1 Sara Teasdale and Ray Bradbury "There Will Come Soft Rains" Steve Bradshaw s Art Institute of Pittsburgh version: 3:55
2 Time enough
3 A World Information Order - Privacy and Security in a Hyper-networked World of Data and Analysis Law + Informatics Symposium on Digital Evidence 2015 Michael Losavio, University of Louisville, U.S.A. Joshua James, Soon Chun Hyang University, Republic of Korea Pavel Gladyshev, University College Dublin, Ireland K.P. Chow, University of Hong Kong
4 Concerns 1. What did privacy mean back in the day? 2. What does privacy mean today? 3. What interests/ things is privacy meant to protect? 4. How might Smart technologies protect those interests/ things? 5. How might Smart technologies injure those interests/ things? 6. Was Louis Brandeis the most brilliant Justice ever? Take that, Ohio!
5 Towards a Smarter Planet Intelligent Interconnected Instrumented IBM Initiatives
6 Core systems of the smart city Sources Types Collections Analytics and Use
7 information generation and exchange is at least bilateral and commutative.
8 SMART CITIES economy community environment Information Technology transportation governance lifestyle Elements of a Smart City
9 Smart+Interconncted Communities Improved Citizen Interactions Connected Residential Communities Creation of Smart, Efficient Workspaces Elements of CISCO's Smart+Interconncted Communities
10 information source nodes as the activities and services of social and civic life: People Work Home Transportation Social Life
11 We now live in a new space of information density, evolving with the Internet of Things and the Smart City. This global information space is shared with powerful and high-powered analytics that can give every government the surveillance powers of totalitarian regimes. This discussion examines the evolving facts and law relating to personal autonomy, identity and authenticity of electronic data, its mutability and evanescence, and how this might impact the liberties and security of the peoples of the world
12 America The Constitution of the United States of America Article I, Section 9 the writ of habeas corpus The Bill of Rights 1 st 2 nd 4 th 5 th 6th
13 Europa EU Data Protection Directive Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (2) Whereas data-processing systems are designed to serve man; whereas they must, whatever the nationality or residence of natural persons, respect their fundamental rights and freedoms, notably the right to privacy, and contribute to economic and social progress, trade expansion and the well-being of individuals;
14 The Fourth Amendment to the Constitution of the United States of America Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized
15 Step by step United States v. Olmstead United States v. Katz Kyllo v. United States United States v. Jones Riley v. California, United States v. Wurie Florida v. Harris Florida v. Jardines Rodriguez v. Nebraska, tbd And our friends FRE 702, 802, 803, 901
16 Back to the Future Justice Brandeis in Olmstead, dissenting The protection guaranteed by the amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man's spiritual nature, of his feelings and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the government, the right to be let alone-the most comprehensive of rights and the right most valued by civilized men. To protect, that right, every unjustifiable intrusion by the government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.
17 Phillip K. Dick Minority Report eaix2k4
18 Justice Sotomayor in Jones observed as to the interconnected sensors of radio-linked global positioning satellite (GPS) monitors analyzed with geo-mapping and locational computing that: In cases involving even short-term monitoring, GPS monitoring generates a precise, comprehensive record of a person s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. See, e.g., People v. Weaver, 12 N. Y. 3d 433, , 909 N. E. 2d 1195, 1199 (2009) ( Disclosed in [GPS] data... will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-thehour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on ). The Government can store such records and efficiently mine them for information years into the future. Pineda-Moreno, 617 F. 3d, at 1124 (opinion of Kozinski, C. J.). And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abusive law enforcement practices: limited police resources and community hostility. Illinois v. Lidster, 540 U. S. 419, 426 (2004
19 digital forensics and computational data collection and analysis in The Smart City personal autonomy, identity and authenticity
20 The New Space of Information Density and Its Risks and Rights "Smart City" reflection of the "Internet of Things" embedded, networked capabilities of devices IBM s paradigm instrumented, interconnected and "intelligent," i.e., computationally-adapted.
21 Investigators Dramatis Personae in LAW ENFORCEMENT Procurators Judges victims Witnesses The CIO Staff Outside consultants and contractors Other Data Mavens! Tech, security & privacy officers, analytics and tactics
22 Dramatis Personae in the city You Me Our families Our friends Our personal, social, athletic, business and professional associates Government
23 The System of the World Compliance Risk Management OGC The People Factor The Cloud System Storage Computation Networking Security & Assurance Smart cities Instrumented, interconnected intelligent??
24 To what do the law, society and government attend? First, Safety and Security from: Taking of property, liberty and life Trespass to rights in property, liberty and life Destruction of property, liberty and life In other words, when someone is hurt, there should be a response Injury may be from Normal business processes or malicious/careless system use Including Computationally-induced results
25 But Justice Sotomayor continued: In cases involving even short-term monitoring, GPS monitoring generates a precise, comprehensive record of a person s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. See, e.g., People v. Weaver, 12 N. Y. 3d 433, , 909 N. E. 2d 1195, 1199 (2009) ( Disclosed in [GPS] data... will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-the-hour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on ). The Government can store such records and efficiently mine them for information years into the future. Pineda- Moreno, 617 F. 3d, at 1124 (opinion of Kozinski, C. J.). And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abusive law enforcement practices: limited police resources and community hostility. Illinois v. Lidster, 540 U. S. 419, 426 (2004).
26 core general principles relating to privacy and cyber privacy law: 1) Activities within the home have the greatest level of protection and are generally protected from intrusion by others absent reasonable grounds based on law. 2) Activities that extend outside the home may still be protected as to privacy but the level of protection may vary. This may depend on special protection in law for that activity. 3) Activities out in public or involving third parties may have little or no protection as to privacy absent special protection in law 4) Activities subject to public regulation may carry lesser or no privacy protections, particularly where data collection is part of regulation or a pre-condition to state permission to use regulated services. 5) Any activity data may be monitored, collected and used with the consent of the data subject, absent statutory prohibitions on use even with consent. And even where a data subject may consent without actually reading the consent document they execute..
27 Justice Sotomayor suggested in her concurring opinion in the Jones GPS tracking case that a reevaluation of the concept of privacy and third party data collection should be undertaken in this new age of electronic data collection and analysis. Her concern, as seen simply in GPS data collection and analytics, was that: The net result is that GPS monitoring by making available at a relatively low cost such a substantial quantum of intimate information about any person whom the Government, in its unfettered discretion, chooses to track may alter the relationship between citizen and government in a way that is inimical to democratic society.
28 Case in point, conclusion 2013 Boston Marathon terrorist bombing crowd-sourced investigation Pointers to the future? Will we let it take that which makes us who we are.
HAS KATZ BECOME QUAINT? USE OF BIG DATA TO OUTFLANK THE FOURTH AMENDMENT Jeffrey L. Vagle * INTRODUCTION On December 14, 2010, a federal court, upon a government motion, entered an order pursuant to the
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
THE NOT A SEARCH GAME JOHN F. STINNEFORD * The privacy versus security discussion is not just about the Fourth Amendment it involves policy considerations as well. The Fourth Amendment concerns frame the
WHEN CAN THE POLICE CONDUCT A NEBRASKA SEARCH AND SEIZURE OF YOUR HOME? A man's house shall be his own castle, privileged against all civil and military intrusion. Petersen Criminal Defense Law Regardless
PRIVACY & CRIMINAL JUSTICE INFORMATION: A PRIMER SEARCH, The National Consortium for Justice Information and Statistics PRIVACY & CRIMINAL JUSTICE INFORMATION Maximizing the utility of criminal justice
APPENDIX APPLICATION QUESTIONNAIRE FOR THE VAWA PILOT PROJECT ON TRIBAL CRIMINAL JURISDICTION Instructions Completing this Application Questionnaire is a necessary step for any Indian tribe that wishes
No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled
Privacy vs. Safety: School Searches of Electronic Devices / Rubén A. Villalobos Partner, Villalobos 2 Legal Group Trustee, Modesto City Schools email@example.com 1 Introduction WELCOME Ask Questions!
P R O T O C O L of the State Attorney's Office of the Republic of Croatia and the Prosecutor s Office of Bosnia and Herzegovina on Cooperation in Prosecution of Perpetrators of War Crimes, Crimes against
Department of Justice Policy Guidance 1 Domestic Use of Unmanned Aircraft Systems (UAS) INTRODUCTION The law enforcement agencies of the Department of Justice ("the Department") work diligently to protect
The Continued Evolution of Mobile, Wireless and Cloud Technologies in the Healthcare Industry Health Care Compliance Association Regional Conference October 11, 2013 Pittsburgh, PA Michael A. Cassidy Copyright
State of Nature v. Government Overview In this lesson, students will discuss what they think life would be like in a state of nature and examine reasons why there is a need for government. They will explore
California s Alternative Sentencing Law for Veterans and Members of the U.S. Military You re a veteran, or maybe you re still in the military. But now you re looking at time in county jail or state prison.
SESSION ID: PNG-F02 Updating the Law on Government Access to Your Online Data Richard Salgado Director, Law Enforcement and Information Security Google Jim Dempsey Executive Director Berkeley Center for
Competing Interests: Enforcing Cybersecurity and Protecting Privacy By Ulka Ghanta March 2012 What is reasonable when balancing privacy rights with a need to enforce Cyber security? The 9/11 attacks forever
Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES Chapter 337-A: PROTECTION FROM HARASSMENT Table of Contents Part 12. HUMAN RIGHTS... Section 4651. DEFINITIONS... 3 Section 4652. FILING OF COMPLAINT; JURISDICTION...
Politics and Cryptography in the United States Syvale Lee April 11, 2006 Outline Bill of Rights Security versus Freedom Current Trends in Computer Security Export Control on Cryptography Pretty Good Privacy
DEPARTMENT OF PUBLIC WORKS MANAGEMENT MANUAL Personnel Directive Subject: PROCEDURE FOR PREVENTING AND/OR RESOLVING PROBLEMS RELATED TO SEXUAL HARASSMENT ADOPTED BY THE BOARD OF PUBLIC WORKS, CITY OF LOS
State University of New York College at Old Westbury Domestic Violence and the Workplace Policy Policy Statement The persons covered by this policy are: employees of SUNY College at Old Westbury (the College
MEMO DATE: April 18, 2013 FROM: J.H.B. Wilson, General Counsel RE: McNeely v. Missouri (SCOTUS, 2013) This decision was released April 17, 2013. An abridged version of the Court s Syllabus can be found
Farzad Family Law Scholarship 2014 Should the right to marry for same-sex couples become a federal constitutional right by amendment to the United States Constitution or remain a State issue? The United
FORMAL MEMORANDUM ENQUIRIES AS TO WITNESS CREDIBILITY Table of Contents Introduction...1 Commission Enquiries...2 Police National Computer (PNC)...3 Police National Database (PND)...3 Social Services Department
State of the States Cyber Crime Consortium By Justin Fitzsimmons Program Manager, High-Tech Crime Training Services SEARCH On April 30, 2015, the Office of the Massachusetts Attorney General, along with
Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States Cloud computing is one of the Internet s great innovations, enabling individuals
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
GIBBS LAW FIRM, P.A. 5666 SEMINOLE BOULEVARD, SUITE TWO TELEPHONE: (727) 399-8300 SEMINOLE, FLORIDA 33772 FACSIMILE: (727) 398-3907 January 4, 2011 VIA EMAIL firstname.lastname@example.org Mr. Kevin McCoy West Virginia
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with
Criminal Justice Curriculum Maps Unit 1: Introduction to Government and Law Unit 2: Crime Unit 3: Due Process Grade: 11 and 12 Subject: Criminal Justice Big Idea/Rationale Unit 1: Introduction to Government
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)
HANDBOOK Rights for Individuals in Mental Health Facilities Admitted Under the Lanterman-Petris-Short Act C A L I F O R N I A D E P A R T M E N T O F Mental Health How to Reach Your Patients Rights Advocate
A Summary of Virginia s Crime Victim and Witness Rights Act Your Rights and Responsibilities Department of Criminal Justice Services Victims Services Section December 2008 www.dcjs.virginia.gov Table of
The Privacy Implications of Historical Cell Site Location Data INTRODUCTION Across the country, Americans use their cell phones for several purposes: making phone calls, sending text messages and emails,
BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain
RELIGION IN THE PUBLIC SCHOOLS BACKGROUND RELIGIOUS LIBERTY IN AMERICA & OUR PUBLIC SCHOOLS Since its founding in 1913, the Anti-Defamation League (ADL) has been guided by its mandate of combating bigotry,
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE ADOPTED ON 9 th January 2008 TABLE OF CONTENTS Page No. 1 Introduction...3 2 Glossary...3 3 Types of Personal Data held by Us...3 4 Obligations
QUO FA T A F U E R N T BERMUDA INTERNATIONAL COOPERATION (TAX INFORMATION EXCHANGE 2005 : 47 TABLE OF CONTENTS 1 2 3 4 4A 5 5A 6 6A 7 8 8A 9 10 11 12 Short title Interpretation Duties of the Minister Grounds
CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical
MEDICAL RECORDS ACCESS GUIDE MICHIGAN Parsonage Vandenack Williams LLC Attorneys at Law Parsonage Vandenack Williams LLC 2008 For more information, contact email@example.com TABLE OF CONTENTS Michigan...1
Data Protection A Guide for Users EUROPEAN PARLIAMENT Contents Contents 3 Introduction 4 Data protection standards making a difference in the European Parliament 5 Data protection the actors 6 Data protection
O B S I D I A N C Y B E R S E C U R I T Y O C C A S I O N A L P A P E R Working with the Federal Government on Cybersecurity Preparation is Key to Success December 5, 2013 Table of Contents CONSIDER THIS...
European Charter of the rights and responsibilities of older people in need of long-term care and assistance JUNE 2010 PREAMBLE Human dignity is inviolable. Age and dependency cannot be the grounds for
Today s Topics Introduction to Data Privacy & ediscovery General Overview Data Privacy in the United States Data Privacy in Foreign Countries Intersection of Data Privacy & ediscovery Preservation of Data
THE BASICS Abuse and Neglect Cases in New York State 2013 Her Justice 1 This booklet explains: What child abuse and child neglect are. What happens in a Family Court case where a parent is accused of neglect
The 4 th Amendment 1 The 4 th Amendment: Pre and Post 9/11 Abstract This paper investigates the impact of the terrible terrorist acts of September 11, 2001, on the 4 th Amendment of the United States Constitution.
ATTORNEY GENERAL OF THE STATE OF NEW YORK INTERNET BUREAU In the Matter of Assurance No. 15-185 Investigation by ERIC T. SCHNEIDERMAN, Attorney General of the State of New York, of Uber Technologies, Inc.,
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
IN RE MARRIAGE CASES (California): 2008 These cases present the issue of the legality of gay marriage bans, in the context of previous State domestic partnership (CA) or civil union (CT) Statutes, under
LEGAL ETHICS OPINION 1814 UNDISCLOSED RECORDING OF THIRD PARTIES IN CRIMINAL MATTERS In this hypothetical, a Criminal Defense Lawyer represents A who is charged with conspiracy to distribute controlled
Human Rights Act 1998 (c. 42) 1 SCHEDULES SCHEDULE 1 Section 1(3). THE ARTICLES PART I THE CONVENTION RIGHTS AND FREEDOMS ARTICLE 2 RIGHT TO LIFE 1 Everyone s right to life shall be protected by law. No
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
The Immigration and Naturalization Service (INS) is now part of the Department of Homeland Security (DHS) and has been renamed and reorganized into: 1. The Bureau of Citizenship and Immigration Services
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
Dr. Asher Vaturi The Max Stern Yezreel Valley College Performance indicators for Indoor and outdoor environment built areas Concern about the overall quality of the indoor environment We focus on issues
The European psychologist in forensic work and as expert witness Recommendations for an ethical practice 1. Introduction 1.1 These recommendations are made to the EFPPA member associations, advising that
Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015 1. Introduction and Scope 1.1 The Data Protection Act 1998 is the law that protects personal privacy and applies to any school
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement and is made between BEST Life and Health Insurance Company ( BEST Life ) and ( Business Associate ). RECITALS WHEREAS, the U.S.
JUVENILE JUSTICE SYSTEM A delinquency petition is a court document alleging that a juvenile, between ages 10-16, has violated a law which would be a criminal offense if committed by an adult. Disposition
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
In the GE Community Fair Employment Practices (Policy 20.2) Issued: October 2000 Supersedes: April 1993 GE is committed to fair employment practices, including the prohibition against all forms of illegal
Data Protection Awareness Based on DIT s Data Protection Policy, the Data Protection Acts, 1988 & 2003 and guidance from the Office of the Data Protection Commissioner Index Definitions What is Data Protection?
Reprint as at 1 July 2013 New Zealand Bill of Rights Act 1990 Public Act 1990 No 109 Date of assent 28 August 1990 Commencement see section 1(2) Contents Page Title 2 1 Short Title and commencement 3 Part
COUNCIL OF THE EUROPEAN UNION Brussels, 11 February 2010 6092/10 Interinstitutional File: 2008/0140 (CNS) SOC 75 JAI 108 MI 39 NOTE from : The Presidency to : The Working Party on Social Questions on :
First Circuit Prohibits Warrantless Search of Cellular Phones In United States v. Wurie, 1 a police officer, while performing routine surveillance, observed what he believed was an illegal drug transaction
For Now, New York State Investigators Can Ping Cellphones Without A Warrant in New York State Can New York State Inspectors General and other law enforcement agencies use real-time GPS tracking on cellphones
MEDICAL RECORDS ACCESS GUIDE IOWA Parsonage Vandenack Williams LLC Attorneys at Law Parsonage Vandenack Williams LLC 2008 For more information, contact firstname.lastname@example.org TABLE OF CONTENTS Iowa...1 Patient
BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS:, City State Zip This Business Associate and Data Use Agreement ( Agreement ) is effective
Case 9:13-cv-80670-DPG Document 4 Entered on FLSD Docket 07/11/2013 Page 1 of 8 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA CASE NO.: 9:13-cv-80670-KAM AJA DE LOS SANTOS, an individual, on
Data Retention and Investigatory Powers Bill CONTENTS Retention of relevant communications data 1 Powers for retention of relevant communications data subject to safeguards 2 Section 1: supplementary Investigatory
MILNBANK HOUSING ASSOCIATION DATA PROTECTION POLICY LS/NOV.2011/REF.P14 1) INTRODUCTION Milnbank Housing Association recognises that the Data Protection Act 1998 is an important piece of legislation to
DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL INTRODUCTION EXPLANATORY NOTES 1. These explanatory notes relate to the Draft Data Retention and Investigatory Powers Bill. They have been prepared by
: Consumerisation of Technology Technology democratization has weaved an ecosystem powered by intelligent systems, connectivity services, analytics, and technology infrastructure to deliver services. With
Judicial Candidate Questionnaire Name _Pennie M. Thrower Party Affiliation R Incumbent N 1. Why do you want to be judge? Because it s my responsibility as a lawyer to improve our legal system, and it s
FORENSIC DNA COLLECTION: A CITIZEN S GUIDE TO YOUR RIGHTS SCENARIOS AND RESPONSES 1. DNA Dragnets You are between the ages of 18 and 35 and live in a city, town or neighborhood where a homicide has occurred.
Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions
Know your rights What rights do I have as a non-immigrant, F-1/J-1 visa holder? Whether or not you re a citizen, you have rights under the United States Constitution. The Fifth Amendment gives every person
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
United States Telephone Recording Laws Legal Aspects of Recording Telephone Conversations: A Practical Guide The federal Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. Sec. 2510 et seq.,
BILL ANALYSIS Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT Internet communications companies often hold information