How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.

Slides:



Advertisements
Similar presentations
Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
Advertisements

Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Privacy & Cybersecurity Compliance in the Post-Snowden World Compliance Week 2014 Conference Peter Swire Huang Professor of Law and Ethics.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the.
August 2011Beyond the Border1 Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness CSG-ERC Canada-U.S. Relations Committee.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Cybersecurity Governance in Ethiopia
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Business Implications of the President’s NSA Review Group Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Where Did HIPAA Come From? “HIPAA Then and Now” Peter Swire Georgia Tech Scheller College of Business Alston & Bird LLP IAPP-Las Vegas 2015.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Vendor Management by Banks: How Law Firms Are Affected Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Peter Swire Holder Chair of Law and Ethics
Surveillance around the world
Cyber Security – An Existential Threat? (IIC, Singapore)
Clash of jurisdictions in the area of data protection
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
EU Sanctions on Individuals
Anti Money Laundering (AML)
DDPO Legal Network 3 November 2016.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Data Protection Act and Other Laws
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Attribution & the globalization of criminal evidence
Articulating a Rights-Based Argument for Land Contract Disclosure
“Keynote: The Big Picture on Privacy and Cybersecurity for Technology Lawyers” Peter Swire Holder Chair of Law & Ethics, Georgia Tech Senior Counsel, Alston.
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
International Regulatory Trends
GDPR Overview Gydeline – October 2017
Recognition and enforcement of foreign judgments and arbitral awards in Russia Roman Zaitsev, PhD, Partner 05/09/2018.
Information Governance and Data Privacy: A World of Risk
Session II: Communication and Outreach
GDPR Overview Gydeline – October 2017
Nina Barakzai November 2017
Confidentiality October 14, 2005.
“The Big Picture on GDPR and the Rising Importance of Privacy Compliance” Peter Swire Holder Chair of Law & Ethics, Georgia Tech Senior Counsel, Alston.
Bob Siegel President Privacy Ref, Inc.
“The Clash of the EU and U. S
Introduction to GDPR 09/11/2018.
U.S. Department of Justice
Protection of News Sources
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
U.S. Intelligence Oversight Reforms & the Cloud Act
Peter Swire Engage CISO Roundtable with the
HIPAA Overview.
The supervision of personal data processing by EU institutions and bodies => data protection and privacy, why it matters, for you as citizens and as EU.
Presentation transcript:

How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business Senior Counsel, Alston & Bird LLP Emory Law School Thrower Symposium February 11, 2016

Overview  Changes in global communications create challenges  Cross-border data flows common and increasing for cybercrime, other crimes, cybersecurity, and national security  Law enforcement has large national security implications, especially for counter-terrorism  Criminal law is part of “all tools” approach for counter- terrorism and national security  Strict US privacy law creates obstacles to EU requests for data  Strict EU privacy law creates obstacles to US requests for data  What are we to do?

Research context for this talk/paper  Research project on mutual legal assistance (with Justin Hemmings)  “Stakeholders in Reform of the Global System on Mutual Legal Assistance,”  “Mutual Legal Assistance in an Era of Globalized Communications: The Analogy to the Visa Waiver Program,”  Research and policy work on Safe Harbor/Schrems/EU (with DeBrae Kennedy-Mayo):  “US Surveillance Law, Safe Harbor, and Reforms Since 2013”,  Today’s project: bringing the two parts together

Why UK and Others Want Direct Access to Data/Evidence Held in the US  Announcement last week of UK/US agreement that, if enacted, would enable UK to go directly to providers in US for stored records, wiretaps, and national security wiretaps  Have been working with industry/civil society/academic group on these issues, to assure privacy/human rights rules for these  Stored records: UK victim, UK suspects, or social network records held in US (law enforcement)  Wiretaps: Alice in UK s/Skypes Bob in UK; it is encrypted, but may be plaintext at server in US (law enforcement)  National security investigations: UK investigation, and don’t want to necessarily share it with NSA; evidence accessed in US

US Privacy Law is Stricter than EU  US Electronic Communications Privacy Act (ECPA) stricter in many respects than law enforcement rules in other countries:  Judicial oversight of request  Probable cause, or almost (reasonable and articulable suspicion)  Notice to service provider of the basis of the request  1 st Amendment:  Don’t provide evidence for hate speech, blasphemy, etc.  Mutual Legal Assistance Treaties  Careful review in US DOJ Office of International Affairs  Big delays, averaging 10 months even for successful requests  EU perspective:  LOTS of evidence held in US by global service providers  US won’t provide vital evidence, even where EU victims, crimes, suspects

EU Privacy Law is Stricter than US  US seeks to export data/evidence from EU, for many reasons  Commerce – Safe Harbor, global companies and services  Law enforcement/national security – we are allies  Strict EU privacy laws  1998 Directive, and new General Data Protection Regulation  Schrems ECJ case in October, struck down Safe Harbor  US/EU negotiations about stricter EU privacy rules  Privacy Shield – commercial and some foreign intelligence  Umbrella agreement – new US promises on data uses and downstream disclosures when receive from EU  US perspective: there must be limits to EU insistence on changing US practices

Mutually Assured Frustration  Human rights advocates on both sides of the Atlantic can’t imagine lowering their standards  US: “You have no judges and no probable cause!”  EU: “You have no comprehensive privacy law like ours and lack legal structure for downstream uses!” plus “The NSA makes the US an unsafe place for our data!”  In our era of global communications, blaming each other and blocking legitimate data flows among allies not the right way to proceed  New agreements have to be effective and also follow privacy and human rights laws and norms

Some Thoughts on the Way Forward  Clearly describe the situation (a main goal of our research project)  Technology – why so many new data flows and challenges  Law – why each side distrusts the other’s approach  Educate the elites who are prone to criticize any reform  Identify concrete reforms that enable data flows while honoring core legal principles of each country  Consider how to expand beyond the “club” of US and EU, to address legal, privacy, and human rights challenges for global data flows