SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
E-services via the Internet and
compliance with the law
Vytautas ČYRAS
Vilnius University
Faculty of Mathematics and Informatics
Vytautas.Cyras@mif.vu.lt

Friedrich LACHMAYER
Vienna
www.legalvisualization.com
Druskininkai, 5-7.12. 2013
Contents
1. Defining „compliance‟
– e-services are in the background
•

Each artefact can cause harm, for example:
–
–

A message can cause hart attack
A pencil can serve as a murder tool

2. Legal machines
– E-proceedings via formulars in the Internet
•

E.g. tax declarations

– Making the architecture transparent
2
1. Compliance

3
Compliance problem [Julisch 2008]
“Sell” compliance, not security.
Given an IT system S and an externally imposed set R of (legal) requirements.
1. Make S comply with R
2. Provide assurance that auditor will accept as evidence of the compliance of
S with R
1. Formalise R
2. Identify which sub-systems of
S are affected by R
3. Determine what assurance
has to be provided to show
that S is compliant with R
4. Modify S to become compliant
with R and to provide the
necessary assurance

4
Comparison
Artificial Intelligence.
Alan Turing

Informatics and law.
Compliance

• “Can machines think?”

• “Does a software system
comply with law?”
Definitions of the meaning of the terms:
• „law‟ and „comply‟
• „machine‟ and „think‟
Both questions
raise a (philosophical) problem
are ill formulated in the sense that:
- cannot be answered „yes‟/„no‟
- not a mathematical „decidable‟/„undecidable‟ problem
Goal of AI: “enhancing rather than simulating human intelligence”
- not to start programming human intelligence (and compliance)

5
Holistic view to compliance

Rasmussen
2005;
IT GRC
COSO

COBIT, ISO 17779, GORE

Regulation and IT alignment framework (Bonazzi et al. 2009)
6
Machine-based or machineassisted decision making?
A case
factual
situation

Plantiff

Judge-machine
Formalistic approach to the law
Mechanistic subsumption

Defendant

Law

No!
Legal
decision
7
Different kinds of norms
Regimes, paradigms, ethics, professional morality

The Ought
realm

Rules 1.
Technical

Rules 2.
Legal

Factual
limitations, e.g. to
fence the grass.

obligations,
permissions, pro
hibitions .

Rules 3.
Reputation
economic,
social,
civic.

…

Rules n.
Energy

Authorities: procedures, e.g.
online dispute resolution

The Is
realm

Avatar

8
Principles of construction
Core ontology
Special ontology 1

Special ontology 2

Rules 1.
Technical

Rules 2.
Legal

Special ontology 3 … Special ontology n

Rules 3.
Reputation

…

Rules n.
Energy

Different modes of effect or relevance
Barrier.
Strict

Occasional.
Probability p%

“Entering without
Stag
stop is refused”

e

“Policeman fines you for
stepping the grass”.
But this happens with
p% probability – if you
do not succeed.

…

Step-by-step.

“Reputation/energy is
decreased by 10 points”

9
Technical rules
You cannot violate them.
Causation is formalised with the modus ponens rule:
(1) Rule(P→Q)
(2) Fact(P)
Conclusion. Fact(Q)
Examples
(pincode → money) & pincode

•
•
•

money

if door = closed then factual_hindrance
if number_ISI_articles < 2 then professor
Constraints in technical standards

Door is
closed

Room
10
Legal rules
You can violate them.
(1) Permission(P iff Q)

Norm(¬P → ¬Q)
P denotes “green”,
Q denotes “cross”,
¬P denotes “red”

Example. green iff cross
( red → do_not_cross )
(2) Fact(¬P)
– red is on
(3) Fact(Q)
– you cross the street, nevertheless
Interpretation. You are simply a bad guy. Nobody can stop
you crossing.
A punishment procedure is exercised with probability
p%, e.g. by a policeman.
11
Reputation/energy rules
Violating rules decreases your energy points.
(1) Norm(¬A)
(2) Fact(A)
Conclusion. Energy reduction by 10%
Formalisation:

Norm(¬A), A
------------------A := 0.9*A

Energy is reduced to A1, then A2 and so on to An. And at last ¬A.
A
A1
A2
An
¬A

12
Subsuming a fact to a legal term
Legal term
A:

Murder

Manslaughter

Aiding
suicide

Death
sentence

Military
act

instance_of
Fact a:

Dead body

A, C → D

...
Legal term:

A

2) Normative
subsumption

A→B

1) Terminological
subsumption

Faktas:

a

B(a)

Conclusion, judgme
nt

13

...
2. Legal machines

14
Machines produce legal acts
(institutional facts)
1)

Actor
or

Examples:
• vending machines
• traffic lights
• computers in organisations
• workflows

• human being
• machine

2)

Actor

Action

Actor

15
Factual acts (raw facts)
„Alice puts a coin in her piggybank‟

Condition

Actor
• human being
• machine

Action

Effect

16
Legal acts: impositio
• „Chris puts a coin in a ticket machine‟
• „Policeman raises hand‟
Legal
condition

Condition

Legal
actor

Actor
• human being
• machine

Legal
action

Action

Legal
effect

Effect

Institutional facts and legal institutions [McCormick & Weinberger 1992]

17
Scenario
•

•

•
•

The fictitious
company, “KnowWhere” offers a
“Person Locator App” which can
track the user‟s location who has
installed the app on his smartphone.
The app accesses the GPS module
of the smartphone and sends the
coordinates and a specific Facebook
ID to the server.
KnowWhere relies on Google Maps.
The “Person Locator Portal”
–
–

Shows maps with user positions and
Facebook IDs
The server collects all user locations that
belong to the given group and uses
Google Maps to highlight their positions
on the map.

(Oberle et al. 2013)

18
Legal reasoning
Question 1. Which provision is applicable?
– Federal Data Protection Act. “Personal data”

Question 2: Is the disclosure of user data to Google lawful?
Answer: No.
– Question 2.1: Is permission or order by this Act or other law
provided? No.
– Question 2.2: Has the data subject provided consent?
No. The users are not informed about the transfer of personal data from
KnowWhere to Google. Therefore, effective consent is not given.

Accept)

Conclusion: the data transfer from KnowWhere to Google can
neither be justified by law nor by consent. Therefore the
conduct of KnowWhere violates data privacy law.
19
Difficulties inherent in law
1.

2.
3.
4.
5.
6.

Abstractness of norms. Norms are formulated (on
purpose) in abstract terms.
Principle vs. rule. The difference in regulatory philosophy
between the US and other countries.
Open texture. H. L. A. Hart‟s example of “Vehicles are
forbidden in the park”.
The myriad of regulatory requirements. Compliance
frameworks are multidimensional.
Teleology. The purpose of a legal norm usually can be
achieved by a variety of ways. They need not to be listed in
a statute and specified in detail.
Legal interpretation methods. The meaning of a legal text
cannot be extracted from the sole text. Apart from the
grammatical interpretation, other methods can be
invoked, such as systemic and teleological interpretation.
20
3. Legal machines
and transparency

21
Changeover

Text culture

Machine culture

22
Technical changeover ‘legal text’ ‘program’
General Norm
Law
Decree

Legal machine
program
No acess

Published

Text culture

Machine culture
Technical changeover ‘legal text’ ‘program’
General Norm
Law
Decree

Legal machine
program
No acess

Published

Legal machine
Ticket machine
Form proceedings

 Problems
General Norm
Law
Decree

1. Transparency

Individual Norm
Court judgement
Administrative decision

2. Ex-post legal
protection

Published

These 2 means were not from the beginning.
They were trained in the course of time, but
now come as a standard.

Party

Text culture
Technical changeover ‘legal text’ ‘program’
General Norm

Legal machine
program

Law
Decree

No acess

1. Transparency

Individual Norm
Court judgement
Administrative decision

2. Ex-post legal
protection

Published

However, these 2 standards are missing
in the beginning of machine culture.

Party

Text culture

Machine culture
Legal machine
program

1. Lack of
transparency

These 2 standards are missing in
the beginning of machine culture.
Therefore we address them.

Legal machine
Ticket machine
Form proceedings

Party

2. No ex-ante
legal protection

No acess
Requirement 1:
Legal machine
program

Die Programme für
Rechtsmaschinen sind
zumindest von ihrer Architektur
her zugänglich zu machen

1. Lack of
transparency

Requirement 2:
Legal machine programs shall
provide a trained, effective and
rapid legal protection
Example1. The law provides 10 variations but
the program contains only 9.
Example 2. A ticket machine gives no money
back. This makes a problem for customers
expecting change from banknotes.

Legal machine
Ticket machine
Form proceedings

Party

2. No ex-ante
legal protection

No acess
Goal:
Equal standard of transparency and legal protection
in text culture and machine culture
Technical transformation ‘legal text’ ‘program’
General Norm

Legal machine
program

Law
Decree

No acess

Individual Norm
Court judgement
Administrative decision

Party

Text culture

1. Lack of
transparency

Legal machine
Ticket machine
Form proceedings

Party

Machine culture

2. No ex-ante
legal protection

1. Transparency

2. Ex-post legal
protection

Published
Thank you

Vytautas.Cyras@mif.vu.lt
Vytautas.Cyras@mif.vu.lt

31

Mais conteúdo relacionado

Mais procurados

Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]Kamal Thakur
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000Karnika Seth
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000 RAJ ANAND
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Parth Patel
 

Mais procurados (13)

Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 

Destaque

Edifici Intelligenti, Comunità rinnovabili
Edifici Intelligenti, Comunità rinnovabiliEdifici Intelligenti, Comunità rinnovabili
Edifici Intelligenti, Comunità rinnovabiliIuri Baldi
 
Compliance and software transparency for legal machines
Compliance and software transparency for legal machinesCompliance and software transparency for legal machines
Compliance and software transparency for legal machinesVytautas Čyras
 
Technical rules and legal rules in online virtual worlds
Technical rules and legal rules in online virtual worldsTechnical rules and legal rules in online virtual worlds
Technical rules and legal rules in online virtual worldsVytautas Čyras
 
Transforming Legal Rules into Online Virtual World Rules: A Case Study in the...
Transforming Legal Rules into Online Virtual World Rules: A Case Study in the...Transforming Legal Rules into Online Virtual World Rules: A Case Study in the...
Transforming Legal Rules into Online Virtual World Rules: A Case Study in the...Vytautas Čyras
 
User needs and legally ruled collaboration in the VirtualLife virtual world p...
User needs and legally ruled collaboration in the VirtualLife virtual world p...User needs and legally ruled collaboration in the VirtualLife virtual world p...
User needs and legally ruled collaboration in the VirtualLife virtual world p...Vytautas Čyras
 
Transforming legal rules into virtual world rules: a case study in the Virtua...
Transforming legal rules into virtual world rules: a case study in the Virtua...Transforming legal rules into virtual world rules: a case study in the Virtua...
Transforming legal rules into virtual world rules: a case study in the Virtua...Vytautas Čyras
 
IRIS 2008. Teleological Networks in Normative Systems
IRIS 2008. Teleological Networks in Normative SystemsIRIS 2008. Teleological Networks in Normative Systems
IRIS 2008. Teleological Networks in Normative SystemsVytautas Čyras
 
Towards Multidimensional Rule Visualizations. Conference RULES 2013 presentation
Towards Multidimensional Rule Visualizations. Conference RULES 2013 presentationTowards Multidimensional Rule Visualizations. Conference RULES 2013 presentation
Towards Multidimensional Rule Visualizations. Conference RULES 2013 presentationVytautas Čyras
 
Compliance and Software Transparency for Legal Machines. Conference Baltic DB...
Compliance and Software Transparency for Legal Machines. Conference Baltic DB...Compliance and Software Transparency for Legal Machines. Conference Baltic DB...
Compliance and Software Transparency for Legal Machines. Conference Baltic DB...Vytautas Čyras
 
Visualising Legal Meaning in Legal Informatics. Workshop DatAMSS 2014 presen...
Visualising Legal Meaning in Legal Informatics. Workshop  DatAMSS 2014 presen...Visualising Legal Meaning in Legal Informatics. Workshop  DatAMSS 2014 presen...
Visualising Legal Meaning in Legal Informatics. Workshop DatAMSS 2014 presen...Vytautas Čyras
 
Convegno sulle detrazioni fiscali in edilizia
Convegno sulle detrazioni fiscali in ediliziaConvegno sulle detrazioni fiscali in edilizia
Convegno sulle detrazioni fiscali in ediliziaIuri Baldi
 

Destaque (12)

Teste
TesteTeste
Teste
 
Edifici Intelligenti, Comunità rinnovabili
Edifici Intelligenti, Comunità rinnovabiliEdifici Intelligenti, Comunità rinnovabili
Edifici Intelligenti, Comunità rinnovabili
 
Compliance and software transparency for legal machines
Compliance and software transparency for legal machinesCompliance and software transparency for legal machines
Compliance and software transparency for legal machines
 
Technical rules and legal rules in online virtual worlds
Technical rules and legal rules in online virtual worldsTechnical rules and legal rules in online virtual worlds
Technical rules and legal rules in online virtual worlds
 
Transforming Legal Rules into Online Virtual World Rules: A Case Study in the...
Transforming Legal Rules into Online Virtual World Rules: A Case Study in the...Transforming Legal Rules into Online Virtual World Rules: A Case Study in the...
Transforming Legal Rules into Online Virtual World Rules: A Case Study in the...
 
User needs and legally ruled collaboration in the VirtualLife virtual world p...
User needs and legally ruled collaboration in the VirtualLife virtual world p...User needs and legally ruled collaboration in the VirtualLife virtual world p...
User needs and legally ruled collaboration in the VirtualLife virtual world p...
 
Transforming legal rules into virtual world rules: a case study in the Virtua...
Transforming legal rules into virtual world rules: a case study in the Virtua...Transforming legal rules into virtual world rules: a case study in the Virtua...
Transforming legal rules into virtual world rules: a case study in the Virtua...
 
IRIS 2008. Teleological Networks in Normative Systems
IRIS 2008. Teleological Networks in Normative SystemsIRIS 2008. Teleological Networks in Normative Systems
IRIS 2008. Teleological Networks in Normative Systems
 
Towards Multidimensional Rule Visualizations. Conference RULES 2013 presentation
Towards Multidimensional Rule Visualizations. Conference RULES 2013 presentationTowards Multidimensional Rule Visualizations. Conference RULES 2013 presentation
Towards Multidimensional Rule Visualizations. Conference RULES 2013 presentation
 
Compliance and Software Transparency for Legal Machines. Conference Baltic DB...
Compliance and Software Transparency for Legal Machines. Conference Baltic DB...Compliance and Software Transparency for Legal Machines. Conference Baltic DB...
Compliance and Software Transparency for Legal Machines. Conference Baltic DB...
 
Visualising Legal Meaning in Legal Informatics. Workshop DatAMSS 2014 presen...
Visualising Legal Meaning in Legal Informatics. Workshop  DatAMSS 2014 presen...Visualising Legal Meaning in Legal Informatics. Workshop  DatAMSS 2014 presen...
Visualising Legal Meaning in Legal Informatics. Workshop DatAMSS 2014 presen...
 
Convegno sulle detrazioni fiscali in edilizia
Convegno sulle detrazioni fiscali in ediliziaConvegno sulle detrazioni fiscali in edilizia
Convegno sulle detrazioni fiscali in edilizia
 

Semelhante a (DAMPS 2013) E-services via the Internet and compliance with the law. File 20131203-Druskininkai-Cyras-EServicesCompliance-slides

The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
20131009 aon security breach legislation
20131009 aon security breach legislation20131009 aon security breach legislation
20131009 aon security breach legislationJos Dumortier
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industryRohana K Amarakoon
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyEzraGray1
 
092012UNDERSTANDING.docx
092012UNDERSTANDING.docx092012UNDERSTANDING.docx
092012UNDERSTANDING.docxhoney725342
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...Vsevolod Shabad
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...Mumbai B.Sc.IT Study
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 
On Mapping Values in AI Governance
On Mapping Values in AI GovernanceOn Mapping Values in AI Governance
On Mapping Values in AI GovernanceGiovanni Sileno
 
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...John Nas
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studiesKirtesh Dudawat
 

Semelhante a (DAMPS 2013) E-services via the Internet and compliance with the law. File 20131203-Druskininkai-Cyras-EServicesCompliance-slides (20)

The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
20131009 aon security breach legislation
20131009 aon security breach legislation20131009 aon security breach legislation
20131009 aon security breach legislation
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industry
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
092012UNDERSTANDING.docx
092012UNDERSTANDING.docx092012UNDERSTANDING.docx
092012UNDERSTANDING.docx
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...State regulation of information protection in the cloud - international and K...
State regulation of information protection in the cloud - international and K...
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
On Mapping Values in AI Governance
On Mapping Values in AI GovernanceOn Mapping Values in AI Governance
On Mapping Values in AI Governance
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studies
 

Último

Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPCeline George
 
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEMISSRITIMABIOLOGYEXP
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 

Último (20)

Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERP
 
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFEPART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
PART 1 - CHAPTER 1 - CELL THE FUNDAMENTAL UNIT OF LIFE
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 

(DAMPS 2013) E-services via the Internet and compliance with the law. File 20131203-Druskininkai-Cyras-EServicesCompliance-slides

  • 1. E-services via the Internet and compliance with the law Vytautas ČYRAS Vilnius University Faculty of Mathematics and Informatics Vytautas.Cyras@mif.vu.lt Friedrich LACHMAYER Vienna www.legalvisualization.com Druskininkai, 5-7.12. 2013
  • 2. Contents 1. Defining „compliance‟ – e-services are in the background • Each artefact can cause harm, for example: – – A message can cause hart attack A pencil can serve as a murder tool 2. Legal machines – E-proceedings via formulars in the Internet • E.g. tax declarations – Making the architecture transparent 2
  • 4. Compliance problem [Julisch 2008] “Sell” compliance, not security. Given an IT system S and an externally imposed set R of (legal) requirements. 1. Make S comply with R 2. Provide assurance that auditor will accept as evidence of the compliance of S with R 1. Formalise R 2. Identify which sub-systems of S are affected by R 3. Determine what assurance has to be provided to show that S is compliant with R 4. Modify S to become compliant with R and to provide the necessary assurance 4
  • 5. Comparison Artificial Intelligence. Alan Turing Informatics and law. Compliance • “Can machines think?” • “Does a software system comply with law?” Definitions of the meaning of the terms: • „law‟ and „comply‟ • „machine‟ and „think‟ Both questions raise a (philosophical) problem are ill formulated in the sense that: - cannot be answered „yes‟/„no‟ - not a mathematical „decidable‟/„undecidable‟ problem Goal of AI: “enhancing rather than simulating human intelligence” - not to start programming human intelligence (and compliance) 5
  • 6. Holistic view to compliance Rasmussen 2005; IT GRC COSO COBIT, ISO 17779, GORE Regulation and IT alignment framework (Bonazzi et al. 2009) 6
  • 7. Machine-based or machineassisted decision making? A case factual situation Plantiff Judge-machine Formalistic approach to the law Mechanistic subsumption Defendant Law No! Legal decision 7
  • 8. Different kinds of norms Regimes, paradigms, ethics, professional morality The Ought realm Rules 1. Technical Rules 2. Legal Factual limitations, e.g. to fence the grass. obligations, permissions, pro hibitions . Rules 3. Reputation economic, social, civic. … Rules n. Energy Authorities: procedures, e.g. online dispute resolution The Is realm Avatar 8
  • 9. Principles of construction Core ontology Special ontology 1 Special ontology 2 Rules 1. Technical Rules 2. Legal Special ontology 3 … Special ontology n Rules 3. Reputation … Rules n. Energy Different modes of effect or relevance Barrier. Strict Occasional. Probability p% “Entering without Stag stop is refused” e “Policeman fines you for stepping the grass”. But this happens with p% probability – if you do not succeed. … Step-by-step. “Reputation/energy is decreased by 10 points” 9
  • 10. Technical rules You cannot violate them. Causation is formalised with the modus ponens rule: (1) Rule(P→Q) (2) Fact(P) Conclusion. Fact(Q) Examples (pincode → money) & pincode • • • money if door = closed then factual_hindrance if number_ISI_articles < 2 then professor Constraints in technical standards Door is closed Room 10
  • 11. Legal rules You can violate them. (1) Permission(P iff Q) Norm(¬P → ¬Q) P denotes “green”, Q denotes “cross”, ¬P denotes “red” Example. green iff cross ( red → do_not_cross ) (2) Fact(¬P) – red is on (3) Fact(Q) – you cross the street, nevertheless Interpretation. You are simply a bad guy. Nobody can stop you crossing. A punishment procedure is exercised with probability p%, e.g. by a policeman. 11
  • 12. Reputation/energy rules Violating rules decreases your energy points. (1) Norm(¬A) (2) Fact(A) Conclusion. Energy reduction by 10% Formalisation: Norm(¬A), A ------------------A := 0.9*A Energy is reduced to A1, then A2 and so on to An. And at last ¬A. A A1 A2 An ¬A 12
  • 13. Subsuming a fact to a legal term Legal term A: Murder Manslaughter Aiding suicide Death sentence Military act instance_of Fact a: Dead body A, C → D ... Legal term: A 2) Normative subsumption A→B 1) Terminological subsumption Faktas: a B(a) Conclusion, judgme nt 13 ...
  • 15. Machines produce legal acts (institutional facts) 1) Actor or Examples: • vending machines • traffic lights • computers in organisations • workflows • human being • machine 2) Actor Action Actor 15
  • 16. Factual acts (raw facts) „Alice puts a coin in her piggybank‟ Condition Actor • human being • machine Action Effect 16
  • 17. Legal acts: impositio • „Chris puts a coin in a ticket machine‟ • „Policeman raises hand‟ Legal condition Condition Legal actor Actor • human being • machine Legal action Action Legal effect Effect Institutional facts and legal institutions [McCormick & Weinberger 1992] 17
  • 18. Scenario • • • • The fictitious company, “KnowWhere” offers a “Person Locator App” which can track the user‟s location who has installed the app on his smartphone. The app accesses the GPS module of the smartphone and sends the coordinates and a specific Facebook ID to the server. KnowWhere relies on Google Maps. The “Person Locator Portal” – – Shows maps with user positions and Facebook IDs The server collects all user locations that belong to the given group and uses Google Maps to highlight their positions on the map. (Oberle et al. 2013) 18
  • 19. Legal reasoning Question 1. Which provision is applicable? – Federal Data Protection Act. “Personal data” Question 2: Is the disclosure of user data to Google lawful? Answer: No. – Question 2.1: Is permission or order by this Act or other law provided? No. – Question 2.2: Has the data subject provided consent? No. The users are not informed about the transfer of personal data from KnowWhere to Google. Therefore, effective consent is not given. Accept) Conclusion: the data transfer from KnowWhere to Google can neither be justified by law nor by consent. Therefore the conduct of KnowWhere violates data privacy law. 19
  • 20. Difficulties inherent in law 1. 2. 3. 4. 5. 6. Abstractness of norms. Norms are formulated (on purpose) in abstract terms. Principle vs. rule. The difference in regulatory philosophy between the US and other countries. Open texture. H. L. A. Hart‟s example of “Vehicles are forbidden in the park”. The myriad of regulatory requirements. Compliance frameworks are multidimensional. Teleology. The purpose of a legal norm usually can be achieved by a variety of ways. They need not to be listed in a statute and specified in detail. Legal interpretation methods. The meaning of a legal text cannot be extracted from the sole text. Apart from the grammatical interpretation, other methods can be invoked, such as systemic and teleological interpretation. 20
  • 21. 3. Legal machines and transparency 21
  • 23. Technical changeover ‘legal text’ ‘program’ General Norm Law Decree Legal machine program No acess Published Text culture Machine culture
  • 24. Technical changeover ‘legal text’ ‘program’ General Norm Law Decree Legal machine program No acess Published Legal machine Ticket machine Form proceedings  Problems
  • 25. General Norm Law Decree 1. Transparency Individual Norm Court judgement Administrative decision 2. Ex-post legal protection Published These 2 means were not from the beginning. They were trained in the course of time, but now come as a standard. Party Text culture
  • 26. Technical changeover ‘legal text’ ‘program’ General Norm Legal machine program Law Decree No acess 1. Transparency Individual Norm Court judgement Administrative decision 2. Ex-post legal protection Published However, these 2 standards are missing in the beginning of machine culture. Party Text culture Machine culture
  • 27. Legal machine program 1. Lack of transparency These 2 standards are missing in the beginning of machine culture. Therefore we address them. Legal machine Ticket machine Form proceedings Party 2. No ex-ante legal protection No acess
  • 28. Requirement 1: Legal machine program Die Programme für Rechtsmaschinen sind zumindest von ihrer Architektur her zugänglich zu machen 1. Lack of transparency Requirement 2: Legal machine programs shall provide a trained, effective and rapid legal protection Example1. The law provides 10 variations but the program contains only 9. Example 2. A ticket machine gives no money back. This makes a problem for customers expecting change from banknotes. Legal machine Ticket machine Form proceedings Party 2. No ex-ante legal protection No acess
  • 29. Goal: Equal standard of transparency and legal protection in text culture and machine culture
  • 30. Technical transformation ‘legal text’ ‘program’ General Norm Legal machine program Law Decree No acess Individual Norm Court judgement Administrative decision Party Text culture 1. Lack of transparency Legal machine Ticket machine Form proceedings Party Machine culture 2. No ex-ante legal protection 1. Transparency 2. Ex-post legal protection Published