Balancing Privacy & Security: The Role Of Privacy And .

2y ago
10 Views
2 Downloads
864.27 KB
16 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Grady Mosby
Transcription

Balancing Privacy & Security:The Role of Privacy andCivil Liberties in theInformation Sharing EnvironmentIAPP Conference 2010SamuelSamel PP. JenkinsDirector for Privacy, Defense Privacy & Civil Liberties Office,U.S. Department of DefenseAlexanderAld JJoellCivil Liberties Protection Officer,Office of Director of National Intelligence

About Our OrganizationsgDoD, Defense Privacy & Civil Liberties Office (DPCLO) DPCLO located within Office of the Secretary of Defense Oversees programs and develops policy to protect privacy and civil libertiesof more than 2.3 million U.S. Military service members (Active, Reserve, andGuard) 700,000Guard),700 000 Civilian employees,employees military installations,installations hospitals,hospitals andschools, as well as the private citizens and organizations with whom DODinteracts Defense Privacy Office established in 1970s; currently standing up andconjoining a civil liberties functional area pursuant to Section 803 of theImplementing Recommendations of the 9/11 Commission ActODNI, Civil Liberties Protection Officer Established by Intelligence Reform and Terrorism Prevention Act of 2004,and stood up in 2005 to oversee coordination and integration of IntelligenceCommunity (IC) personnel, expertise, and capabilities IC includes such agencies as the CIA, FBI, National Security Agency (NSA),N tiNationall ReconnaissanceRiOfficeOffi (NRO),(NRO) andd NationalN tilGGeospatialti l IIntelligencet lliAgency (NGA) Ensures the protection of civil liberties in development and implementation2of an Information Sharing Environment construct.

Overview Challenge of National Security in a Nation Built onFreedom Implications of Shifting from a “Need to Know”Philosophy to a “Need to Share” Approach Agency-Level Privacy Protections as a Safeguard &Support Structure for the ISE Balancing National Security with Respect for Privacyand Civil Liberties3

Keyy Points of Focus IInformationftisharingh iisi an imperativeititot maintaini t i our nation’sti ’ security,it butb t totbe successful, it will require both a renewed emphasis on existing vehicles anda shift in long-held intelligence practices. With adherence to time-tested fair information practice principles and respectfor constitutionally guaranteed civil liberties, non-intelligence agencies’ andprivate sector programs can help the IC conserve valuable human andtechnologicalgresources. Non-intelligence agencies’ adherence to privacy and civil liberties engenderstrust in the government’s deliberative processes, and builds faith in the ISE toconduct lawful and legitimate intelligence analysis.analysis Once non-intelligence agencies share information within the ISE, it isincumbent upon the IC to institute its own institutional protections thatmaintain a proper balanceb lbbetween intelligencellpractices andd individuals’d d l ’liberty interests.4

The Challengeg of National Securityy“Respect my privacy!!!”“Keep me safe!!!”5

Information Sharing Environment Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004 – Sec.1016(b)(1)(A): “TheThe President shall create an information sharing environment for thesharing of terrorism information in a manner that is consistent with national security andwith applicable legal standards relating to privacy and civil liberties.” Executive Order 13388, Further Strengthening the Sharing of TerrorismInformation to Protect Americans, October 25, 2005 – Sec. 1(b): “To the maximumextent consistent with applicable law, agencies shall, in the design and use of informationsystems and in the dissemination of information among agencies protect the freedom,information privacy and other legal rights of Americans in the conduct of activities[relating to the detection,detection prevention,prevention disruption,disruption preemptionpreemption, and mitigation of theeffects of terrorist activities, including the sharing of terrorism information amongagencies and appropriate State, local, and tribal government authorities.”6

Common Privacy ConcernsCan I see myinformation beforethey share it?7

Using Existing Vehicles to EnsureE l SEarlySafeguardsfd withinithi ththe ISE U.S. Constitution Privacy Act of 1974 (as amended), codified at 5 U.S.C. § 552a Requires government agencies to show an individual any records kept on him or herRequires agencies to follow fair information practices when gathering and handling personal dataPlaces restrictions on how agencies can share an individualindividual'ss data with other people and agenciesLets individuals sue the government for violating its provisionsDoD Directive 5400.11, Defense Privacy Program First Amendment prevents government interference with exercise of free speech, free assembly, freereligious exercise, among othersRecording of protected activity could result in “chilling effect” and violate civil liberties, Privacy Act, andagency requirements.Requires balancing of need to collect, maintain, use, or disseminate personal information aboutindividuals with individual’s right to be protected against unwarranted invasion of privacyEnsures checks for relevancy, timeliness, completeness, and accuracyLimits recording information relating to the exercise of First Amendment rightsISE Privacy Guidelines Protected information may be shared through the ISE only if it is terrorism information, homelandsecurity information, or law enforcement information.Requires appropriate physical, technical, and administrative measures to safeguard protected information8

FederalAgencyPrivateSectorPrivaacy & Civil Libeerties ProgramssPrivacy Spheres of InfluenceDataQualityDataSecurityInformation SharingEnvironmentCivil LibertiesProtection9

Fair Information Practice Principles The Fair Information Practice Principles will enhancenot only the privacy protection of the ISE, butalso the ISE’s effectiveness and functionality. Strong privacy & civil liberties programs acrossgovernment and private organizations canaccomplishli h twotobjectives:bj ti1: Protect the Public2: Protect the Intelligence Community10

Fair Information Practice PrinciplesInformation Limitation Keep and collect only that information which is necessary Ensure that information shared is relevant and necessaryData QualityQy Ensure data is accurate, up-to-date, and complete Provide a more clear and accurate picture to the IC when sharinginformation.11

Fair Information Practice PrinciplesAccountabilityy Identify an official responsible for each data collection to ensure itsaccuracy and protection Provide the IC with easily understood contacts for informationrequests.Sec itSecurity Strong administrative, physical, and technical safeguards areessential to pprotect the ppublic Data loss can compromise government secrets and bolster criminals,terrorists, and other foreign powers12

DoD Application ofPre Sharing SafeguardsPre-Sharing Increased Use of Systemyof Record Notices (SORNs)() Increased completion rate of public notices from 57% to 95% over the past year;over 1,300 DoD SORNS currently in existenceCreates greater transparency in records held on individuals Implementation of Required Quarterly Reporting Previously, DoD Components reported only once per yearQuarterly reporting requires Components to conduct more regular reviews of policy,data, and systemsSupports Federal Information Sharing and Management Act reporting Formalization of DoD Civil Liberties Program & Revision of DoDPrivacyy Regulationsg DoD Privacy Regulations will codify Fair Information Practice PrinciplesIncrease and strengthen awareness of privacy and civil liberties policies Conduct Privacyy and Civil Liberties ImpactpAssessments Allows early detection of privacy and civil liberties implications of proposed policies,programs, or operations13

FederalAgencyPrivateSectorPrivaacy & Civil Libeerties ProgramssPrivacy Spheres of InfluenceDataQualityDataSecurityInformation SharingEnvironmentCivil LibertiesProtection14

INSERTSALEX JOELOSSLIDESSFOUO15

Revisitingg Keyy Points As theAth ISE ffacilitatesilit t a shifthift fromf“need-to-know”“d t k” tot “need-to-share”,“d th” eachhagency and private sector privacy and civil liberties program must renew itscommitment to applying existing safeguards to the information it collects. The Fair Information Practice Principles provide a helpful roadmap for ensuringthat our privacy and civil liberties programs are adequately preparing collectedinformation for potential sharing within the ISE, if and when such anauthorized need arises. By holding our respective privacy and civil liberties programs to a higherstandard, we can strengthen the ISE’s ability to achieve the critical balancebetween privacy and national security.security16

that our privacy and civil liberties programs are adequately preparing collected information for potential sharing within the ISE, if and when such an authorized need arises. By holding our respective privacy and civil liberti

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Glossary of Social Security Terms (Vietnamese) Term. Thuật ngữ. Giải thích. Application for a Social Security Card. Đơn xin cấp Thẻ Social Security. Mẫu đơn quý vị cần điền để xin số Social Security hoặc thẻ thay thế. Baptismal Certificate. Giấy chứng nhận rửa tội

8. Load Balancing Lync Note: It's highly recommended that you have a working Lync environment first before implementing the load balancer. Load Balancing Methods Supported Microsoft Lync supports two types of load balancing solutions: Domain Name System (DNS) load balancing and Hardware Load Balancing (HLB). DNS Load Balancing