization of the Internet since going public in early 1990’s created new business models Google and advertising Merchandise distribution, i.e. shopping! Amazon Buying and bargaining eBay Entertainment We’re waiting :-) Government In the midst of a historic national deficit, watch for an Internet tax sometime near you soon!
8
…the Law and Regulatory Issues Copyright, Copyright, Copyright When I went to law school and walked uphill both ways… Digital Millennium Copyright Act 1998 Section 512: Notice and take down Section 1201: Anti-circumvention February 2003: Senate Hearings First letters to the presidents Verizon “fast-track” litigation Law suits against individuals Action against Internet 2 Second letter to presidents regarding subnets and filtering Copyright, Copyright, Copyright When I went to law school and walked uphill both ways… Digital Millennium Copyright Act 1998 Section 512: Notice and take down Section 1201: Anti-circumvention February 2003: Senate Hearings First letters to the presidents Verizon “fast-track” litigation Law suits against individuals Action against Internet 2 Second letter to presidents regarding subnets and filtering
9
, , ! Current litigation Google Library Project If there is ever a case to test fair use in the new electronic age, this is the one! American Association of Publishers v. Shhhhhhhh Current legislative reform Orphan works Finally a boon to and for higher education!! Current litigation Google Library Project If there is ever a case to test fair use in the new electronic age, this is the one! American Association of Publishers v. Shhhhhhhh Current legislative reform Orphan works Finally a boon to and for higher education!!
10
Institutional Policy Response Statement X complies with all copyright laws. Procedure DMCA E-Reserves Course management systems Intellectual Property of the University and its employees, students and faculty Statement X complies with all copyright laws. Procedure DMCA E-Reserves Course management systems Intellectual Property of the University and its employees, students and faculty
11
Electronic Surveillance USA-Patriot Act Amended the Electronic Communications Privacy Act By lowering the evidentiary standard for voicemail and call records E.g. network flow logs Legal backdrop for the collection of call records from major communications providers Below probable cause = file a paper with a clerk USA-Patriot Act Amended the Electronic Communications Privacy Act By lowering the evidentiary standard for voicemail and call records E.g. network flow logs Legal backdrop for the collection of call records from major communications providers Below probable cause = file a paper with a clerk
12
Institutional Policy Response Statement “All roads lead to Rome” i.e. counsel Cornell University Policy 4.13, Acceptance of Legal Papers http://www.policy.cornell.edu/vol4_13.cfm http://www.policy.cornell.edu/vol4_13.cfm Unit Protocol in order to get to Rome Cornell Information Technologies Statement “All roads lead to Rome” i.e. counsel Cornell University Policy 4.13, Acceptance of Legal Papers http://www.policy.cornell.edu/vol4_13.cfm http://www.policy.cornell.edu/vol4_13.cfm Unit Protocol in order to get to Rome Cornell Information Technologies
13
Make request Start External Law Enforcement University Counsel VP of Info Tech ITSO or IT Policy Office CIT Other CU Department Receive request Follow Internal unit protocol Refer to ITSO, IT Policy, or VP of IT* Refer to University Counsel N Y Y Can Comply? End Request tangible item? Order to provide item** Give item to ITSO/ IT Policy Office Y N End Give item to University Counsel Give item to law enforcement Receive item/ records Request for electronic records Order to provide records** Transmit records to law enforcement ** Depending on nature of the request, University Counsel may contact either IT Policy Office or ITSO Defect in request? Fix defect in legal paperwork YN * Depending on who is available Notify ITSO, IT Policy, or VP of IT* to counsel? Y N to VP of IT? Y N to ITSO or IT Policy? to CIT? Y N N Y
14
Privacy Laws… Health Insurance Portability Act Financial Services Act (GLBA) **Both HIPAA and GLBA have explicit security and privacy regulations Family Education Rights Privacy Act Pre-existing, so it has not caught up yet Got a campus hotel with cable or movies? Video Recording Act Cable Act Health Insurance Portability Act Financial Services Act (GLBA) **Both HIPAA and GLBA have explicit security and privacy regulations Family Education Rights Privacy Act Pre-existing, so it has not caught up yet Got a campus hotel with cable or movies? Video Recording Act Cable Act
15
Institutional Policy Response Complementary Privacy and Security Programs organized around the following five categories: Policy Risk Assessment/Operations Training for personnel Education for all users Enforcement Complementary Privacy and Security Programs organized around the following five categories: Policy Risk Assessment/Operations Training for personnel Education for all users Enforcement
16
Examples Cornell Security Program http://www.cit.cornell.edu/oit/policy/security.html http://www.cit.cornell.edu/oit/policy/security.html Cornell (nascent) Privacy Program http://www.cit.cornell.edu/oit/policy/privacy.html http://www.cit.cornell.edu/oit/policy/privacy.html IT Policy Framework http://www.cit.cornell.edu/oit/policy/framework-chart.html http://www.cit.cornell.edu/oit/policy/framework-chart.html Cornell Security Program http://www.cit.cornell.edu/oit/policy/security.html http://www.cit.cornell.edu/oit/policy/security.html Cornell (nascent) Privacy Program http://www.cit.cornell.edu/oit/policy/privacy.html http://www.cit.cornell.edu/oit/policy/privacy.html IT Policy Framework http://www.cit.cornell.edu/oit/policy/framework-chart.html http://www.cit.cornell.edu/oit/policy/framework-chart.html
17
Data Breach Notification Laws in several states California and New York, notably Federal one is on the way, currently several offerings Common characteristics Name + SSN, bank routing, credit card or other financial transaction numbers Standard: reasonable belief that data were accessed by an unauthorized individual Encryption is a safe harbor Laws in several states California and New York, notably Federal one is on the way, currently several offerings Common characteristics Name + SSN, bank routing, credit card or other financial transaction numbers Standard: reasonable belief that data were accessed by an unauthorized individual Encryption is a safe harbor
18
Cornell’s Institutional Response (Reactive) Data Incident Response Team (DIRT) VP of IT Directors of Security and Policy Legal Counsel (sometimes two!) Director of Communications Campus Police ***Unit head of affected computers and associated personnel ***Data stewards of the breached data Data Incident Response Team (DIRT) VP of IT Directors of Security and Policy Legal Counsel (sometimes two!) Director of Communications Campus Police ***Unit head of affected computers and associated personnel ***Data stewards of the breached data
19
Institutional Policy Response Information Security of Institutional Data http://www.cit.cornell.edu/oit/policy/drafts/RUis.html Appendix A Rules for handling data broken down into three categories of users: Data Stewards Unit Heads Custodians Appendix B Minimum Data Security Standards for Three Classes of Data http://www.cit.cornell.edu/computer/security/prop-baseline.html Information Security of Institutional Data http://www.cit.cornell.edu/oit/policy/drafts/RUis.html Appendix A Rules for handling data broken down into three categories of users: Data Stewards Unit Heads Custodians Appendix B Minimum Data Security Standards for Three Classes of Data http://www.cit.cornell.edu/computer/security/prop-baseline.html
20
Data Steward Inventory data under his/her jurisdiction Categorize data Establish rules for disclosing and authorizing access to administrative data Conduct annual risk assessments of security and privacy practices Unit Head Assume responsibility for data under his/her control Deploy procedures to comply with steward's rules for disclosing, categorizing, and authorizing access to administrative data Deploy procedures for meeting minimum standards for data security according to data classification (see Appendix B) Negotiate with stewards in cases of disclosing mixed data sets (i.e., more than one data category or steward) Custodian Execute unit's procedures for disclosing, categorizing, and authorizing access to administrative data Execute unit's procedures for meeting minimum standards for data security according to data classification (see Appendix B) Report all data breach incidents
21
Data Classification Criteria Cost/Benefit Analysis Costs (financial and administrative): Administrative burden Financial cost of new technologies New business practices Benefits (mitigating risk): Legal check list Policy decisions (prioritizing institutional data) Ethical considerations? Cost/Benefit Analysis Costs (financial and administrative): Administrative burden Financial cost of new technologies New business practices Benefits (mitigating risk): Legal check list Policy decisions (prioritizing institutional data) Ethical considerations?
22
Legal Check List Type of Data Privacy Statement Annual Notice Notification Upon Breach Private Right of Action Government Enforcement Statutory Damages Personally Identifiable no xxxx Education Record xno x Medical Record xno xxx Banking Record xx complicated oxx
23
Yochai Benkler, The Wealth of Networks We are in the midst of a technological, economic and organizational transformation that allows us to renegotiate the terms of freedom, justice and productivity in the information society. How we shall live in this new environment will in some significant measure depend on policy choices that we make over the next decade or so.
24
How Social Production Transforms Markets and Freedom To be able to understand these choices, to be able to make them well, we must recognize that they are part of what is fundamentally a social and political choice -- a choice about how to be free, equal, productive human beings under a new set of technological and economic conditions.
25
The Big “P” Policy Challenge: As economic policy, allowing yesterday’s winners to dictate the terms of tomorrow’s economic competition would be disastrous. As social policy, missing an opportunity to enrich democracy, freedom and justice in our society while maintaining or even enhancing our productivity would be unforgivable.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.