72
Using Law Responsibly: What Happens When Law Meets Technology? michael geist canada research chair in internet and e- commerce law university of ottawa

Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Embed Size (px)

Citation preview

Page 1: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Using Law Responsibly:What Happens When Law Meets

Technology?

michael geistcanada research chair in internet and e-commerce law

university of ottawa

Page 2: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 3: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 4: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 5: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

digital surveillanceprivacy

electronic marketingcopyright

Page 6: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 7: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Lawful AccessDigital Privacy Act

CASL2012 Copyright Reform

Page 8: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Bill C-51CETATPP

Page 9: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

2016

Page 10: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Next Five Years

Page 11: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Using Law Responsibly

Page 12: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 13: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Activities on the Networkvs.

The Network Itself

Page 14: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

<1>Access

Page 15: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 16: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 17: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 18: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 19: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Regulated competition

Page 20: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

<2>Security

Page 21: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 22: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

C-51 Debate

Page 23: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Lawful Access

Page 24: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Basic Subscriber Information

Page 25: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Bills C-46 & 47• Mandatory subscriber info disclosure to “designated person” (CSIS, law enforcement):

– Name– Address– telephone number – Email address– Internet protocol address– mobile identification number– electronic serial number– local service provider identifier– international mobile equipment identity number– international mobile subscriber identity number – subscriber identity module card number that are associated with the subscriber’s service and

equipment• Individual police officer can also require in exceptional circumstances

Page 26: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 27: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Warrantless?What Information?

What Circumstances?What Thresholds?

Page 28: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Data Retention

Page 29: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

What Information?How Long?

Who has Access?

Page 30: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Network Interception Capabilities

Page 31: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Bills C-46 & 47• Interception equipment capabilities

– Capability to provide intercepted communications– In same format as the communication (no requirement to decrypt)

• Operational requirements– Enable interception– Isolate communication– Provide proscribed info– Multiple interceptions

• Must maintain capabilities with new software, services• Must report some new equipment to government if acquire from another telco provider• Every telco provider must submit report on equipment within 6 months of law taking effect• Government can reduce requirements

– Phase in period - 18 months for new equipment; 3 years for ISPs with <100,000 subscribers• Penalties for non-compliance

Page 32: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Who Pays?What Networks?What Regulation?

Page 33: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Encryption

Page 34: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 35: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Backdoors?What Products/Services?

Safeguards?Oversight?

Page 36: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

<3>Internet Tax

Page 37: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 38: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 39: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 40: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 41: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 42: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 43: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

<4>Linking

Page 44: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 45: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 46: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

“If you click through to a journalist's story, then at that point perhaps that journalist and the newspaper that employs him should receive a payment. There are ways to get at this.”

- Alberta Weekly Newspapers Association

Page 47: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 48: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

<5>VPNs

Page 49: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 50: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 51: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 52: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

<6>Global Orders

Page 53: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 54: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 55: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 56: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

<7>Localization

Page 57: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 58: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 59: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 60: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

<8>Blocking

Page 61: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 62: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 63: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 64: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

What happens when law meets technology

Page 65: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 66: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 67: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 68: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 69: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?
Page 70: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Using Law Responsibly

Page 71: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

Meet Our Responsibility

Page 72: Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technology?

@mgeist