This document discusses how personal injury lawyers are beginning to use data collected from wearable fitness trackers as evidence in legal cases. Some key points:
- Personal injury lawyers are having clients wear fitness trackers to collect detailed activity data before and after accidents to demonstrate the physical impacts of injuries.
- This objective data could help bolster claims about reduced mobility and quality of life in court, especially when combined with testimony. However, data could also potentially hurt some cases.
- Courts will need to determine whether wearable data should be admissible as evidence and if it violates privacy. Precedents suggest data may be allowed if relevant and privacy is protected.
- Questions remain about how reliably the data represents
Electronic Document Management And DiscoveryRonald Coleman
Presentation given as part of Delaware Bar Association Computer Law Section CLE program, "E-Commerce law: Critical Legal and Business Issues."
Many of the particulars of this presentation are relatively obsolete now.
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
Read our NTIA comment letter on ''Big Data'' Developments and How They Impact the Consumer Privacy Bill of Rights. Filed with the NTIA on August 5, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
Electronic Document Management And DiscoveryRonald Coleman
Presentation given as part of Delaware Bar Association Computer Law Section CLE program, "E-Commerce law: Critical Legal and Business Issues."
Many of the particulars of this presentation are relatively obsolete now.
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
Read our NTIA comment letter on ''Big Data'' Developments and How They Impact the Consumer Privacy Bill of Rights. Filed with the NTIA on August 5, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
Presentation on the subject of personal health data, blockchain technology and my master's thesis project.
"Donate Your Data" provides individuals with the option to take ownership of their personal health data and make choices on how it is donated for use within health research studies.
It is a first step towards a future in which data-driven services are designed according to citizen data rights, offering both data security and transparency over its use to each and every person.
(First presented to BCGDV in Berlin on September 1, 2017.)
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
The evolution of the Internet of Things is significantly a
ected by legal restrictions imposed for personal data handling, such as the European General Data Protection Regulation (GDPR).
The main purpose of this regulation is to provide people in the digital age greater control over their personal data, with their freely given, specific, informed and unambiguous consent to collect and process the data concerning them. ADVOCATE is an advanced framework that fully complies with the requirements of GDPR, which, with the extensive use of blockchain and artificial intelligence technologies, aims to provide an environment that will support users in maintaining control of their personal data in the IoT ecosystem. This paper proposes and presents the Intelligent Policies Analysis Mechanism (IPAM) of the ADVOCATE framework, which, in an intelligent and fully automated manner, can identify conflicting rules or consents of the user, which may lead to the collection of personal data that can be used for profiling. In order to clearly identify and implement IPAM, the problem of recording user data from smart entertainment devices using Fuzzy Cognitive Maps (FCMs) was simulated. FCMs are an intelligent decision-making system that simulates the processes of a complex system, modeling the correlation base, knowing the behavioral and balance specialists of the system. Respectively, identifying conflicting rules that can lead to a profile, training is done using Extreme Learning Machines (ELMs), which are highly ecient neural systems of small and flexible architecture that can work optimally in complex environments.
Simple Blockchain Eco System for medical data managementsvrohith 9
The blockchain is one of the most ingenious inventions. It changed traditional approach to the transactions that are made between computers virtually, Blockchain allows digital format of information to travel across the world without being tampered, was originally made for bitcoin exchanges which were a virtual currency that was circulated by open source developers and certain hosting companies. Since it is secure and incorruptible digital ledger, we made our project to store all the transactions based on custom SHA-256 and Base64 encoding methods, since blockchain is based on the peer-to-peer network the other mediums never know the hashed content. The database updates are shared across the network and so it resists from single point failure, being controlled by certain authority, Overriding of data.
Goldman Sachs defines IoT (internet of things) as the third wave of internet revolution: by connecting to the internet billions of devices, IoT opens up a host of new business opportunities and challenges. The basic building blocks of the IoT are devices that can sense/recognize their surrounding environments and communicate with other devices, connecting/communicating network medium/infrastructure that can interconnect devices and connect devices to the internet, back-end IT systems that can process information (data) obtained by the IoT devices (e.g. cloud computing/big data analytics) and provide the value added services exploiting the information. Therefore, a part or whole of data aggregation, data transfer, data correlation, data analysis and services based on the data are the essential elements of the IoT inventions, and thus, the elements of the IoT patent claims. Consequently, many of IoT patents can be identified as abstract ideas because they are the certain methods of organizing human activities/mental process or fundamental economic practices or mathematical relationships/formulas unless the IoT patent claims are drafted carefully to pass the post-Alice 101 patent eligibility test.
DDNFS: a Distributed Digital Notary File SystemIJNSA Journal
Safeguarding online communications using public key cryptography is a well-established practice today, but with the increasing reliance on “faceless”, solely online entities one of the core aspects of public key cryptography is becoming a substantial problem in practice: Who can we trust to introduce us to and vouch for some online party whose public key we see for the first time? Most existing certification models lack flexibility and have come under attack repeatedly in recent years[1, 2], and finding practical improvements has a high priority. We propose that the real-world concept of a notary or certifying witness can be adapted to today’s online environment quite easily, and that such a system when combined with peer-topeer technologies for defense in depth is a viable alternative to monolithic trust infrastructures. Instead of trusting assurances from a single party, integrity certifications (and data replication) can be provided among a group of independent parties in a peer-to-peer fashion. As the likelihood of all such assurance providers being subverted at the very same time is very much less than that of a single party, overall robustness is improved. This paper presents the design and the implementation of our prototype online notary system where independent computer notaries provide integrity certification and highly-available replicated storage, and discusses how this online notary system handles some common threat patterns.
Blockchain has become a popular technical term to drop over the past six months, most people cannot effectively explain Blockchain or describe its real value and application to the marketplace. Hopefully, this presentation will help you better understand...
Here are some examples of our design work. We do all sorts of things like websites, annual reports, branding and logos and even an amplifier user interface.
Presentation on the subject of personal health data, blockchain technology and my master's thesis project.
"Donate Your Data" provides individuals with the option to take ownership of their personal health data and make choices on how it is donated for use within health research studies.
It is a first step towards a future in which data-driven services are designed according to citizen data rights, offering both data security and transparency over its use to each and every person.
(First presented to BCGDV in Berlin on September 1, 2017.)
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
The evolution of the Internet of Things is significantly a
ected by legal restrictions imposed for personal data handling, such as the European General Data Protection Regulation (GDPR).
The main purpose of this regulation is to provide people in the digital age greater control over their personal data, with their freely given, specific, informed and unambiguous consent to collect and process the data concerning them. ADVOCATE is an advanced framework that fully complies with the requirements of GDPR, which, with the extensive use of blockchain and artificial intelligence technologies, aims to provide an environment that will support users in maintaining control of their personal data in the IoT ecosystem. This paper proposes and presents the Intelligent Policies Analysis Mechanism (IPAM) of the ADVOCATE framework, which, in an intelligent and fully automated manner, can identify conflicting rules or consents of the user, which may lead to the collection of personal data that can be used for profiling. In order to clearly identify and implement IPAM, the problem of recording user data from smart entertainment devices using Fuzzy Cognitive Maps (FCMs) was simulated. FCMs are an intelligent decision-making system that simulates the processes of a complex system, modeling the correlation base, knowing the behavioral and balance specialists of the system. Respectively, identifying conflicting rules that can lead to a profile, training is done using Extreme Learning Machines (ELMs), which are highly ecient neural systems of small and flexible architecture that can work optimally in complex environments.
Simple Blockchain Eco System for medical data managementsvrohith 9
The blockchain is one of the most ingenious inventions. It changed traditional approach to the transactions that are made between computers virtually, Blockchain allows digital format of information to travel across the world without being tampered, was originally made for bitcoin exchanges which were a virtual currency that was circulated by open source developers and certain hosting companies. Since it is secure and incorruptible digital ledger, we made our project to store all the transactions based on custom SHA-256 and Base64 encoding methods, since blockchain is based on the peer-to-peer network the other mediums never know the hashed content. The database updates are shared across the network and so it resists from single point failure, being controlled by certain authority, Overriding of data.
Goldman Sachs defines IoT (internet of things) as the third wave of internet revolution: by connecting to the internet billions of devices, IoT opens up a host of new business opportunities and challenges. The basic building blocks of the IoT are devices that can sense/recognize their surrounding environments and communicate with other devices, connecting/communicating network medium/infrastructure that can interconnect devices and connect devices to the internet, back-end IT systems that can process information (data) obtained by the IoT devices (e.g. cloud computing/big data analytics) and provide the value added services exploiting the information. Therefore, a part or whole of data aggregation, data transfer, data correlation, data analysis and services based on the data are the essential elements of the IoT inventions, and thus, the elements of the IoT patent claims. Consequently, many of IoT patents can be identified as abstract ideas because they are the certain methods of organizing human activities/mental process or fundamental economic practices or mathematical relationships/formulas unless the IoT patent claims are drafted carefully to pass the post-Alice 101 patent eligibility test.
DDNFS: a Distributed Digital Notary File SystemIJNSA Journal
Safeguarding online communications using public key cryptography is a well-established practice today, but with the increasing reliance on “faceless”, solely online entities one of the core aspects of public key cryptography is becoming a substantial problem in practice: Who can we trust to introduce us to and vouch for some online party whose public key we see for the first time? Most existing certification models lack flexibility and have come under attack repeatedly in recent years[1, 2], and finding practical improvements has a high priority. We propose that the real-world concept of a notary or certifying witness can be adapted to today’s online environment quite easily, and that such a system when combined with peer-topeer technologies for defense in depth is a viable alternative to monolithic trust infrastructures. Instead of trusting assurances from a single party, integrity certifications (and data replication) can be provided among a group of independent parties in a peer-to-peer fashion. As the likelihood of all such assurance providers being subverted at the very same time is very much less than that of a single party, overall robustness is improved. This paper presents the design and the implementation of our prototype online notary system where independent computer notaries provide integrity certification and highly-available replicated storage, and discusses how this online notary system handles some common threat patterns.
Blockchain has become a popular technical term to drop over the past six months, most people cannot effectively explain Blockchain or describe its real value and application to the marketplace. Hopefully, this presentation will help you better understand...
Here are some examples of our design work. We do all sorts of things like websites, annual reports, branding and logos and even an amplifier user interface.
Learn about key trends facing the mobile forensics industry this year, including growing device and data backlogs, cloud-based data, and how to manage large quantities of data from multiple disparate sources.
9 Trends in Identity Verification (2023) by RegulaRegula
Regula held an internal panel discussion and compiled nine expert opinion-based identity verification trends to watch and leverage in 2023. You can find the full text in our blog: https://regulaforensics.com/blog/identity-verification-trends-2023/
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
Have you ever stopped to consider the trail of breadcrumbs you leave behind every time you browse the internet? From social media posts to online purchases, your digital footprint is expanding with each click. But what if I told you that this seemingly harmless virtual path holds immense significance in solving online crime cases? In an era where cybercriminals are growing more sophisticated by the day, understanding the importance of digital footprints has become crucial for law enforcement agencies and individuals alike. Get ready to dive into a world where every keystroke could be a potential clue in unraveling complex web-based crimes.
The final section of the Digital Forensics journal article by Ga.pdfjyothimuppasani1
The final section of the \"Digital Forensics\" journal article by Garfinkel lists many of the
technical and personnel challenges to modern digital forensics. Using that section (Forging
Ahead, page 4) and your text, write a discussion board post describing the challenges to digital
forensics that you think are the most difficult to solve. Can you think of any other challenges to
digital forensics that are not mentioned? Could you see yourself working in the digital forensics
space as a future career? Forging Ahead For all its power, digital forensics faces stark challenges
that are likely to grow in the coming years. Today\'s computers have on average 1,000 times
more storage but are only 100 times faster than the high-end workstations of the early 1990s, so
there is less computing power available to process each byte of memory. The number of cases in
which digital evidence is collected is rising far faster than the number of forensic investigators a
to do the examinations. And police no realize that digital evidence can be used to solve crimes-
that is, as part of the investigation process- whereas in the past it was main ly a tool for assisting
in convictions. Cell phones may be equipped with self-destruct\" applications that wipe their data
if they receive a particular text, so it is now standard practice to store phones in a shielded metal
which blocks radio waves. But many cell phones wi forget their stored memory if left off for too
long, so the Faraday cages must be equipped with box, called a Faraday cage power strips and
cell phone chargers. Because many low-end cell phones have proprietary plugs, police must
seize chargers as well. However, some phones wi wipe their data if they can\'t call home,
whereas others will encrypt their data with algorithms too powerful for law enforcement to
decipher Further complicating the investigator\'s job is the emergence of cloud computing and
other technologies for storing data on the Internet. As a result of the doud, there is no way ensure
that a seized cell phone actually holds the suspect\'s data-the phone might simply be a tool for
accessing a remote server. A law enforcement professional who is authorized to search a device
may not have legal authority to use information on that device to access remotely stored data.
Worse sti the data might be deleted in the meantime by one of the suspect\'s collaborators.
Despite its technical sophistication and reliance on the minutiae of digital systems, the single
biggest challenge facing digital forensics practice today has a decidedly human dimension: the
lack o lified people to serve as researchers and practitioners. Not merely the result of the general
tech shortage, the very nature of digital forensics makes staffing significantly harder than in
other disciplines. Because the field\'s mission is to understand any data that might be stored we
need individuals who have knowledge of both current and past computer systems, applications,
and data format.
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
10 Criminology in the Future
Criminology in the Future
Kristopher Freitag, Javielle Watson, Michael Westphal, Starcia Zeigler
CJA/314
April 7, 2014
Judy Mazzucca
Technology is advancing in every aspect of the criminal justice system, from the investigation to the prosecution of the crimes. Crime fighting methodologies have the potential to greatly assist law enforcement in the war on crime. Some experts even think that some software and tools will be able to help prevent crime. (Yeung, n.d.). Methodologies, such as mandating DNA collection programs, biometrics, and implementing cybercrime spyware programs are on the list of the next big things of the future, when it comes to fighting crime. DNA testing helps law enforcement investigate and prosecute crimes, as well as clear the names of those who have been wrongfully convicted. There are currently about twenty states with laws requiring DNA collection at the time of the person’s arrest. The federal government also has this requirement. As, with any controversial subject, DNA testing has its critics. Some are saying that DNA testing is in violation of the Fourth Amendment, especially for those who have not been convicted of a crime. Others are concerned that DNA testing may open the doors for abuse of the genetic information being stored in the databases. (Berson, n.d.). Biometrics are automated methods of recognizing a person based on physiological or behavioral characteristics. Some of the features measured using biometrics are handwriting, voice, iris, hand geometry, vein, retinal, and fingerprints. Biometric based solutions provide personal data privacy, and confidential financial transactions, and are starting to become the foundation of an extensive array of highly secure identification and personal verification solutions. The need for highly secure identification and personal verification technologies is great, due to the increased number of transaction fraud and security breaches. This need is especially great in the areas of local, state, and federal governments. Infrastructures such as electronic banking, health and social services, law enforcement, and retail sales are already taking advantage of, and seeing the benefits of biometric technology. ("The Biometrics Consortium", n.d.).
As we become more and more dependent on technology, the increase of cybercrimes are skyrocketing, which has forced law enforcement to figure out ways of combatting cybercrimes. We have become extremely vulnerable to many cybercrimes, including social media fraud, which consists of cyber criminals using social media to steal the identities of unsuspecting people; and luring people to download malicious materials, or reveal their passwords; corporate security breaches, which consists of cyber criminals exploiting company employees via scams; and phishing, which involves cyber criminals targeting company employees by sending emails that appear to be from someone within the company. ("Homeland .
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
(300-400 words)
1- Watch anyone of the following documentary/movie:
· The Corporation (2005)
· Food Inc. (2009)
· An Inconvenient Truth (2006)
Share your understanding around
Who
THE PEOPLE INVOLVED
What
THE PROBLEMS, THINGS, IDEAS
When
PAST, PRESENT, FUTURE OF THE TOPIC
Where
THE PLACE INVOLVED
Why
THE CAUSES, REASONS, RESULTS, CONDITIONS.
How
HISTORY OR FUNCTION (HOW IT BEGAN OR OPERATES).
………………………………………………………………………………………………………………………………………….
2-
(a) Find a news article about an economic topic that you find interesting.
(b) Make a short bullet-list summary of the article.
(c) Write and illustrate with appropriate graphs an economic analysis of the key points in the article.
Hint: Use 5Ws and 1H in your explanation.
1. Who was involved?
1. What happened?
1. When did it happen?
1. Where did it happen?
1. Why did it happen?
1. How did it happen?
Smartphones Have Privacy Risks.docx
Smartphones Have Privacy Risks
Smartphones, 2013
Top of Form
Bottom of Form
Around the turn of the century, the FBI [Federal Bureau of Investigation] was pursuing a case against a suspect—rumored to be Las Vegas strip-club tycoon Michael Galardi, though documents in the case are still sealed—when it hit upon a novel surveillance strategy.
The suspect owned a luxury car equipped with an OnStar-like system that allowed customers to "phone home" to the manufacturer for roadside assistance. The system included an eavesdropping mode designed to help the police recover the vehicle if it was stolen, but the FBI realized this same antitheft capability could also be used to spy on the vehicle's owner.
When the bureau asked the manufacturer for help, however, the firm (whose identity is still secret) objected. They said switching on the device's microphone would render its other functions—such as the ability to contact emergency personnel in case of an accident—inoperable. A federal appeals court sided with the company; ruling the company could not be compelled to transform its product into a surveillance device if doing so would interfere with a product's primary functionality.
The specifics of that 2003 ruling seem quaint today [in 2012]. The smartphones most of us now carry in our pockets can easily be turned into surveillance and tracking devices without impairing their primary functions. And that's not the only privacy risk created as we shift to a mobile, cloud-based computing world. The cloud services we use to synchronize data between our devices increase the risk of our private data falling prey to snooping by the government, by private hackers, or by the cloud service provider itself. And we're packing ever more private data onto our mobile devices, which can create big headaches if we leave a cell phone in a taxicab.
What to do about it? In this [viewpoint], we'll explore the new privacy threats being created as the world shifts to an increasingly mobile, multi-device computing paradigm. Luckily, there are steps both device makers and lawmakers can take to ...
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldTed Myerson
Innovative opportunities, such as genomic research and the Internet of Things, are better able to achieve their enormous market potential by diminishing expenses, time-spent and data loss from current de-identification and data minimization practices. By addressing the concerns of governmental organizations charged with protecting the rights of data subjects with new technology controls, organizations can save money and conduct better research while minimizing out-of-pocket and opportunity costs associated with data privacy.
The Anonos approach avoids the pitfalls of both full and zero privacy environments. Full privacy leads to lack of data, an unclear picture and no personalized experiences for the data subjects while zero privacy actually reduces the value of data because it does not eliminate anyone or anything, leaving too many choices and “noisy” data while exposing data subjects to potential discrimination and harm.
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxsmile790243
Paper #1
Reasonable Expectation of Privacy
In this discussion, we are asked about the reasonable expectation of privacy on government-owned equipment that has been issued to us. In my opinion, the government is actually in the right to search without a warrant the computer records and history of government employees. The Fourth Amendment prohibits unreasonable searches and seizures from both civil and criminal authorities (Lynch, 2006). I would argue that since the government owns the issued equipment then the government has every right to search that equipment. The Fourth Amendment protects an American citizen’s property from seizure and the privacy of that American citizen, but this equipment is not privately owned. Also, when an American citizen becomes a federal employee then the citizen should be held to the standards of the government. The government employee could also have access to sensitive material, in which that material if leaked, could cause serious and detrimental harm to the interests of the United States. In cases that involve an employee having access to sensitive material, then the federal government has every right to access the computer records of this person. Also, a phone issued out by the federal government should only be used for the government, and not for private use. I have a government computer issued to me. That computer is used for government business and was paid for by the government. In my opinion, the federal employee should not have a reasonable expectation of privacy on equipment that is issued by the federal government. The United States Supreme Court is still in the process of evaluating how the protections garnered from the Fourth Amendment fits into this digital age (Ferguson, 2020). In saying this, future court cases that take place in the digital age can eventually change the Supreme Court’s stance on privacy protections.
References
Ferguson, A. G. (2020). Structural Sensor Surveillance.
Iowa Law Review
,
106
(1), 47+.
https://link.gale.com/apps/doc/A648382109/AONE?u=tel_a_bethelc&sid=AONE&xid=084bdf7f
Lynch, M. (2006). Mere platitudes: the "Domino Effect" of school-search cases on the Fourth Amendment rights of every American.
Iowa Law Review
,
91
(2), 781+.
https://link.gale.com/apps/doc/A145338747/AONE?u=tel_a_bethelc&sid=AONE&xid=4dcacfe1
Paper #2
Rights of Employers to Monitor Employee Devices
Morrison and Bailey (2011) state that smartphones can now perform tasks formerly reserved for computers. These phones have tremendous processing hardware and significant memory capacity to run both productivity-enhancing and productivity-impeding software. These phones can take pictures, record videos, and support video conferencing. In short, these modern smartphones are capable of delivering and receiving vast amounts of information.
Given these phones' abilities, employers have a concern about the use of these phones in the workplace. Weisberg (2019) says that after the terrorist attack.
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
An overview of the legal, privacy, and security issues surrounding modern cloud services and cryptography
Created as an alumnus talk for the Computer & Network Support Technology Fairfield Career Center senior class of 2016.
1. 14 | RECOVERY ALL images BY istockphoto.comALL images BY istockphoto.com
Who,
what
and
wear
By KIM ARNOTT
New generation of data-rich
tech devices figure to soon
have impact in courts
We’re tracking our every move.
Forget the days of insurance companies attempting to catch
out malingering claimants by hiring private investigators to lurk
in parked cars with telephoto lenses. Nowadays, that surreptitious
jog around the block — including the number of steps taken and
maximum heart rate reached — is most likely to be recorded with
an inexpensive fitness tracker worn on the claimant’s wrist.
An explosion of computerized devices known as wearables
has hit the marketplace in recent years. Affordable and pop-
ular, the digital devices let consumers capture — and often
share — details of their habits, activities and biometric infor-
mation with friends, and even strangers.
Technology is also being integrated into a range of work-
place wearables. Sophisticated safety vests and hardhats moni-
tor construction employees’ vital signs, repetitive motions and
proximity to heavy equipment, while some office companies
are outfitting employees with lanyards capable of recording
their interactions with other staff members.
With a slew of electronic devices gathering details about our
lives, questions about the possible use of that data are intrigu-
ing many with an interest in personal injury law.
“I think the big impact for personal injury insurance litiga-
tion is that I am now my own private investigator, putting my-
self under surveillance,” says Timothy Banks, a Toronto-based
specialist in privacy and data security law with Dentons.
2. Recovery | 15
The ways in which such surveillance might be used has yet
to be determined. But its admissibility may initially be tested in
a Calgary courtroom.
Earlier this year, personal injury lawyer Simon Muller of
McLeod Law garnered widespread media attention when he
let it be known that he is using personal trackers like Fitbits
to gather data on the activity level of his clients. The devices,
available in a variety of forms from a number of manufacturers,
can track such things as the number of steps taken in a day,
elevation changes and sleep patterns.
For example, activity data collected from a former personal
trainer who was injured in a car accident four years is being
run through an analytics platform offered by Calgary company
Vivametrica. Muller expects it will show that she is now less
active than other women of her age and profession.
He also has a client with a significant disability using the wear-
able device. If activity trackers can demonstrate someone’s inabil-
ity to maintain a healthy lifestyle, Muller notes that the data can
be used to project their susceptibility to disease in the future.
“It gives us the ability to look beyond the immediate conse-
quences of an injury and consider the long-term consequenc-
es,” he told The Lawyers Weekly earlier this year.
Being able to bolster client testimony with objective evidence
from a fitness tracker could be very helpful in court, says Jason
Katz, a personal injury lawyer with Toronto-based Singer Kwinter.
Individuals with well-established Fitbit histories could
easily demonstrate their physical activity levels before and
after an accident.
“One of the challenges we have on the plaintiff bar is trying
to show the changes in people’s quality of life by changes in
their daily activities,” he said. “This is probably one of the most
powerful and easiest ways to show the difference in a person’s
activity level.”
So far the admissibility of data collected from wearable de-
vices hasn’t yet been tested in a Canadian or American court-
room. But Matthew Pearn, a civil litigator in New Brunswick,
notes that the broader issue of using digital data to analyze a
person’s mobility status was recently considered in Laushway v.
Messervey [2014] N.S.J. No. 107.
In that case, the Nova Scotia Court of Appeal upheld a lower
court ruling compelling a plaintiff to turn over his computer hard
drive to allow forensic analysis of its metadata. The information
was to be used to evaluate his claim that an accident had limited
his ability to sit and conduct his Internet-based business.
While the plaintiff complained that disclosure of the data
would violate his privacy rights, the court found the data was
both relevant and probative, and that the privacy interests of
the plaintiff could be protected through the terms and condi-
tions of the production order.
Patricia Mitchell, a partner with Stewart McKelvey in Hali-
Recovery | 15
I think the big impact for personal injury insurance
litigation is that I am now my own private
investigator, putting myself under surveillance.“ “
Timothy Banks, Dentons Canada
Personal Injury Investigations
Slips, Trips, Falls
Building Code Compliance
Motor Vehicle Accidents/Injuries
Ladder Failures
Municipal Liability
Construction
Deficiencies
Environmental
Services
Fire Investigations
Playground Injuries
1·800 ·920 ·5854www.caskanette.on.ca
Kitchener · London · Cambridge · Burlington
EXPERIENCED · TRUSTED · PROMPT
3. 16 | RECOVERY ALL images BY istockphoto.com
fax, represented the defendants in the case. She said that fol-
lowing the Court of Appeal decision, a settlement was reached
in the case so the metadata was never collected.
“I don’t know if that court order had any impact on the de-
sire to settle on the part of the plaintiff but I know it did re-
solve not long afterwards,” she said.
She believes the court’s decision was helpful in laying out
a three-step method of analysis for considering requests for
electronic data.
“The real analysis —as with any piece of evidence that a
party wants to admit in a case — is whether it’s relevant to the
issues between the parties.”
“It makes a lot of sense to me that data from wearable de-
vices may very well be relevant in the personal injury context.”
The courts may also very well make that determination,
says Banks.
“Just because it comes from a wearable and just because it
may be sitting in the cloud doesn’t mean it isn’t subject to the
ordinary rules of production and evidence as other data in a
lawsuit,” he said.
While courts will have to evaluate the sensitivity of the infor-
mation being collected and its relevance in the case at hand, he
predicts there will be an initial flurry of cases in personal injury
and employee litigation that will see wearable data requested.
“I think we’ll see the same type of pattern as we did with social
media — the court initially giving the benefit of the doubt to its
relevance and then later being a bit more circumspect as to when
the data is relevant and needs to be produced,” said Banks.
As courts grapple with how to wisely use the increasingly
pervasive technologies, Pearn suggests one of the biggest chal-
lenges for lawyers will be to provide judges with satisfactory
explanations of the technology and some comfort that the in-
formation they generate is probative.
“It’s a new kind of tool in the litigation tool kit and I think
the courts will really struggle with whether this is too deep an
invasion into someone’s private life,” he said.
Even privacy regulators have been struggling to manage the
implications of rapidly developing technologies, said Banks. In
an attempt to protect individuals from “unanticipated bad out-
comes” related to their electronic data, he says most Canadian
and European privacy regulators have been employing the pre-
cautionary principle when dealing with new technology.
Canada’s privacy law landscape is also evolving, says Karen
Eltis, a law professor at the University of Ottawa and author of
Courts, Litigants and the Digital Age.
While Canadian courts have been fairly open to admitting
digital data as a new form of evidence, she believes a recent
evolution toward “a far more robust” interpretation of privacy
4. Recovery | 17
rights may have a significant impact on electronic evidence.
In particular, she points to the 2014 Supreme Court decision
in R. v. Spencer [2014] S.C.J. No. 43, which considered digi-
tal privacy implications in the criminal law context and found
that police required a warrant to obtain IP subscriber data.
“If courts are recognizing that IP subscriber data is intimate
information, that it’s not like a phone book ... well, Fitbit
seems intuitively more intimate,” she says.
Even when courts do admit data arising from new technolo-
gy, she warns against the dangerous tendency to imbue it with
an “illusion of infallibility.”
Pointing to early DNA evidence that resulted in wrongful
convictions and GPS devices that led drivers miles out of their
way, Eltis says data from new technology needs to be ques-
tioned, authenticated and understood in context.
“These things can be really misleading if de-contextual-
ized,” she says.
Data from wearables may also become less reliable over time
if people become aware of its discoverability and begin to dis-
tort or manipulate the data as a result, she adds.
“At the time being, the mystique and the novelty is what
these things have going for them in terms of evidence, but as
that erodes we’ll have to perhaps revisit the value of the use of
such devices in court.”
Katz agrees that small samples of the digital data from wear-
able devices could be misleading, just as a Facebook photo of
a party or vacation can be misinterpreted. And while it may
have value for plaintiffs in some circumstances, it may also
work against them in other cases.
“Like everything, it’s just one other potentially complicat-
ing factor that lawyers will have to look at in the basket of
evidence that they have to try and piece out the strengths and
weaknesses of their case and how to present it.”
It’s a new kind of tool
in the litigation tool kit
and I think the courts
will really struggle with
whether this is too
deep an invasion into
someone’s private life.
“ “
Matthew Pearn, Lawyer
The effects of an accident
are felt far beyond the impact.
Plaintiff financing
fast so families don’t
have to suffer.
Call or visit us online.
1 · 888 · 285 · 7333
SEAHOLD.CA
We’ve helped thousands of families continue
to meet their financial obligations while they
wait for their personal injury claim to settle.
At SEAHOLD we supply plaintiff financing
fast so families don’t have to suffer.
PLAINTIFF FINANCING. MADE EASY.
SEAHOLD