Christopher Boam Counsel for Internet & Global Ecommerce MCI, Inc., International Affairs on behalf of WITSA The World Information Technology and Services.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

QMUL Cloud Legal Project Cloud Legal Project: Began in Oct 2009 as 3 year project - funded by Microsoft. Focus? To address legal and regulatory issues.
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Northside I.S.D. Acceptable Use Policy
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
INTERNATIONAL UNION FOR CONSERVATION OF NATURE. 2 Implemented in 12 countries of Africa, Asia, Latin America and the Middle East, through IUCN regional.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Net Neutrality, What Else? Wim Nauwelaerts Partner Hunton & Williams.
Environmental Management System (EMS)
CHAPTER 4 E-ENVIRONMENT
Cyber bullying and internet safety Parents meeting: staying safe online.
CIPA Update. FOR SCHOOLS – By July 1, 2012, amend your existing Internet safety policy (if you have not already done so) to provide for the education.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Unlawful Internet Gambling Enforcement Act Final Rule Joseph Baressi June 3, 2009.
Developing a Records & Information Retention & Disposition Program:
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
Business Plug-In B7 Ethics.
E-safety across West Midlands Schools Stephanie Davies WMnet.
Data Protection and Cybercrime The dilemma of Internet Service Providers CEENET Workshop 22 September 2002 Joe McNamee Regulatory Affairs Manager, EuroISPA.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
Self Assessment Feedback Logistics R Us GOLD Member.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
THE POTENTIAL FOR EFFECTIVE WEB CONTENT CONTROL BASED ON CURRENT TECHNOLOGY Carolyn Watters and Michael Shepherd Web Information Filtering Lab Faculty.
Internet Safety Guide for Teens Don’t give out personal information about yourself, your family situation, your school, your telephone number, or your.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
NRCCL (University of Oslo, Faculty of Law) Hyperlinks and search engines(I) Jon Bing Norwegian Research Center for Computers and Law Master Lecture 16.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Module 9 Configuring Messaging Policy and Compliance.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Data Protection STFC Presentation to PPD Senior Staff 26/11/2009 FoI/DP team.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
FAQs about the new regulatory framework Lucy Rhodes
Promoting Good Practices in Domain Name Registration Supported by.
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
Client/User Analysis Website Design. 2 Questions to be answered: What is the purpose of the site? What is the purpose of the site? Who is the site for?
Energy Agency of the Republic of Serbia
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
DOC Web Policies & Best Practices Jennifer Hammond NOAA Research WebShop 2002 August 7, 2002.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
1 Pollutant Release & Transfer Registers The Canadian Government Experience National Workshop on PRTRs Santiago, Chilé - May 29, 2002.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
August 31, The Etowah County School District’s electronic network is available to all students and employees. The goal is to foster learning environments.
E-Safety Parent Talk Helping to keep your children safe online.
They Need You - to encourage them to make good choices. - to teach them about how to stay safe. - to help them to recognise scams. - to encourage good.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
Moving to BYOD Gary Audin 1.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Agencija za zaštitu ličnih/osobnih podataka u Bosni i Hercegovini Агенција за заштиту личних података у Босни и Херцеговини Personal Data Protection Agency.
Data Minimization Framework
E-Safety Briefing
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Current Privacy Issues That May Affect Your Credit Union
Importance of Law and Policies in the Environmental Management System
Good Spirit School Division
Welcome to the E Safety Workshop
GDPR PERSONDATAFORORDNINGEN I PRAKSIS
What does that have to do with me?
Getting Ready For GDPR Simon Marks Director
Presentation transcript:

Christopher Boam Counsel for Internet & Global Ecommerce MCI, Inc., International Affairs on behalf of WITSA The World Information Technology and Services Alliance For InfoCom, Panama City, Panama (June 18, 2003) Slide 1

For InfoCom, Panama City, Panama (June 18, 2003) Slide 2 Users on the Internet – Sept 2002 CAN/US M Europe M Asia/Pac M Latin Am * M Africa M Mid-east M Total M (Source: * Includes Central and South America

For InfoCom, Panama City, Panama (June 18, 2003) Slide 3 Internet User Trends Estimates revised 4/2003 (Source: Nua Internet Surveys + V.Cerf projections)

For InfoCom, Panama City, Panama (June 18, 2003) Slide 4 Data Preservation vs. Data Retention Mandatory data retention requirements (for service providers to “pool” network data for law enforcement investigative purposes) pose significant risks by:Mandatory data retention requirements (for service providers to “pool” network data for law enforcement investigative purposes) pose significant risks by: ­requiring companies to create enormous data pools – potential targets for misuse; ­requiring security measures at significant cost; and ­ignoring technical infeasibility to effectively search retained data. The issue of whether to impose mandatory data retention should be addressed in a manner that reflects:The issue of whether to impose mandatory data retention should be addressed in a manner that reflects: ­the limited context in which retained data would be useful to law enforcement; ­the enormous risks and possible costs to service providers; and ­the successful implementation of more efficient and effective investigative tools such as data preservation.

For InfoCom, Panama City, Panama (June 18, 2003) Slide 5 Content Liability and “Blocking” Legislation and regional codes of practice often fail to embody three key components with regard to the liability of a hosting (or non-hosting) service provider:Legislation and regional codes of practice often fail to embody three key components with regard to the liability of a hosting (or non-hosting) service provider: ­First, there must be recognition of the fact that a service provider that does not host the alleged illicit content has little if any effective technical ability to block it. And forcing an ISP to attempt a block can often exacerbate the problem. ­When a service provider does host material found to be illicit, there needs to be a process by which law enforcement makes the determination as to what is “illegal,” etc., based upon a legal or regulatory scheme that defines such material. ­And finally, there must be formal adherence to process by law enforcement in requiring ISPs to “takedown” designated material in order to limit liability for acting in accordance with the order.

For InfoCom, Panama City, Panama (June 18, 2003) Slide 6 Council of Europe Declaration “Freedom of Communication on the Internet” (May 2003) urges member states:“Freedom of Communication on the Internet” (May 2003) urges member states: ­1.To refrain from subjecting online content to tougher restrictions than those imposed on other means of content delivery. ­2.To encourage self- or co-regulation of Internet content. ­3. Not to block or filter content or deny public access to it, with the exception of filters aimed at protecting children. ­4. To encourage universal access to Internet communications and information services on a nondiscriminatory basis at reasonable cost. ­5. Not to subject the provision of online services to special authorization schemes solely on the ground of the means of transmission used. ­6. Not to hold ISPs liable for Internet content when they merely transmitted information or provided access. However, the CoE said, ISPs could be held co-responsible if they didn't take down sites when they became aware of their illegal nature. ­7. To respect the decision of users to remain anonymous online. (Located at: )

For InfoCom, Panama City, Panama (June 18, 2003) Slide 7 Data Protection and Privacy Development of new or improved DP standards and legislation should focus on four key imperatives:Development of new or improved DP standards and legislation should focus on four key imperatives: ­Relevant Risks – Create rules that focus on the risk attributable to misuse of certain types of data in setting the level of protection for that data; ­Consistent Implementation – Ensure that national legislation cannot embellish regional framework or other international DP requirements with added protections that frustrate the possibility of cross-border compliance; ­Flexible Compliance Options – Enable regulatory authorities to review and give the “stamp of approval” to appropriate industry and NGO- developed compliance contracts, codes and procedures; and ­Consultation – Industry understands that its role in DP compliance supports its mission to achieve and retain customers, and thus, industry consultation at all levels of DP legislative development will improve compliance and enforcement.

For InfoCom, Panama City, Panama (June 18, 2003) Slide 8 Privacy “Self Help” Ask questions – Before you give a Web site your address, phone number, home address, check out their privacy policy or them a question. If you don’t get a good answer, move on.Ask questions – Before you give a Web site your address, phone number, home address, check out their privacy policy or them a question. If you don’t get a good answer, move on. Protect yourself from Harvesters – People that want to send you Spam will look for your address anywhere and everywhere. Consider creating a “disposable” address to use in public postings, online purchases and online chatting.Protect yourself from Harvesters – People that want to send you Spam will look for your address anywhere and everywhere. Consider creating a “disposable” address to use in public postings, online purchases and online chatting. When it comes to Spam, don’t talk to strangers – Which means, if you get Spam, and you’ve never heard of the company or sender, don’t waste your time sending them an to take you off their list. Unfortunately, 9 times out of 10, they’re simply hoping you respond so that they can see your address is “live” and send you more Spam.When it comes to Spam, don’t talk to strangers – Which means, if you get Spam, and you’ve never heard of the company or sender, don’t waste your time sending them an to take you off their list. Unfortunately, 9 times out of 10, they’re simply hoping you respond so that they can see your address is “live” and send you more Spam. Never ever use a social security or government ID number online – Most reputable online companies both in the US and abroad will never ask you for it, and if they do, they’ll give you several other options for you to identify yourself. You don’t want that number misused, online or anywhere else, so don’t use it – period. If somebody online says you need to use it, then take your business elsewhere.Never ever use a social security or government ID number online – Most reputable online companies both in the US and abroad will never ask you for it, and if they do, they’ll give you several other options for you to identify yourself. You don’t want that number misused, online or anywhere else, so don’t use it – period. If somebody online says you need to use it, then take your business elsewhere.

For InfoCom, Panama City, Panama (June 18, 2003) Slide 9 Christopher Boam Counsel for Internet & Global Ecommerce MCI, Inc., International Affairs on behalf of WITSA The World Information Technology and Services Alliance