SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
The Encryption Debate
National Security
v.
Individual's Privacy
2nd Annual INBA-IAPP Privacy Summit
Sept. 23, 2016 at Taj Westend, Bangalore
Moderated By:
Kavitha Gupta
Co-chair of IAPP Bangalore Knet
Freedom & Fear at war*
Tangible harm that security
proposal would prevent
v.
Intangible harm that an
intrusion on Privacy would
cause
*President George W. Bush address on Terrorism (20.9.2001)
Will strong encryption be shown to have
hindered law enforcement during terrorist
attack/criminal event ?
Mandate Backdoor
Requesting Companies to assist in unlocking or
decrypting the device
-FBI v. Apple
Encryption laws worldwide
Reference: https://prestonbyrne.com/2015/01/13/you-cant-stop-crypto/
Encryption Ban?
• Government officials around the world are
proposing bills to have encryption weakened
with the only intention to protect citizens
from criminals and terrorists. Will this draft
bill become the first step in a much larger
attack on encryption and on personal
freedoms as well?
INTERNATIONAL CLOUD STORAGE
IMPLICATIONS
• Microsoft Ireland Case: Can a US Warrant
Compel A US Provider to Disclose Data Stored
Abroad?
• The Federal Appeal Court ruled- American
companies don't have to hand over customer
data to U.S. police if it's stored on computers in
another country
Impact of Limiting Encryption
• Consumer Privacy compromised
• Business Issues
Would any regulatory burden on limiting
encryption would influence companies to shift
their businesses overseas with more encryption-
friendly policies?
Thank you!
For any queries/questions, feel free to contact me –
Kavitha Gupta
Co-chair of IAPP Bangalore
KNET: https://iapp.org/about/person/0011a00000DnPVAAA3
LinkedIn: https://in.linkedin.com/in/kavitha-gupta-1809844
Twitter: https://twitter.com/KavithaGupta2
Blog: http://kgritzy.blogspot.in/
Email id: kgritzy@gmail.com/skype:kgritzy1

Mais conteúdo relacionado

Mais procurados (6)

20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
 
Spring 2015 VJIL Newsletter
Spring 2015 VJIL NewsletterSpring 2015 VJIL Newsletter
Spring 2015 VJIL Newsletter
 
blind to threats
blind to threatsblind to threats
blind to threats
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks Presentation
 
Wikileaks
WikileaksWikileaks
Wikileaks
 

Destaque

Lecture 1 xt-n tuxai oilgolt
Lecture 1 xt-n tuxai oilgoltLecture 1 xt-n tuxai oilgolt
Lecture 1 xt-n tuxai oilgolt
munkhuu_a
 
System Design Society Brochure
System Design Society BrochureSystem Design Society Brochure
System Design Society Brochure
hadi karami
 
SDR_Simulator4_2
SDR_Simulator4_2SDR_Simulator4_2
SDR_Simulator4_2
hadi karami
 

Destaque (15)

Propriedades coliga prof agamenom
Propriedades coliga prof agamenomPropriedades coliga prof agamenom
Propriedades coliga prof agamenom
 
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1
 
Presentation 16 mar 2016 Kittelfjäll
Presentation 16 mar 2016 Kittelfjäll Presentation 16 mar 2016 Kittelfjäll
Presentation 16 mar 2016 Kittelfjäll
 
MSPM-Degree
MSPM-DegreeMSPM-Degree
MSPM-Degree
 
Lecture 1 xt-n tuxai oilgolt
Lecture 1 xt-n tuxai oilgoltLecture 1 xt-n tuxai oilgolt
Lecture 1 xt-n tuxai oilgolt
 
Riya Karmakar (1)
Riya Karmakar (1)Riya Karmakar (1)
Riya Karmakar (1)
 
sai resume win.jpg
sai resume win.jpgsai resume win.jpg
sai resume win.jpg
 
"Аялал жуулчлалын үндэс" Хичээл-7
"Аялал жуулчлалын үндэс" Хичээл-7"Аялал жуулчлалын үндэс" Хичээл-7
"Аялал жуулчлалын үндэс" Хичээл-7
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Зочид буудлын өрөө захиалгын шаардлага
Зочид буудлын өрөө захиалгын шаардлагаЗочид буудлын өрөө захиалгын шаардлага
Зочид буудлын өрөө захиалгын шаардлага
 
Squint/Strabismus
Squint/StrabismusSquint/Strabismus
Squint/Strabismus
 
Liaison CM2-6e Découverte du CDI - Parcours 6
Liaison CM2-6e Découverte du CDI - Parcours  6Liaison CM2-6e Découverte du CDI - Parcours  6
Liaison CM2-6e Découverte du CDI - Parcours 6
 
Animer un portail documentaire - E-sidoc
Animer un portail documentaire - E-sidocAnimer un portail documentaire - E-sidoc
Animer un portail documentaire - E-sidoc
 
System Design Society Brochure
System Design Society BrochureSystem Design Society Brochure
System Design Society Brochure
 
SDR_Simulator4_2
SDR_Simulator4_2SDR_Simulator4_2
SDR_Simulator4_2
 

Semelhante a Encryption - Conflict between National Interest and Individual's Privacy

From the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionFrom the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
JeanmarieColbert3
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
EvonCanales257
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
Kevin Murphy
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 

Semelhante a Encryption - Conflict between National Interest and Individual's Privacy (18)

From the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionFrom the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Berkley Law Writing Competition
Berkley Law Writing CompetitionBerkley Law Writing Competition
Berkley Law Writing Competition
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 

Último

一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
A AA
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 

Último (20)

Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 

Encryption - Conflict between National Interest and Individual's Privacy

  • 1. The Encryption Debate National Security v. Individual's Privacy 2nd Annual INBA-IAPP Privacy Summit Sept. 23, 2016 at Taj Westend, Bangalore Moderated By: Kavitha Gupta Co-chair of IAPP Bangalore Knet
  • 2. Freedom & Fear at war* Tangible harm that security proposal would prevent v. Intangible harm that an intrusion on Privacy would cause *President George W. Bush address on Terrorism (20.9.2001)
  • 3. Will strong encryption be shown to have hindered law enforcement during terrorist attack/criminal event ?
  • 4. Mandate Backdoor Requesting Companies to assist in unlocking or decrypting the device -FBI v. Apple
  • 5. Encryption laws worldwide Reference: https://prestonbyrne.com/2015/01/13/you-cant-stop-crypto/
  • 6. Encryption Ban? • Government officials around the world are proposing bills to have encryption weakened with the only intention to protect citizens from criminals and terrorists. Will this draft bill become the first step in a much larger attack on encryption and on personal freedoms as well?
  • 7. INTERNATIONAL CLOUD STORAGE IMPLICATIONS • Microsoft Ireland Case: Can a US Warrant Compel A US Provider to Disclose Data Stored Abroad? • The Federal Appeal Court ruled- American companies don't have to hand over customer data to U.S. police if it's stored on computers in another country
  • 8. Impact of Limiting Encryption • Consumer Privacy compromised • Business Issues Would any regulatory burden on limiting encryption would influence companies to shift their businesses overseas with more encryption- friendly policies?
  • 9. Thank you! For any queries/questions, feel free to contact me – Kavitha Gupta Co-chair of IAPP Bangalore KNET: https://iapp.org/about/person/0011a00000DnPVAAA3 LinkedIn: https://in.linkedin.com/in/kavitha-gupta-1809844 Twitter: https://twitter.com/KavithaGupta2 Blog: http://kgritzy.blogspot.in/ Email id: kgritzy@gmail.com/skype:kgritzy1