Commentary: Surge of body-worn police video demands we adopt policies to secure data

Jeff Gould by Jeff Gould,
Wednesday, February 03, 2016

Body-worn camera video needs to be protected by the strongest data standards available. The FBI’s Criminal Justice Information Service (CJIS) Security Policy, developed over many years by the FBI with extensive input from state and local law enforcement agencies, is made-to-order for the task. The CJIS Security Policy is designed to ensure that the information which flows from the FBI’s vast national database to local law enforcement agencies is protected both from outside hackers and inside leaks.

Privacy Considerations For Evolving Video Surveillance

Bradley Shear by Bradley Shear, Law Office of Bradley S. Shear
Wednesday, January 27, 2016

During President Obama’s final State of the Union address earlier this month, he drew attention to the rapid pace of change brought about by technology and innovations, explaining that these changes are “reshaping the way we live, the way we work, our planet, our place in the world. … And whether we like it or not, the pace of this change will only accelerate.” The president could not be more correct. While the world has significantly changed since President Obama took office in 2009, the laws and regulations governing the technology that has driven this change have not kept pace.

Demand for body-worn cameras must be met with highest standards of data security

Karen Evans by Karen Evans, KE&T Partners
Friday, January 22, 2016

A group of unlikely allies came together in Washington this week to discuss the best ways to implement body-worn cameras at law enforcement agencies across the country. The event featured speakers from the International Association of Chiefs of Police, the National District Attorneys Association, the ACLU and other organizations. The participants discussed creating and managing body-worn camera programs and addressed the need for the highest data security and privacy protections for body-worn camera video.

Section 508, WCAG 2.0, Oh My!

Tracy Mitrano by Tracy Mitrano, Mitrano & Associates
Tuesday, January 12, 2016

About accessibility for higher education in the United States: I am concerned that our institutions have two sets of standards with which to comply and how higher education might respond to that fact. The first are section 508 standards of the Rehabilitation Act... The other set is that of the Web Content Accessibility Guidelines or “WCAG” 2.0.

Body-Worn Cameras: In Support of Justice on University Campuses

Tracy Mitrano by Tracy Mitrano, Mitrano & Associates
Monday, January 11, 2016

For higher education institutions, it is time to take a leadership role to ensure the strongest security protocols are in place for proper management of data produced by body-worn and surveillance cameras. In law enforcement, this is the FBI's Criminal Justice Information Services (CJIS) security policy...

Encryption is Not Enough to Protect Cloud Data — Trust Remains Essential

Jeff Gould by Jeff Gould,
Monday, January 04, 2016

End-to-end encryption is not always an option for organizations that require strong data protection but cannot renounce the benefits of the cloud. The only alternative to encryption is trust. Organizations that entrust sensitive data to cloud providers for encryption-unfriendly applications such as automated video redaction must have a very high degree of confidence in those providers.

2016: Year of Internet Standards

Tracy Mitrano by Tracy Mitrano, Mitrano & Associates
Monday, January 04, 2016

Five areas of Internet law and policy stand out: privacy, security, accessibility, intellectual property and governance. A central theme undergirds them all: standards. Hence I shall deem 2016 the Year of Internet Standards. Today I begin with privacy. Privacy is the most important area of law in the 21st century. It is brought to you by technology pushing the social norms envelope. It is also sufficiently comprehensive of a topic as to cover a wide swath of different types of law. Finally, privacy just might turn out to be the vocabulary that has the greatest chance to harmonize law and policy practices on the Internet.

10 Implications of the New EU General Data Protection Regulation (GDPR)

Daniel J. Solove by Daniel Solove, TeachPrivacy
Wednesday, December 23, 2015

The GDPR has been many years in the making, and it will have an enormous impact on the transfer of data between the US and EU, especially in light of the invalidation of the Safe Harbor Arrangement earlier this year. It will has substantial implications for any global company doing business in the EU. The GDPR is anticipated to go into effect in 2017.

A better way to fight terror with tech

Michael Chertoff by Michael Chertoff, Chertoff Group
Tuesday, December 22, 2015

Tension between the tech community and U.S. law enforcement agencies over privacy versus security is on the rise. But it's time for everyone to step back and take some of the drama out of the debate. There is much that the tech community and law enforcement can agree on. They can agree that we need a smooth, efficient legal process in place to provide law enforcement with access to information it needs to do its job. They can agree on the value of protecting end user privacy. And, they can agree that, in the long run, the globalized nature of the network requires us to forge international agreements that facilitate these two outcomes across international borders.

Data security is key to police body cameras

Bradley Shear by Bradley Shear, Law Office of Bradley S. Shear
Wednesday, December 09, 2015

It is possible to hack body-worn camera systems to create a threat to public safety. Personal information — especially video recordings of those who have been victims of domestic violence, sexual assault or child abuse — should be afforded the strongest security protections. The International Association of Chiefs of Police recommends that “law enforcement agencies should generally store all collected data at the highest level of security .” Since body-worn camera footage may contain the most sensitive information recorded, the Metropolitan Police Department should be required to implement the strongest security protocols.