Internet!Surveillance!and!Boomerang!Routing!:! A!Call!for!Canadian!Network!Sovereignty!
|
|
- Isabella Townsend
- 8 years ago
- Views:
Transcription
1 JonathanA.Obar,AndrewClement InternetSurveillanceandBoomerangRouting: ACallforCanadianNetworkSovereignty InP.Ross&J.Shtern(Eds.),TEM$2013$:$Proceedings$of$the$Technology$&$Emerging$Media$Track Citation Obar,J.A.&Clement,A.(2013).InternetSurveillanceandBoomerangRouting:ACallforCanadianNetwork Sovereignty.InP.Ross&J.Shtern(Eds.),TEM$2013$:$Proceedings$of$the$Technology$&$Emerging$Media$ Track$ $Annual$Conference$of$the$Canadian$Communication$Association$(Victoria,$June$5$ $7,$2013),URL:
2 InternetSurveillanceandBoomerangRouting: ACallforCanadianNetworkSovereignty 1 Author JonathanA.Obar FacultyofInformation,UniversityofToronto DepartmentofTelecommuncation,InformationStudiesandMedia,MichiganStateUniversity jonathan.obar@utoronto.ca AndrewClement FacultyofInformation,UniversityofToronto andrew.clement@utoronto.ca Abstract Analysisofmorethan25,000internettraceroutesrevealsaphenomenonwecall boomerang routing,wherebycanadianptopcanadianinternettransmissionsareroutinelyroutedthrough theunitedstates.canadianoriginatedtransmissionsthattraveltoacanadiandestinationvia au.s.switchingcentreorcarrieraresubjecttou.s.lawpincludingtheusapatriotactand FISAA.Asaresult,thesetransmissionsexposeCanadianstopotentialU.S.surveillance activities,includingthosehighlightedbythesnowdenallegations aviolationofcanadian networksovereignty. InthefaceofthisunregulatedsurveillanceofCanadians,theFederalgovernmentand internetserviceprovidersshouldrepassertournationalnetworksovereigntyandbetter protectcanadiancivilliberties.inwhatfollows,wepresentboomerangroutefindingsand discussnsatrackingconcerns.wethenofferaplanforstrengtheningcanadiannetwork sovereigntyandprovidetwostrategiesforprotectingcanadianinternettransmissionsfrom Americansurveillance:1)strengthenandenforceCanadianprivacylaw(e.g.PIPEDA),and2) repatriatecanadianinternettrafficbybuildingmoreinternetexchangepoints. Keywords Surveillance;NSA;Telecommunications;Privacy;BigData;NetworkSovereignty 1 This research has received funding from Canada s Social Sciences and Humanities Research Council and the Office of the Privacy Commissioner of Canada. The IXmaps project is the work of a research team that currently includes Colin McCann and Antonio Gamba. David Phillips, Steve Harvey, GabbyResch,ErikStewart,NancyPaterson,MishaSnyderandLaurenDiMonte havemadeinvaluablecontributionsatearlierstagesoftheproject.wearealso gratefultothoseindividuals,largelyanonymous,whohavecontributedtothe databasebyinstallingandrunningtrgen,orhaveprovidedfeedbackthathas helpedimprovetheapplication. 1
3 1. Introduction Nationalsovereigntyisthreatenedwhenanotherwiseinternationally independent state has its rights and powers of internal regulation and controlviolatedbytheencroachmentofaforeignbody(barr,2002).asa sovereignwillcanbeimposedinanyareawherethereisarelationship betweenthepoliticalentityknownasthestateanditscitizens,thereare a multitude of sites for potential violation. One such site is network sovereignty P the authoritative quality or process whereby an entity (such as the state) or set of entities distinguishes the boundaries of a network and then exercises a sovereign will or control within those boundaries.anycontrollingentity,fromafeudalmonarchtoanelected government, exercises a form of network sovereignty when they construct or regulate any number of network systems ranging from transportation (e.g. roads, railroads, highways), utilities (e.g. water, electric) to communication (e.g. mail routes, telecommunication) in whichthestatehasavitalinterest.assovereigns,theycandecidewhere thesenetworksgo,theirstructuraldesignanddevelopment,theextent to which they operate, in whole or in part, and at what speed and capacity,aswellaswhoorwhatcantravelonthem,andatwhatprice.it follows that a threat to national network sovereignty constitutes encroachmentupontherightsandpowersofthestatetoregulateand controlanyofthesenetworkaspects. Canada s telecommunication system, as a critical infrastructure for nation building and sociopeconomic wellpbeing, is one site where the state has, over many years, attempted to exercise national network sovereignty. Following from a long history of protectionist policy, the Telecommunications Act of 1993 notes that Canadian telecommunications perform an essential role in the maintenance of Canada s identity and sovereignty (Telecommunications Act, 1993). Exercisingasovereignwill,theCanadiangovernmentalsodetermineda connectionbetweenitstelecommunicationsystemandtheprotectionof civil liberties. For example, the Act notes that Canadian telecommunicationsshould contributetotheprotectionoftheprivacy ofpersons (Ibid).TheseprivacyprotectionsarereinforcedbySection8 of the Canadian$ Charter$ of$ Rights$ and$ Freedoms that protects against unlawfulsearchandseizure,andbythepersonal$information$protection$ and$electronic$documents$act(pipeda),whichsafeguardsdataprivacyin theprivatesector.asaresult,shouldaforeignbodyencroachuponthe controlofacanadiantelecommunicationnetworkanditsoperation,that actionwouldconstituteaviolationofcanadiannetworksovereignty,and potentiallythreatencanadiancivilliberties. This paper presents findings from the IXmaps (for internet exchange mapping)projectattheuniversityoftoronto 2 aresearchinitiativethat maps and analyzes the routes Canadian data packets take across the internetbackbone.whilecanadiansaccessingamericanserversthrough 2 2
4 intendedcommunicationwithamericansandamericaninternetservices shouldexpecttosendpacketsacrosstheborder,onemightassumethat CanadianPtoPCanadian communication remains within national jurisdiction. Contrary to this assumption, the IXmaps research makes visibleawidespreadphenomenonwecall boomerangrouting whereby CanadianPtoPCanadian internet transmissions are routinely routed throughtheunitedstates 3.Canadianoriginatedtransmissionsthattravel toacanadiandestination,butviaau.s.switchingcentreoru.s.carrier, aresubjecttou.s.lawpincludingtheusapatriotactandfisaa 4.Asa result, CanadianPtoPCanadian internet transmissions that boomerang exposecanadiancommunicationstopotentialu.s.surveillanceactivities a violation of Canadian network sovereignty. These concerns are particularly acute in the wake of Edward Snowden s revelations about the National Security Agency s (NSA) internet surveillance programs (Clement,2014). Inthefaceofthisunregulated surveillance of Canadians, the Federal governmentandinternetserviceprovidersshouldrepassertournational networksovereigntyandbetterprotectcanadiancivilliberties.inwhat follows, we present IXmaps boomerang route findings, and discuss related concerns about NSA tracking. We then offer a plan for strengtheningcanadiannetworksovereigntyandprovidetwostrategies for protecting Canadian internet transmissions from American surveillance: 1) strengthen and enforce Canadian privacy law (e.g. PIPEDA), and 2) repatriate Canadian internet traffic by building more internetexchangepoints. 2. MappingCanadianBoomerangTrafficThroughtheU.S. Whenusersinteractwithinternetapplications( ,web,p2p,etc.) they send data packets over the internet. As each packet takes its individual path, it travels through data traffic routers that pass the packet closer to the destination. Anyone who has tracked a couriered mailpackageknowsthatmaildoesnottravelinastraightlinefrompoint A directly to point B, there are stops (or hops ) in different locations alongtheway thesameistruefordatapacketrouting. IXmapssoftwaremapsdatapacketroutes( traceroutes )usinggoogle EarthandGoogleMapstotracetheroutespacketstakefromtheuser s machine,throughthedifferenttrafficrouters( hops )alongthewayto the final destination. As shown in Figure 1, the software provides locationdata(i.e.latitudeandlongitude)foreachhopalongtheroute. Since2009,theIXmapsteamhasengagedinacrowdsourcingeffortto generateandaccumulatetraceroutes.morethan200contributorshave installedandruncustomizedtracegenerationsoftware(trgen),adding 3 While not recognized publically, it is wellpknown in the internet routing communitythatsignificantportionsofintrapcanadiantraffictransitstheus. 4 Notably Section 215 of the USA Patriot Act, and Section 702 of the Foreign SurveillanceIntelligenceAmendmentsAct(FISAA). 3
5 Obar & Clement Internet Surveillance and Boomerang Routing to a database currently containing well over 25,000 traceroutes from over 200 distinct originating addresses, terminating in more than 2,500 distinctdestinations. Figure'1' 'Toronto.New'York.Chicago.Toronto'Boomerang'Traceroute'Details' Figure1presentsthetraceroutedatafora boomerangroute,apath thatoriginatesandterminatesinthesamecountry,buttransitsanother. As depicted in Figure 2, this traceroute begins and ends in Canada, but crossesintotheu.s.alongtheway. Figure'2' 'Toronto.New'York.Chicago.Toronto'Boomerang'Route$ From the database of 25,000 traceroutes, 5,560 originate and terminate in Canada, of those, 1,280, roughly onepquarter, boomerang through the United States. Some of the online interactions that boomerang through the U.S. include visits to Canadian government websites,includingtheofficeoftheprivacycommissionerofcanada,as wellasanumberofpersonalbankingsitessuchasbankofmontreal,td CanadaTrustandCIBC. 4
6 3. CanadianBoomerangTrafficandNSASurveillance In2006,MarkKlein,aretiredAT&Ttechnician,revealedthattheU.S. NationalSecurityAgency(NSA)hadinstalledsurveillanceequipmentat AT&T smainsanfranciscointernetexchangepoint(ixp)at611folsom St. (Klein, 2009). By installing splitters that directed exact copies of all traffic passing through the IXP to secret computers, the NSA s surveillance system is capable of monitoring the process of communication (i.e. sender and receiver), but also the contents of messages as well. Much of the intercepted traffic is saved for later analysis. The NSA s secret data center or spy facility currently being builtinutah,willsoonbecapableofhandlingseveraldecadesworthof internet traffic (Bamford, 15 Mar 2012). 5 Recent revelations by whistlebloweredwardsnowdenreinforcetheseallegations,pointingto widespread NSA interception of domestic U.S. internet traffic (Greenwald,7Jun2013;Greenwaldetal,2013) Based on conversations and meetings with other AT&T staff, Klein (2009) reports that surveillance installations, like that in San Francisco, existinfiveotherlocations:atlanta,losangeles,sandiego,sanjoseand Seattle. Clement (2013) identifies 18 cities in the U.S. that likely have similarsurveillancesites.furthermore,ofthe1,319u.s.ponlytraceroutes heldintheixmapsdatabase,99percenttravelthroughatleastoneof these cities, suggesting that the NSA has almost complete surveillance capabilitiesforallu.s.internettraffic(ibid). TheextentofU.S.surveillanceofCanadiandatapacketsislessclear. Table 1 lists the topp10 U.S. cities suspected of having installed NSA splitteroperations(clement,2013).thetablealsonotesthepercentage of the 1,280 CanadianPUSPCanada boomerang routes housed in the IXmaps database that pass through these cities, potentially subject to U.S.surveillanceefforts.Currentfindingsrevealthatcitiesclosesttothe CanadianborderaremorelikelytorouteCanadiandata.Approximately 50 percent of IXmaps boomerang routes pass through New York and Chicago,thetoptwocitiessuspectedofhavingNSAsplitters,andabout 25percenttravelthroughSeattle. 6 5 The size of big data and the speed of its exponential growth are difficult to grasp.ibmreportsthatattheturnofthemillennium,800,000petabytes(10 15 bytes)werestoredintheworld(zikopoulos,eaton,deroos,deutsch,&lapis, 2012).In2020,itisprojectedthatthisnumberwillreach35zettabytes(10 21 bytes).theamountofdatathensawillreportedlybecapableofstoringisin therangeofyottabytes(10 24 bytes). 6 ThesefiguresareapproximateasthegeoPlocationofroutersisnotprecise. 5
7 NSA %ofcdnkuskcdntraffic City Boomerangs Likelihood (1280Routes) 1 NewYork,NY % 2 Chicago,IL % 3 LosAngeles,CA 6 <1% 4 Atlanta,GA 42 3% 5 Dallas,TX 21 2% 6 SanFrancisco,CA 12 1% 7 Washington,DC % 8 Seattle,WA % 9 SanDiego,CA 0 0% 10 Boston,MA 10 1% Table'1' 'Canada.US.Canada'Boomerangs'and'Likelihood'of'NSA'Surveillance' The boomerang routing and threat of NSA surveillance suggests that many of the ISPs routing Canadian internet traffic are jeopardizing the sovereignty and privacy of Canadians mandated by the TelecommunicationsActandPIPEDA. 4. ACallforCanadianNetworkSovereignty Foreign surveillance of Canadian internet transmissions threatens Canadian civil liberties and violates our sovereignty. This call for Canadian network sovereignty urges the Federal government to strengthenoursecuritypoliciesandrelatedenforcementmechanismsto ensure that CanadianPtoPCanadian communication remains within our national boundaries and jurisdiction. Canadian democratic institutions likely cannot affect U.S. surveillance practices, but they can exert pressure to ensure that those operating within the jurisdiction of Canadian law make the protection of Canadian sovereignty and civil libertiesatoppriority.werecommendthatpolicyeffortsstrengthenand enforcecanadianprivacylaws,andworktorepatriatecanadianinternet trafficbybuildingmoreinternetexchangepoints StrengthenCanadianPrivacyLaws(i.e.PIPEDA) Canadiandataroutingandcollectionpracticesneedgreaterprotection by Canadian privacy policy. While the Personal$ Information$ Protection$ and$ Electronic$ Documents$ Act (PIPEDA) demonstrates the Federal government sinterestinprivacyprotections,moreneedstobedoneto ensure results. When PIPEDA went into effect at the turn of the millennium, Facebook, Twitter and smartphones didn t exist. More of ourlivesarebeinglivedonline,witheachactivityproducingstreamsof finepgrainedpersonaldata. Canada s Privacy Commissioners should more vigourously apply existinglaw,andcanadianprivacypoliciesalsoneedtobestrengthened. As federal Commissioner Jennifer Stoddart notes, PIPEDA is outdated andinneedofreform, As organizations find new ways to profit from personal information,therisks to privacy are growing exponentially.[ ]Itisincreasinglyclearthatthelawisnot up to the task of meeting the challenges of today and certainlynotthoseoftomorrow.(opc,23may2013) 6
8 Furthermore,whiletheOfficeofthePrivacyCommissioner(OPC)has prompted companies to improve their privacy practices, actions are rarely proactive, with minimal reactions more often the result after considerable OPC resources have been spent (Ibid). Stoddart notes, [t]he legislation lacks mechanisms strong enough to ensure organizationsinvestappropriatelyinprivacy (Ibid). TheOPChasreleasedapositionpiece(OPC,2013)callingforPIPEDA reformthatwoulddomoretostrengthennationalnetworksovereignty aswellasprivacy.thesereformsinclude: 1) Strengthening OPC enforcement powers including: a) statutory damages to be administered by Federal Court for violations, b) orderpmakingpowersfortheopcthatwouldforceorganizations toperformorceasecertainactions,andc)monetarypenaltiesto beimposedbytheopc. 2) Breach notification: requiring organizations to report privacy breachestotheopcandtoaffectedusers. 3) Increasedtransparency:transparencyreportswouldberequired, disclosing law enforcement and other government requests for personalinformation,andtheextenttowhichentitiescomply. 4) Promoteaccountability:organizationswouldhavetodemonstrate accountability (proactive privacy protections) upon request. The enforceable agreements concept, the notion that OPC can compel action, would be incorporated into the law, with accountability provisions being subject to review by a Federal Court. Each of these reforms should be implemented with a focus on data collection and management practices, including routing behaviours. While enforcement power will be essential to ensure compliance, greater transparency is also vital to ensure a more democratic assessment of current practices. It is unrealistic to expect a quick and completeshifttonetworksovereignty,andthus,publicunderstandingof the reform is essential. Currently, PIPEDA requires that users submit privacy complaints to carriers. Without greater transparency, this requirementislikelytoaccomplishlittleprotection,asusersareunable todeterminetheextenttowhichtheircivillibertiesarebeingviolated. Greater transparency and enforcement will push back against the development of industry practices that subject Canadians to U.S. surveillanceeffortsandthreatenourprivacyandnationalsovereignty RepatriateInternetTrafficByBuildingMoreCanadian InternetExchangePoints Passinglawsmandatingroutingpatternswillbeproblematicifcarriers are not provided with the tools to ensure that a sovereign Canadian internet network will be able to function. While political economic relationships between carriers contribute to routing patterns, network congestion issues, specifically Canadian IXP bottlenecks, are a realistic concern that can direct routing and as a result, impact network sovereigntyandprivacy. 7
9 Internetexchangepoints(IXPs)havemanybenefitsincludingtheability tohelpreducenetworkcongestionandincreasethelikelihoodoflocal peering(itu,2013).ithasbeensuggestedthatthepresenceaswellas management of IXPs can impact an entire region s Internet economy (Ryan and Gerson, 2012; ITU, 2013). Other related benefits include: reducingthenumberofnetworkhopstoexchangetraffic,optimizingthe useofinternationalconnectivity,improvingnetworkresilienceandlikely qualityofservice,reducingtransmissioncostsandinternationalcapacity costs (potentially millions of dollars per year), and increasing the possibility of greater internet penetration rates (ITU, 2013). Indeed, given the rise of the internet economy and the intensification of the internet s centrality to everyday life, the importance of IXPs is only growing. ToensureCanadiannetworksovereignty,moreIXPsneedtobebuilt. 7 As of June 2012, Canada only had three IXPs. In the last year, two additionalixpshavebeenaddedtothelist.bycomparison,theunited States has 86 IXPs (Packet clearing house, 2013). As Byron Holland, presidentofthecanadianinternetregistrationauthoritynotes, Thereisonewaytoprotectourselves,tosomedegree,fromhavingour data fall under the jurisdiction of a foreign country. We must ensure moreofittravelstoitsdestinationviacanadianroutes.[ ]Itistimefor CanadatorepatriateitsInternettraffictothebestextentpossible[ ]to do this will require more Internet Exchange Points [ ] By building a robustcanadianinternetinfrastructure,includinganationpwidefabricof IXPs, we can ensure more Canadian traffic stays in Canada, and is thereforeonlysubjecttocanadianlaw.(holland,24jun2013) The Canadian government should continue to invest in this vital infrastructure, which is certainlylinkedtoeconomicbenefit,aswellas theprotectionofprivacyandnetworksovereignty. 5. Conclusion When Canadian internet traffic boomerangs through the U.S., the transmissionsbecomesubjecttou.s.lawsincludingthepatriotactand FISAA. With U.S. security agencies engaging in broad domestic surveillance, CanadianPtoPCanadian transmissions may be subject to interception.tosafeguardcanadiannetworksovereignty,thecanadian governmentshoulddomoretoensurethatthecommercialentitiesthat route Canadian internet transmissions are compelled to protect them, andasaresult,userprivacy.networksovereigntybeginswithstronger governmentpolicyandenforcementmechanismsthatcanenhanceisp best practices and spur industry selfpregulation. The building of more Canadian internet exchange points and promotion of their use will removejustificationsforinternationalpeering,andstrengthencanada s interneteconomy. 7 SeetheCIRAreportbyWoodcock&Edelman(2012). 8
10 These efforts will contribute to state sovereignty, but will not free Canadiansfrombeingsurveilled.Interceptionstrategiessimilartothose being perpetrated by the NSA are also likely taking place in Canada. SimilartothebillionPdollar spycenter beingbuiltinutah(bamford,15 Mar 2012), Communications Security Establishment Canada (CSEC) is currentlybuildingan$880millionintelligencecomplexrightnexttothe Canadian Security Intelligence Service s headquarters (Pugliese, 12 Oct 2009). While CSEC denies any claim of domestic surveillance activity (CTV,10Jun2013)ithasbeensuggestedthatthepurposeofthisnew facilityistoemulatethensa(tencer,8jun2013). National network sovereignty is threatened when an otherwise internationally independent state has its rights and powers of internal network regulation and control violated by the encroachment of a foreign body. Though the multitude of challenges presented by our evolving telecommunications system can seem insurmountable (Obar, 2013),pragmaticandrealisticstrategiesforbolsteringCanadiannetwork sovereigntyareneeded.canadiansshouldadvocatefortougherprivacy policies and enforcement of the law to ensure that civil liberties are protected.weshouldalsochampioninvestmentintelecommunications infrastructure, especially internet exchange points that would, in combination with stronger policies, reduce dependence on foreign routing, strengthen our internet economy and restore faith in the commitmentsofourpublictrustees. 9
11 References Bamford, J. (15 Mar 2012). The NSA is building the country sbiggestspycenter(watchwhatyousay). Wired. Retrieved July 20, 2013 from enter/ Barr,B.(2002).Protectingnationalsovereigntyinaneraof international meddling: an increasingly difficult task.harvard$$ journal$of$legislation,$39,299p 324. Clement,A.(2013).IXmaps trackingyourpersonaldata through the NSA s warrantless wiretapping sites. Proceedings$ of$ the$ IEEE$ $ ISTAS$ conference. Toronto.June27P30,2013. Clement, A. (2014, forthcoming) NSA Surveillance: Exploringthegeographiesofinternetinterception, To be presented at the iconference2014, Berlin, March4P7,2014 CTV.(10Jun2013).DataPcollectionprogramnottargeting Canadians: MacKay. Retrieved July 26, 2013 from notptargetingpcanadianspmackayp Greenwald,G.(7Jun2013).NSAPrismprogramtapsinto user data of Apple, Google and others. The$ Guardian.$ Retrieved July 20, 2013 from giantspnsapdata Greenwald, G., MacAskill, E. & Poitras, L. (10 Jun 2013). Edward Snowden:the whistleblower behind the NSA surveillance revelations. The$ guardian.$$ Retrieved July 20, 2013 from snowdenpnsapwhistleblowerpsurveillance Holland,B.(24Jun2013).PRISM,internetexchangepoints and Canada. Public$ domain$ (blog).$ Accessed July 26, 2013 from internetpexchangeppointspandpcanada/$ InternationalTelecommunicationsUnion.(2013).Internet exchanges points (IXPs). WTPF backgrounder series.retrievedjuly26,2013from 13/Documents/backgrounderPwtpfP13PixpsPen.pdf Klein,M.(2009).Wiringupthebigbrothermachine and fightingit.charleston,sc:booksurgepublishing. Obar, J.A. (2013). Phantom data sovereigns: Walter Lippmann,bigdataandthefallacyofpersonaldata sovereignty. Working paper. Retrieved July 26, 2013 from id= OfficeofthePrivacyCommissionerofCanada.(2013).The$ case$for$$ reforming$ the$ Personal$ Information$ Protection$ and$ Electronic$ Documents$ Act.$ Retrieved July 26, 2013 from 5_e.asp$ Office of the Privacy Commissioner of Canada. (23 May 2013). New release: new privacy challenges demand stronger protections for Canadians. Retrieved July 26, 2013 from c_130523_e.asp Packet clearing house. (2013). Internet exchange point growth. Retrieved July 26, 2013 from ary/growth/ Pugliese, D. (12 Oct 2009). Canadian spies Camelot : defencehopingot attractworldp class talent with $880M intelligence complex. National$ Post.RetrievedJuly 26, 2013 from anpspiespcamelotpdefencephopingptopattractpworldp classptalentpwithp880mpintelligencepcomplex/ Ryan, P.S. & Gerson, J. (2012). A primer on internet exchange points for policymakers and nonp engineers. Retrieved July 26, 2013 from id= TelecommunicationsAct.(1993,c.38).Retrievedfromthe Government of Canada Justice Laws website: Tencer, D. (8 Jun 2013). NSA spying on Canadians, CSEC capableofsimilarsurveillance:experts.huffington Post. Retrieved July 26, 2013 from spyingpcanada_n_ html Woodcock,B.&Edelman,B.(2012).Towardefficienciesin Canadianinternettrafficexchange.Areportforthe Canadian Internet Registration Authority. Retrieved December 9, 2013 from EfficienciesPinPCanadianPInternetPTrafficP Exchange2.pdf Zikopoulos,P.,Eaton,C.,deRoos,D.Deutsch,T.,&Lapis, G.(2012).Understanding$big$data.NewYork,NY: McGrawPHill. 10
The Internet is Not a Cloud Geographies Matter as Much as Ever for Internet Storage, Routing and Surveillance
The Internet is Not a Cloud Geographies Matter as Much as Ever for Internet Storage, Routing and Surveillance Andrew Clement Fac. of Information, Univ. of Toronto Seeing through the Cloud Assessing Privacy
More informationCommittee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
More informationData Privacy Transparency of Canadian Internet Service Providers
keeping internet users IN THE KNOW OR IN THE DARK Data Privacy Transparency of Canadian Internet Service Providers Andrew Clement & Jonathan Obar IXmaps & New Transparency Projects Faculty of Information,
More informationSection II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY
Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,
More informationGovernment Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015
Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:
More informationIntroducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report
Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,
More informationIN THE SUPREME COURT OF BRITISH COLUMBIA NOTICE OF CIVIL CLAIM. This action has been started by the plaintiff for the relief set out in Part 2 below.
IN THE SUPREME COURT OF BRITISH COLUMBIA No. ----- Vancouver Registry BETWEEN: THE BRITISH COLUMBIA CIVIL LIBERTIES ASSOCIATION Plaintiff AND: THE ATTORNEY GENERAL OF CANADA Defendant Narne and address
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationStatement on ischool responses to the challenges of NSA mass state surveillance
Statement on ischool responses to the challenges of NSA mass state surveillance April 7, 2015 We members of the ischool community/iconference 2015 attendees recognize that: 1. Widespread mass suspicion-less
More informationGlobal Information Society Watch 2014
Global Information Society Watch 2014 Communications surveillance in the digital age This report was originally published as part of a larger compilation, which can be downloaded from GISWatch.org Association
More informationEconomic Impact of PRISM on Cloud Services & Safe Harbor
Economic Impact of PRISM on Cloud Services & Safe Harbor SESSION ID: TRND-R04A Craig Spiezle Executive Director & President, Online Trust Alliance https://otalliance.org Challenges & Risks Privacy Balkanization
More informationKeeping Internet Users in the Know or in the Dark A Report on the Data Privacy Transparency of Canadian Internet Carriers
Keeping Internet Users in the Know or in the Dark A Report on the Data Privacy Transparency of Canadian Internet Carriers Andrew Clement* & Jonathan A. Obar** andrew.clement@utoronto.ca. jonathan.obar@uoit.ca
More informationPosition Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security
Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationIndex All entries in the index reference page numbers.
Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125
More informationPrivacy Law in Canada
Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the
More informationIt s stated goal is to give people the power to share and make the world more open and connected.
BALANCING INDIVIDUAL RIGHTS WITH THE SOCIAL AND ECONOMIC BENEFITS OF A DIGITAL ECONOMY INTRODUCTION The World Wide Web and advances in broadband technology have presented enormous opportunities for economic
More informationCanada s New Anti-Spam Legislation: Overview and Implications for Businesses
dentons.com Focus on Communications Canada s New Anti-Spam Legislation: Overview and Implications for Businesses January, 2011 Contact Margot Patterson Dentons Canada LLP Counsel, Ottawa margot.patterson@dentons.com
More informationKeynote Presentation to. Simon Fraser University Vancouver, BC November 8, 2013. Elizabeth Denham Information and Privacy Commissioner for B.C.
CHECK AGAINST DELIVERY Keynote Presentation to MEDIA DEMOCRACY DAYS Simon Fraser University Vancouver, BC November 8, 2013 Elizabeth Denham Information and Privacy Commissioner for B.C. Thank you so much.
More informationCLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com
More informationWyoming School Boards Association Insurance Trust ( The Plan ) HEALTH CARE PLAN PRIVACY NOTICE
Wyoming School Boards Association Insurance Trust ( The Plan ) HEALTH CARE PLAN PRIVACY NOTICE THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS
More informationInsights and Commentary from Dentons
dentons.com Insights and Commentary from Dentons On March 31, 2013, three pre-eminent law firms Salans, Fraser Milner Casgrain, and SNR Denton combined to form Dentons, a Top 10 global law firm with more
More informationThank you for the opportunity to join you here today.
Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.
More informationBoys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology
Effective: Feb 18, 2015 Executive Director Replaces: 2010 Policy Page 1 of 5 REFERENCE: HIGH FIVE 1.4.3, 2.2.4, 2.5.3, PIDEDA POLICY: Our Commitment Boys and Girls Clubs of Kawartha Lakes (BGCKL) and the
More informationOPEN ACCESS, PRIVACY AND HACKER CULTURE
OPEN ACCESS, PRIVACY AND HACKER CULTURE An Inside Higher Ed webinar with Tracy Mitrano Director of IT policy and the Institute for Internet Culture Policy and Law at Cornell University October 2, 2013
More informationCase 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA --------------------------------------------------- KLAYMAN et al., Plaintiffs,
More informationComputer Science 199r. CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony
Computer Science 199r CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony Pierce Tria May 14, 2007 Privacy Concerns with Next Generation Telephony I. CALEA and The USA
More informationThe USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
More informationdetails, and numerous other data points. Enough information is often collected that even 2
Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 650 Pennsylvania Avenue, NW Washington, D.C. 050 VIA E MAIL bigdata@ostp.gov March, 04 Re: Big Data Study, Document
More informationMyths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
More informationNETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
More informationThe cloud thing: Privacy and cloud computing
The cloud thing: Privacy and cloud computing David T.S. Fraser (david.fraser@mcinnescooper.com / @privacylawyer) University of New Brunswick July 2011 Disclaimer What follows are the views of the author
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 22 November 2006 15644/06 DATAPROTECT 45 EDPS 3
COUNCIL OF THE EUROPEAN UNION Brussels, 22 November 2006 15644/06 DATAPROTECT 45 EDPS 3 COVER NOTE from: Secretary-General of the European Commission, signed by Mr Jordi AYET PUIGARNAU, Director date of
More informationCSA Survey Results Government Access to Information July 2013
CSA Survey Results Government Access to Information July 2013 EXECUTIVE OVERVIEW During June and July of 2013, news of a whistleblower, US government contractor Edward Snowden, dominated global headlines.
More informationMICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT Western Student E-Communications Outsourcing Paul Eluchok - University Privacy Officer David Ghantous - Associate Director of Technical Services Dated: August
More informationBrief on Did GCHQ Spy on You Illegally?
Brief on Did GCHQ Spy on You Illegally? Privacy International on Monday launched a campaign and platform allowing people to ask the UK s surveillance court, the Investigatory Powers Tribunal, if GCHQ spied
More informationDistributel Communications Limited. c/o Privacy Officer 177 Nepean St. Suite 300, Ottawa, ON, K2P 0B4. January 20, 2014
Distributel Communications Limited. c/o Privacy Officer 177 Nepean St. Suite 300, Ottawa, ON, K2P 0B4 January 20, 2014 Dear Distributel Privacy Officer: We are academic researchers and civil rights organizations
More informationProtecting Saskatchewan data the USA Patriot Act
Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,
More informationDEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
More informationIntroduction. We hope you find this transparency report useful and informative. Enjoy.
January June 2014 Introduction In February 2014, we published our first ever transparency report, which explained how, when, and why governments requested information about our users throughout calendar
More informationNetworks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
More informationIs There Such a Thing as Internet Privacy?
Is There Such a Thing as Internet Privacy? April 13, 2015 Danielle Graff & Kristél Kriel Western Canada s Law Firm Click Agenda to edit Master title style What is Internet Privacy? Why does it matter?
More informationHAS KATZ BECOME QUAINT? USE OF BIG DATA TO OUTFLANK THE FOURTH AMENDMENT. Jeffrey L. Vagle * INTRODUCTION
HAS KATZ BECOME QUAINT? USE OF BIG DATA TO OUTFLANK THE FOURTH AMENDMENT Jeffrey L. Vagle * INTRODUCTION On December 14, 2010, a federal court, upon a government motion, entered an order pursuant to the
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) VONAGE HOLDINGS ) CORPORATION ) WC Docket No. 03-211 Petition for Declaratory Ruling ) Concerning an Order of the )
More informationH. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationAtlanta Insomnia & Behavioral Health Services, P.C. 315 West Ponce de Leon Ave Suite 1051 Decatur, GA 30030 404-378-0441
Atlanta Insomnia & Behavioral Health Services, P.C. 315 West Ponce de Leon Ave Suite 1051 Decatur, GA 30030 404-378-0441 Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES
More informationPassenger Protect Program Transport Canada
AUDIT REPORT OF THE PRIVACY COMMISSIONER OF CANADA Passenger Protect Program Transport Canada Section 37 of the Privacy Act 2009 AUDIT OF PASSENGER PROTECT PROGRAM, TRANSPORT CANADA The audit work reported
More informationTransferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act
Office of the Commissariat Privacy Commissioner à la protection de of Canada la vie privée du Canada Transferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act
More informationOnline Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION. Washington, DC 20006
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ) ) Joint Petition for Rulemaking to Resolve ) RM-10865 Various Outstanding Issues Concerning the ) Implementation of
More informationPRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION
PRIVACY POLICY Last updated February 2, 2009 INTRODUCTION This Privacy Policy explains how personal information about you may be collected, used, or disclosed by the Canadian Education and Research Institute
More informationCASL Compliance: A Primer on Canada's Anti-Spam Legislation. Whitepaper by David O. Klein, Esq.
CASL Compliance: A Primer on Canada's Anti-Spam Legislation Whitepaper by David O. Klein, Esq. Part 1 Will Your Marketing Campaign Be the Target of a Class Action Lawsuit or Regulatory Investigation for
More informationSUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
More informationFACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy
FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with
More information12.809 COURT ORDERS FOR TELEPHONE RECORDS
12.809 COURT ORDERS FOR TELEPHONE RECORDS References: United States Code (USC) 18USC2510-18USC2522, et al - Federal Wiretap Statutes 18USC2703 - Release of Subscriber Information to Law Enforcement under
More informationNSA Surveillance, National Security and Privacy
NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM
More informationGuilford Medical Associates, P.A.
Page 1 Guilford Medical Associates, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE
More informationBefore the AmCham EU Transatlantic Conference (Mar. 3, 2011), available at http://useu.usmission.gov/kennard_amchameu_030311.html.
One Year Later: Privacy and Data Security in a World of Big Data, the Internet of Things, and Global Data Flows Keynote Address Before the USCIB/BIAC/OECD Conference on Promoting Inclusive Growth in the
More informationDoing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance
About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring
More informationDepartment of Justice Policy Guidance: Use of Cell-Site Simulator Technology
Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Cell-site simulator technology provides valuable assistance in support of important public safety objectives. Whether deployed
More informationPrivacy Law in Canada
by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually
More informationDSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services
DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security
More informationThe European Union as a Constitutional Guardian of Internet Privacy and Data Protection: the Story of Article 16 TFEU
The European Union as a Constitutional Guardian of Internet Privacy and Data Protection: the Story of Article 16 TFEU SHORT SUMMARY There is a wide perception that governments are losing control over societal
More informationHIPAA PRIVACY NOTICE PLEASE REVIEW IT CAREFULLY
HIPAA PRIVACY NOTICE THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN OBTAIN ACCESS TO THIS INFORMATION. INTRODUCTION PLEASE REVIEW IT CAREFULLY Moriarty
More informationMega Transparency Report. March 2015. Requests for Removal of Content and for User Information
Mega Transparency Report March 205 Requests for Removal of Content and for User Information Introduction This is the first transparency report published by Mega since it commenced operations in January
More informationData Privacy: Where Should I House My Data?
Data Privacy: Where Should I House My Data? intralinks.com Data Privacy: Where Should I House My Data? As enterprise file sharing and collaboration tools become more widely used, it becomes increasingly
More informationPatriot Act Impact on Canadian Organizations Using Cloud Services
Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states
More informationPersonal Information Protection Act. Information Sheet 12: 1. Service Providers Outside Canada: Notification, Policies and Practices
: Notification, Policies and Practices Personal Information Protection Act Information Sheet 12 Introduction Organizations in Alberta operate in an increasingly global business environment. Large and small
More informationPolk Medical Center Notice of Privacy Practices
Polk Medical Center Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
More informationCYBER LIABILITY CLAIMS
CYBER LIABILITY CLAIMS TRENDS AND DEVELOPMENTS IN THE U.S. AND CANADA Animateur / Moderator: Daniel Desjardins, Senior Director Global Risk Management & Insurance, Bombardier Inc. Conférenciers / Speakers:
More informationAs Required by the Privacy Regulations Created as a Result of the Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Craig Ranch OB/GYN NOTICE OF PRIVACY PRACTICES As Required by the Privacy Regulations Created as a Result of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) THIS NOTICE DESCRIBES
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationNational Security Agency
National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the
More informationCOMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE FEDERAL TRADE COMMISSION. In the Matter of Myspace, LLC. FTC File No. 102 3058.
COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE FEDERAL TRADE COMMISSION In the Matter of Myspace, LLC FTC File No. 102 3058 June 8, 2012 By notice published on May 14, 2012, the Federal Trade
More informationStrategies for occupational therapists to address elder abuse/mistreatment
Strategies for occupational therapists to address elder abuse/mistreatment Provincial Legal Information: Quebec Prepared by the Canadian Association of Occupational Therapists August 2011 This project
More informationJust Net Coalition statement on Internet governance
Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a
More informationIt is the policy of the National Conference of State Legislatures to advance and defend a
COMMITTEE: POLICY: TYPE: LAW AND CRIMINAL JUSTICE CRIMINAL JUSTICE CONSENT It is the policy of the National Conference of State Legislatures to advance and defend a balanced, dynamic criminal justice partnership
More information7 August 2015. I. Introduction
Suggestions for privacy-related questions to be included in the list of issues on Hungary, Human Rights Committee, 115th session, October-November 2015 I. Introduction 7 August 2015 Article 17 of the International
More informationMicrosoft Cloud Computing Research Centre
Microsoft Cloud Computing Research Centre 1 st Annual Symposium, Cambridge 2014 : Legal frameworks Ian Walden i.n.walden@qmul.ac.uk 1 Introductory remarks From organised crime to law enforcement The Snowden
More informationHealth Insurance Portability and Accountability Act (HIPAA)
Atlanta Center for Positive Change 333 Sandy Springs Circle NE Suites 109 & 127 Atlanta, GA 30328 Anne Lewis Moore, PsyD (404) 277-7992 Karen Kallis, M.Ed., LAPC, NCC (404) 423-1087 Ephrat L. Lipton, LCSW,
More informationCLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
More informationUNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA OAKLAND DIVISION ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )
0 Marcia Hofmann (Cal. Bar No. 00 Zeitgeist Law PC Taylor Street San Francisco, CA Telephone: ( 0- marcia@zeitgeist.law Attorney for Amici Curiae Automattic, Inc.; CloudFlare, Inc.; CREDO Mobile, Inc.;
More informationAs the US debates email privacy a Berlin start up surges with...
TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services
More informationInternet Governance Forum Baku 2012
Internet Governance Forum Baku 2012 Workshop Cloudy Jurisdiction: Addressing the Thirst for Cloud Data in Domestic Legal Processes Workshop organized by Tamir Israel, Staff Lawyer, Samuelson- Glushko Canadian
More informationHow To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationBush Lets U.S. Spy on Callers Without Courts
Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December
More information5C-315. Presentation To. United States Department of Justice Office of Enforcement Operations Narcotics & Dangerous Drugs Section
5C-315 Presentation To United States Department of Justice Office of Enforcement Operations Narcotics & Dangerous Drugs Section Office of Investigative Technology Deputy Assistant Administrator ELECTRONIC
More informationPrivacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy
Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the
More informationPromoting Cross Border Data Flows Priorities for the Business Community
Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing
More informationPRIVACY POLICY. Consent
PRIVACY POLICY car2go N.A. LLC and car2go Canada Ltd. (collectively, car2go ) recognize the importance of protecting your personal information. We take the protection of your personal information seriously
More informationElectronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.
Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for
More informationGmail Security - Concerns About Privacy
Office of Risk Management and Access to Information MEMORANDUM Tel.: (807) 343-8518; 343-8267 Fax: (807) 346-7735 Email: mshaw1@lakeheadu.ca TO: FROM: Inquirers about Lakehead University s Adoption of
More informationFreedom of Information Act Request and Request for Expedited Processing
February 24, 2014 Arnetta Mallory - FOIA Initiatives Coordinator National Security Division U.S. Department of Justice 950 Pennsylvania Avenue, N.W. Room 6150 Washington, DC 20530-0001 BY EMAIL nsdfoia@usdoj.gov
More informationT.38 fax transmission over Internet Security FAQ
August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes
More informationFEB 0 S 2012. The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C. 20515
The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C. 20515 FEB 0 S 2012. The Honorable Harry Reid Majority Leader United States Senate Washington, D.C. 20510 The Honorable
More informationF ACEBOOK ACCOUNT SEARCH WARRNT AFFIDAVIT. at http://1 0.173.2.l2/criminal/ccips/online/library.htm under "Guides from ISPs."
F ACEBOOK ACCOUNT SEARCH WARRNT AFFIDAVIT ~tly\ ~"\,+i"". '-u..d"o~ USAGE NOTES: This go-by is for obtaining information relating to social networking accounts maintained on Facebook. The Facebook law
More informationUNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationPolicy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE
Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Kurt Wimmer I. The Need for Reform: A 1986 Act Doesn t Fit the
More information