Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy
|
|
- Cordelia Preston
- 8 years ago
- Views:
Transcription
1 Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy
2 The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the NSA, May 2013 countries or individuals that engage in cyber attacks should face consequences and international condemnation. In an interconnected world, an attack on one nation's networks can be an attack on all. - Hilary Clinton, Secretary of State, January 2010
3 Snowden leaks so far Around 500 docs made public Guardian has published 17 docs Yesterday US stated Snowden has doomsday cache of highly encrypted classified docs
4 What do we now know? Access to communications metadata The US has direct access to communications data held by Google, AOL, YouTube, Yahoo, Facebook, Microsoft (incl Skype) via PRISM Also gathers bulk access to telephone data Tapping of fibre optic cables UK is intercepting all data passing through 200 fibre optic cables landing in the UK via TEMPORA Storing content for 3 days and metadata for 30 days Breaking of encryption standards and infiltration of standards bodies
5 What do we now know? Computer network exploitation (hacking) is common practice The NSA has infected more than 50,000 computers with specialised malware Collection of and chat address books More than 250 million address books are gathered every year Hacking of private cables of Google centres Hacking of the SWIFT financial messaging system Spying on foreign leaders
6 What do we know? All data is shared with the Five Eyes alliance Interception, collection, analysis and decryption is conducted by each of the agencies of the 5 countries and all data is shared fluidly Operations centres are jointly run in each of the five countries Five Eyes have infiltrated every aspect of modern communications networks
7 What do we now know? Mass surveillance is the norm We are in a golden age for data collection NSA strategy doc: Digital information created since 2006 grew tenfold, reaching 1.8 exabytes in 2011, a trend projected to continue; the traces individuals leave when they interact with the global network will define the capacity to locate, characterize and understand entities. NSA has adapted in innovative and creative ways that have led some to describe the current day as the golden age of SIGINT.
8 Our thinking must shift in fundamental ways our personal and communications data is hugely valuable, and even data about data (metadata) is of great interest to our governments oversight mechanisms will fail to protect the rights of individuals when they are not transparent and publicly accountable borders are obsolete. Distinctions based on sovereignty and jurisdiction are being erroded. What does cross-border transfer of data mean in today s world? who needs data retention when individuals want to store everything, forever, in the cloud?
9 The policy and legal implications 1) The challenge to internet governance 2) Undermining the EU-US relationship 3) Long-term prioritisation of security over privacy 4) Increased legitimacy of surveillance in repressive regimes
10 The challenge to internet governance Brazil data localisation EU need a European data cloud What are the implications? Cost to internet services, complexity, impact on innovation Increased power to authoritarian regimes to restrict internet flows What role for national borders and outdated understandings of jurisdiction?
11 Undermining the US-EU relationship EU leaders (Oct 2013 statement): lack of trust undermines international cooperation Parliamentary vote to suspend the SWIFT agreement Renegotiation of the Safe Harbour Principles - Commission has imposed a 2014 deadline New data protection regulation prevents US companies from complying with law enforcement requests for EU data
12 Long-term prioritisation of security over privacy Justification for mass surveillance has been counterterrorism and the protection of security NSA media strategy document Sound Bites That Resonate mention 9/11 Negotiations around UN General Assembly US/UK demand to include mention of promoting security Difficulty in mobilising public outrage suggests that debate might be lost already?
13 Increased legitimacy of surveillance in repressive regimes China at the IGF: US should take a look at its own human rights record Zimbabwe on new SIM registration law: "There's nothing amiss about that, it happens all over the world. Ask Edward Snowden." Same technologies used by US government to conduct computer network exploitation and mass surveillance sold on the private market to Egypt, Bahrain, Libya, Morrocco, Yemen etc.
14 The fallout is not over yet More revelations to come Political and legal pressure to increase in the new year General Assembly vote on resolution in early Dec Brazil internet summit April 2014
15 The future?
Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015
Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:
More informationJust Net Coalition statement on Internet governance
Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a
More informationRevealed: how US and UK spy agencies defeat internet privacy and security
http://www.theguardian.com/world /2013/sep/05/nsa gchq encryption codes security Revealed: how US and UK spy agencies defeat internet privacy and security NSA and GCHQ unlock encryption used to protect
More informationEconomic Impact of PRISM on Cloud Services & Safe Harbor
Economic Impact of PRISM on Cloud Services & Safe Harbor SESSION ID: TRND-R04A Craig Spiezle Executive Director & President, Online Trust Alliance https://otalliance.org Challenges & Risks Privacy Balkanization
More informationGreat ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven
Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven 2 3 NSA calls the iphone users public 'zombies' who pay for their own surveillance 4 Snowden revelations NSA: Collect it
More informationNSA Surveillance, National Security and Privacy
NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM
More informationdetails, and numerous other data points. Enough information is often collected that even 2
Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 650 Pennsylvania Avenue, NW Washington, D.C. 050 VIA E MAIL bigdata@ostp.gov March, 04 Re: Big Data Study, Document
More informationInternet surveillance - The Main Advantages
INTERNET TECHNOLOGY: LIBERATING OR CONTROLLING? Dr. Farid Farahmand War & Peace Series Fall 2013 So!. Is the Internet technology! Internet has opened a new dimension of communications giving us more control!
More informationOverview of Cloud Computing in India
Overview of Cloud Computing in India NIST Standards in Trade Workshop with India Rahul Jain Principal Consultant Data Security Council of India September 17, 2014 Opportunities in the Cloud Cloud Market
More informationThe threats which were perceivable 20 years ago differ greatly from our ever increasing
1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different
More informationMicrosoft Cloud Computing Research Centre
Microsoft Cloud Computing Research Centre 1 st Annual Symposium, Cambridge 2014 : Legal frameworks Ian Walden i.n.walden@qmul.ac.uk 1 Introductory remarks From organised crime to law enforcement The Snowden
More informationCan we maintain Human Rights in Our Cyber Empire?
Can we maintain Human Rights in Our Cyber Empire? Yvo Desmedt Univ. of Texas at Dallas USA and University College London UK December 11, 2014 c Yvo Desmedt 1. THE INDUSTRIAL EMPIRES The industrial empires
More informationSafe Harbour Agreement no longer a valid basis for EEA to US transfers of personal data
Jisc Safe Harbour NOTE ON THE COURT OF JUSTICE OF THE EUROPEAN UNION'S JUDGMENT ON 'SAFE HARBOUR' ARRANGEMENTS FOR THE TRANSFER OF PERSONAL DATA FROM THE EEA TO THE USA KEY POINTS Safe Harbour Agreement
More informationThe Year 2013 Has Become 1984
The Year 2013 Has Become 1984 Saturday, September 21, 2013 23:33 idiscovery Solutions Tom Matzen The Editor interviews Tom Matzen, Director at idiscovery Solutions, in charge of the firm s International
More informationPrivacy & Data Security: The Future of the US-EU Safe Harbor
Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT
More informationTechnological Sovereignty: Missing the Point?
Technological Sovereignty: Missing the Point? An Analysis of European Proposals after June 5, 2013 by TIM MAURER, ROBERT MORGUS, ISABEL SKIERKA, MIRKO HOHMANN Following reports of foreign government surveillance
More informationDATE: 1 APRIL 2014. Introduction
INTERNET SOCIETY SUBMISSION TO THE OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS IN RESPONSE TO THE CONSULTATION ON THE RIGHT TO PRIVACY IN THE CONTEXT OF THE UN GENERAL ASSEMBLY RESOLUTION 68/167 DATE:
More informationThe Risk of Hosting in. Canada. An ebook by
The Risk of Hosting in Canada An ebook by Index Introduction...1 Financial Risks...3 Legal Risks...5 Security Risks...8 Technical Risks...10 Conclusion...12 Contact...12 Introduction Hosting your applications
More informationCSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015
CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 On March 10, 2015 the Center for Strategic and International Studies, in conjunction with the Cybersecurity Unit of the U.S. Department of
More informationSecond Cyber Security Summit, November 11, 2013 in Bonn Final communique
Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference
More informationLOOKING AT CLOUDS FROM BOTH SIDES NOW
ANALYSIS, ADVANCED KEY POINTS OF THE ARTICLE: LOOKING AT CLOUDS FROM BOTH SIDES NOW WRITTEN BY W. KUAN HON, CHRISTOPHER MILLARD & IAN WALDEN 1/12 SUMMARY 1. Analysis history...3 2. Context...4 3. The evolution
More informationEU- US NGO Letter on 1 To Secretary Pritzker
November 13, 2015 Secretary Penny Pritzker U.S. Department of Commerce 1401 Constitution Ave., NW Washington, D.C. 20230 Commissioner Věra Jourová Justice, Consumers and Gender Equality European Commission
More informationChinese Media & Cyber Security
Chinese Media & Cyber Security CCTV-4, Obama & Edward Snowden By Jacquelyn Chinn Recent events concerning international relations and cyber security between the United States and China have presented an
More informationEUROPEAN PARLIAMENT 2014-2019. Committee on Civil Liberties, Justice and Home Affairs WORKING DOCUMENT
EUROPEAN PARLIAMT 2014-2019 Committee on Civil Liberties, Justice and Home Affairs 19.1.2015 WORKING DOCUMT on the Follow-up of the LIBE Inquiry on Electronic Mass Surveillance of EU Citizens Committee
More informationExpert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cybersecurity and Data Protection - First Principles By Chris Connolly
More informationCOMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Rebuilding Trust in EU-US Data Flows
EUROPEAN COMMISSION Brussels, 27.11.2013 COM(2013) 846 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Rebuilding Trust in EU-US Data Flows EN EN 1. INTRODUCTION: THE
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationSUNDAY, JUNE 16, 2013. MARINA Internet metadata
ABCDE SUNDAY, JUNE 16, 2013 NSA SURVEILLANCE The Architecture Four-pronged U.S. approach relies heavily on data behind Internet, phone communications By Barton Gellman On March 12, 2004, acting attorney
More informationAs the US debates email privacy a Berlin start up surges with...
TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services
More informationUN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
More information7 August 2015. I. Introduction
Suggestions for privacy-related questions to be included in the list of issues on Hungary, Human Rights Committee, 115th session, October-November 2015 I. Introduction 7 August 2015 Article 17 of the International
More informationEmail Data Security. The dominant business communication tool
Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools
More informationFA 01: Intelligence agencies target information highways
FA 01: Intelligence agencies target information highways Submarine cables make the global information highways a reality. The newest spy scandal forces states to further expand their networks. Now, the
More informationPrivacy and Access 20/20 Conference. Data Sovereignty and Data Localization. Does it matter?
Privacy and Access 20/20 Conference Data Sovereignty and Data Localization Does it matter? 13 November 2015 1 Overview To focus the mind: Microsoft vs. USA 2015 Stepping back to leap forward: The basic
More informationPromoting Cross Border Data Flows Priorities for the Business Community
Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing
More informationGlobal Corporate Responsibility for Internet Freedom. Background paper
Global Corporate Responsibility for Internet Freedom Background paper Introduction The Internet, as a global network of networks, is not under the control of a single government or international entity.
More informationHow To Prepare For The Challenges Of 2014
Contact: Timothy J. Toohey Partner 213.417.5324 ttoohey@mpplaw.com The Year Ahead in Privacy and Data Security 2014 promises to be another eventful year in the privacy and data security fields. Although
More informationF A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations
Brussels, 24 March 2014 140324/01 F A C T S H E E T EU-US Summit (Brussels, 26 March 2014) and EU-US relations The Leaders of the European Union and the United States of America will meet on 26 March 2014
More informationAs prepared for delivery
Restoring Confidence in the Global Cloud Remarks by Victoria Espinel President and CEO, BSA The Software Alliance Forum Europe 3 rd Annual European Cloud Computing Conference Brussels, Belgium, April 9,
More informationOPEN ACCESS, PRIVACY AND HACKER CULTURE
OPEN ACCESS, PRIVACY AND HACKER CULTURE An Inside Higher Ed webinar with Tracy Mitrano Director of IT policy and the Institute for Internet Culture Policy and Law at Cornell University October 2, 2013
More informationEDRi s. January 2015. European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70
EDRi s Red lines on TTIP January 2015 European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70 ABOUT EDRI European Digital Rights is a network of 34 privacy and
More informationHOW SAFE IS YOUR DATA? Are you at risk of making the headlines for all the wrong reasons?
HOW SAFE IS YOUR DATA? Are you at risk of making the headlines for all the wrong reasons? What do you need to consider when choosing a cloud service? G-Cloud gives central and local government departments
More informationContext. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world
To cloud or not to cloud, that is a very serious question EEMA / TrustCore Legal challenges in a post Safe Harbour and pre GDPR cloud world 18 November 2015 hans.graux@timelex.eu Context Major cloud providers
More informationThe Internet, Human Rights, and the Private Sector
The Internet, Human Rights, and the Private Sector An Interview with Michael A. Samway GJIA: You stated in a November 2008 C-SPAN interview that in addition to heading Yahoo! s international legal team,
More informationNSA After-shocks. How Snowden has changed ICT decision-makers approach to the Cloud
NSA After-shocks How Snowden has changed ICT decision-makers approach to the Cloud FOREWORD 2013 was a game-changing year for cloud service providers across the globe. Edward Snowden s revelations of covert
More informationCyber Defense & Breach Response Privacy Issues
Cyber Defense & Breach Response Privacy Issues Kevin Boyle Partner 17 November 2014 Latham & Watkins is the business name of Latham & Watkins (London) LLP, a registered limited liability partnership organised
More informationData privacy and security in the post-snowden era
Data privacy and security in the post-snowden era Matthew D. Sarrel, CISSP August 22, 2014 This report is underwritten by Verne Global. TABLE OF CONTENTS Executive summary... 3 Situational analysis...
More informationFreedom of Expression Online The Role of Internet Intermediaries
Freedom of Expression Online The Role of Internet Intermediaries This summary describes a forthcoming report to be published jointly by UNESCO, the Internet Society, and the Open Society Foundations. It
More informationPatriot Act Impact on Canadian Organizations Using Cloud Services
Patriot Act Impact on Canadian Organizations Using Cloud Services November 8, 2013 By Scott Wright The Streetwise Security Coach http://www.securityperspectives.com 1 PRESENTATION TITLE Why do nation-states
More informationLawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Steven M. Bellovin https://www.cs.columbia.edu/ smb Join work with Matt Blaze, Sandy Clark, Susan Landau Steven M. Bellovin
More informationCase 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
Case 1:13-cv-00851-RJL Document 108-1 Filed 04/15/14 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA --------------------------------------------------- KLAYMAN et al., Plaintiffs,
More informationTHE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY
前 沿 探 索 THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY By Lt Col Jose Luis Llagran Bonilla 1 (Ecuador) I. Introduction Cyberspace is an interdependent network of information technology infrastructures
More informationCybersecurity: Taking Stock and Looking Ahead
Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity
More informationKeren Elazari Hackers: The Internet s Immune System
Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think
More informationHow Covert Agents Infiltrate the Internet to Manipulate, Deceive,...
DISPATCHES How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations By Glenn Greenwald 24 Feb 2014, 6:25 PM EST 1 of 17 02/25/2014 10:22 AM A page from a GCHQ top secret
More informationTake Back Control. Executive Summary
Take Back Control There's no such thing as secure anymore. Debora Plunkett, NSA Executive Summary Businesses violate your privacy every day because collecting, using, sharing, and even losing your personal
More informationNational intelligence authorities and surveillance in the EU: Fundamental rights safeguards and remedies
National intelligence authorities and surveillance in the EU: Fundamental rights safeguards and remedies Dr Mario Oetheimer Brussels, 28 May 2015 Opening session The repercussions on intelligence oversight
More informationInternet Governance Forum Baku 2012
Internet Governance Forum Baku 2012 Workshop Cloudy Jurisdiction: Addressing the Thirst for Cloud Data in Domestic Legal Processes Workshop organized by Tamir Israel, Staff Lawyer, Samuelson- Glushko Canadian
More informationBig Data and Mozilla
Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue Washington, DC 20504 RE: Office of Science and Technology Policy Request for Information: Big Data
More informationNSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill
NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill Marcus Christian Partner +1 202 263 3731 mchristian@mayerbrown.com Howard W. Waltzman
More information04 DEC 2013. Big data: Navigating the future. By Eric Hunter
04 DEC 2013 Big data: Navigating the future By Eric Hunter Big data: Navigating the future BY ERIC HUNTER Photography by Sam Mardon Forecasting the future can also shape and clarify it. Eric Hunter of
More informationCloud and surveillance
Cloud and surveillance (These notes formed the basis of Neil Brown s panel session at Broad Group s Cloud Law European Summit on 25th November 2014. CC BY 2.0) Ladies and gentleman, I am delighted to be
More informationData Privacy & Security in the Cloud: Legal Basics and New Developments
Data Privacy & Security in the Cloud: Legal Basics and New Developments Lawrence R. Freedman Partner, Edwards Wildman Palmer LLP lfreedman@edwardswildman.com (202) 939-7923 1 The Basics Two basic data
More informationThe firestorm of controversy
0100100000011001100110 1001011100100110010101 1100110111010001101111 0111001001101101001000 0001101111011001100010 0000011000110110111101 1011100111010001110010 0110111101110110011001 0101110010011100110111
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationPosition Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security
Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic
More informationProtecting your information
Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost
More informationJohn O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan:
John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505 November 4, 2015 Mr. Brennan: On March 31, 2015 several organizations called on the Central Intelligence Agency
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON BIG DATA MANAGEMENT AND ITS SECURITY PRUTHVIKA S. KADU 1, DR. H. R.
More informationOffensive capabilities
Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and
More information1 Data Protection Principles
Today, our personal information is being collected, shared, stored and analysed everywhere. Whether you are browsing the internet, talking to a friend or making an online purchase, personal data collection
More informationSystematic Government Access to Personal Data: A Comparative Analysis
: A Comparative Analysis Ira Rubinstein, New York University School of Law Greg Nojeim, Center for Democracy & Technology Ronald Lee, Arnold & Porter LLP* November 13, 2013 Funded by The Privacy Projects
More informationThe Question of Digital and Cyber Surveillance on Civilians. Malak Hassaballah (General Assembly Chair) I. Introduction
Committee: Issue: Student Officer: General Assembly The Question of Digital and Cyber Surveillance on Civilians Malak Hassaballah (General Assembly Chair) I. Introduction Surveillance is defined as close
More informationGreySky. Superfast Broadband. Changing the World
Superfast Broadband Changing the World Superfast Broadband Changing the World The internet is nothing if we don t use it, and the way we use it will play a critical role in how it is delivered. The commercial
More informationNational Security Agency
National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationIntroducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report
Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,
More informationSurveillance Costs: The NSA s Impact on the Economy, Internet Freedom & Cybersecurity
July 2014 New America s Open Technology Institute Policy Paper Surveillance Costs: The NSA s Impact on the Economy, Internet Freedom & Cybersecurity Danielle Kehl with Kevin Bankston, Robyn Greene & Robert
More informationCloud storage buyer s guide
Cloud storage buyer s guide for small business sponsored by 1 Table of contents Why should you read this guide? 3 Step 1: Decide how much security you need 4 Step 2: Consider what you need cloud storage
More informationData Protection HEADLINE PART Developments: Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance
Data Protection HEADLINE PART Developments: 1 Implications HEADLINE for the PART Insurance 2 Sector Strategies for Compliance Sub-headline Arial 18pt dark gray Optional Name Arial 13pt italic white Venue
More informationFieldfisher Report: Managing Global Data Residency Risk
Fieldfisher Report: Managing Global Data Residency Risk MARCH 2015 Introduction We live in an always on, interconnected, data-hungry world. Our personal data is collected by our computers, our phones,
More informationJOINT MOTION FOR A RESOLUTION
EUROPEAN PARLIAMENT 2009-2014 Plenary sitting inofficial consolidated version prepared by Jan Philipp Albrecht after adoption in Plenary on 23 October 2013 JOINT MOTION FOR A RESOLUTION pursuant to Rule
More informationBy Daniel E. Frank and Don Borelli
30-SECOND SUMMARY As intelligent, interconnected devices become more widely available and increasingly host high-value information like a hospital patient s medical records the intrusion points for cyber
More informationData Privacy: Where Should I House My Data?
Data Privacy: Where Should I House My Data? intralinks.com Data Privacy: Where Should I House My Data? As enterprise file sharing and collaboration tools become more widely used, it becomes increasingly
More informationCommittee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
More informationWe Must Comply with International Requirements! Introducing Biometric ID Cards in France
We Must Comply with International Requirements! Introducing Biometric ID Cards in France Meryem Marzouki CNRS - LIP6/PolyTIC / IRIS Meryem.Marzouki@iris.sgdg.org www.iris.sgdg.org Terrorizing Privacy?
More informationHow to protect privacy and security in the Crypto Wars
As part of the Global Conference on Cyberspace, the Netherlands will facilitate an expert panel on the right to privacy, one of the central themes of the conference. During this panel, high esteemed privacy
More informationPOLICY BRIEF Why Trade Agreements are not Setting Information Free
POLICY BRIEF Why Trade Agreements are not Setting Information Free Susan Ariel Aaronson, Ph.D. In December 2012, IIEP published a policy brief, Can Trade Policy Set Information Free? which compared US,
More informationOnline Freedom of Speech: The Battle Continues
Online Freedom of Speech: The Battle Continues Walid AL-SAQAF Diplo Foundation Webinar September 25, 2012 Relevant Questions 1. The UN Human Rights Council's issued a resolution affirming human rights
More informationBackground Guide. Security Intelligence Summit. Director: Jenilee Trew Assistant Director: Anthony Tsou. Georgia Tech
Background Guide Security Intelligence Summit Director: Jenilee Trew Assistant Director: Anthony Tsou Georgia Tech Model United Nations Conference 2014 Table of Contents Table of Contents... 2 Letter from
More informationAchieving True Security in a Cloud-Hosted World
Achieving True Security in a Cloud-Hosted World Introduction After half a decade of working out the kinks on free, individual user accounts, major commercial cloud storage services such as Dropbox and
More informationEncyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
More informationEU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004
COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the
More informationWrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors
1 Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors Scott Woodison Executive Director, Compliance and Enterprise Risk Office of Internal Audit and Compliance
More informationThe Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
More informationNATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY
DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL
More informationAccession to Convention 108: Benefits and Commitments. Marc Rotenberg, President Electronic Privacy Information Center Washington, DC
Accession to Convention 108: Benefits and Commitments Marc Rotenberg, President Electronic Privacy Information Center Washington, DC Convention 108: From a European Reality to Global Treaty Strasbourg,
More informationLaw and Policy in Internet Surveillance Programs: United States, Great Britain and Germany 1
stiftung neue verantwortung Impulse 25/13 Law and Policy in Internet Surveillance Programs: United States, Great Britain and Germany 1 Many Europeans are outraged about US government surveillance programs
More informationBig Data Big Security Problems? Ivan Damgård, Aarhus University
Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence
More information