Competing Interests: Enforcing Cybersecurity and Protecting Privacy By Ulka Ghanta

Size: px
Start display at page:

Download "Competing Interests: Enforcing Cybersecurity and Protecting Privacy By Ulka Ghanta"

Transcription

1 Competing Interests: Enforcing Cybersecurity and Protecting Privacy By Ulka Ghanta March 2012 What is reasonable when balancing privacy rights with a need to enforce Cyber security? The 9/11 attacks forever altered the scope of privacy protections. And the courts and Congress continue to seek a proper middle ground. It is well established that the Fourth Amendment protects unreasonable searches and seizures and upholds the rights of the private citizen. In the case Katz v. United States, the Supreme Court developed a standard to determine whether a search and seizure was unreasonable. The Court explained there is a reasonable expectation of privacy if a person has a subjective expectation of privacy and a person in society would consider it reasonable, resulting in an unreasonable search under the Fourth Amendment. But what is reasonable? It is a concept that has stumped and evaded the courts, Congress, law enforcement, and the public for some time. In particular, the 9/11 attacks greatly altered the definition of how privacy should be protected by the government and law enforcement in light of potential terrorist threats to the country. However, technology has expanded exponentially since 9/11, and in the age of increasingly rampant communications via the Internet, SmartPhones, and other new electronic devices, maintaining privacy interests is even more challenging. Proposed amendments to the Electronic Communications Privacy Act (ECPA) endeavor to tackle this issue by engaging in the delicate dance between protecting national security and upholding a citizen s privacy rights. The 1986 Electronic Communications Privacy Act (ECPA) The ECPA was originally created to protect electronic communications and prevent unreasonable surveillance by the government. ECPA evidentiary protection standards are varied based on the length of time the electronic communication information is stored and its location. For example, stored on a personal hard drive is protected from seizure by a judicial warrant, but the same stored in a remote account is unprotected. When the act was passed in 1986, was largely stored on personal hard drives without being stored on third party servers, or more commonly known as cloud servers. s older than 180 days were considered outdated and largely discarded. Communications that are conducted within a personal residence, where there is a reasonable expectation of privacy, require that the government obtain a judicial warrant based on probable cause before gaining access to the communications. Under the ECPA, law enforcement can obtain access to any online communications (even if conducted at home) older than 180 days without a warrant and without showing probable cause as long as the information is relevant to a criminal investigation. The

2 EPCA standard for obtaining this information is considerably lower than probable cause. The government is only required to show clear and articulable facts that the information is needed to assist with a criminal investigation. Today, this means that any communications, including s, documents, and pictures, for example, that are stored in cloud servers and older than six months can be subject to a warrantless search. Popular sites such as Facebook, Dropbox, or the Apple ICloud storage system are used routinely by the public and hold information for much longer than six months. Thus, warrantless searches can apply to any financial, medical, and personal information placed on a cloud operating system that is not on one s personal hard drive. Before the advent of the Internet, this law appropriately gave law enforcement the ability to conduct surveillance without being too invasive, but the original law now seems obsolete. Case law regarding ECPA violations has been largely inconsistent, with some courts requiring judicial warrants to read s and access communications, and others supporting the use of a subpoenas to gain the same information. In addition, the ECPA does not cover geolocation information (i.e., real world geographic location information of an object such as a mobile phone). Consequently, the courts have been left on their own to determine to what extent geolocation information can be included or protected under this statute. Digital providers, media outlets, internet service providers, and consumer advocacy groups are frustrated with the lack of consistent legal guidance. As a result, Congress is attempting to rectify this problem and provide a comprehensive solution that can be upheld in the courts. The Department of Justice has been reluctant to accept ECPA reforms because doing so would require a higher burden for law enforcement and others to gain access to this information. Knowing the difficulties and time delays that can result in establishing probable cause, many law enforcement officials don t want to deal with those administrative hurdles. The real question is: What is too invasive and how do we draw a line? Senate bill S.1011 attempts to update the ECPA and answer that question. Electronic Communications Privacy Acts Amendment Last year, Senator Patrick Leahy introduced the S Electronic Communications Privacy Acts Amendment. The bill updates the EPCA s Stored Communications Act (SCA) provision, which regulates the voluntary and mandatory disclosures of electronic communications stored by Internet service providers (ISPs). The amendment eliminates the 180 day rule and requires law enforcement to obtain a warrant based on probable cause in order to obtain any stored communication. It also includes the protection of geolocation information. Therefore, any geolocation information derived from any electronic device (which would include Global Positioning System devices as well as SmartPhones) is protected.

3 Thus, the ECPA amendment does not allow law enforcement to have easy access to private files, records, or communications, but there are exceptions. If the government is given express consent by the owner of the device to access the information or if the government is responding to an emergency by the device user, then a warrant is not necessary. In addition, there are different requirements for geolocation information. For warrant based investigations, an ISP can be compelled to disclose contemporaneous (or real time) information. To obtain historical geolocation information, such as the subscriber s name and address, telephone records, or billing information, the government only needs a subpoena or consent under the lower specific and articuable facts standard. There are exceptions for national security interests as well. ISPs can voluntarily disclose electronic content to the government that involves combating a cyber attack against their network. The Attorney General and Department of Homeland Secretary are required to submit an annual Congressional report outlining the number of voluntary disclosures they received regarding cyber attacks. The amendment requires that notice be given to the consumer within three days of the warrant s issuance to make him or her aware of the warrant. However, the notice can be delayed to protect the life or physical safety of a person or to prevent threats against national security. The EPCA amendment attempts to codify one main standard requiring law enforcement to obtain a warrant based on probable cause, and so courts using the standard of specific and articulable facts under the Stored Communications Act would have to require adherence to a new standard. This amendment suggests that regardless of when or where the electronic information is stored, it should be guaranteed additional protection from government scrutiny. Carrier IQ and the Federal Bureau of Investigation A recent incident by a keystroke software company provides another example of the tension between government surveillance and privacy protection. Carrier IQ develops software to test network diagnostics that is used by many prominent mobile phone carriers. Companies such as AT&T, Sprint, and T Mobile have used the software technology on nearly 150 million phones to evaluate connectivity issues, data output, battery life, and other technical concerns. The company has stated its software only serves to improve user experiences with their SmartPhones. However Carrier IQ s software is installed onto SmartPhones in a way that is difficult to detect or remove by the consumer. An independent researcher recently posted a video Youtube that shows how the company s software could view the keystrokes made on his phone. The software s features enable Carrier IQ to see text messages, website traffic, applications used on mobile phones, and other data communications consumers may engage in on their phones. While it is troubling that Carrier IQ can see the information, it is even more disturbing that it could possibly share the information with the phone carriers. Major phone carriers such as Sprint, AT&T,

4 HTC, and Samsung claim that their end user licensing agreements authorize them to use Carrier IQ software to monitor application deployment and other data and cell site connectivity issues. Though Carrier IQ denies using the information for nothing more than gauging product efficiency and productivity, the company has not explained the exact basis for its applications and how much, if any, information is shared with cell phone carriers. As a result of the negative press, Sprint has started disabling the software from all its phones. Another party interested in the software technology is the Federal Bureau of Investigation (FBI). A senior employee from Carrier IQ stated the FBI approached the company about using its technology to monitor consumer activities. FBI director Robert Mueller denied receiving or obtaining any personal information about consumers from Carrier IQ during a congressional hearing last year. The FBI occasionally reaches out to companies like Carrier IQ to learn about emerging and new technologies which the FBI claims was the extent of its communication with the company. While Director Mueller denied communicating with Carrier IQ to acquire personal cell phone data, the FBI was not so confident when approached about its internal documents. The FBI denied an Associated Press request regarding its interactions with Carrier IQ by citing a Freedom of Information Act exception for any documents that relate to a law enforcement proceeding. It is unclear if the FBI actually used the software for its investigations or if it is possibly investigating Carrier IQ for federal violations. Even if Carrier IQ did not share the software or data (as it claims) with the FBI, the FBI could have obtained this information from the phone carriers or other sources themselves. In light of this situation, it is clear that passage of the ECPA amendment would protect any information collected by Carrier IQ that is stored or transmitted on these SmartPhones by requiring law enforcement to obtain a warrant to access the information. While the FBI may have quickly gathered and monitored cell phone information using Carrier IQ software, the ECPA amendments would make it more challenging for the FBI to act on that information. Over the course of 2011, targeted cyber attacks increased by over 400% and therefore law enforcement officials are certainly justified in prioritizing protecting the public from these attacks. At the same time, the ECPA amendments appear to provide an appropriate check on the reach of law enforcement s power. United States vs. Jones and beyond Limiting warrantless surveillance over private communications was most recently addressed by the Supreme Court in January. In United States vs. Jones, the Court ruled that installing a GPS device on a suspect s car and monitoring his activities for nearly a month was a physical intrusion that constituted a search under the Fourth Amendment, thereby violating his privacy rights.

5 The Court decided that police should obtain a warrant before engaging in almost any form of GPS surveillance. Though the Court did not prescribe an actual standard for when the tracking become a search (i.e., how many days), Justice Alito explained it occurred before the four week mark. Also the Court s opinion was largely focused on the physical intrusion of the police s action and why in this particular case this type of surveillance was deemed unconstitutional. The Court also left the door open for government surveillance and whether a warrant is required for short term monitoring of a suspect. While the Justices described various levels of government invasion and how they could be deemed intrusive, such as closed circuit television video monitoring, the Court decided that it would address that issue at another time. Despite not setting a clear cut standard on electronic surveillance, the general sentiment from the Justices was that government surveillance and reasonable expectations of privacy should be reexamined in the digital age. Justice Scalia wrote that situations involving merely the transmission of electronic signals without trespass would remain subject to scrutiny from the Supreme Court. Justice Sotomayor said it may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. Thus, while the standard for what is deemed a reasonable privacy expectation continues to evolve, it is clear that the law must keep up with ever increasing technological advancements. New technology allows one to use data all over the world, and it is reasonable for society to believe that no matter where they are, their , phone, pictures, and other communications are protected and not subject to warrantless surveillance. While the Jones decision answers one area where privacy standards should be more largely recognized, it is clear more people expect that the online and electronic communications they convey in their daily lives should have greater protection from government scrutiny. Senator Leahy s bill has not passed out of committee, and getting floor time to debate and pass the bill will be even more difficult in light of this election year with the divided, partisan Congress. But arguably there is no better time to act on these issues and set the record straight for what communications society does and should expect protection for in the rapidly ever changing digital age.

6 Source List: 1) David Kravets, Aging Privacy Law Leaves Cloud E Mail Open to Cops, Wired Magazine, October 21, 2011, turns twenty five/. 2) Andy Greenberg, FBI Says Carrier IQ May Be Used in Law Enforcement Proceedings, Forbes magazine, December 12, 2011, says carrieriq may be used in law enforcement proceedings/. 3) David Kravets, Carrier IQ explains Secret Monitoring Service to FTC, FCC, Wired Magazine, December 14, 2011, ftc fcc/. 4) Sari Horwitz, Carrier IQ faces federal probe into allegations software tracks cellphone data, The Washington Post, December 14, 2011, probing carrier iq/2011/12/14/giqa9nceuo_story.html. 5) Hayley Tsukayama, FBI hasn t sought Carrier IQ data, chief says, The Washington Post, December 15, 2011, hasnt sought carrier iq data chiefsays/2011/12/15/giqab4vowo_story.html. 6) Adam Clark Estes, Yes, even iphones can spy on you too, The Atlantic Wire, December 1, 2011, even iphones can spy you too/45606/. 7) Caryn Tamber, Probable cause is still the rule for cell site data, The Daily Record, July 31, ) Seth Rosenbloom, Wolf in the Digital Age: Voluntary Disclosure Under the Stored Communications Act, 39 Colum. Human Rights L. Rev ) Erwin Chemerinsky: Keeping Up with the Joneses How Far Does the Reasonable Expectation of Privacy Go?, American Bar Association Law Journal, November 1, 2011, 10) Adam Liptak, Justices Say GPS Tracker Violated Privacy Rights, The New York Times, January 23, 2012, use of gps is ruled unconstitutional.html?pagewanted=2&_r=1. 11) John W. Whitehead, U.S. v. Jones: The Battle for the Fourth Amendment Continues, New Jersey Today, January 24, 2012, s v jones the battle for the fourth amendment continues/ 12) Symantec Intelligence Report: November 2011, _linkedin_2011nov_worldwide_intelligencereportnov ) Theofel v. Farey Jones, 359 F.3d 1066 (9th Cir. Cal. 2004). 14) United States v. Weaver, 636 F. Supp. 2d 769 (C.D. Ill. 2009). 15) United States v. Jackson, U.S. Dist. LEXIS (D.D.C. 2007). 16) Katz vs. United States, 389 U.S. 347 (1967). 17) United States v. Jones, 132 S.Ct. 945, 953 (2012). 18) United States v. Jones, 132 S.Ct. 945, 957 (2012). 19) Hearing on Oversight of the Federal Bureau of Investigation Before the S.Comm. on the Judiciary, 112 th Cong. (2011) (statement of Robert S. Mueller III, Director Federal Bureau of Investigation).

7 20) Richard M. Thompson, Governmental Surveillance of Cell Phones and Vehicles, Congressional Research Service, December 1, Ulka Ghanta rejoined the University of Maryland Center for Health and Homeland Security (CHHS) as a Senior Law and Policy Analyst in October Ms. Ghanta currently works with the Exercise and Training branch of CHHS helping to develop, test, and evaluate emergency management exercises for state and local agencies.

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3) DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners

More information

Recent Developments in Cybersurveillance

Recent Developments in Cybersurveillance David W. Opderbeck New Jersey Law Journal, May 16, 2016 Over the past few months, there has been a flurry of sometimes contradictory activity concerning the government's ability to access electronic information

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

# # # # # Issue and Decision of the United States Supreme Court

# # # # # Issue and Decision of the United States Supreme Court Article for Minnesota Chiefs of Police Magazine: New Legal Requirements for GPS Tracking Devices By Peter Ivy and Peter Orput, MCPA Co-Counsel February, 2012 # # # # # Issue and Decision of the United

More information

Location and Cell Phone Tracking: Technology, Law, and Defense Strategy

Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)

More information

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication.

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication. THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Practice Tips Social Networking, Mobile Devices, and the Cloud: The Newest Frontiers of Privacy Law By David J. Goldstone and Daniel B. Reagan

More information

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE

Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Policy Views UPDATING THE ELECTRONIC COMMUNICATIONS PRIVACY ACT: AN ESSENTIAL LEGISLATIVE GOAL FOR MEDIA COMPANIES AND THE PUBLIC THEY SERVE Kurt Wimmer I. The Need for Reform: A 1986 Act Doesn t Fit the

More information

For Now, New York State Investigators Can Ping Cellphones Without A Warrant in New York State

For Now, New York State Investigators Can Ping Cellphones Without A Warrant in New York State For Now, New York State Investigators Can Ping Cellphones Without A Warrant in New York State Can New York State Inspectors General and other law enforcement agencies use real-time GPS tracking on cellphones

More information

Case5:15-xr-90304-HRL Document22 Filed06/19/15 Page1 of 16

Case5:15-xr-90304-HRL Document22 Filed06/19/15 Page1 of 16 Case:-xr-00-HRL Document Filed0 Page of MELINDA HAAG (CABN United States Attorney DAVID R. CALLAWAY (CABN Chief, Criminal Division J. DOUGLAS WILSON (DCBN JEFFREY SCHENK (CABN Assistant United States Attorneys

More information

HAS KATZ BECOME QUAINT? USE OF BIG DATA TO OUTFLANK THE FOURTH AMENDMENT. Jeffrey L. Vagle * INTRODUCTION

HAS KATZ BECOME QUAINT? USE OF BIG DATA TO OUTFLANK THE FOURTH AMENDMENT. Jeffrey L. Vagle * INTRODUCTION HAS KATZ BECOME QUAINT? USE OF BIG DATA TO OUTFLANK THE FOURTH AMENDMENT Jeffrey L. Vagle * INTRODUCTION On December 14, 2010, a federal court, upon a government motion, entered an order pursuant to the

More information

9/30/2013. What is Cloud Computing? Benefits of Cloud Computing

9/30/2013. What is Cloud Computing? Benefits of Cloud Computing The Continued Evolution of Mobile, Wireless and Cloud Technologies in the Healthcare Industry Health Care Compliance Association Regional Conference October 11, 2013 Pittsburgh, PA Michael A. Cassidy Copyright

More information

GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know

GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know The Law, Potential Issues, and Best Practices. By Brian J. Moore and Ashley C. Pack Presenters Bi Brian J. Moore

More information

National Association of Criminal Defense Lawyers Electronic Surveillance & Government Access to Third Party Records

National Association of Criminal Defense Lawyers Electronic Surveillance & Government Access to Third Party Records National Association of Criminal Defense Lawyers Electronic Surveillance & Government Access to Third Party Records Adopted by the Board of Directors February 19, 2012 Ft. Lauderdale, Florida Introduction

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Digital Discovery & e-evidence

Digital Discovery & e-evidence Digital Discovery & e-evidence Reproduced with permission from Digital Discovery & e-evidence, 12 ddee 452, 11/08/2012. Copyright 2012 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Be it enacted by the People of the State of Illinois,

Be it enacted by the People of the State of Illinois, AN ACT concerning location surveillance. Be it enacted by the People of the State of Illinois, represented in the General Assembly: Section 1. Short title. This Act may be cited as the Freedom From Location

More information

Department, Board, Or Commission Author Bill Number

Department, Board, Or Commission Author Bill Number BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain

More information

Scholarship @ GEORGETOWN LAW. Georgetown University Law Center

Scholarship @ GEORGETOWN LAW. Georgetown University Law Center Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2010 Electronic Communications Privacy Act and the Revolution in Cloud Computing : Hearing Before the Subcomm. on the Constitution, Civil Rights,

More information

HOUSE ENROLLED ACT No. 1009

HOUSE ENROLLED ACT No. 1009 Second Regular Session 118th General Assembly (2014) PRINTING CODE. Amendments: Whenever an existing statute (or a section of the Indiana Constitution) is being amended, the text of the existing provision

More information

THE NOT A SEARCH GAME

THE NOT A SEARCH GAME THE NOT A SEARCH GAME JOHN F. STINNEFORD * The privacy versus security discussion is not just about the Fourth Amendment it involves policy considerations as well. The Fourth Amendment concerns frame the

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

Neustar Webinar. September 12, 2013

Neustar Webinar. September 12, 2013 Neustar Webinar September 12, 2013 Walking a Legal Tightrope MODERATOR: Trevor Gray, Supervisor, Legal Compliance Services Neustar, Inc. PANELISTS: James B. Baldinger Shareholder Carlton Fields, PA Pedro

More information

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART II - DEPARTMENT OF JUSTICE CHAPTER 33 - FEDERAL BUREAU OF INVESTIGATION 532. Director of the Federal Bureau of Investigation The Attorney General may appoint

More information

United States v. Jones: The Government s Use of a GPS Tracking Device Constitutes a Search within the Meaning of the Fourth Amendment

United States v. Jones: The Government s Use of a GPS Tracking Device Constitutes a Search within the Meaning of the Fourth Amendment United States v. Jones: The Government s Use of a GPS Tracking Device Constitutes a Search within the Meaning of the Fourth Amendment On January 23rd, 2012, the United States Supreme Court handed down

More information

Barbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut)

Barbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut) Date submitted: 14/08/2009 Librarians Shushed No More: The USA PATRIOT Act, The Connecticut Four, and Professional Ethics Barbara M. Jones, Ph.D. International Library Consultant, USA Former University

More information

October 19, 2015 POLICY DIRECTIVE 047-02. Assistant Secretary U.S. Immigration and Customs Enforcement

October 19, 2015 POLICY DIRECTIVE 047-02. Assistant Secretary U.S. Immigration and Customs Enforcement October 19, 2015 Deputy Secretary U.S. Department of Homeland Security Washington, DC 20528 Homeland Security POLICY DIRECTIVE 047-02 MEMORANDUM FOR: Sarah Saldana Assistant Secretary U.S. Immigration

More information

SUBSCRIBER PRIVACY NOTICE

SUBSCRIBER PRIVACY NOTICE PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s

More information

HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals.

HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals. HOW DOES A CRIMINAL CASE GET DISMISSED WITHOUT A TRIAL? Many criminal cases are resolved without a trial. Some with straight forward dismissals. In some cases the prosecution can be misinformed by the

More information

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT

More information

Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States

Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States Cloud computing is one of the Internet s great innovations, enabling individuals

More information

Defendant brought a Motion to Suppress the DNA Testing Results or in the alternative,

Defendant brought a Motion to Suppress the DNA Testing Results or in the alternative, STATE OF MINNESOTA COUNTY OF HENNEPIN COUNTY ` DISTRICT COURT FOURTH JUDICIAL DISTRICT STATE OF MINNESOTA, Plaintiff, vs. JIMMIE DALE JACKSON, File No: 04085182 ORDER AND MEMORANDUM OF LAW Defendant. Defendant

More information

Questions And Answers. Electron ic Monitoring in the Workplace

Questions And Answers. Electron ic Monitoring in the Workplace Questions And Answers Electron ic Monitoring in the Workplace Kevin J. Smith and Rachel J. Tischler Employers and employment attorneys alike have been concerned about the legal limits of electronic monitoring

More information

Public Act No. 16-148

Public Act No. 16-148 Public Act No. 16-148 AN ACT CONCERNING COMPELLED DISCLOSURE OF CELLULAR TELEPHONE AND INTERNET RECORDS AND FRAUD COMMITTED THROUGH TELEPHONE SOLICITATION. Be it enacted by the Senate and House of Representatives

More information

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT The Fourth Amendment Guarantees a Right to Privacy and Protects Against Unreasonable Searches and Seizures; If Your Fourth

More information

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT NARANJIBHAI PATEL and RAMILABEN PATEL, No. 08-56567 Plaintiffs-Appellants, D.C. No. v. 2:05-cv-01571- DSF-AJW CITY OF LOS ANGELES, a

More information

V 11.01.14. Seven areas are covered by this Notice:

V 11.01.14. Seven areas are covered by this Notice: Mediatti Broadband Communications, your local cable operator ( MBC ) is providing this Subscriber Privacy Notice ( Notice ) to inform you of its practices regarding personally identifiable information

More information

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF APPLICATION FOR CELL TOWER RECORDS MAGISTRATE NO. H-15-136M UNDER 18 U.S.C. 2703(D) OPINION On February 10, 2015

More information

Digital Evidence Legal Issues and Trends

Digital Evidence Legal Issues and Trends State of the States Cyber Crime Consortium By Justin Fitzsimmons Program Manager, High-Tech Crime Training Services SEARCH On April 30, 2015, the Office of the Massachusetts Attorney General, along with

More information

Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology

Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Cell-site simulator technology provides valuable assistance in support of important public safety objectives. Whether deployed

More information

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act. Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for

More information

Privacy Statement. Policy Overview. This Notice tells you our policies regarding:

Privacy Statement. Policy Overview. This Notice tells you our policies regarding: Privacy Statement At Glacier Club Cable TV we take your privacy seriously and we want you to know our policies. This Notice will give you an overview of those policies and how we will apply them in specific

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)

More information

Future Proof Your ediscovery Practices

Future Proof Your ediscovery Practices FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting

More information

Data Privacy & Security in the Cloud: Legal Basics and New Developments

Data Privacy & Security in the Cloud: Legal Basics and New Developments Data Privacy & Security in the Cloud: Legal Basics and New Developments Lawrence R. Freedman Partner, Edwards Wildman Palmer LLP lfreedman@edwardswildman.com (202) 939-7923 1 The Basics Two basic data

More information

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORI(

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORI( UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORI( AMERICAN CIVIL LIBERTIES UNION FOUNDATION Plaintiff, v. No. UNITED STATES DEPARTMENT OF JUSTICE, including its component the Federal

More information

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES Chapter 337-A: PROTECTION FROM HARASSMENT Table of Contents Part 12. HUMAN RIGHTS... Section 4651. DEFINITIONS... 3 Section 4652. FILING OF COMPLAINT; JURISDICTION...

More information

Retaliatory Hacking: Risky Business or Legitimate Corporate Security?

Retaliatory Hacking: Risky Business or Legitimate Corporate Security? Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital

More information

The Honorable John Conyers, Jr. Ranking Member, House Judiciary Committee 2138 Rayburn House Office Bldg. Washington, D.C. 20515

The Honorable John Conyers, Jr. Ranking Member, House Judiciary Committee 2138 Rayburn House Office Bldg. Washington, D.C. 20515 WASHINGTON LEGISLATIVE OFFICE November 30, 2015 The Honorable Bob Goodlatte Chairman, House Judiciary Committee 2138 Rayburn House Office Bldg. Washington, D.C. 20515 AMERICAN CIVIL LIBERTIES UNION WASHINGTON

More information

No. 1-10-2072 IN THE APPELLATE COURT OF ILLINOIS FIRST JUDICIAL DISTRICT

No. 1-10-2072 IN THE APPELLATE COURT OF ILLINOIS FIRST JUDICIAL DISTRICT NOTICE: This order was filed under Supreme Court Rule 23 and may not be cited as precedent by any party except in the limited circumstances allowed under Rule 23(e)(1). SIXTH DIVISION JUNE 30, 2011 IN

More information

Working with the Federal Government on Cybersecurity

Working with the Federal Government on Cybersecurity O B S I D I A N C Y B E R S E C U R I T Y O C C A S I O N A L P A P E R Working with the Federal Government on Cybersecurity Preparation is Key to Success December 5, 2013 Table of Contents CONSIDER THIS...

More information

Freedom of Information Act Request and Request for Expedited Processing

Freedom of Information Act Request and Request for Expedited Processing February 24, 2014 Arnetta Mallory - FOIA Initiatives Coordinator National Security Division U.S. Department of Justice 950 Pennsylvania Avenue, N.W. Room 6150 Washington, DC 20530-0001 BY EMAIL nsdfoia@usdoj.gov

More information

2016 -- H 7542 S T A T E O F R H O D E I S L A N D

2016 -- H 7542 S T A T E O F R H O D E I S L A N D LC00 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO PUBLIC UTILITIES AND CARRIERS - DUTIES OF UTILITIES AND CARRIERS Introduced By: Representatives

More information

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue

More information

SENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen

SENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen SENATE.............. No. 2299 The Commonwealth of Massachusetts In the Year Two Thousand Fourteen SENATE, Wednesday, July 23, 2014 The committee on Ways and Means, to whom was referred the Senate Bill

More information

Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation. Part I

Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation. Part I Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation Part I March 20, 2014 Speakers John J. Sullivan, Partner, rejoined Mayer Brown after serving as General Counsel at the US Department

More information

S. ll IN THE SENATE OF THE UNITED STATES A BILL

S. ll IN THE SENATE OF THE UNITED STATES A BILL TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks Volume 22, No. 1 September 2012 Criminal Justice Section Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks A case comment on R. v. Spencer and R. v. Trapp Brock Jones 1 A. Peer-to-Peer

More information

State of Wisconsin: Circuit Court: Milwaukee County: v. Case No. 2009CF001837. Defendant's Motion to Suppress Evidence

State of Wisconsin: Circuit Court: Milwaukee County: v. Case No. 2009CF001837. Defendant's Motion to Suppress Evidence State of Wisconsin: Circuit Court: Milwaukee County: State of Wisconsin, Plaintiff, v. Case No. 2009CF001837 Willie Pierce, Defendant. Defendant's Motion to Suppress Evidence Now comes the above-named

More information

constitutionality of NY-OIG s warrantless collection of data in this case.

constitutionality of NY-OIG s warrantless collection of data in this case. Using GPS Devices in Inspector General Investigations after Cunningham v. New York State Department of Labor 1 Wesley Cheng 2 I. Introduction When the New York State Office of the Inspector General ( NY-

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

Privacy vs. Safety: School Searches of Electronic Devices

Privacy vs. Safety: School Searches of Electronic Devices Privacy vs. Safety: School Searches of Electronic Devices / Rubén A. Villalobos Partner, Villalobos 2 Legal Group Trustee, Modesto City Schools ruben.villalobos@gmail.com 1 Introduction WELCOME Ask Questions!

More information

The Role of Government in Commercial Cybersecurity

The Role of Government in Commercial Cybersecurity The Role of Government in Commercial Cybersecurity Public-Private Partnerships and Improvements in Government Data Security Rather Than Government Control As the Optimal Model Christopher Wolf Future of

More information

Legal Update. Safe Schools, Cell Phones, and the Fourth Amendment

Legal Update. Safe Schools, Cell Phones, and the Fourth Amendment Legal Update Safe Schools, Cell Phones, and the Fourth Amendment Copyright 2009 by NASRO. Reprinted with permission. By Bernard James Professor of Law Pepperdine University bjames@pepperdine.edu Reform

More information

Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution.

Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution. Chapter 6 The Constitution and Business Laws that govern business have their origin in the lawmaking authority granted by the federal constitution. The Constitutional Powers of Government The Constitution

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

Future Proof Your ediscovery Practices

Future Proof Your ediscovery Practices FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Barak Cohen, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting Jessica

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

MEMORANDUM. Managers, Administrators, Clerks, Attorneys, and Planners

MEMORANDUM. Managers, Administrators, Clerks, Attorneys, and Planners MEMORANDUM To: From: Managers, Administrators, Clerks, Attorneys, and Planners Kimberly S. Hibbard, General Counsel Date: September 15, 2013 Re: City Authority to Regulate Wireless Telecommunications HB

More information

Ohio Court Interprets Continuing Contract Requirements

Ohio Court Interprets Continuing Contract Requirements January 2010 Ohio Court Interprets Continuing Contract Requirements Inside This Issue: Ohio Court Interprets Continuing Contract Requirements 1 United States Supreme Court to Rule on Public Employee Privacy

More information

CYBERCRIME LAWS OF THE UNITED STATES

CYBERCRIME LAWS OF THE UNITED STATES CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications

More information

Before the Federal Communications Commission Washington, D.C. 20554

Before the Federal Communications Commission Washington, D.C. 20554 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Inquiry Concerning High Speed Access to ) GN Docket No. 00-185 the Internet Over Cable and Other Facilities ) Proprietary

More information

INFORMATION ABOUT FILING A WHISTLEBLOWER DISCLOSURE WITH THE OFFICE OF SPECIAL COUNSEL IMPORTANT

INFORMATION ABOUT FILING A WHISTLEBLOWER DISCLOSURE WITH THE OFFICE OF SPECIAL COUNSEL IMPORTANT U.S. OFFICE OF SPECIAL COUNSEL Form OSC-12 (202) 254-3640 / (800) 572-2249 OMB Control No. 3255-0002 Exp. Date: 2/28/14 INFORMATION ABOUT FILING A WHISTLEBLOWER DISCLOSURE WITH THE OFFICE OF SPECIAL COUNSEL

More information

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS. IN THE MATTER OF APPLICATIONS Case Nos. 13-MJ-8163-JPO MEMORANDUM AND ORDER

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS. IN THE MATTER OF APPLICATIONS Case Nos. 13-MJ-8163-JPO MEMORANDUM AND ORDER UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS IN THE MATTER OF APPLICATIONS Case Nos. 13-MJ-8163-JPO FOR SEARCH WARRANTS FOR 13-MJ-8164-DJW INFORMATION ASSOCIATED WITH 13-MJ-8165-DJW TARGET EMAIL

More information

BEFORE THE CORPORATION COMMISSION OF T~~R-G~.'r`, C STAFF'S RESPONSE TO APPLICATION OF YOURTEL AMERICA, INC. AND BRIEF IN SUPPORT

BEFORE THE CORPORATION COMMISSION OF T~~R-G~.'r`, C STAFF'S RESPONSE TO APPLICATION OF YOURTEL AMERICA, INC. AND BRIEF IN SUPPORT 1 Selma* F :.f MA R 0 > ~ 'U0 BEFORE THE CORPORATION COMMISSION OF T~~R-G~.'r`, C APPLICATION OF YOURTEL AMERICA, INC. ~ Or OKLAHOtII a F/K/A THE PAGER COMPANY D/B/A THE ) CAUSE NO. PUD 200700047 PAGER

More information

WEST VIRGINIA LEGISLATURE. House Bill 4402

WEST VIRGINIA LEGISLATURE. House Bill 4402 06R WEST VIRGINIA LEGISLATURE 06 REGULAR SESSION Introduced House Bill 0 BY DELEGATES SKINNER AND FAIRCLOTH [Introduced February, 06; referred to the committee on the Judiciary.] 06R A BILL to amend the

More information

No. Microsoft Corporation ( Microsoft ) alleges as follows. INTRODUCTION

No. Microsoft Corporation ( Microsoft ) alleges as follows. INTRODUCTION UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 1 1 1 Microsoft Corporation, v. Plaintiff, The United States Department of Justice, and Loretta Lynch, in her official capacity as

More information

Online Behavioral Tracking and Targeting Concerns and Solutions from the Perspective of:

Online Behavioral Tracking and Targeting Concerns and Solutions from the Perspective of: Online Behavioral Tracking and Targeting Concerns and Solutions from the Perspective of: Center for Digital Democracy Consumer Federation of America Consumers Union Consumer Watchdog Electronic Frontier

More information

The United States of America (the Government ) seeks an order. pursuant to the Stored Communications Act ( SCA ) requiring various

The United States of America (the Government ) seeks an order. pursuant to the Stored Communications Act ( SCA ) requiring various UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - - -: IN THE MATTER OF THE APPLICATION : M-50 OF THE UNITED STATES OF AMERICA : FOR AN ORDER PURSUANT TO 18 U.S.C.

More information

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal

More information

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches.

AGENDA ELECTRONIC ADVANCES AND THE LAW. Tangipahoa Case Study and Cell Phone Basics. The U.S. Supreme Court and Cell Phone Searches. Leland Corky Dwight, Investigator Louisiana State Police ELECTRONIC ADVANCES AND THE LAW J. J. Williams, Jr., Staff Attorney Louisiana District Attorneys Association JJ@LDAA.ORG AGENDA Tangipahoa Case

More information

United States vs. McNeely: Analysis and Implications for DWI Enforcement in Minnesota 1

United States vs. McNeely: Analysis and Implications for DWI Enforcement in Minnesota 1 United States vs. McNeely: Analysis and Implications for DWI Enforcement in Minnesota 1 By Peter Ivy and Peter Orput, MCPA Co-Counsel 2 1) McNeely Background and Supreme Court Holding On April 17, 2013,

More information

Decided: March 27, 2015. S14A1625. WILLIAMS v. THE STATE. Following a bench trial, John Cletus Williams was convicted of driving

Decided: March 27, 2015. S14A1625. WILLIAMS v. THE STATE. Following a bench trial, John Cletus Williams was convicted of driving In the Supreme Court of Georgia Decided: March 27, 2015 S14A1625. WILLIAMS v. THE STATE. HINES, Presiding Justice. Following a bench trial, John Cletus Williams was convicted of driving under the influence

More information

NEW WAVE PRIVACY NOTICE

NEW WAVE PRIVACY NOTICE NEW WAVE PRIVACY NOTICE Companies controlled by NewWave Communications (subsequently referred to as NewWave, we, our, or us ) operate cable television systems through which they provide their customers

More information

Right to Financial Privacy Act

Right to Financial Privacy Act Background The Right to Financial Privacy Act of 1978 was enacted to provide the financial records of financial institution customers a reasonable amount of privacy from federal government scrutiny. The

More information

620 F.3d 304 (3d Cir. 2010).

620 F.3d 304 (3d Cir. 2010). CRIMINAL LAW STORED COMMUNICATIONS ACT THIRD CIRCUIT ALLOWS GOVERNMENT TO ACQUIRE CELL PHONE TRACKING DATA WITHOUT PROBABLE CAUSE. In re The Application of the United States for an Order Directing a Provider

More information

Cloud and Mobile Privacy: The Electronic Communications Privacy Act

Cloud and Mobile Privacy: The Electronic Communications Privacy Act Information & Communications Technology & Public Policy Project Science, Technology, & Public Policy Program Cloud and Mobile Privacy: The Electronic Communications Privacy Act What Technology Companies

More information

ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 539 (Levine) As Introduced February 23, 2015

ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair. AB 539 (Levine) As Introduced February 23, 2015 AB 539 Page 1 Date of Hearing: April 7, 2015 Counsel: Sandra Uribe ASSEMBLY COMMITTEE ON PUBLIC SAFETY Bill Quirk, Chair AB 539 (Levine) As Introduced February 23, 2015 SUMMARY: Authorizes the issuance

More information

Legal and Ethical Issues Facing Computer & Network Security Researchers

Legal and Ethical Issues Facing Computer & Network Security Researchers Legal and Ethical Issues Facing Computer & Network Security Researchers Aaron Burstein UC Berkeley School of Information November 23, 2009 Constraints on Network Research U.S. law is often unclear (and

More information

THE IMPLICATIONS OF THE ABANDONED PROPERTY DOCTRINE OF THE FOURTH AMENDMENT ON DATA DELETED FROM THE CLOUD. William C Pizio

THE IMPLICATIONS OF THE ABANDONED PROPERTY DOCTRINE OF THE FOURTH AMENDMENT ON DATA DELETED FROM THE CLOUD. William C Pizio THE IMPLICATIONS OF THE ABANDONED PROPERTY DOCTRINE OF THE FOURTH AMENDMENT ON DATA DELETED FROM THE CLOUD By William C Pizio Capstone Project Submitted to the Faculty of Utica College April, 2013 In Partial

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,

More information

June 12, 2015 VIA ELECTRONIC TRANSMISSION

June 12, 2015 VIA ELECTRONIC TRANSMISSION VIA ELECTRONIC TRANSMISSION The Honorable James B. Comey, Jr. Director Federal Bureau of Investigation 935 Pennsylvania Avenue, N.W. Washington, D.C. 20535 Dear Director Comey: June 12, 2015 I am writing

More information

Cyber Legislation & Policy Developments 2014

Cyber Legislation & Policy Developments 2014 Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal

More information

JAN 2 2 2016. (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any

JAN 2 2 2016. (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any ~ (c) S.B. NO. \ JAN 0 A BILL FOR AN ACT THE SENATE TWENTY-EIGHTH LEGISLATURE, 0 STATE OF HAWAII RELATING TO LAW ENFORCEMENT. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: ' SECTION. Section

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information