Anti-Terrorism Legislation and Campus Computing Tracy Mitrano, Cornell Barbara Simons, Stanford Rodney Petersen, Maryland Copyright Tracy Mitrano, Rodney.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

The Basics for Information Technologies and Higher Education
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
Protection of privacy for all Students!
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Copyright 2006 Rubin Law Firm, LLC Drafting HIPAA Compliant Subpoenas & Discovery Presented by:RACHEL B. RUBIN Kansas Bar Association Annual Meeting June.
©The USA PATRIOT Act and You: A Legal Update Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford,
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
USA Patriot Act Presented by: Kisha Thompson. Objectives potential threats potential vulnerabilities potential legal exposure To determine how the USA.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
NC State University - March David Drooz1 USA PATRIOT Federal anti- terrorism law Effective October 26, 2001 December 31, 2005, sunset for some of.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
2/16/2010 The Family Educational Records and Privacy Act.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Class 7 Internet Privacy Law Your Digital Afterlife.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
ISSUES IN FBI LAW ENFORCEMENT RELATED TO COUNTER-TERRORISM INVESTIGATIONS Ranjana Natarajan National Security Clinic University of Texas School of Law.
Security Services Constitutional Issues in Private Security.
8/28/2015 The Family Educational Rights and Privacy Act (FERPA)  Also known as the Buckley Amendment.  Statute: 20 U.S.C. 1232g; Regulations: 34 CFR.
Newsgathering: Access to Meetings & Records. Access and the First Amendment How has the U.S. Supreme Court responded to claims that the First Amendment.
Class 11 Internet Privacy Law Government Surveillance.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
The Patriot Act Protecting the US or Violating People’s Freedoms.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
The USA PATRIOT Act An Overstatement of ALA Concerns?
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Bellwork Think about this…. Historical Event
Surveillance around the world
Courts System Search Warrants.
Legal Implications.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
HIPAA Pros - Disclosures
Laws Governing Police Surveillance
Electronic Surveillance, Post 9/11
The Right to Privacy vs. National Security
Presentation transcript:

Anti-Terrorism Legislation and Campus Computing Tracy Mitrano, Cornell Barbara Simons, Stanford Rodney Petersen, Maryland Copyright Tracy Mitrano, Rodney J. Petersen and Barbara Simons, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Dissecting the Patriot Act for Its Potential Impact on Colleges and Universities Tracy Mitrano Policy Advisor Co-Director of Computer Policy and Law Cornell University

Patriot Act of 2001 To deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes. H.R.3162 Sponsor: Rep Sensenbrenner, F. James, Jr.(introduced 10/23/2001) Latest Major Action: 10/26/2001 Signed by President

Title I: Enhancing Domestic Security Against Terrorism Section 103: Increased funding for the Technical Support Center –Addition to established funding for section 811 of the Antiterrorism and Effective Death Penalty Act of 1996 –$200,000,000 addition each year for

Title I: Enhancing Domestic Security Against Terrorism Section 105: Expansion of National Electronic Crime Task Force Initiative –Director of US Secret Service shall create national task force on the New York Electronic Crimes Task Force model –Operate throughout the United States –For the purpose of “preventing, detecting and investigating various forms of electronic crimes.”

Title II: Enhanced Surveillance Procedures Sharing of Information –Law enforcement with federal agencies Obtaining Records –FERPA –FISA –ECPA Rewording to Include Electronic Communications –“routing,” “network addresses,” “signaling” Creating New Categories –Computer Trespass Creating New Access –Rubber Stamp and National Service for Subpoenas –Deputizing owners and operators of IT Creating New Compensations –FBI compensate ISP –Civil actions for computer abuse over $5,000.

Section 203: Sharing of Sensitive Information Information gathered in criminal investigations by law enforcement agencies can be shared with federal intelligence services including INS, SS, CIA and FBI –“Criminal investigations” balanced against “unauthorized disclosure” –Includes telephone and Internet interceptions –Startling to Americans because of 1970’s Church Committee revelations about CHAOS and the violations of the CIA’s statutory provisions in its charter toward Vietnam anti-war protesters

Obtaining Records: Implications for Higher Education FERPA –Family Education Rights and Privacy Act FISA –Foreign Intelligence Surveillance Act ECPA –Electronic Communications Privacy Act

Family Education Rights and Privacy Act Patriot Act amends to permit educational institutions to disclose educational records to federal law enforcement officials without student consent: –If a U.S. Assistant Attorney General, or similarly ranked official, obtains a court order relevant to terrorism investigation –Institution is not liable, and need not maintain a record of the transaction –Distinct from the “health and safety” already existing exception

Ancillary to FERPA National Center for Education Statistics –Federal officials can have access to survey information, which is otherwise held confidential Monitoring of Foreign Students –Full implementation of existing Immigration and Naturalization Service law regarding information about students

Foreign Intelligence Surveillance Act Judicial “Rubber-Stamping” of subpoenas –Common language affecting both FISA and ECPA Extensive use of “Pen Registers” and other surveillance techniques for the electronic media –Common language affecting both FISA and ECPA –Rewording of language to include electronic media such as “routing,” “network addresses” and “wire or electronic communication” –No subpoena for recorded voice messages

Foreign Intelligence Surveillance Act Business Records –FBI can seize with a court order certain business records pursuant to a terrorism or intelligence investigation –Prohibits record keeper disclosure of FBI action

Access: ECPA Sections 2702 and 2703 Amended Section 210 and 216 of Patriot Act –Like FISA pen register, expands scope of subpoena to cover electronic communications With non-disclosure provisions and congressional oversight Section 222 provides for “reasonable compensation” for “reasonable expenses” to owner of network communications –Observers have raised questions about specificity of language and interpretation: Routing (addresses) or content (urls) not clear

Access: ECPA Sections and 2703 Amended Section 220 creates “nationwide service for search warrants for electronic evidence.” –Creates a “national subpoena” obtainable from magistrates in federal district courts which can be extended to any other jurisdiction –i.e. if FBI in Washington want something in California, they can apply for warrant in Washington federal court and have it apply to California, they do not specifically need to go to California federal court to obtain the warrant

Access: ECPA Section 2702 Amended Section 212 of Patriot Act: Voluntary Emergency disclosure of electronic communications –(3) a provider of remote computing service or electronic communications service to the public shall not knowingly divulge a record or other information pertaining to a subscriber or to a customer of such service, EXCEPT

Exceptions to Section 212 Privilege (C) If a provider reasonably believes that an emergency involving immediate danger of death or serious physical injury to any person requires disclosure of the information without delay… Additional exception include: customer consent; necessary operations personnel; provider property protection, to a government entity and (mysteriously) any person “other than a government entity.”

Access: ECPA Section 2703 Amended Section 212 of Patriot Act: Required disclosure of customer communications or records: –To government with appropriate subpoena, court order or letter from Attorney General (already existing “hostile nation provision” with its own requirements) Telephone connection, session times and duration, subscriber number or identity, including any temporarily assigned network address –Government officials may seek stored voic messages without wiretap authorization

Access: ECPA Section 2510 Amended Section 217 (1) of Patriot Act: Computer Trespass –(A) person who accesses a protected computer without authorization and thus has no reasonable expectation of privacy in any communication transmitted to, through, or from the protected computer –(B) does not include a person known by the owner or operator of the protected computer to have an existing contractual relationship with the owner or operator of the protected computer for access to all or part of the protected computer

Access: ECPA Section 2511(2) Amended Section 217 (2) of Patriot Act: –(i) It shall not be unlawful under this chapter for a person acting under color of law to intercept the wire or electronic communications of a computer trespasser transmitted to, though, or from the protected computer…

Access: ECPA Section 2511(2) Amended Section 217 (2) of Patriot Act: –If – Owner/operator “authorizes” Owner/operator acts “under color of law” (when a person acts or purports to act in the performance of official duties under any law, ordinance or regulation) and lawfully engaged in investigation Owner/operator has “reasonable grounds” to believe information is relevant to an investigation Owner/operator acquires only trespass communications, and no others.

Nota Bene! Sections 210, 212, 217 (1) and (2) of the Patriot Act that amend sections 2510, 2511, 2702 and 2703 of the Electronic Communications Privacy Act have nothing to do with terrorism per se – no particular motive or citizenship or immigration status is required to make it actionable. Sections 217(1) and (2) simply alleviates owners and operators of protected computers of potential ECPA liability for their investigations and/or disclosures under certain circumstances.

Nota Bene! Moreover, these new provisions make “hacking” (more clearly) illegal!* –Criminal offense with criminal sanctions –Hackers face civil liability with damages beginning at $5,000 –*Section 1030 of Title 18 of USC criminal code “computer abuse;” scope and damage rights now clearer without fear of ECPA liability** –**But, case law has not refined statutory definition of a “protected computer” as defined under section 1030

Problem Areas for Potential Abuses and Concerns Constitutional –First Amendment; speech –Fourth, Fifth and Sixth criminal procedure –Separation of powers (agencies as 4 th branch) Privacy –Colleges/University Autonomy –FISA “business records” –FERPA new exception –Content and Exceptions to disclosure Federalism –National service Case law definitions –“Public” –“Emergency” –“Color of law” –“Protected Computer” –“Network Addresses,” “Routing,” “Customer Information” Deputized “Owner” – Policy and Procedure

Small Consolation Sunset Provisions: –Emergency segments of the ECPA will expire without further congressional action after four years. –If took only a matter of weeks to enact this legislation. –If Congress wants to extend, it easily can do so in the future –Whether colleges and universities care will depend on how the politics between them and law enforcement/government over these provisions play out over time.

What Must Be Done Work together to address crime and terrorism Maintain free speech and inquiry Hold forth on our constitutional protections Import that sensibility of constitutional protections and due process into internal policies and procedures Watch and react politically depending on how this legislation makes its way into the daily life of American society

Conclusion Where angels have feared to tread, let not fools rush in…