Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

Size: px
Start display at page:

Download "Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy"

Transcription

1 Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy

2 The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the NSA, May 2013 countries or individuals that engage in cyber attacks should face consequences and international condemnation. In an interconnected world, an attack on one nation's networks can be an attack on all. - Hilary Clinton, Secretary of State, January 2010

3 Snowden leaks so far Around 500 docs made public Guardian has published 17 docs Yesterday US stated Snowden has doomsday cache of highly encrypted classified docs

4 What do we now know? Access to communications metadata The US has direct access to communications data held by Google, AOL, YouTube, Yahoo, Facebook, Microsoft (incl Skype) via PRISM Also gathers bulk access to telephone data Tapping of fibre optic cables UK is intercepting all data passing through 200 fibre optic cables landing in the UK via TEMPORA Storing content for 3 days and metadata for 30 days Breaking of encryption standards and infiltration of standards bodies

5 What do we now know? Computer network exploitation (hacking) is common practice The NSA has infected more than 50,000 computers with specialised malware Collection of and chat address books More than 250 million address books are gathered every year Hacking of private cables of Google centres Hacking of the SWIFT financial messaging system Spying on foreign leaders

6 What do we know? All data is shared with the Five Eyes alliance Interception, collection, analysis and decryption is conducted by each of the agencies of the 5 countries and all data is shared fluidly Operations centres are jointly run in each of the five countries Five Eyes have infiltrated every aspect of modern communications networks

7 What do we now know? Mass surveillance is the norm We are in a golden age for data collection NSA strategy doc: Digital information created since 2006 grew tenfold, reaching 1.8 exabytes in 2011, a trend projected to continue; the traces individuals leave when they interact with the global network will define the capacity to locate, characterize and understand entities. NSA has adapted in innovative and creative ways that have led some to describe the current day as the golden age of SIGINT.

8 Our thinking must shift in fundamental ways our personal and communications data is hugely valuable, and even data about data (metadata) is of great interest to our governments oversight mechanisms will fail to protect the rights of individuals when they are not transparent and publicly accountable borders are obsolete. Distinctions based on sovereignty and jurisdiction are being erroded. What does cross-border transfer of data mean in today s world? who needs data retention when individuals want to store everything, forever, in the cloud?

9 The policy and legal implications 1) The challenge to internet governance 2) Undermining the EU-US relationship 3) Long-term prioritisation of security over privacy 4) Increased legitimacy of surveillance in repressive regimes

10 The challenge to internet governance Brazil data localisation EU need a European data cloud What are the implications? Cost to internet services, complexity, impact on innovation Increased power to authoritarian regimes to restrict internet flows What role for national borders and outdated understandings of jurisdiction?

11 Undermining the US-EU relationship EU leaders (Oct 2013 statement): lack of trust undermines international cooperation Parliamentary vote to suspend the SWIFT agreement Renegotiation of the Safe Harbour Principles - Commission has imposed a 2014 deadline New data protection regulation prevents US companies from complying with law enforcement requests for EU data

12 Long-term prioritisation of security over privacy Justification for mass surveillance has been counterterrorism and the protection of security NSA media strategy document Sound Bites That Resonate mention 9/11 Negotiations around UN General Assembly US/UK demand to include mention of promoting security Difficulty in mobilising public outrage suggests that debate might be lost already?

13 Increased legitimacy of surveillance in repressive regimes China at the IGF: US should take a look at its own human rights record Zimbabwe on new SIM registration law: "There's nothing amiss about that, it happens all over the world. Ask Edward Snowden." Same technologies used by US government to conduct computer network exploitation and mass surveillance sold on the private market to Egypt, Bahrain, Libya, Morrocco, Yemen etc.

14 The fallout is not over yet More revelations to come Political and legal pressure to increase in the new year General Assembly vote on resolution in early Dec Brazil internet summit April 2014

15 The future?

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

Revealed: how US and UK spy agencies defeat internet privacy and security

Revealed: how US and UK spy agencies defeat internet privacy and security http://www.theguardian.com/world /2013/sep/05/nsa gchq encryption codes security Revealed: how US and UK spy agencies defeat internet privacy and security NSA and GCHQ unlock encryption used to protect

More information

Economic Impact of PRISM on Cloud Services & Safe Harbor

Economic Impact of PRISM on Cloud Services & Safe Harbor Economic Impact of PRISM on Cloud Services & Safe Harbor SESSION ID: TRND-R04A Craig Spiezle Executive Director & President, Online Trust Alliance https://otalliance.org Challenges & Risks Privacy Balkanization

More information

Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven

Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven 2 3 NSA calls the iphone users public 'zombies' who pay for their own surveillance 4 Snowden revelations NSA: Collect it

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

details, and numerous other data points. Enough information is often collected that even 2

details, and numerous other data points. Enough information is often collected that even 2 Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 650 Pennsylvania Avenue, NW Washington, D.C. 050 VIA E MAIL bigdata@ostp.gov March, 04 Re: Big Data Study, Document

More information

INTERNET TECHNOLOGY: LIBERATING OR CONTROLLING? Dr. Farid Farahmand War & Peace Series Fall 2013

INTERNET TECHNOLOGY: LIBERATING OR CONTROLLING? Dr. Farid Farahmand War & Peace Series Fall 2013 INTERNET TECHNOLOGY: LIBERATING OR CONTROLLING? Dr. Farid Farahmand War & Peace Series Fall 2013 So!. Is the Internet technology! Internet has opened a new dimension of communications giving us more control!

More information

Overview of Cloud Computing in India

Overview of Cloud Computing in India Overview of Cloud Computing in India NIST Standards in Trade Workshop with India Rahul Jain Principal Consultant Data Security Council of India September 17, 2014 Opportunities in the Cloud Cloud Market

More information

The threats which were perceivable 20 years ago differ greatly from our ever increasing

The threats which were perceivable 20 years ago differ greatly from our ever increasing 1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different

More information

Microsoft Cloud Computing Research Centre

Microsoft Cloud Computing Research Centre Microsoft Cloud Computing Research Centre 1 st Annual Symposium, Cambridge 2014 : Legal frameworks Ian Walden i.n.walden@qmul.ac.uk 1 Introductory remarks From organised crime to law enforcement The Snowden

More information

Can we maintain Human Rights in Our Cyber Empire?

Can we maintain Human Rights in Our Cyber Empire? Can we maintain Human Rights in Our Cyber Empire? Yvo Desmedt Univ. of Texas at Dallas USA and University College London UK December 11, 2014 c Yvo Desmedt 1. THE INDUSTRIAL EMPIRES The industrial empires

More information

Safe Harbour Agreement no longer a valid basis for EEA to US transfers of personal data

Safe Harbour Agreement no longer a valid basis for EEA to US transfers of personal data Jisc Safe Harbour NOTE ON THE COURT OF JUSTICE OF THE EUROPEAN UNION'S JUDGMENT ON 'SAFE HARBOUR' ARRANGEMENTS FOR THE TRANSFER OF PERSONAL DATA FROM THE EEA TO THE USA KEY POINTS Safe Harbour Agreement

More information

The Year 2013 Has Become 1984

The Year 2013 Has Become 1984 The Year 2013 Has Become 1984 Saturday, September 21, 2013 23:33 idiscovery Solutions Tom Matzen The Editor interviews Tom Matzen, Director at idiscovery Solutions, in charge of the firm s International

More information

Privacy & Data Security: The Future of the US-EU Safe Harbor

Privacy & Data Security: The Future of the US-EU Safe Harbor Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT

More information

DATE: 1 APRIL 2014. Introduction

DATE: 1 APRIL 2014. Introduction INTERNET SOCIETY SUBMISSION TO THE OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS IN RESPONSE TO THE CONSULTATION ON THE RIGHT TO PRIVACY IN THE CONTEXT OF THE UN GENERAL ASSEMBLY RESOLUTION 68/167 DATE:

More information

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 On March 10, 2015 the Center for Strategic and International Studies, in conjunction with the Cybersecurity Unit of the U.S. Department of

More information

The Risk of Hosting in. Canada. An ebook by

The Risk of Hosting in. Canada. An ebook by The Risk of Hosting in Canada An ebook by Index Introduction...1 Financial Risks...3 Legal Risks...5 Security Risks...8 Technical Risks...10 Conclusion...12 Contact...12 Introduction Hosting your applications

More information

LOOKING AT CLOUDS FROM BOTH SIDES NOW

LOOKING AT CLOUDS FROM BOTH SIDES NOW ANALYSIS, ADVANCED KEY POINTS OF THE ARTICLE: LOOKING AT CLOUDS FROM BOTH SIDES NOW WRITTEN BY W. KUAN HON, CHRISTOPHER MILLARD & IAN WALDEN 1/12 SUMMARY 1. Analysis history...3 2. Context...4 3. The evolution

More information

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference

More information

EU- US NGO Letter on 1 To Secretary Pritzker

EU- US NGO Letter on 1 To Secretary Pritzker November 13, 2015 Secretary Penny Pritzker U.S. Department of Commerce 1401 Constitution Ave., NW Washington, D.C. 20230 Commissioner Věra Jourová Justice, Consumers and Gender Equality European Commission

More information

Technological Sovereignty: Missing the Point?

Technological Sovereignty: Missing the Point? Technological Sovereignty: Missing the Point? An Analysis of European Proposals after June 5, 2013 by TIM MAURER, ROBERT MORGUS, ISABEL SKIERKA, MIRKO HOHMANN Following reports of foreign government surveillance

More information

Chinese Media & Cyber Security

Chinese Media & Cyber Security Chinese Media & Cyber Security CCTV-4, Obama & Edward Snowden By Jacquelyn Chinn Recent events concerning international relations and cyber security between the United States and China have presented an

More information

EUROPEAN PARLIAMENT 2014-2019. Committee on Civil Liberties, Justice and Home Affairs WORKING DOCUMENT

EUROPEAN PARLIAMENT 2014-2019. Committee on Civil Liberties, Justice and Home Affairs WORKING DOCUMENT EUROPEAN PARLIAMT 2014-2019 Committee on Civil Liberties, Justice and Home Affairs 19.1.2015 WORKING DOCUMT on the Follow-up of the LIBE Inquiry on Electronic Mass Surveillance of EU Citizens Committee

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

SUNDAY, JUNE 16, 2013. MARINA Internet metadata

SUNDAY, JUNE 16, 2013. MARINA Internet metadata ABCDE SUNDAY, JUNE 16, 2013 NSA SURVEILLANCE The Architecture Four-pronged U.S. approach relies heavily on data behind Internet, phone communications By Barton Gellman On March 12, 2004, acting attorney

More information

As the US debates email privacy a Berlin start up surges with...

As the US debates email privacy a Berlin start up surges with... TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cybersecurity and Data Protection - First Principles By Chris Connolly

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Rebuilding Trust in EU-US Data Flows

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Rebuilding Trust in EU-US Data Flows EUROPEAN COMMISSION Brussels, 27.11.2013 COM(2013) 846 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Rebuilding Trust in EU-US Data Flows EN EN 1. INTRODUCTION: THE

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

Email Data Security. The dominant business communication tool

Email Data Security. The dominant business communication tool Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools

More information

Privacy and Access 20/20 Conference. Data Sovereignty and Data Localization. Does it matter?

Privacy and Access 20/20 Conference. Data Sovereignty and Data Localization. Does it matter? Privacy and Access 20/20 Conference Data Sovereignty and Data Localization Does it matter? 13 November 2015 1 Overview To focus the mind: Microsoft vs. USA 2015 Stepping back to leap forward: The basic

More information

FA 01: Intelligence agencies target information highways

FA 01: Intelligence agencies target information highways FA 01: Intelligence agencies target information highways Submarine cables make the global information highways a reality. The newest spy scandal forces states to further expand their networks. Now, the

More information

Global Corporate Responsibility for Internet Freedom. Background paper

Global Corporate Responsibility for Internet Freedom. Background paper Global Corporate Responsibility for Internet Freedom Background paper Introduction The Internet, as a global network of networks, is not under the control of a single government or international entity.

More information

As prepared for delivery

As prepared for delivery Restoring Confidence in the Global Cloud Remarks by Victoria Espinel President and CEO, BSA The Software Alliance Forum Europe 3 rd Annual European Cloud Computing Conference Brussels, Belgium, April 9,

More information

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations Brussels, 24 March 2014 140324/01 F A C T S H E E T EU-US Summit (Brussels, 26 March 2014) and EU-US relations The Leaders of the European Union and the United States of America will meet on 26 March 2014

More information

The Year Ahead in Privacy and Data Security

The Year Ahead in Privacy and Data Security Contact: Timothy J. Toohey Partner 213.417.5324 ttoohey@mpplaw.com The Year Ahead in Privacy and Data Security 2014 promises to be another eventful year in the privacy and data security fields. Although

More information

7 August 2015. I. Introduction

7 August 2015. I. Introduction Suggestions for privacy-related questions to be included in the list of issues on Hungary, Human Rights Committee, 115th session, October-November 2015 I. Introduction 7 August 2015 Article 17 of the International

More information

OPEN ACCESS, PRIVACY AND HACKER CULTURE

OPEN ACCESS, PRIVACY AND HACKER CULTURE OPEN ACCESS, PRIVACY AND HACKER CULTURE An Inside Higher Ed webinar with Tracy Mitrano Director of IT policy and the Institute for Internet Culture Policy and Law at Cornell University October 2, 2013

More information

HOW SAFE IS YOUR DATA? Are you at risk of making the headlines for all the wrong reasons?

HOW SAFE IS YOUR DATA? Are you at risk of making the headlines for all the wrong reasons? HOW SAFE IS YOUR DATA? Are you at risk of making the headlines for all the wrong reasons? What do you need to consider when choosing a cloud service? G-Cloud gives central and local government departments

More information

NSA After-shocks. How Snowden has changed ICT decision-makers approach to the Cloud

NSA After-shocks. How Snowden has changed ICT decision-makers approach to the Cloud NSA After-shocks How Snowden has changed ICT decision-makers approach to the Cloud FOREWORD 2013 was a game-changing year for cloud service providers across the globe. Edward Snowden s revelations of covert

More information

Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world

Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world To cloud or not to cloud, that is a very serious question EEMA / TrustCore Legal challenges in a post Safe Harbour and pre GDPR cloud world 18 November 2015 hans.graux@timelex.eu Context Major cloud providers

More information

EDRi s. January 2015. European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70

EDRi s. January 2015. European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70 EDRi s Red lines on TTIP January 2015 European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70 ABOUT EDRI European Digital Rights is a network of 34 privacy and

More information

The Internet, Human Rights, and the Private Sector

The Internet, Human Rights, and the Private Sector The Internet, Human Rights, and the Private Sector An Interview with Michael A. Samway GJIA: You stated in a November 2008 C-SPAN interview that in addition to heading Yahoo! s international legal team,

More information

Cyber Defense & Breach Response Privacy Issues

Cyber Defense & Breach Response Privacy Issues Cyber Defense & Breach Response Privacy Issues Kevin Boyle Partner 17 November 2014 Latham & Watkins is the business name of Latham & Watkins (London) LLP, a registered limited liability partnership organised

More information

Data privacy and security in the post-snowden era

Data privacy and security in the post-snowden era Data privacy and security in the post-snowden era Matthew D. Sarrel, CISSP August 22, 2014 This report is underwritten by Verne Global. TABLE OF CONTENTS Executive summary... 3 Situational analysis...

More information

Promoting Cross Border Data Flows Priorities for the Business Community

Promoting Cross Border Data Flows Priorities for the Business Community Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing

More information

Patriot Act Impact on Canadian Organizations Using Cloud Services

Patriot Act Impact on Canadian Organizations Using Cloud Services Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states

More information

Freedom of Expression Online The Role of Internet Intermediaries

Freedom of Expression Online The Role of Internet Intermediaries Freedom of Expression Online The Role of Internet Intermediaries This summary describes a forthcoming report to be published jointly by UNESCO, the Internet Society, and the Open Society Foundations. It

More information

Keren Elazari Hackers: The Internet s Immune System

Keren Elazari Hackers: The Internet s Immune System Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think

More information

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA --------------------------------------------------- KLAYMAN et al., Plaintiffs,

More information

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Steven M. Bellovin https://www.cs.columbia.edu/ smb Join work with Matt Blaze, Sandy Clark, Susan Landau Steven M. Bellovin

More information

THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY

THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY 前 沿 探 索 THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY By Lt Col Jose Luis Llagran Bonilla 1 (Ecuador) I. Introduction Cyberspace is an interdependent network of information technology infrastructures

More information

Cybersecurity: Taking Stock and Looking Ahead

Cybersecurity: Taking Stock and Looking Ahead Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity

More information

How Covert Agents Infiltrate the Internet to Manipulate, Deceive,...

How Covert Agents Infiltrate the Internet to Manipulate, Deceive,... DISPATCHES How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations By Glenn Greenwald 24 Feb 2014, 6:25 PM EST 1 of 17 02/25/2014 10:22 AM A page from a GCHQ top secret

More information

Take Back Control. Executive Summary

Take Back Control. Executive Summary Take Back Control There's no such thing as secure anymore. Debora Plunkett, NSA Executive Summary Businesses violate your privacy every day because collecting, using, sharing, and even losing your personal

More information

National intelligence authorities and surveillance in the EU: Fundamental rights safeguards and remedies

National intelligence authorities and surveillance in the EU: Fundamental rights safeguards and remedies National intelligence authorities and surveillance in the EU: Fundamental rights safeguards and remedies Dr Mario Oetheimer Brussels, 28 May 2015 Opening session The repercussions on intelligence oversight

More information

Internet Governance Forum Baku 2012

Internet Governance Forum Baku 2012 Internet Governance Forum Baku 2012 Workshop Cloudy Jurisdiction: Addressing the Thirst for Cloud Data in Domestic Legal Processes Workshop organized by Tamir Israel, Staff Lawyer, Samuelson- Glushko Canadian

More information

Cloud and surveillance

Cloud and surveillance Cloud and surveillance (These notes formed the basis of Neil Brown s panel session at Broad Group s Cloud Law European Summit on 25th November 2014. CC BY 2.0) Ladies and gentleman, I am delighted to be

More information

RE: Office of Science and Technology Policy Request for Information: Big Data

RE: Office of Science and Technology Policy Request for Information: Big Data Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue Washington, DC 20504 RE: Office of Science and Technology Policy Request for Information: Big Data

More information

NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill

NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill Marcus Christian Partner +1 202 263 3731 mchristian@mayerbrown.com Howard W. Waltzman

More information

The firestorm of controversy

The firestorm of controversy 0100100000011001100110 1001011100100110010101 1100110111010001101111 0111001001101101001000 0001101111011001100010 0000011000110110111101 1011100111010001110010 0110111101110110011001 0101110010011100110111

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Protecting your information

Protecting your information Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost

More information

Data Privacy & Security in the Cloud: Legal Basics and New Developments

Data Privacy & Security in the Cloud: Legal Basics and New Developments Data Privacy & Security in the Cloud: Legal Basics and New Developments Lawrence R. Freedman Partner, Edwards Wildman Palmer LLP lfreedman@edwardswildman.com (202) 939-7923 1 The Basics Two basic data

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON BIG DATA MANAGEMENT AND ITS SECURITY PRUTHVIKA S. KADU 1, DR. H. R.

More information

The Question of Digital and Cyber Surveillance on Civilians. Malak Hassaballah (General Assembly Chair) I. Introduction

The Question of Digital and Cyber Surveillance on Civilians. Malak Hassaballah (General Assembly Chair) I. Introduction Committee: Issue: Student Officer: General Assembly The Question of Digital and Cyber Surveillance on Civilians Malak Hassaballah (General Assembly Chair) I. Introduction Surveillance is defined as close

More information

Offensive capabilities

Offensive capabilities Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and

More information

1 Data Protection Principles

1 Data Protection Principles Today, our personal information is being collected, shared, stored and analysed everywhere. Whether you are browsing the internet, talking to a friend or making an online purchase, personal data collection

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan:

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan: John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505 November 4, 2015 Mr. Brennan: On March 31, 2015 several organizations called on the Central Intelligence Agency

More information

Background Guide. Security Intelligence Summit. Director: Jenilee Trew Assistant Director: Anthony Tsou. Georgia Tech

Background Guide. Security Intelligence Summit. Director: Jenilee Trew Assistant Director: Anthony Tsou. Georgia Tech Background Guide Security Intelligence Summit Director: Jenilee Trew Assistant Director: Anthony Tsou Georgia Tech Model United Nations Conference 2014 Table of Contents Table of Contents... 2 Letter from

More information

Systematic Government Access to Personal Data: A Comparative Analysis

Systematic Government Access to Personal Data: A Comparative Analysis : A Comparative Analysis Ira Rubinstein, New York University School of Law Greg Nojeim, Center for Democracy & Technology Ronald Lee, Arnold & Porter LLP* November 13, 2013 Funded by The Privacy Projects

More information

GreySky. Superfast Broadband. Changing the World

GreySky. Superfast Broadband. Changing the World Superfast Broadband Changing the World Superfast Broadband Changing the World The internet is nothing if we don t use it, and the way we use it will play a critical role in how it is delivered. The commercial

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Data Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance

Data Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Data Protection HEADLINE PART Developments: 1 Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Sub-headline Arial 18pt dark gray Optional Name Arial 13pt italic white Venue

More information

Surveillance Costs: The NSA s Impact on the Economy, Internet Freedom & Cybersecurity

Surveillance Costs: The NSA s Impact on the Economy, Internet Freedom & Cybersecurity July 2014 New America s Open Technology Institute Policy Paper Surveillance Costs: The NSA s Impact on the Economy, Internet Freedom & Cybersecurity Danielle Kehl with Kevin Bankston, Robyn Greene & Robert

More information

By Daniel E. Frank and Don Borelli

By Daniel E. Frank and Don Borelli 30-SECOND SUMMARY As intelligent, interconnected devices become more widely available and increasingly host high-value information like a hospital patient s medical records the intrusion points for cyber

More information

Fieldfisher Report: Managing Global Data Residency Risk

Fieldfisher Report: Managing Global Data Residency Risk Fieldfisher Report: Managing Global Data Residency Risk MARCH 2015 Introduction We live in an always on, interconnected, data-hungry world. Our personal data is collected by our computers, our phones,

More information

JOINT MOTION FOR A RESOLUTION

JOINT MOTION FOR A RESOLUTION EUROPEAN PARLIAMENT 2009-2014 Plenary sitting inofficial consolidated version prepared by Jan Philipp Albrecht after adoption in Plenary on 23 October 2013 JOINT MOTION FOR A RESOLUTION pursuant to Rule

More information

Data Privacy: Where Should I House My Data?

Data Privacy: Where Should I House My Data? Data Privacy: Where Should I House My Data? intralinks.com Data Privacy: Where Should I House My Data? As enterprise file sharing and collaboration tools become more widely used, it becomes increasingly

More information

PRIVACY INTERNATIONAL SUBMISSION IN RESPONSE TO SCIENCE & TECHNOLOGY COMMITTEE CALL FOR EVIDENCE ON THE DRAFT INVESTIGATORY POWERS BILL

PRIVACY INTERNATIONAL SUBMISSION IN RESPONSE TO SCIENCE & TECHNOLOGY COMMITTEE CALL FOR EVIDENCE ON THE DRAFT INVESTIGATORY POWERS BILL Introduction PRIVACY INTERNATIONAL SUBMISSION IN RESPONSE TO SCIENCE & TECHNOLOGY COMMITTEE CALL FOR EVIDENCE ON THE DRAFT INVESTIGATORY POWERS BILL 27 NOVEMBER 2015 Submitted to the Honourable Members

More information

04 DEC 2013. Big data: Navigating the future. By Eric Hunter

04 DEC 2013. Big data: Navigating the future. By Eric Hunter 04 DEC 2013 Big data: Navigating the future By Eric Hunter Big data: Navigating the future BY ERIC HUNTER Photography by Sam Mardon Forecasting the future can also shape and clarify it. Eric Hunter of

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

How to protect privacy and security in the Crypto Wars

How to protect privacy and security in the Crypto Wars As part of the Global Conference on Cyberspace, the Netherlands will facilitate an expert panel on the right to privacy, one of the central themes of the conference. During this panel, high esteemed privacy

More information

POLICY BRIEF Why Trade Agreements are not Setting Information Free

POLICY BRIEF Why Trade Agreements are not Setting Information Free POLICY BRIEF Why Trade Agreements are not Setting Information Free Susan Ariel Aaronson, Ph.D. In December 2012, IIEP published a policy brief, Can Trade Policy Set Information Free? which compared US,

More information

We Must Comply with International Requirements! Introducing Biometric ID Cards in France

We Must Comply with International Requirements! Introducing Biometric ID Cards in France We Must Comply with International Requirements! Introducing Biometric ID Cards in France Meryem Marzouki CNRS - LIP6/PolyTIC / IRIS Meryem.Marzouki@iris.sgdg.org www.iris.sgdg.org Terrorizing Privacy?

More information

Online Freedom of Speech: The Battle Continues

Online Freedom of Speech: The Battle Continues Online Freedom of Speech: The Battle Continues Walid AL-SAQAF Diplo Foundation Webinar September 25, 2012 Relevant Questions 1. The UN Human Rights Council's issued a resolution affirming human rights

More information

WHITEPAPER. Data Security for Office 365 Balancing control & usability

WHITEPAPER. Data Security for Office 365 Balancing control & usability WHITEPAPER Data Security for Office 365 Balancing control & usability Contents Executive Summary... 2 Top Security Issues for Office 365... 4 Compelled Disclosures... 4 Unauthorized Sharing... 4 External

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Achieving True Security in a Cloud-Hosted World

Achieving True Security in a Cloud-Hosted World Achieving True Security in a Cloud-Hosted World Introduction After half a decade of working out the kinks on free, individual user accounts, major commercial cloud storage services such as Dropbox and

More information

EUROPEAN DATA PROTECTION SUPERVISOR. Inventory 2014. A strategic approach to legislative consultation

EUROPEAN DATA PROTECTION SUPERVISOR. Inventory 2014. A strategic approach to legislative consultation Brussels, 18 December 2013 EUROPEAN DATA PROTECTION SUPERVISOR Inventory 2014 A strategic approach to legislative consultation 1 1. ISSUES OF STRATEGIC IMPORTANCE FOR 2014 This document presents the public

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors 1 Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors Scott Woodison Executive Director, Compliance and Enterprise Risk Office of Internal Audit and Compliance

More information

Accession to Convention 108: Benefits and Commitments. Marc Rotenberg, President Electronic Privacy Information Center Washington, DC

Accession to Convention 108: Benefits and Commitments. Marc Rotenberg, President Electronic Privacy Information Center Washington, DC Accession to Convention 108: Benefits and Commitments Marc Rotenberg, President Electronic Privacy Information Center Washington, DC Convention 108: From a European Reality to Global Treaty Strasbourg,

More information

In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem

In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem U.S. Department of Commerce National Telecommunications and Information Administration Docket No. 150312253 5253 01 Submitted

More information

NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY

NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL

More information

Law and Policy in Internet Surveillance Programs: United States, Great Britain and Germany 1

Law and Policy in Internet Surveillance Programs: United States, Great Britain and Germany 1 stiftung neue verantwortung Impulse 25/13 Law and Policy in Internet Surveillance Programs: United States, Great Britain and Germany 1 Many Europeans are outraged about US government surveillance programs

More information