SlideShare uma empresa Scribd logo
1 de 72
Using Law Responsibly:
What Happens When Law Meets
Technology?
michael geist
canada research chair in internet and e-commerce law university of
ottawa
digital surveillance
privacy
electronic marketing
copyright
Lawful Access
Digital Privacy Act
CASL
2012 Copyright Reform
Bill C-51
CETA
TPP
2016
Next Five Years
Using Law Responsibly
Activities on the Network
vs.
The Network Itself
<1>
Access
Regulated competition
<2>
Security
C-51 Debate
Lawful Access
Basic Subscriber Information
Bills C-46 & 47
• Mandatory subscriber info disclosure to “designated person” (CSIS, law enforcement):
– Name
– Address
– telephone number
– Email address
– Internet protocol address
– mobile identification number
– electronic serial number
– local service provider identifier
– international mobile equipment identity number
– international mobile subscriber identity number
– subscriber identity module card number that are associated with the subscriber’s service and
equipment
• Individual police officer can also require in exceptional circumstances
Warrantless?
What Information?
What Circumstances?
What Thresholds?
Data Retention
What Information?
How Long?
Who has Access?
Network Interception Capabilities
Bills C-46 & 47
• Interception equipment capabilities
– Capability to provide intercepted communications
– In same format as the communication (no requirement to decrypt)
• Operational requirements
– Enable interception
– Isolate communication
– Provide proscribed info
– Multiple interceptions
• Must maintain capabilities with new software, services
• Must report some new equipment to government if acquire from another telco provider
• Every telco provider must submit report on equipment within 6 months of law taking effect
• Government can reduce requirements
– Phase in period - 18 months for new equipment; 3 years for ISPs with <100,000 subscribers
• Penalties for non-compliance
Who Pays?
What Networks?
What Regulation?
Encryption
Backdoors?
What Products/Services?
Safeguards?
Oversight?
<3>
Internet Tax
<4>
Linking
“If you click through to a
journalist's story, then at that
point perhaps that journalist and
the newspaper that employs him
should receive a payment. There
are ways to get at this.”
- Alberta Weekly Newspapers Association
<5>
VPNs
<6>
Global Orders
<7>
Localization
<8>
Blocking
What happens when law meets
technology
Using Law Responsibly
Meet Our Responsibility
@mgeist

Mais conteúdo relacionado

Mais procurados

Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
safa
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
safa
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
Robin Kapoor
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
safa
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
ValueMentor Consulting
 
General requirements-for-e-commerce
General requirements-for-e-commerceGeneral requirements-for-e-commerce
General requirements-for-e-commerce
sumasicm
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
ravijain90
 

Mais procurados (20)

Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Information act 2000
Information act 2000Information act 2000
Information act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber law
Cyber lawCyber law
Cyber law
 
It act,2000
It act,2000It act,2000
It act,2000
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
The E-Commerce Act - Republic Act 8792
The E-Commerce Act - Republic Act 8792The E-Commerce Act - Republic Act 8792
The E-Commerce Act - Republic Act 8792
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
It act 2000
It act 2000It act 2000
It act 2000
 
Class it act
Class it actClass it act
Class it act
 
General requirements-for-e-commerce
General requirements-for-e-commerceGeneral requirements-for-e-commerce
General requirements-for-e-commerce
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 

Destaque

Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and Democracy
Cybera Inc.
 

Destaque (20)

Are MOOC's past their peak?
Are MOOC's past their peak?Are MOOC's past their peak?
Are MOOC's past their peak?
 
Predicting the Future With Microsoft Bing
Predicting the Future With Microsoft BingPredicting the Future With Microsoft Bing
Predicting the Future With Microsoft Bing
 
Do Universities Dream of Big Data
Do Universities Dream of Big DataDo Universities Dream of Big Data
Do Universities Dream of Big Data
 
Open access and open data: international trends and strategic context
Open access and open data: international trends and strategic contextOpen access and open data: international trends and strategic context
Open access and open data: international trends and strategic context
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to Data
 
Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and Democracy
 
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
 
Analytics 101: How to not fail at analytics
Analytics 101: How to not fail at analyticsAnalytics 101: How to not fail at analytics
Analytics 101: How to not fail at analytics
 
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
 
10-03-2011 Guillermo Padrés en entrevista calificó esta gira muy fructífera, ...
10-03-2011 Guillermo Padrés en entrevista calificó esta gira muy fructífera, ...10-03-2011 Guillermo Padrés en entrevista calificó esta gira muy fructífera, ...
10-03-2011 Guillermo Padrés en entrevista calificó esta gira muy fructífera, ...
 
Lara emma power point 100 diapositivas
Lara emma power point 100 diapositivasLara emma power point 100 diapositivas
Lara emma power point 100 diapositivas
 
Actosilocutorios fichatrabalho f_lamy
Actosilocutorios fichatrabalho f_lamyActosilocutorios fichatrabalho f_lamy
Actosilocutorios fichatrabalho f_lamy
 
Espaço Nutricional LCB
Espaço Nutricional LCBEspaço Nutricional LCB
Espaço Nutricional LCB
 
Portfólio
PortfólioPortfólio
Portfólio
 
Curso água e urbanismo palestra do engenheiro plinio tomaz - 29-09-2015
Curso água e urbanismo   palestra do engenheiro plinio tomaz - 29-09-2015Curso água e urbanismo   palestra do engenheiro plinio tomaz - 29-09-2015
Curso água e urbanismo palestra do engenheiro plinio tomaz - 29-09-2015
 
El gestor-deportivo-y-sus-competencias
El gestor-deportivo-y-sus-competenciasEl gestor-deportivo-y-sus-competencias
El gestor-deportivo-y-sus-competencias
 
Tecnófilo - TECNOLOGIAS E PRÁTICAS EDUCATIVAS
Tecnófilo - TECNOLOGIAS E PRÁTICAS EDUCATIVASTecnófilo - TECNOLOGIAS E PRÁTICAS EDUCATIVAS
Tecnófilo - TECNOLOGIAS E PRÁTICAS EDUCATIVAS
 
Diagnostico de ganado
Diagnostico de ganadoDiagnostico de ganado
Diagnostico de ganado
 
AcademicCert_MBA
AcademicCert_MBAAcademicCert_MBA
AcademicCert_MBA
 
Nuestros hijos y las altas capacidades Montse Expósito
Nuestros hijos y las altas capacidades Montse ExpósitoNuestros hijos y las altas capacidades Montse Expósito
Nuestros hijos y las altas capacidades Montse Expósito
 

Semelhante a Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
David Cunningham
 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy Regulations
Julia Mak
 

Semelhante a Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology? (20)

it act
it act it act
it act
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
Privacy &amp; The Smart Grid (Susanlyon Chtlj01292010)
Privacy &amp; The Smart Grid (Susanlyon   Chtlj01292010)Privacy &amp; The Smart Grid (Susanlyon   Chtlj01292010)
Privacy &amp; The Smart Grid (Susanlyon Chtlj01292010)
 
GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
04 privacy
04 privacy04 privacy
04 privacy
 
Nevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy RegulationsNevada Data Protection & Privacy Regulations
Nevada Data Protection & Privacy Regulations
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
IPR & Cyber Laws (Practical Qustions Paper) [CBSGS - 75:25 Pattern] {2013-201...
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 

Mais de Cybera Inc.

Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cybera Inc.
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cybera Inc.
 

Mais de Cybera Inc. (20)

Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
 
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
 
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
 
Opening the doors of the laboratory
Opening the doors of the laboratoryOpening the doors of the laboratory
Opening the doors of the laboratory
 
Open City - Edmonton
Open City - EdmontonOpen City - Edmonton
Open City - Edmonton
 
Unlocking the power of healthcare data
Unlocking the power of healthcare dataUnlocking the power of healthcare data
Unlocking the power of healthcare data
 
Checking in on Healthcare Data Analytics
Checking in on Healthcare Data AnalyticsChecking in on Healthcare Data Analytics
Checking in on Healthcare Data Analytics
 
I didn't know i was a geomatics company
I didn't know i was a geomatics companyI didn't know i was a geomatics company
I didn't know i was a geomatics company
 
Integrating Geospatial into the Everyday
Integrating Geospatial into the EverydayIntegrating Geospatial into the Everyday
Integrating Geospatial into the Everyday
 
From the Traditional to the Virtual
From the Traditional to the VirtualFrom the Traditional to the Virtual
From the Traditional to the Virtual
 
Where is EdTech Heading?
Where is EdTech Heading?Where is EdTech Heading?
Where is EdTech Heading?
 
Digital Social Innovation and the Impact of Data Analytics
Digital Social Innovation and the Impact of Data Analytics Digital Social Innovation and the Impact of Data Analytics
Digital Social Innovation and the Impact of Data Analytics
 
Delivering our Data Driven Future
Delivering our Data Driven FutureDelivering our Data Driven Future
Delivering our Data Driven Future
 
Jordan Engbers - Making an Effective Data Scientist
Jordan Engbers - Making an Effective Data ScientistJordan Engbers - Making an Effective Data Scientist
Jordan Engbers - Making an Effective Data Scientist
 
Calgary OpenStack Meetup January 2015
Calgary OpenStack Meetup January 2015Calgary OpenStack Meetup January 2015
Calgary OpenStack Meetup January 2015
 
Open Government
Open GovernmentOpen Government
Open Government
 
Orchestration
OrchestrationOrchestration
Orchestration
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?