Privacy and Cybersecurity Law in India and the U.S. Professor Peter Swire Ohio State University National Law University, Dwarka March 31, 2011.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
The United States, Privacy, and Data Protection Peter P. Swire Dutch Embassy Presentation January 19, 2001.
Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
"Security and Privacy After September 11 Professor Peter P. Swire Ohio State Law School Consultant, Morrison & Foerster Privacy & Data Security Summit.
A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Reflections on the White House Privacy Office Peter P. Swire U.S. Chief Counselor for Privacy, OSU College of Law, 2001-present CFP, March 8,
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Research and Privacy Under HIPAA Professor Peter P. Swire Moritz College of Law Ohio State University National Academy of Science Panel on Science, Technology.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
Privacy Today Privacy Day January 28, 2008 International Association of Privacy Professionals.
Online Profiling and Consumer Choice Peter P. Swire Center for American Progress Ohio State University ATL Hill Briefing April 28, 2008.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
The Need for Government-Wide Privacy Policy Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP DHS Privacy Advisory Committee.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Lawful Access in the EU: The Pipe to the Cloud? Professor Peter Swire Ohio State University & Future of Privacy Forum Georgetown Law School Conference.
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Do you know how to keep yourself safe?
Encryption Export Controls in the US Preliminary Research.
Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Conflicting Privacy Regimes: (1) Encryption and (2) Access to Cloud Records Peter Swire Ohio State University Future of Privacy Forum IAPP Global Summit.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Professor Peter Swire The Privacy Project.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Reasons to Support Strong Encryption for a Globally Secure Internet Professor Peter Swire Ohio State University U.S. Technology Training Institute Washington,
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
The Basics The Constitution is the highest law in the United States. All other laws come from the Constitution. It says how the government works. It creates.
Security of the Distributed Electronic Patient Record: A Case-Based Approach James G. Anderson, Ph.D. Purdue University.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
LAW OF COMPUTER TECHNOLOGY FALL 2015 © 2015 MICHAEL I. SHAMOS Regulatory Law Michael I. Shamos, Ph.D., J.D. Institute for Software Research School of.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
Privacy and the Law.
Surveillance around the world
“Privacy and Cybersecurity Law in India and the U.S.”
Big Data Considerations
U.S. Intelligence Oversight Reforms & the Cloud Act
Peter Swire Engage CISO Roundtable with the
Computer Security Social Legal and Ethical issues
Online Safety: Rights and Responsibilities
Presentation transcript:

Privacy and Cybersecurity Law in India and the U.S. Professor Peter Swire Ohio State University National Law University, Dwarka March 31, 2011

Overview Theme – the rules about information are important in the information age Theme – the rules about information are important in the information age Information privacy Information privacy Constitutional law Constitutional law Statutory and self-regulatory law, with Indian proposal under development Statutory and self-regulatory law, with Indian proposal under development Google Buzz settlement this weekGoogle Buzz settlement this week Cybersecurity Cybersecurity Risk-adjusted efforts for security, Indian proposal under development Risk-adjusted efforts for security, Indian proposal under development Encryption Encryption Current controversy on RIM/Blackberry, Skype, etc. Current controversy on RIM/Blackberry, Skype, etc. Reasons why the US decided to support strong crypto after intense debate in the 1990s Reasons why the US decided to support strong crypto after intense debate in the 1990s Disclaimer – I am not an expert on Indian law, but have been working on specific issues related to encryption and will have research paper this year on that Disclaimer – I am not an expert on Indian law, but have been working on specific issues related to encryption and will have research paper this year on that

Swire Background Law professor since 1990 Law professor since 1990 First Internet law writing 1992 First Internet law writing 1992 Chief Counselor for Privacy to President Clinton, Chief Counselor for Privacy to President Clinton, Big growth of Internet, and first U.S. national laws on medical privacy, financial privacy, Internet privacy Big growth of Internet, and first U.S. national laws on medical privacy, financial privacy, Internet privacy Wiretaps and other surveillance law for Internet (not just phones) Wiretaps and other surveillance law for Internet (not just phones) Encryption, big U.S. legal shift in 1999 Encryption, big U.S. legal shift in 1999 Special Assistant to President Obama, Special Assistant to President Obama, Issues included broadband, spectrum, privacy, cybersecurity Issues included broadband, spectrum, privacy, cybersecurity Theme: blend law, technology, business, government Theme: blend law, technology, business, government

U.S. Constitution 4 th Amendment to Constitution (in effect 1789) 4 th Amendment to Constitution (in effect 1789) Protects a reasonable expectation of privacy against government search Protects a reasonable expectation of privacy against government search Usually require warrant signed by judge to do search or seizure, such as entry to a home or business Usually require warrant signed by judge to do search or seizure, such as entry to a home or business Wiretaps for law enforcement generally require a warrant Wiretaps for law enforcement generally require a warrant Very complex case law Very complex case law

U.S. Constitution 1 st Amendment to Constitution (in effect 1789) 1 st Amendment to Constitution (in effect 1789) Strong rules against state limits on free speech or free press Strong rules against state limits on free speech or free press Important in case law about personal privacy Important in case law about personal privacy Common law protections for individual privacy Common law protections for individual privacy Public revelation of private facts, or false light about a person Public revelation of private facts, or false light about a person Intrusion on seclusion Intrusion on seclusion Protect a celebrity or other persons right of publicity – rule is that other person cant make money off of the celebritys name (no advertisement suggesting Tandulkar supports your product without his permission) Protect a celebrity or other persons right of publicity – rule is that other person cant make money off of the celebritys name (no advertisement suggesting Tandulkar supports your product without his permission) But 1 st Amendment guarantees free speech But 1 st Amendment guarantees free speech Newspaper can make money with Tandulkars name in headline Newspaper can make money with Tandulkars name in headline Many revelations of your personal life are protected speech Many revelations of your personal life are protected speech

Statutes for Private Sector Data In U.S. (and, I understand, India) no similar constitutional/human right to limit processing of personal information by private sector In U.S. (and, I understand, India) no similar constitutional/human right to limit processing of personal information by private sector European Convention on Human Rights, implemented in E.U. Data Protection Directive, does treat this as a human right European Convention on Human Rights, implemented in E.U. Data Protection Directive, does treat this as a human right U.S. Congress has passed statutes for some sensitive types of information U.S. Congress has passed statutes for some sensitive types of information HIPAA for medical privacy HIPAA for medical privacy Gramm-Leach-Bliley for financial services Gramm-Leach-Bliley for financial services Telecom Act of 1996 for data held by phone companies Telecom Act of 1996 for data held by phone companies Childrens Online Privacy Protection Act for information collected from under-13s Childrens Online Privacy Protection Act for information collected from under-13s Video Privacy Protection Act for movie rentals (Judge Bork) Video Privacy Protection Act for movie rentals (Judge Bork)

Statutory Protections & Fair Information Practices For HIPAA, European laws, and other possible private-sector laws, have FIPS For HIPAA, European laws, and other possible private-sector laws, have FIPS On Internet, often done by self-regulation – promises like statutes On Internet, often done by self-regulation – promises like statutes Notice – how the personal data will be used Notice – how the personal data will be used Choice – We have business partners who may have offers. Do you want your data shared? Choice – We have business partners who may have offers. Do you want your data shared? Opt in: dont use data unless affirmative consent; aps for FBOpt in: dont use data unless affirmative consent; aps for FB Opt out: use data unless customer says no (tick box already checked but you can uncheck it)Opt out: use data unless customer says no (tick box already checked but you can uncheck it) Access – see your medical or other records Access – see your medical or other records Data security -- doesnt help to have privacy rules if the 12 year old can hack in Data security -- doesnt help to have privacy rules if the 12 year old can hack in Accountability – consequences if dont follow the rules Accountability – consequences if dont follow the rules

Accountability HIPAA enforced by U.S. Department of Health and Human Services HIPAA enforced by U.S. Department of Health and Human Services Patient complaints Patient complaints Opportunity for hospital, etc., to fix problem Opportunity for hospital, etc., to fix problem Consent decrees & penalties Consent decrees & penalties $1 million penalty last month for hospital$1 million penalty last month for hospital Federal Trade Commission enforces against unfair and deceptive trade practices, notably including broken privacy promises Federal Trade Commission enforces against unfair and deceptive trade practices, notably including broken privacy promises This week, consent decree for Google Buzz This week, consent decree for Google Buzz New service, log in, Sweet, send me to Buzz!New service, log in, Sweet, send me to Buzz! G signed Gmail users up for this new social network, saying unless you ticked Nah, send me to my inboxG signed Gmail users up for this new social network, saying unless you ticked Nah, send me to my inbox Claim Google broke its privacy policy and violated the U.S.-E.U. Safe Harbor Claim Google broke its privacy policy and violated the U.S.-E.U. Safe Harbor Google promises now comprehensive privacy program, with 20 years of outside privacy audits Google promises now comprehensive privacy program, with 20 years of outside privacy audits

Beyond FIPS: Legal Conflicts Often have intersection of a privacy rule (dont share data) and some other public policy purpose (need to share data) Often have intersection of a privacy rule (dont share data) and some other public policy purpose (need to share data) An example from HIPAA: doctor or hospital, and someone arrives who did/might have broken the law. Should the doctor report to the police? An example from HIPAA: doctor or hospital, and someone arrives who did/might have broken the law. Should the doctor report to the police? Perspective of the doctor? Hippocratic Oath? Why have that? Perspective of the doctor? Hippocratic Oath? Why have that? Perspective of the police? Knife wound? IV drug user? Perspective of the police? Knife wound? IV drug user? History of this in HIPAA History of this in HIPAA This question raised to me this week in India by a national security official This question raised to me this week in India by a national security official When is disclosure required/permitted/forbidden? When is disclosure required/permitted/forbidden? Hi Kenesa: Ill be talking about encryption on April 11. Also,

Cybersecurity Protections Already saw that security is an element of privacy FIPS Already saw that security is an element of privacy FIPS Dont steal from my bank account Dont steal from my bank account Dont reveal my medical or surfing records Dont reveal my medical or surfing records Government agencies and dont reveal secret government information Government agencies and dont reveal secret government information Basic idea of many cybersecurity laws: Basic idea of many cybersecurity laws: Must have risk-adjusted security provisions Must have risk-adjusted security provisions HIPAA, GLB, U.S. government (FISMA) HIPAA, GLB, U.S. government (FISMA) Online policies promise reasonable security, so FTC enforcement Online policies promise reasonable security, so FTC enforcement Some common elements Some common elements Responsible officials Responsible officials Policies, training Policies, training Identify areas of greatest risk, e.g., bank accounts vs. marketing materials Identify areas of greatest risk, e.g., bank accounts vs. marketing materials Good idea to specify technology? 40-bit? Have a firewall? No. Good idea to specify technology? 40-bit? Have a firewall? No.

Summary Thus Far Constitutional provisions, especially about government intrusion into personal space Constitutional provisions, especially about government intrusion into personal space Statutes – privacy FIPs, risk-weighted cybersecurity Statutes – privacy FIPs, risk-weighted cybersecurity Beyond statutes to self regulation, but have enforcement Beyond statutes to self regulation, but have enforcement Interesting legal issues where conflicts between reasons to share data and to limit data flows Interesting legal issues where conflicts between reasons to share data and to limit data flows Goal of an overall regime where important things are protected and important data uses also succeed Goal of an overall regime where important things are protected and important data uses also succeed Next – current controversy about encryption Next – current controversy about encryption Idea of encryption: Alice sends to Bob; she wraps her text in code, and only he can decode it Idea of encryption: Alice sends to Bob; she wraps her text in code, and only he can decode it Current statute in India from 1998 – encryption bit length maximum 40 bits Current statute in India from 1998 – encryption bit length maximum 40 bits Current banking regulators – encryption bit length minimum 128 bits Current banking regulators – encryption bit length minimum 128 bits RIM/Blackberry and should messages be available to a government in the clear, in real time? RIM/Blackberry and should messages be available to a government in the clear, in real time? Hi Kenesa: Ill be talking about encryption on April 11. Also, Hi Kenesa: Ill be talking about encryption on April 11. Also,

Local switch Phone call Telecom Company Alice Bob

Local switch Phone call Telecom Company Alice Bob

Bob ISP Alice ISP %!#&*YJ#$ Hi Bob! Internet : Many Nodes betwee n ISPs Alice Bob %!#&*YJ#$

Problems with Weak Encryption Nodes between A and B can see and copy whatever passes through Nodes between A and B can see and copy whatever passes through Brute force attacks became more effective due to Moores Law; today, 40 bits very easy to break by many Brute force attacks became more effective due to Moores Law; today, 40 bits very easy to break by many From a few telcos to many millions of nodes on the Internet From a few telcos to many millions of nodes on the Internet Hackers Hackers Criminals Criminals Foreign governments Foreign governments Amateurs Amateurs Strong encryption as feasible and correct answer Strong encryption as feasible and correct answer Scaled well as Internet users went over one billion Scaled well as Internet users went over one billion

U.S. Experience 1990s Initial inter-agency victory for law enforcement (FBI) and national security (NSA), early-mid 90s Initial inter-agency victory for law enforcement (FBI) and national security (NSA), early-mid 90s Fear of loss of ability to wiretap Fear of loss of ability to wiretap Strong crypto within US Strong crypto within US Exports were controlled, on idea that crypto = munition Exports were controlled, on idea that crypto = munition Political system supports law enforcement and national security Political system supports law enforcement and national security Sept. 1999, shift in U.S. policy to allow strong crypto for export Sept. 1999, shift in U.S. policy to allow strong crypto for export I chaired WH working group on encryption 1999 I chaired WH working group on encryption 1999 Part of WH announcement 1999 of shift to strong crypto exports Part of WH announcement 1999 of shift to strong crypto exports Why the change to position contrary to view of law enforcement and security agencies? Why the change to position contrary to view of law enforcement and security agencies?

Crumbling of Weak Crypto Position Futility of weak crypto rules Futility of weak crypto rules Meeting with Senator or Congressman Meeting with Senator or Congressman Start the clock, how long to search for encryption download? Start the clock, how long to search for encryption download? Get PGP or other strong crypto in less than one minuteGet PGP or other strong crypto in less than one minute In world of weak crypto rules, effect on good guys and bad guys In world of weak crypto rules, effect on good guys and bad guys Bad guys – download PGP, stop the wiretap Bad guys – download PGP, stop the wiretap Good guys – follow the rules, legitimate actors get their secrets revealed Good guys – follow the rules, legitimate actors get their secrets revealed Banking, medical records, retail salesBanking, medical records, retail sales The militarys communications on the Internet, government agencies, critical infrastructureThe militarys communications on the Internet, government agencies, critical infrastructure

Objection – We Want the Keys The failure of the Clipper Chip The failure of the Clipper Chip Idea was that all users of strong crypto would escrow their keys with law enforcement Idea was that all users of strong crypto would escrow their keys with law enforcement Advocates for it had various safeguards, e.g., two people in the government had to agree for the key to be revealedAdvocates for it had various safeguards, e.g., two people in the government had to agree for the key to be revealed Very strong technical arguments against this Very strong technical arguments against this Some people didnt trust the governmentSome people didnt trust the government If do this for 200 nations worldwide, more people dont trust all the governmentsIf do this for 200 nations worldwide, more people dont trust all the governments Single point of failure – if the databank of keys is ever revealed, most/all communications can be readSingle point of failure – if the databank of keys is ever revealed, most/all communications can be read Personal communications Personal communications Corporate secrets Corporate secrets Government communications over the Internet Government communications over the Internet

Objection – We Want the Keys Even apart from key escrow, is useful to walk briefly through how public key encryption works, to show limits of requests for we want the keys Even apart from key escrow, is useful to walk briefly through how public key encryption works, to show limits of requests for we want the keys Basic approach of public key encryption Basic approach of public key encryption RSA a well-known instance of this approach RSA a well-known instance of this approach Alice and Bob each have a public key that anyone can wrap plaintext with Alice and Bob each have a public key that anyone can wrap plaintext with They each have a private key that is the only way to unwrap the encrypted text (unless someone tries brute force or other attack) They each have a private key that is the only way to unwrap the encrypted text (unless someone tries brute force or other attack) Wrapping like multiplication (multiply two huge prime numbers); unwrap is like division (find the two primes); cryptosystem is one-way function Wrapping like multiplication (multiply two huge prime numbers); unwrap is like division (find the two primes); cryptosystem is one-way function

Encrypt Encrypted message – Hi Bob! 1 Alice Bob's public key Bob's private key – Alice's local ISP Decrypt Hi Bob! – Bob's local ISP – Backbone provider Bob

Encrypt Encrypted message – Hi Fred! 2 Jill at Corporation A, Tata Public key of Corporation B – Reliance Private key of Corporation B, Reliance – Corporation A's ISP Decrypt Hi Fred! – Corporation B's ISP – Backbone provider Fred at Corporation B Reliance. Lawful process: (1)Ask Tata before encryption (2)Ask Reliance after decryption Lawful process: (1)Ask Tata before encryption (2)Ask Reliance after decryption

Limits to Getting the Keys In many instances, the keys are held by Alice and Bob In many instances, the keys are held by Alice and Bob No one else has the keys No one else has the keys That can include the software maker or service providerThat can include the software maker or service provider Can be encryption at rest – your laptopCan be encryption at rest – your laptop Keep a backup, or else computer brickifies Keep a backup, or else computer brickifies Can be encryption in communicationCan be encryption in communication You may be only one with access to the private key, in some systems select it yourself or it is created by a one- way function where the originator has no access You may be only one with access to the private key, in some systems select it yourself or it is created by a one- way function where the originator has no access Technical experts prefer/insist on this Technical experts prefer/insist on this

Objection – Isnt There a Back Door? As with Clipper Chip, law enforcement would love to have a back door As with Clipper Chip, law enforcement would love to have a back door Back door = designed security flaw in the system Back door = designed security flaw in the system May be that law enforcement only can read (Clipper Chip) May be that law enforcement only can read (Clipper Chip) May be that software/service provider can read (they promise security but keep a secret way in) May be that software/service provider can read (they promise security but keep a secret way in) Goal of back door: Goal of back door: All the good guys can get in (and know they can ask for it) All the good guys can get in (and know they can ask for it) No one else, including bad guys, get in: No one else, including bad guys, get in: Criminals and their hackersCriminals and their hackers Foreign governments and spy servicesForeign governments and spy services Ph.D. computer expertsPh.D. computer experts White hat hackers – people who detect flaws and tell CERTs and others about themWhite hat hackers – people who detect flaws and tell CERTs and others about them

The Likelihood of Back Doors? Lets think through the likelihood that widely-used strong encryption actually has back doors for some law enforcement/national security agencies Lets think through the likelihood that widely-used strong encryption actually has back doors for some law enforcement/national security agencies My view – much less likely than many people think My view – much less likely than many people think Swire writings on when secrecy helps/hurts security Swire writings on when secrecy helps/hurts security Key point is that secrecy not likely to be successful when there are many attackers, who can attack repeatedly, and can report successful attacks Key point is that secrecy not likely to be successful when there are many attackers, who can attack repeatedly, and can report successful attacks A simpler way to say this: Wikileaks A simpler way to say this: Wikileaks What likelihood that the FBI has been pervasively using a backdoor, with knowledge of software/services companies, and it hasnt leaked since 1999 approval of strong crypto? What likelihood that the FBI has been pervasively using a backdoor, with knowledge of software/services companies, and it hasnt leaked since 1999 approval of strong crypto? What likelihood that none of the smart Ph.Ds and white hat hackers have ever found an example of this? What likelihood that none of the smart Ph.Ds and white hat hackers have ever found an example of this? What brand effect on Microsoft (Bit Locker) and other global brands if they promised security and secretly broke it? What penalties for fraud? What brand effect on Microsoft (Bit Locker) and other global brands if they promised security and secretly broke it? What penalties for fraud?

Why We Dont Want Weak Cybersecurity Key point so far on encryption – weak crypto is weak cybersecurity Key point so far on encryption – weak crypto is weak cybersecurity A world full of attackers can and will read data sent over the Internet unless there is strong crypto A world full of attackers can and will read data sent over the Internet unless there is strong crypto Indian and all other governments have spoken strongly about the need for strong cybersecurity Indian and all other governments have spoken strongly about the need for strong cybersecurity Numerous quotes about the need for strong cybersecurity Numerous quotes about the need for strong cybersecurity Cyber warfare and threats to cyber security are fast becoming the next generation of threats. We need to make our cyber systems as secure and as non-porous as possible. Indian Defense Minister, Shri A.K. Antony, May 2010 Cyber warfare and threats to cyber security are fast becoming the next generation of threats. We need to make our cyber systems as secure and as non-porous as possible. Indian Defense Minister, Shri A.K. Antony, May 2010 Critical infrastructure open to attack Critical infrastructure open to attack Financial system Financial system Medical records and other sensitive personal information Medical records and other sensitive personal information Including records used in cross-border provision of servicesIncluding records used in cross-border provision of services

Lack of Strong Crypto as Legal Violation Strong crypto increasingly becoming legal requirement Strong crypto increasingly becoming legal requirement State of Massachusetts computer security law now in effect State of Massachusetts computer security law now in effect Strict penalties for loss of laptop or other loss of data unless strong encryption in placeStrict penalties for loss of laptop or other loss of data unless strong encryption in place U.S. funding of $19 billion for electronic health records U.S. funding of $19 billion for electronic health records Rules for reimbursementRules for reimbursement Strong encryption is expected to qualify for fundingStrong encryption is expected to qualify for funding More generally, numerous laws worldwide require cost-effective security measures, on pain of penalties More generally, numerous laws worldwide require cost-effective security measures, on pain of penalties What is adequate protection under E.U. law?What is adequate protection under E.U. law? For instance, Gramm-Leach-Bliley safeguards rule for U.S. financial servicesFor instance, Gramm-Leach-Bliley safeguards rule for U.S. financial services With strong crypto low-cost and pervasive, its absence violates many lawsWith strong crypto low-cost and pervasive, its absence violates many laws

Conclusion Privacy and cybersecurity are key information law issues for the information age Privacy and cybersecurity are key information law issues for the information age New generation of lawyers will become expert on these topics New generation of lawyers will become expert on these topics International Association of Privacy Professionals, from 140 people in 2001 to over 2000 people at the conference this year, over 7000 members (CIPP certification) International Association of Privacy Professionals, from 140 people in 2001 to over 2000 people at the conference this year, over 7000 members (CIPP certification) Intellectually interesting – law to match cutting-edge technology, trying to govern global data flows Intellectually interesting – law to match cutting-edge technology, trying to govern global data flows For lawyers who understand the needs of technology, business, and government, the chance to build a better Information Society For lawyers who understand the needs of technology, business, and government, the chance to build a better Information Society Come aboard for this interesting ride Come aboard for this interesting ride