Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Gov 20 LA Presentation - Sex Drugs Rock and Code

804 views

Published on

Presentation on Privacy and Security for Gov20LA

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Gov 20 LA Presentation - Sex Drugs Rock and Code

  1. 1. SEX.DRUGS.ROCK.&CODE . (Or, Alternatively, Privacy & Security in the Cyber Age)
  2. 2. @gagnier on the Twitter
  3. 3. “Heres a little bit of advice,youre quite welcome, it is freeDon’t do nothing that is cut-price,youll know what theyll make you beThey will try their tricky device,trap you with the ordinaryGet your teeth into a small slice,the cake of liberty.” Song, “Sex and Drugs and Rock and Roll.” Ian Durry, 1977.
  4. 4. CODEn.1. A systematically arranged and comprehensive collection oflaws.2. A systematic collection of regulations and rules ofprocedure or conduct: a traffic code.3.a. A system of signals used to represent letters or numbersin transmitting messages.b. A system of symbols, letters, or words given certainarbitrary meanings, used for transmitting messages requiringsecrecy or brevity.4. A system of symbols and rules used to representinstructions to a computer; a computer program.
  5. 5. CODEn.1. A systematically arranged and comprehensive collection oflaws.2. A systematic collection of regulations and rules ofprocedure or conduct: a traffic code.3.a. A system of signals used to represent letters or numbersin transmitting messages.b. A system of symbols, letters, or words given certainarbitrary meanings, used for transmitting messages requiringsecrecy or brevity.4. A system of symbols and rules used to representinstructions to a computer; a computer program.
  6. 6. While you say DATA
  7. 7. I sayBREACH
  8. 8. uncharted legal territory Privacy
  9. 9. We are dealing with:corporate-created legal regimes
  10. 10. Tough questions:Personally identifiable information.What gets collected from citizen users?Coalescing the plethora of governmentregulation with an environment with noregulation.
  11. 11. Recommendation:Need policies around apps& data collection.
  12. 12. hackers? Cybersecurity
  13. 13. We are dealing with:Defining what “hacking” is
  14. 14. Tough questions:Innocuous v. malicious activities.What are the rights of those who“compromise?”Rushing to solve a problem that is indeed atangible problem.
  15. 15. Text
  16. 16. So? Where We’re At
  17. 17. Text
  18. 18. Current Legal Regime Applied:Computer Fraud and Abuse ActEconomic Espionage ActState Level Regulation
  19. 19. Regulatory Attempts:Do Not Track ActCommercial Privacy Bill of Rights 2011Personal Data Privacy and Security ActSecure and Fortify Elections Data ActData Security and Breach Notification Act
  20. 20. Text
  21. 21. Regulatory Attempts:SECURE ITCSACISPA
  22. 22. Hillz? Send those files to China? Text Shit.
  23. 23. And Back to Code & Cultural Influence Oh, Those Social Norms
  24. 24. CODEn.1. A systematically arranged and comprehensive collection oflaws.2. A systematic collection of regulations and rules ofprocedure or conduct: a traffic code.3.a. A system of signals used to represent letters or numbersin transmitting messages.b. A system of symbols, letters, or words given certainarbitrary meanings, used for transmitting messages requiringsecrecy or brevity.4. A system of symbols and rules used to representinstructions to a computer; a computer program.
  25. 25. @gagnier on the Twitter
  26. 26. SEX.DRUGS.ROCK.&CODE . (Or, Alternatively, Privacy & Security in the Cyber Age)

×