transparency for legal machines
play

transparency for legal machines Vytautas YRAS Vilnius University - PowerPoint PPT Presentation

Compliance and software transparency for legal machines Vytautas YRAS Vilnius University Vytautas.Cyras@mif.vu.lt Friedrich LACHMAYER Vienna University of Innsbruck www.legalvisualization.com Tallinn, 8-11.06. 2014 Contents 1. Legal


  1. Compliance and software transparency for legal machines Vytautas Č YRAS Vilnius University Vytautas.Cyras@mif.vu.lt Friedrich LACHMAYER Vienna University of Innsbruck www.legalvisualization.com Tallinn, 8-11.06. 2014

  2. Contents 1. Legal machines – E-proceedings via forms in the Internet • E.g. tax declarations – Making the architecture transparent 2. Defining compliance – e-services are in the background – Each artefact can cause harm, e.g.: • Message can cause hart attack • Pencil can serve as a murder tool 3. The concept of subsumption 2

  3. 1. Legal machines 3

  4. Machines produce legal acts • Actions with legal importance and legal consequences • Institutional facts Examples: 1) Actor • vending machines • traffic lights • computers in organisations or • workflows • human being • machine 2) Actor Actor Action 4

  5. Factual acts (raw facts) ‘ Alice puts coins in her piggy bank’ Action Effect Condition Actor • human being • machine 5

  6. Legal acts: impositio ‘ Chris puts coins in the ticket machine’ ‘ Policeman raises hand’ Legal Legal Legal Legal condition actor action effect Actor Condition Action Effect • human being • machine Institutional facts and legal institutions (McCormick & Weinberger 1992) 6

  7. 2. Legal machines and transparency 7

  8. Machines are not flexible • You can argue with an operator • You cannot argue with a machine – E.g. “credit card declined” • You can violate legal rules • You cannot violate technical rules 8

  9. Changeover Machine culture Text culture 9

  10. Technical changeover ‘legal text’  ‘program’ General Norm Legal machine Law program Decree No access Published Machine culture Text culture 10

  11. Technical changeover ‘legal text’  ‘program’ General Norm Legal machine Law program Decree No access Published Legal machine Ticket machine Form proceedings  Problems 11

  12. General Norm Law Decree Published 2. Ex-post legal 1. Transparency protection Individual Norm Court judgement Administrative decision These 2 means were not from the beginning. They were trained in the course of time, but now come as a standard. Party Text culture 12

  13. Technical changeover ‘legal text’  ‘program’ General Norm Legal machine Law program Decree No access Published 2. Ex-post legal 1. Transparency protection Individual Norm Court judgement Administrative decision However, these 2 standards are missing in the beginning of machine culture. Party Machine culture Text culture 13

  14. Legal machine program No access 1. Lack of transparency legal protection 2. No ex-ante These 2 standards are missing in the beginning of machine culture. Legal machine Therefore we address them. Ticket machine Form proceedings Party 14

  15. Requirement 1: Legal machine The architecture of software software should be available No access 1. Lack of transparency legal protection 2. No ex-ante Requirement 2: Software should provide a Legal machine trained, effective and rapid legal protection Ticket machine Form proceedings Example1. The law provides 10 variations but the program contains only 9. Example 2. A ticket machine gives no money back. This makes a problem for customers Party expecting change from banknotes. 15

  16. Goal Equal standard of transparency and legal protection in text culture and machine culture 16

  17. Technical transformation ‘legal text’  ‘program’ General Norm Legal machine Law program Decree No access Published 1. Lack of 2. Ex-post legal transparency 1. Transparency legal protection 2. No ex-ante protection Individual Norm Legal machine Court judgement Ticket machine Administrative decision Form proceedings Party Party Machine culture Text culture 17

  18. 3. Compliance 18

  19. Compliance problem (Julisch 2008) “Sell” compliance, not security. Given an IT system S and an externally imposed set R of (legal) requirements. 1. Make S comply with R 2. Provide assurance that auditor will accept as evidence of the compliance of S with R 1. Formalise R 2. Identify which sub-systems of S are affected by R 3. Determine what assurance has to be provided to show that S is compliant with R 4. Modify S to become compliant with R and to provide the necessary assurance 19

  20. Holistic view to compliance Rasmussen 2005; IT GRC COSO COBIT, ISO 17779, GORE Regulation and IT alignment framework (Bonazzi et al. 2009) 20

  21. Comparison Artificial Intelligence. Informatics and law. Alan Turing Compliance • “Can machines think ?” • “Does a software system comply with law ?” Definitions of the meaning of the terms: • ‘ law ’ and ‘ comply ’ • ‘ machine ’ and ‘ think ’ Both questions are ill formulated in the sense that: - can’t be answered ‘yes’/‘no’ - not a ‘decidable’/‘ undecidable ’ problem an answer depends on philosophical assumptions Goal of AI: “ enhancing rather than simulating human intelligence” - first understand then start programming 21

  22. Machine- based or machine- assisted decision making? Plaintiff Defendant Case Factual situation Judge-machine Judge-machine Law Formalistic approach to the law No! Mechanistic subsumption Legal decision 22

  23. Standard cases, hard cases, emergency cases Case Judge-machine Legal machine Hard cases – “No” Emergency cases – Standard cases – “Yes” not applicable Legal decision 23

  24. “Accept” ≠ effective consent Accept) 24

  25. Noncompliant scenario • The fictitious company, “ KnowWhere ” offers a “Person Locator App” which can track the user’s location who has installed the app on his smartphone. • The app accesses the GPS of the smartphone and sends the coordinates and a Facebook ID to the server. • KnowWhere relies on Google Maps. • The “Person Locator Portal” – Shows maps with user positions and Facebook IDs – The server collects all user locations and uses Google Maps to highlight their positions on the map. See Oberle et al. 2013, http://script-ed.org/?p=667 25

  26. Legal reasoning Question: Is the disclosure of user data to Google lawful? Answer: No. – Question 1: Is permission or order by the law provided? No. – Question 2: Has the data subject provided consent? No. The users are not informed about the transfer of personal data from KnowWhere to Google. Therefore, effective consent is not given. Accept) Conclusion : Data transfer from KnowWhere to Google cannot be justified. Therefore KnowWhere violates data privacy law. 26

  27. Modelling legal norms as rules state_of_affairs → legal_consequences if condition then effects else sanction ((Collection(X) OR Processing(X) OR Use(X)) AND performedUpon(X,Y) AND PersonalData(Y)) AND (Permission(P) OR Order(P)) AND givenFor(P,X))) OR (Consent(C) AND DataSubject(D) AND about(Y,D) AND gives(D,C) AND permits(C,X)) → Lawfulness(P) AND givenFor(P,X) See also Kowalski, Sergot, etc. 27

  28. 4. Subsumption 28

  29. Subsuming a fact to a legal term Aiding Death Military Legal term ... Murder Manslaughter suicide sentence act A : instance_of Fact a: Dead body 2) Normative A → B A & C → D Legal term: A ... subsumption 1) Terminological subsumption Conclusion, Fact: a B (a) judgment 29

  30. Difficulties inherent in law 1. Abstractness of norms . Norms are formulated (on purpose) in abstract terms 2. Principle vs. rule . The difference in regulatory philosophy between the US and other countries 3. Open texture . Hart’s example of “Vehicles are forbidden in the park” 4. The myriad of regulatory requirements . Compliance frameworks are multidimensional 5. Legal interpretation methods . The meaning of a legal text cannot be extracted from the sole text – grammatical interpretation, – systemic interpretation – teleological interpretation 30

  31. Thank you Vytautas.Cyras@mif.vu.lt Vytautas.Cyras@mif.vu.lt 31

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend