Legal and Ethical Issues Facing Computer & Network Security Researchers
|
|
|
- Michael Wells
- 10 years ago
- Views:
Transcription
1 Legal and Ethical Issues Facing Computer & Network Security Researchers Aaron Burstein UC Berkeley School of Information November 23, 2009
2 Constraints on Network Research U.S. law is often unclear (and unfriendly). Ethical issues are novel, and the scientific context changes rapidly.
3 Overview Law Electronic Communications Privacy Act (ECPA) Collecting and sharing network packet traces Running infected hosts Computer Fraud & Abuse Act (CFAA) Copyright / Digital Millennium Copyright Act (DMCA) Ethics Basic principles Human Subjects Research & Institutional review boards (IRBs)
4 COMMUNICATIONS PRIVACY LAW
5 Network Research: Privacy Law Issues Common research activities: Collecting network measurement data Packet headers Payload Publishing network traces Collecting mobile device traces E.g., Location data
6 ECPA at a Glance Content Non-content Real-time Wiretap Act Pen/Trap Stored Stored Communications Act
7 Electronic Communications Privacy Act (ECPA) Wiretap Act (18 U.S.C ) Prohibits real-time interception of communications contents Stored Communications Act (18 U.S.C ) Prohibits certain disclosures of content and noncontent/addressing information Pen/Trap statute (18 U.S.C ) Prohibits real-time interception of noncontent/addressing information
8 Disclosure vs. Internal Use Real-time, contents Stored contents Voluntary disclosure OK? No No Internal use OK? No Yes Real-time, noncontent Stored, noncontent No Yes (to non-govt recipient) Yes Yes
9 No Research Exemptions in ECPA! Some trace collection permitted by: Consent of users or Provider exception (allowing network operators to monitor networks to defend them) Limitations Individual consent hard to get Blanket consent (e.g., as part of a network s terms of service) may provide little information about data collection, use Provider exception requires collaboration with operational IT staff
10 Other Privacy Issues State laws Two-party rule in state wiretap laws International laws EU member nations generally have stricter privacy laws Interaction with human subjects regulations
11 How ECPA Affects Cybersecurity Research (1) Activity: Collecting full-packet traces in realtime Relevant law: Wiretap Act Applies to any network (government, enterprise, WiFi, university, etc.) Need consent or sufficient link to operational network protection for provider exception Wiretap Act continues to cover traces after they are recorded If collection violates law, disclosure probably does too.
12 How ECPA Affects Cybersecurity Research (2) Activity: Collecting packet-header traces in real-time Relevant law: Pen/Trap statute Consent, provider exceptions available Also an exception for network operation, maintenance, and testing Legally stored data become subject to SCA
13 How ECPA Affects Cybersecurity Research (3) Activity: Sharing or publishing packet traces Relevant law: SCA Applies only to public service providers: commercial ISPs but not businesses Full-packet traces: disclosure prohibited without consent, subpoena Packet header traces: disclosure allowed unless given to governmental entity Much broader than law enforcement; hampers some public releases
14 COMPUTER FRAUD & ABUSE ACT (CFAA)
15 CFAA & Network Research Botnet infiltration (and response?) Running malicious code in testbeds Collecting data from online services Running honeynets to interact with attackers
16 CFAA Elements Protected computer Any computer connected to the Internet Access Not defined in statute Authorization Not defined in statute Obtaining information / causing loss Penalties scale with type, value of information obtained Loss is not defined
17 Is the CFAA as Broad as It Sounds? Perhaps... United States v. Lori Drew (2009) Access means to obtain information from Authorization may be set by Terms of Service But U.S. Const. limits criminal application of CFAA in TOS breach cases. Insufficient clarity + arbitrary enforcement = unconstitutional vagueness
18 Testbeds: Legal Issues Concern: What if worms, viruses escape testbed containment? CFAA prohibits (1) knowingly causing transmission of code and (2)intentionally or recklessly causing damage Unclear whether accidents meet this standard of intent
19 ETHICAL ISSUES
20 Overview 1. Basic ethical principles / theories 2. Human subjects research and ethical compliance
21 Ethical Frameworks Consequentialism The moral rightness of an act depends only on its consequences. Deontological theories Morality is prescribed by individual rights, duties.
22 Research Ethics Belmont Report crafted principles for human subjects research (HSR) Respect for persons Beneficence Justice Common Rule codifies Belmont principles Defines research, human subject, consent, institutional review board (IRB) Applies to any HSR at an organization receiving federal research funding
23 Navigating Human Subjects Review
24
25 Ethical Trouble Spots for Network Research Is it HSR? Waiver of Informed Consent May be waived if impracticable to obtain Deception Minimal risk No adverse effect on subjects rights, welfare Non-deceptive research design impracticable
26 IRB Review: Easing the Pain Exemptions Studies of existing, publicly available data Studies of data recorded so that subjects cannot be identified, directly or through IDs Note: IRB decides whether research is exempt. Expedited review Research involves no more than minimal risk Allows quick(er) protocol approval
27 Ethics Beyond HSR Issues Harm to the researcher s organization (e.g., university) Harm to other users Accelerating the arms race Confusing researchers roles When to report malicious activity to... Victims? Law enforcement?
28 Law & Ethics in Research Frontiers Studies of security-related behavior Downloading malware Checking binary signatures Ignoring A/V warnings Conditioning users to ignore security Infiltrating cybercrime organizations DMCA take down studies Active probes
29 Security Analysis of Software
30 Software Analysis: Legal Issues Issues Finding software vulnerabilities Publishing results Relevant laws: Contract law (EULAs, clickwrap/shrinkwrap licenses) Digital Millennium Copyright Act (DMCA)
31 Software Analysis: Contract Issues EULAs typically prohibit reverse engineering, other processes that reveal vulnerabilities Courts usually enforce them but important issues remain unsettled: Pre-emption by patent law Tension with First Amendment
32 Software Analysis: DMCA Issues No person shall circumvent a technological measure that effectively controls access to a work protected by the Copyright Act But: courts, U.S. DOJ have found that the DMCA does not prohibit conducting research on or publishing papers about software vulnerabilities. Caveats: Publishing actual circumvention software might violate DMCA. Restrictions in EULAs still apply.
33 Ethical Issues in Software Analysis Whether (and when) to notify software vendor How much detail to publish
34 Resources Legal Information Institute ( Open access to US Constitution, US Code Common Rule Go to select title 45, part 46. Samuelson Clinic at UC Berkeley School of Law ( Reforming the ECPA to Enable a Culture of Cybersecurity Research ( In-depth analysis of applicable privacy laws and proposal for a research exception to the ECPA
Information Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
Retaliatory Hacking: Risky Business or Legitimate Corporate Security?
Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital
Acceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.
TERMS OF SERVICE IMPORTANT NOTICE: *All Payments to Orbit Cloud Inc are Non-Refundable* Orbit Cloud Inc. ("Orbit Cloud", "The Company") agrees to furnish services to the Subscriber, subject to the following
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Legal and Ethical Aspects. IT 4823 Information Security Administration. Cybercrime / Computer Crime. Law Enforcement Challenges.
IT 4823 Information Security Administration Legal and Ethical Considerations March 24 Legal and Ethical Aspects Topics include: cybercrime and computer crime intellectual property issues privacy ethical
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF
The Law of Web Application Hacking CanSecWest March 9, 2011 Marcia Hofmann, EFF what we ll talk about today Three situations you should recognize and approach with caution when you re doing security research
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 [email protected] (202) 661-3935 Why share information? Prevention
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
Virgin Media Business Acceptable Use Policy (Internet)
Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer
PRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of
PRIVACY POLICY Mil y Un Consejos Network Version Date: April 15th 2010 GENERAL Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of its users ( user or you ) whether they use
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.
CTC Acceptable Use Policy Consolidated Telephone Company doing business as Consolidated Telecommunications Company (CTC) has adopted this Acceptable Use Policy to encourage the use of its network and services
HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications
Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together
How To Get A Credit Card From Dsostingprotection
Terms of Service IMPORTANT NOTICE: *All Payments To DDoshostingprotection Are Non-Refundable* "DDoshostingprotection") agrees to furnish services to the Subscriber, subject to the following TOS (Terms
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
Fusion Acceptable Use Policy. Effective Feb 2, 2015
Fusion Acceptable Use Policy Effective Feb 2, 2015 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer or Customer s end users) the ability to learn about Fusion and
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its
114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS
114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging
1 of 3 3/29/2010 6:55 AM
Cox Communications - Cable, High Speed Internet and Telephone... http://www.cox.com/policy/leainformation/ 1 of 3 3/29/2010 6:55 AM Sign In Register Cox Centers Cart Order Now Select Location Search Cox
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA
TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE
Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.
This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
Health Information Privacy Refresher Training. March 2013
Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal
Acceptable Use Policy
Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present
Law & Ethics, Policies & Guidelines, and Security Awareness
Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY 1. Introduction This acceptable use policy ("Policy") sets out the principles, terms and conditions that govern the
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT
TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT Don t get lost in the cloud! This session will arm you with an understanding of the intricacies of
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
CYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
JPMA - Terms and Conditions
Agreement to Terms By accessing the JPMA Website and Online Training System, you signify that you agree to these Terms and Conditions. In addition, you will be subject to any posted guidelines, rules,
To IRB, or Not to IRB? That Is the Question!
To IRB, or Not to IRB? That Is the Question! A presentation by Mary Sapp, Ph.D. Assistant Vice President, Planning & Institutional Research University of Miami and Thomas K. Martin, Ph.D. Associate Vice
HIPAA Privacy Rule Primer for the College or University Administrator
HIPAA Privacy Rule Primer for the College or University Administrator On August 14, 2002, the Department of Health and Human Services ( HHS ) issued final medical privacy regulations (the Privacy Rule
NATIONAL HEALTHCARE SAFETY NETWORK USER RULES OF BEHAVIOR. Version 1.0 08/08/05
NATIONAL HEALTHCARE SAFETY NETWORK USER RULES OF BEHAVIOR Version 1.0 08/08/05 VERSION HISTORY Version # Implemented By Revision Date Reason 1.0 James Tolson 08/08/05 Page 2 of 12 TABLE OF CONTENTS 1 INTRODUCTION...
Good Clinical Practice 101: An Introduction
Good Clinical Practice 101: An Introduction Presented by: Lester Jao Lacorte, MD Medical Officer Commissioner s Fellow Division of Bioresearch Monitoring Office of Compliance Center for Devices and Radiological
To report an incident of policy abuse please send detailed email to: [email protected]
South Canaan Telephone s Internet access is a prepaid service. Billing: A subscriber to South Canaan Telephone s Internet access services will be sent a billing statement by the 10 th day of the month
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
Human Subjects Research (HSR) Series
Human Subjects Research (HSR) Series CITI Program s HSR series consists of modules from two basic tracks, Biomedical (Biomed) and Social- Behavioral- Educational (SBE), and a set of Additional Modules
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
TERMS OF SERVICE TELEPORT REQUEST RECEIVERS
TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,
Peer to Peer File Sharing and Copyright Infringement Policy
Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct
DHS S&T Cyber Security Division (CSD) PREDICT Overview
Homeland Security Advanced Research Projects Agency DHS S&T Cyber Security Division (CSD) PREDICT Overview Douglas Maughan Division Director November 2, 2015 http://www.dhs.gov/cyber-research DHS S&T Research
HIPAA Privacy Summary for Fully-insured Employer Groups
HIPAA Privacy Summary for Fully-insured Employer Groups I. Overview The Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) regulate the uses and disclosures
Appendix L: Nebraska s False Medicaid Claims Act Nebraska Statues Chapter 68 November 2013 Section 68-935 Terms, defined.
Appendix L: Nebraska s False Medicaid Claims Act Nebraska Statues Chapter 68 November 2013 Section 68-935 Terms, defined. For purposes of the False Medicaid Claims Act: A. Attorney General means the Attorney
Digital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
ELECTRONIC SIGNATURE AGREEMENT
ELECTRONIC SIGNATURE AGREEMENT 1. Agreement If you contract with us electronically or otherwise request documentation or disclosures electronically, you specifically consent and agree that we may provide
HIPAA Privacy Summary for Self-insured Employer Groups
I. Overview HIPAA Privacy Summary for Self-insured Employer Groups The Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) regulate the uses and disclosures of
Privacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
Department of the Navy Human Research Protection Program
Department of the Navy Human Research Protection Program Roles and Responsibilities of Principal Investigators May 2013 HISTORY AND REGULATIONS 2 US Historical Underpinnings Tuskegee Experiment Began in
S. ll IN THE SENATE OF THE UNITED STATES A BILL
TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer
EECS 588: Computer and Network Security. Introduction January 14, 2014
EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
