The Hazards of Technology-neutral Policy: Questioning Lawful Access to Traffic Data
نویسندگان
چکیده
After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy processes, amongst many others, resulted in the emergence of a number of technology policy innovations. Two particular innovations are the internationalization of policy-setting, and the trend towards technology-neutral policies. These innovations come with risks, however. The risks are particularly apparent when we look at policies on law enforcement access to traffic data. Access to traffic data for law enforcement purposes is a traditional tool for investigation and intelligence gathering. Traffic data is an elusive term, due in part to technology variances. The policies regarding lawful access to traffic data, however, are increasingly set in technology-neutral language, while the language is often negotiated at international fora. Each policy innovation needs to be questioned. The momentum behind the policy changes comes from both the technology and international incentive schemes. Yet the policies tend to ignore the technological details; while policy changes are argued as necessary due to international obligations. In the hope of updating our policies, we may be numbing our technological awareness and political openness. LAW ENFORCEMENT REQUIREMENTS: THE
منابع مشابه
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملOn Calibration and Application of Logit-Based Stochastic Traffic Assignment Models
There is a growing recognition that discrete choice models are capable of providing a more realistic picture of route choice behavior. In particular, influential factors other than travel time that are found to affect the choice of route trigger the application of random utility models in the route choice literature. This paper focuses on path-based, logit-type stochastic route choice models, i...
متن کاملFarmers’ Perception and Management of Natural Hazards in Production and Security of Farm Investment in Isuikwuato, Abia State, Nigeria
This study on farmers’ perception and management of natural hazards in production and security of farm investment was carried out in Isuikwuato Local Government Area of Abia State, Nigeria. The study was sought to identify farmers’ perceived natural hazards in food production; identify adopted measures used in mitigating impacts of the hazards and determined factors that influenced farmers from...
متن کاملLawful Interception of IP Traffic
When compared with access network interception, Lawful Interception of the Internet is both more difficult and much less mature. However, Internet interception is becoming increasingly more important as Law Enforcement Agencies find that access network interception is becoming less effective. Unfortunately, the most common approach to Internet interception has some fundamental weaknesses, which...
متن کامل