Lukas Feiler, Ph.D., SSCP, CIPP/E

Size: px
Start display at page:

Download "Lukas Feiler, Ph.D., SSCP, CIPP/E"

Transcription

1 CURRICULUM VITAE PERSONAL DATA Name Address Lukas Feiler, Ph.D., SSCP, CIPP/E Leopoldsgasse 21/1/4; A-1020 Vienna, Austria Phone ; cell: Web Nationality Austria Date of birth May 25, 1983 PROFESSIONAL EXPERIENCE RECORD since September 2014 December 2012 until August 2014 April 2011 to November 2012 August 2009 to December 2009 and October 2008 to January 2009 March 2009 to July 2009 October 2005 to March 2011 September 2006 August 2006 July and August 2004 and March 2005 to March 2011 November 2003 to February 2004 and October 2006 to March 2011 September 2000 to October 2003 and July 2000 Associate and head of Information Technology/Intellectual Property practice group at Baker & McKenzie Diwok Hermann Petsche Rechtsanwälte (bakermckenzie.com), Vienna Lawyer at Baker & McKenzie Diwok Hermann Petsche Rechtsanwälte (www.bakermckenzie.com), Vienna Practice group Information Technology/Intellectual Property Associate at Wolf Theiss Attorneys at Law (www.wolftheiss.com), Vienna Practice group Information Technology/Intellectual Property Clerkships with the Austria District Court Leopoldstadt, the Regional Criminal Court Vienna and the Commercial Court Vienna Traineeship with the European Commission, DG Information Society and Media, Unit A3 "Internet; Network and Information Security", Brussels E-Center European Center for E-Commerce and Internet Law (www.e-center.eu), Vienna Vice Director (part time) Internship with Wolf Theiss Attorneys at Law (www.wolftheiss.com), Vienna Practice group Information Technology/Intellectual Property Fiaxon Ltd. (www.fiaxon.co.uk), Leeds, UK Development of a VoIP ITSP management solution with PHP and MySQL Empowered Media Corp. (www.empoweredmedia.com), New York, NY Application developer and network administrator; starting March 2005, remotely from Vienna on a part time basis NEA Senoner KEG (www.nea.at), Vienna Database designer and system administrator; IT security consulting services (part time) Endlos Produktion Kusch Senoner OEG (www.endlos.at), Vienna Application developer and system administrator (part time) CV Lukas Feiler, June 2015 page 1

2 TEACHING ACTIVITY since since March 2014 since March 2014 since September 2012 August 2002 to March 2006 February 2006 Teaching assignment for IT Compliance and Information Security Management at the University of Applied Sciences Burgenland Teaching assignment for European and International Privacy Law as part of the LLM Program in European and International Business Law at the University of Vienna School of Law Teaching assignment for IT Compliance as part of the master program IT Management at the University of Applied Sciences Wiener Neustadt Lecturer for Compliance Data Protection / Liability in the Compliance Area as part of the Academy for Compliance Management at the Academy for Law, Taxes, and Business (ARS) SAE Technology Institute Vienna (www.sae.edu), Lecturer for IT project planning, Networking, PHP & MySQL, and Hacking & Computer Crime Law Pädagogisches Institut des Bundes in Wien (http://www.pib-wien.ac.at), Vienna Lecturer for Linux System Administration MILITARY SERVICE, VOLUNTARY SERVICES October and November 2008 Voluntary non-partisan voter registration for the U.S. elections on November 4 th 2008 October 2001 to May 2002 July 1999 and August 2000 Military service guard, guard commander Voluntary work with the National Trusts of England and Scotland in environmental projects EDUCATION & CERTIFICATION February 2015 October 2013 since November 2009 since August 2009 February & March 2010 March 2009 October 2008 to May 2011 August to December 2007 October 2002 June 2008 CIPP/E (Certified Information Privacy Professional/Europe) certification awarded by the International Association of Privacy Professionals (IAPP); Exams taken in Dec. & Feb Passing of the Austrian Bar Exam with the mark Very Good The Europe Center (TEC) Research Fellow Freeman Spogli Institute for International Studies at Stanford University see Stanford-Vienna Transatlantic Technology Law Forum (TTLF) Fellow The TTLF is a transatlantic academic partnership between the Stanford Law School Program in Law, Science & Technology and the University of Vienna School of Law; see Research at Stanford Law School SSCP (Systems Security Certified Practitioner) certification awarded by the International Information Systems Security Certification Consortium, (ISC)²; Exam taken in Paris, Feb Ph.D. in law (Dr. iur.) with distinction from the Vienna University, Faculty of Law Thesis title: Information Security Law in the EU and the U.S. A Risk-Based Assessment of Regulatory Policies Recipient of a University of Vienna Research Grant 2010 Recipient of a research grant under the Stanford University Advanced Graduate Student Exchange Program Santa Clara University School of Law, exchange student courses: Copyright Law (A), Patent Law (A-) and Cyberspace Law (B) Law Degree (Mag. iur.) from the Vienna University, Faculty of Law ranked top 1% for 2005/06; top 8% of all graduates in 2007/ Erich Fried Gymnasium, Vienna; school leaving certificate with distinction CV Lukas Feiler, June 2015 page 2

3 PERSONAL SKILLS AND COMPETENCES GERMAN mother tongue ENGLISH excellent (reading, writing, speaking), TOEFL score: 111 of 120 FRENCH LEGAL SPECIALIZATION IT-SKILLS OTHER SKILLS Basic - Copyright law - Data protection law - E-commerce law - Telecommunications law - Competition and trademark law - IP/IT law in the U.S. - Application development: PHP, Java, Perl, C, Assembly (IA-32) - System and network administration: Linux, OpenBSD, FreeBSD, Solaris, and Windows - Database administration: Oracle, InterBase, Firebird, MySQL, and Microsoft SQL Server - Excellent communication and presentation skills - Team-orientation and networking skills PUBLICATIONS, RESEARCH PAPERS June 2015 May 2015 May 2015 April 2015 December 2014 November 2014 November 2014 November 2014 Lukas Feiler & Holger Lutz, Schlüsseldienste im Visier: Haftung von Zertifizierungsstellen für falsch ausgestellte SSL-/TLS-Zertifikate [Aiming at the Key Service: Liability of Certificate Authorities for Incorrectly Issued SSL/TLS Certificates], c t 14/2015, at 146 (F.R.G.). JOACHIM SCHERER, LUKAS FEILER, CAROLINE HEINICKEL & HOLGER LUTZ, DIGITALER KODEX ZUM ÄNDERUNGSBEDARF DES RECHTSRAHMENS AUFGRUND DER KONVERGENZ STUDIE IM AUFTRAG DER AKTIONSLINIE HESSEN-IT DES HESSISCHEN MINISTERIUMS FÜR WIRTSCHAFT, ENERGIE, VERKEHR UND LANDESENTWICKLUNG [ DIGITAL CODEX ON THE NEED FOR AMENDMENT OF THE LEGAL FRAMEWORK DUE TO CONVERGENCE STUDY COMMISSIONED BY THE ACTION LINE HESSEN-IT OF THE HESSIAN MINISTRY OF ECONOMICS, TRANSPORTATION, AND URBAN AND REGIONAL DEVELOPMENT] (2015) (F.R.G.). Lukas Feiler, Zur Vergütung von Vervielfältigungen zum privaten Gebrauch auf Speicherkarten für Mobiltelefone Entscheidungsanmerkung zu EuGH , C-463/12, Copydan Båndkopi/Nokia Danmark A/S [The Compensation for Private Copies on Storage Cards of Mobile Phones Case Note on ECJ case no. C-463/12, Copydan Båndkopi v. Nokia Danmark A/S], 2015 ZEITSCHRIFT FÜR INFORMATIONSRECHT [ZIR] 190 Lukas Feiler & Georg Krakow, Staatsschutz: Die Freiheit als Preis? [State Security: Is Freedom the Price?], DER STANDARD, April 8, 2015, at 31 Lukas Feiler & Holger Lutz, Data Disposal Security Requirements under EU, Austrian and German Law, WORLD DATA PROTECTION REPORT, Volume 15, No. 3,. Georg Diwok & Lukas Feiler, Internetriesen wollen Zahlungsdienste ohne Banken [Internet Giants Want Payment Service without Banks], DER STANDARD, December 4, 2014, at 17 Lukas Feiler, Informationsfreiheit vs. Datenschutz - Datenschutz als Hemmschuh und Wegbereiter für das Grundrecht auf Zugang zu amtlichen Informationen [Freedom of Information v. Data Protection Data Protection as Roadblock and Driver of the Fundamental Right to Access to Government Information], in JAHRBUCH DATENSCHUTZRECHT 2014 [YEARBOOK DATA PROTECTION LAW 2014] 55 (Dietmar Jahnel ed., 2014) Caroline Heinickel & Lukas Feiler, Neuer Referentenentwurf zum IT-Sicherheitsgesetz [New Proposal for the IT Security Act], CR-ONLINE.DE, November 17, 2014 (F.R.G.). Caroline Heinickel & Lukas Feiler, Der Entwurf für ein IT-Sicherheitsgesetz europarechtlicher Kontext und die (eigentlichen) Bedürfnisse der Praxis [The Draft for an IT Security Act EU Law Context and (Actual) Business Needs], 2014 COMPUTER UND RECHT 708 (F.R.G.). CV Lukas Feiler, June 2015 page 3

4 November 2014 Lukas Feiler & Bernhard Kainz, Veröffentlichte Inhalte zur freien Verwendung? [Published Content Free for the Taking?], DIE PRESSE, November 3, 2014, at 16 Lukas Feiler, Pflichten zur sicheren Datenentsorgung [Secure Data Disposal Duties], 2014 MEDIEN UND RECHT 274 September 2014 Lukas Feiler & Marc Lager, Regulator will unlauteren Gewinn kassieren [Regulator Wants to Seize Unfair Profit], DER STANDARD, September 29, 2014, at 11 July 2014 May 2014 March 2014 March 2014 January 2014 January 2014 November 2013 November 2013 July 2013 May 2013 March 2013 February 2013 February 2013 January 2013 December 2012 Lukas Feiler & Marc Lager, Die Mühen des Onlinevertriebs [The Troubles of Online Distribution], WIRTSCHAFTSBLATT, July 24, 2014, at 10 Alexander Schnider, Lukas Feiler & Bernhard Kainz, Die Leerkassettenvergütung für Computerfestplatten und Smartphone-Datenspeicher [The Copyright Levy on Computer Hard Discs and Smartphone Data Storage Media], 2014 ÖSTERREICHISCHE BLÄTTER FÜR GEWERBLICHEN RECHTSSCHUTZ UND URHEBERRECHT [ÖBL] 113 Lukas Feiler & Alexander Schnider, Webgesperrt: Europäischer Gerichtshof bejaht Website- Sperrungen bei Urheberrechtsverletzungen [Webblocked: European Court of Justice Affirms Website Blockings in Case of Copyright Infringement], c t 10/2014, at 160 (F.R.G.). Lukas Feiler & Alexander Schnider, EU-Gericht entzieht Festplattenabgabe ihre Grundlage [EU Court Destroys Basis for Private Copying Levy for Hard Disks], DER STANDARD, April 14, 2014, at 11 Lukas Feiler & Siegfried Fina, Big Data under Austrian Data Protection Law, WORLD DATA PROTECTION REPORT, Volume 14, Number 3, March Imke Gerdes & Lukas Feiler, Bitcoin: Virtuelles Geld im rechtsfreien Raum? [Bitcoin: Virtual Money in a Legal Vacuum], DIE PRESSE, March 3, 2014, at 16 Lukas Feiler & Siegfried Fina, Datenschutzrechtliche Schranken für Big Data [Limits for Big Data under Data Protection Law], 2013 MEDIEN UND RECHT 309 Lukas Feiler & Alexander Schnider, Festplattenabgabe auf Irrwegen [Misguided Private Copying Levy for Hard Disks], DiePresse.com, January 24, 2014 Lukas Feiler, Datenschutzrechtliche Herausforderungen bei internen Compliance- Untersuchungen [Data Protection-Related Challenges During Internal Compliance Investigations], in JAHRBUCH DATENSCHUTZRECHT UND E-GOVERNMENT 2013 [YEARBOOK DATA PROTECTION LAW AND E-GOVERNMENT 2013] 143 (Dietmar Jahnel ed., 2013). Lukas Feiler, Soziale Medien Die Demokratisierung der Vierten Gewalt [Social Media The Democratization of the Fourth Estate], in MEINUNGSFREIHEIT - QUO VADIS? JAHRBUCH MENSCHENRECHTE 2012/2013 [FREEDOM OF EXPRESSION QUO VADIS? YEARBOOK HUMAN RIGHTS 2012/2013] 167 (Heiner Bielefeldt et al. eds., 2013). Lukas Feiler, Computerstrafrecht, Datenschutzrecht, Urheberrecht [Computer Crime Law, Data Protection Law, Copyright Law], in DAS NEUE UNTERNEHMENSSTRAFRECHT [THE NEW CORPORATE CRIME LAW] (Daisy Birtalan & Alexander Skribe eds., 2013) Lukas Feiler, Auf Zuruf muss Google Ruf schützen [Upon Request, Google Must Protect Reputation], DIE PRESSE, May 21, 2013, at 11 Lukas Feiler, Die Cybersecurity-Richtlinie der EU-Kommission [The Cybersecurity Directive of the European Commission], SECURITY INSIDER, March 28, 2013, specials/security_corner/management/articles/399543/ Alexander Schnider & Lukas Feiler, Zulässige Privatkopie ist totes Recht [The Right to Private Copying is Dead], DER STANDARD, Feb. 13, 2013, at 9 Lukas Feiler & Alexander Schnider, Teilen eines Links auf Facebook kann strafbar machen [Sharing a Link on Facebook Can Make Criminally Liable], DIE PRESSE, Feb. 4, 2013, at 7 Alexander Schnider & Lukas Feiler, High Noon im Kampf um Technologielizenzen [High Noon in the Fight for Technology Licenses], DER STANDARD, Jan. 9, 2013, at 21 Lukas Feiler & Alexander Schnider, Fragen für User, Antwort für Urheber [Questions for Users, Answers for Copyright Holders], DIE PRESSE, Dec. 10, 2012, at 16 CV Lukas Feiler, June 2015 page 4

5 September 2012 August 2012 July 2012 June 2012 June 2012 May 2012 May 2012 April 2012 April 2012 March 2012 March 2012 February 2012 January 2012 January 2012 Lukas Feiler, Birth of the First-Download Doctrine The Application of the First-Sale Doctrine to Internet Downloads under EU and US Copyright Law, JOURNAL OF INTERNET LAW, Sept. 2012, at 1, based on Lukas Feiler, Birth of the First-Download Doctrine The Application of the First- Sale Doctrine to Internet Downloads under EU and US Copyright Law, Stanford-Vienna Transatlantic Technology Law Forum (TTLF) Working Paper No. 17, Lukas Feiler & Michaela Petsche, EuGH gewährt zweite Chance auf.eu-wunschdomain [ECJ Grants Second Chance to Obtain Preferred.eu Domain], DIE PRESSE, Aug. 6, 2012, at 9 Georg Kresbach & Lukas Feiler, Die Grenzen des Keyword-Advertising [The Legal Limits of Keyword Advertising], RECHT.EXTRAJOURNAL.NET DOSSIER, July 2012, at 12 Georg Kresbach & Lukas Feiler, Neue Net-Adressen erschweren Markenschutz [New Domain Names Complicate Trademark Protection], DER STANDARD, June 27, 2012, at 28 Alexander Schnider & Lukas Feiler, Prozedurale Prosa auf Europäisch Kein Urheberrechtsschutz für Programmiersprachen [Procedural Prose in Europe No Copyright Protection for Programming Languages], c t 13/2012, 154 (F.R.G.). Alexander Schnider & Lukas Feiler, wetter.tv Keine Haftung des Unternehmers für eine Google AdWords-Anzeige, Entscheidungsanmerkung zu OGH , 17 Ob 22/11a [No Liability for a Corporation for a Google AdWord Campaign, Comment on Austrian Supreme Court , 17 Ob 22/11a], 2012 ÖSTERREICHISCHE BLÄTTER FÜR GEWERBLICHEN RECHTSSCHUTZ UND URHEBERRECHT [ÖBL] 119 Lukas Feiler & Michaela Petsche, Wie Urheber im Web zu ihrem Recht kommen könnten [How Copyright Holders Could Enforce Their Rights Online], DIE PRESSE, May 7, 2012, at 16 Lukas Feiler, Facebook-Fremdpostings können teuer werden [Third-Party Facebook Postings Can Come at a High Price], DER STANDARD, Apr. 18, 2012, at 23 Lukas Feiler, Website Blocking Injunctions under EU and U.S. Copyright Law Slow Death of the Global Internet or Emergence of the Rule of National Copyright Law?, Stanford-Vienna Transatlantic Technology Law Forum (TTLF) Working Paper No. 13, Alexander Schnider & Lukas Feiler, Musik für Patienten und Freunde macht keine Abgabe nötig [Music for Patients or Friends Does Not Require Royalty Payments], DIE PRESSE, Mar. 26, 2012, at 16 Lukas Feiler, Website-Sperren sind auch ohne ACTA Realität [Website Blocking Injunctions are Reality even without ACTA], Der Standard, Mar. 7, 2012, at 26 Lukas Feiler, Der Vorschlag der Europäischen Kommission für eine Datenschutz- Grundverordnung der EU [The European Commission s Proposal for a General Data Protection Regulation], 2011 MEDIEN UND RECHT INTERNATIONAL 127 Lukas Feiler, Händler haften für geknackte E-Gutscheine [Merchants Face Liability for Hacked Electronic Gift Certificates], DER STANDARD, Jan. 18, 2012, at 23 Alexander Schnider & Lukas Feiler, Internet-Recht: Eigene Regeln über Online-Fans nötig [Internet Law: Separate Contractual Rules Needed for Twitter Followers], DIE PRESSE, Jan. 16, 2012, at 16 November 2011 Lukas Feiler, Falsche Facebook-Freunde können gesetzwidrig sein [False Facebook Friends Can Be Illegal], DER STANDARD, Nov. 23, 2011, at 23 November 2011 Alexander Schnider & Lukas Feiler, Videospiele: Sanktionen für eilige Verkäufer [Video Games: Sanctions Against Hasty Sellers], DIE PRESSE, Nov. 21, 2011, at 16 November 2011 LUKAS FEILER, INFORMATION SECURITY LAW IN THE EU AND THE U.S. (Springer 2011). October 2011 Lukas Feiler & Ana Stahov, Rechtliche Aspekte der Netzneutralität und ihrer Einschränkung [The Legal Aspects of Net Neutrality and Its Limitation], 2011 MEDIEN UND RECHT 287 October 2011 Lukas Feiler, Zur Frage des anwendbaren Datenschutzrechts: Besser einmal als 27-mal [On the Question of the Applicable Data Protection Law: Better One Time Than 27 Times], DER STANDARD, WIRTSCHAFT & RECHT, Oct. 2011, at 18 September 2011 Lukas Feiler, Outages of Critical Information Infrastructure under EU and U.S. Law Transparency versus Secrecy, JOURNAL OF INTERNET LAW, Sept. 2011, at 1. July 2011 Alexander Schnider & Lukas Feiler, 3D-Druck und die Rechte Dritter [3D-Printing and the Rights of Third Parties], DIE PRESSE, July 18, 2011, at 9 CV Lukas Feiler, June 2015 page 5

6 June 2011 April 2011 March 2011 January 2011 December 2010 December 2010 November 2010 September 2010 July 2010 June 2010 April 2010 October 2009 September 2009 September 2009 May 2009 March 2009 February 2009 Lukas Feiler & Ana Stahov, Die Einführung der Vorratsdatenspeicherung in Österreich [The Implementation of Traffic Data Retention in Austria], 2011 MEDIEN UND RECHT 111 Lukas Feiler, Information Security Law in the EU and the U.S. A Risk-Based Assessment of Regulatory Policies, Stanford-Vienna Transatlantic Technology Law Forum (TTLF) Working Paper No. 9, feiler_wp9.pdf. Lukas Feiler, Separation of Ownership and the Authorization to Use Personal Computers: Unintended Effects of EU and US Law on IT Security, 27 SANTA CLARA COMPUTER & HIGH TECH. L.J. 131 (2011), based on Lukas Feiler, Separation of Ownership and the Authorization to Use Personal Computers: Unintended Effects of EU and U.S. Law on IT Security, Stanford-Vienna Transatlantic Technology Law Forum (TTLF) Working Paper No. 5, sites/default/files/publication/205105/doc/slspublic/feiler_wp5.pdf. Lukas Feiler, Beeinträchtigungen der Meinungsäußerungsfreiheit durch die Zensur des Internets in China und im Iran [Impairment of the Freedom of Expression by Internet Censorship in China and Iran], in NOTHING TO HIDE NOTHING TO FEAR?: DATENSCHUTZ TRANSPARENZ SOLIDARITÄT. JAHRBUCH MENSCHENRECHTE 2011 [NOTHING TO HIDE NOTHING TO FEAR?: DATA PROTECTION TRANSPARENCY SOLIDARITY. YEARBOOK HUMAN RIGHTS 2011] 269 (Heiner Bielefeldt et al. eds., 2011). Lukas Feiler, The Legality of the Data Retention Directive in Light of the Fundamental Rights to Privacy and Data Protection, 1 EUROPEAN JOURNAL OF LAW AND TECHNOLOGY 3 (2010), based on Lukas Feiler, The Legality of the Data Retention Directive in Light of the Fundamental Rights to Privacy and Data Protection, Stanford-Vienna Transatlantic Technology Law Forum (TTLF) Working Paper No. 7, sites/default/files/publication/205103/doc/slspublic/feiler_wp7.pdf. Stephan Steinhofer & Lukas Feiler, Urheberrechtliche Ansprüche auf die Sperrung von Websites durch Access-Provider [Claims Under Copyright Law for the Blockage of Websites by Internet Access Providers], 2010 MEDIEN UND RECHT 322. Lukas Feiler, Facebook: Vor österreichischen Gerichten? [Facebook: Before Austrian Courts?], OUTPUT, Nov. 2010, at 17 (Austria) Lukas Feiler, Jailbreaking Der Ausbruch aus restriktiven Geschäftsmodellen [Jailbreaking Breaking out of Restrictive Business Models], OUTPUT, Sept. 2010, at 15 Lukas Feiler, Data Privacy Unterschiede in EU und USA [Data Privacy Differences in the EU and the USA], OUTPUT, July-Aug. 2010, at 15 Lukas Feiler, Identity Theft - Rechtlicher Rahmen [Identity Theft The Legal Framework], OUTPUT, June 2010, at 15 Lukas Feiler, New Approaches to Network and Information Security Regulation: The EU Telecoms Package, 2 COMPUTER LAW REVIEW INTERNATIONAL 43 (2010) (F.R.G.). Lukas Feiler, Data Breach Notification nach österreichischem Recht [Data Breach Notification under Austrian Law], 2009 MEDIEN UND RECHT 281 Lukas Feiler, Meinungsäußerung: Online anonym [Anonymous Free Speech Online], OUTPUT, Sept. 2009, at 13 Lukas Feiler, Security Breach Notification: Informationspflichten bei der Verletzung der Sicherheit personenbezogener Daten [Security Breach Notification: Obligations to Notify Breaches of the Security of Personal Data], in INNOVATION UND INTERNATIONALE RECHTSPRAXIS - PRAXISSCHRIFT FÜR WOLFGANG ZANKL [INNOVATION AND INTERNATIONAL LEGAL PRACTICE: FESTSCHRIFT FOR WOLFGANG ZANKL] 147 (Lukas Feiler & Maximilian Raschhofer eds., 2009). Lukas Feiler, Data Mining als Anti-Terror-Maßnahme [Data Mining as an Anti-Terror Measure ], OUTPUT, May 2009, at 17 Wolfgang Zankl & Lukas Feiler, Das Fürstentum Liechtenstein als Daten-Standort - Legistische Maßnahmen zur Stärkung der Konkurrenzfähigkeit [The Principality of Liechtenstein as a Location for Data Storage Regulatory Measures to Improve Competitiveness] (2009) (Austria) (unpublished, on file with authors). Lukas Feiler, Freedom of Information: Recht auf Transparenz [Freedom of Information: A Right to Transparency], OUTPUT, Feb. 2009, at 17 CV Lukas Feiler, June 2015 page 6

7 February 2009 September 2008 July 2008 July 2008 May 2008 March 2008 July 2007 June 2007 May 2007 March 2007 LUKAS FEILER ET AL., AUF DEM WEG ZUM ÜBERWACHUNGSSTAAT? NEUE ÜBERWACHUNGSMAßNAHMEN IM BEREICH DER INFORMATIONS- UND KOMMUNIKATIONSTECHNOLOGIE [ON THE WAY TO THE SURVEILLANCE STATE? NEW INFORMATION AND COMMUNICATION TECHNOLOGY SURVEILLANCE MEASURES] (Wolfgang Zankl ed., 2009), cited approvingly in Austrian Constitutional Court [VfGH] , case no. B1031/11. Lukas Feiler, Personenbezogene Daten: Data Breach Notification [Personal Data: Data Breach Notification], OUTPUT, Sept. 2008, at 12 Lukas Feiler, The Data Retention Directive (2008), DataRetentionDirective.pdf. Lukas Feiler, Offene Formate: Eine rechtliche Notwendigkeit [Open Document Formats: A Legal Necessity], OUTPUT, July-Aug. 2008, at 14 Lukas Feiler, Online-Vertrag: Abschluss nur nach Extra-Mail-Bestätigung? [Formation of Online Contracts: Only After Confirmations?], OUTPUT, May 2008, at 15 Lukas Feiler, XML_Query2XML: Von SQL zu XML [XML_Query2XML: From SQL to XML], 3 PHPSOLUTIONS 60 (2008). Lukas Feiler, Second Hand Software - Der Erschöpfungsgrundsatz im österreichischen Urheberrecht [Second Hand Software The First-Sale Doctrine in Austrian Copyright Law], OUTPUT, July-Aug. 2007, at 19 Lukas Feiler et al., Vorratsdatenspeicherung - Kommt der Überwachungsstaat? [Data Retention The Emergence of the Surveillance State?] ANWALT AKTUELL, June 2007, at 30 Lukas Feiler et al., Stellungnahme an den Nationalrat zur Umsetzung der Vorratsdatenspeicherungs-RL [Position Paper Regarding the Implementation of the EU Data Retention Directive, submitted to the Austrian Parliament] (May 29, 2007) (Austria), available at Lukas Feiler, Botnets: Spamming, Phishing und DDoS Attacks im großen Stil [Botnets: Spamming, Phishing and DDoS Attacks on a Large Scale], ANWALT AKTUELL, Mar. 2007, at 30 December 2006 Lukas Feiler, E-Center Information Security Threat Update: Man-in-the-Middle Attacks (2006) (Austria), available at Middle_Attacks.pdf. November 2006 Lukas Feiler, Data Retention: Sinnlose Sache? [Data Retention: A Pointless Effort?], OUTPUT, Nov. 2006, at 17 September 2006 July 2006 June 2006 May 2006 May 2006 March 2006 March 2006 March 2006 Lukas Feiler, E-Center Information Security Threat Update: Social Engineering (2006) (Austria), available at Lukas Feiler, Haften Hersteller oder Händler für Sicherheitslücken in Standardsoftware? [Are Software Producers or Vendors Liable for Security Vulnerabilities in Software?], OUTPUT, July- Aug. 2006, at 17 With contributions regarding the legal protection of databases and software: Antony Raynoschek, Lukas Feiler, Martin Hischenhuber, Katharina Hubik, Karl Lechner, Clemens Stadler & David Wurmbäck, Schutz Geistigen Eigentums in der Informationsgesellschaft [Protection of Intellectual Property in the Information Society] (2006) (unpublished e-center study). Lukas Feiler, E-Center Information Security Threat Update: Botnets (2006) (Austria), available at Lukas Feiler & Achim Brock, E-Center Information Security Threat Update: MS Word 0-day Exploit (2006) (Austria), available at Lukas Feiler & Achim Brock, E-Center Information Security Threat Update: MS Internet Explorer createtextrange() Vulnerability (2006) (Austria), available at Lukas Feiler & Achim Brock, E-Center Information Security Threat Update: DDoS durch DNS Amplification Attacks [E-Center Information Security Threat Update: DDoS through DNS Amplification Attacks] (2006) (Austria), available at Lukas Feiler & Achim Brock, E-Center Information Security Threat Update: Sendmail Race Condition (2006) (Austria), available at CV Lukas Feiler, June 2015 page 7

8 January 2006 Lukas Feiler, Zur strafrechtlichen Beurteilung von IT-Sicherheitslücken [The Significance of IT Security Vulnerabilities under Computer Crime Law] (2008) (Austria), available at In this paper, I argued that hacking did not constitute a crime according to 118a(1) Austrian Criminal Code if performed by exploiting vulnerabilities that do not directly lead to the destruction of data (e.g. command injection, SQL injection, or race conditions). In 2007, pointing to the specific vulnerabilities identified in my paper, the law was amended accordingly. SPEECHES, CONTRIBUTIONS TO CONFERENCES June 2015 June 2015 April 2015 April 2015 November 2014 November 2014 November 2014 Seminar for members of the IT-LAW.AT association on Cybersecurity Recognizing, Assessing, and Reducing Legal Risks, June 12, Lecture on Big Data & Automated Decision Making at the Annual IT Compliance Conference at the Academy for Law, Taxes, and Business (ARS), June 9, 2015 Presentation on The Regulated User at a q/talk of the civil rights organization quintessenz, Vienna, April 28, Presentation on Cybersecurity Insurance Insurable Legal Cyber Risks at the Security Forum 2015 of the Campus Hagenberg, University of Applied Sciences Upper Austria, April 23, Presentation together with Gregor Gessner (Hewlett-Packard Austria) on Bring Your Own Device (BYOD) A Compliance Challenge as part of the event HP BYOD Solutions and Legal Aspects organized by Hewlett-Packard Austria and NIPCON IT Solution GmbH, Graz, March 19, Lecture on Data Protection & IT Compliance as part of the Academy for Compliance Management at the Academy for Law, Taxes, and Business (ARS), March 18, Presentation on Data Protection for Franchisors, Syncon/Baker & McKenzie-Workshop Franchise Aspects, March 10, Lecture on The Foundations of Data Protection Law as part of the course Foundations of Technology Law II at the University of Vienna School of Law, March 10, Presentation on Open Government 2.0 The New Directly Applicable Fundamental Right to Access to Documents, plenary meeting of the Lower Austrian Legal Society, St. Pölten University of Applied Sciences, November 19, Lecture on Data Protection and Copyright at MBA Program Marketing and Distribution at the Danube University Krems, November 19, Presentation on Open Data: Access to Documents according to the case-law of the European Court of Human Rights at the conference Digital2014 organized by the Austrian Computer Society (OCG), November 12, Lecture on Telecommunications Law and Net Neutrality as part of the class General Business Law at the University of Vienna School of Law, October 31, Lecture on Telecommunications Law and Net Neutrality as part of the class Basics of Technology Law I at the University of Vienna School of Law, October 27, Lecture on "Internal Investigations", Business Circle, October 6, September 2014 June 2014 Lecture on Data Protection & IT Compliance as part of the Academy for Compliance Management at the Academy for Law, Taxes, and Business (ARS), September 16, Lecture on EU Data Protection Law, LL.M. European and International Business Law, University of Vienna, June 14, Presentation on Internal Compliance Investigations: Data Protection Challenges at the Security Forum 2014 of the Campus Hagenberg, University of Applied Sciences Upper Austria, April 10, Lecture on Data Protection Law at the Vienna University of Technology, April 4, CV Lukas Feiler, June 2015 page 8

9 March 2014 March 2014 Lecture on Telecommunications Law and Net Neutrality at the Vienna University of Technology, March 28, Lecture on Compliance Data Protection / Liability in the Compliance Area as part of the Academy for Compliance Management at the Academy for Law, Taxes, and Business (ARS), March 13, February 2014 Guest lecture on Cyber Forensics at the Erich Fried high school (BRG9), February 18, December 2013 October 2013 June 2013 Lecture on Data Protection Law and International Corporate Practice, General Management MBA TU/DU and General Management MBA EIPOS, Danube University Krems, 9 December Lecture on Telecommunications Law and Net Neutrality as part of the class Basics of Technology Law I at the University of Vienna School of Law, October 15, Lecture on EU Data Protection Law, LL.M. European and International Business Law, University of Vienna, June 22, June 2013 Presentation on Legal Risks of Big Data at the (ISC)² Austria Chapter Meeting, June 6, April 2013 Presentation on Big Data Big Liability? at the Security Forum 2013 of the Campus Hagenberg, University of Applied Sciences Upper Austria, April 17, March 2013 Lecture on Data Protection at the Danube University Krems, March 7, December 2012 November 2012 November 2012 Presentation on Data Loss Prevention Legal Challenges in the Fight against Data Loss, Deloitte Cyber Security Event, December 4, Presentation of my TTLF Working Paper Website Blocking Injunctions under EU and U.S. Copyright Law at the Economic and Social Research Council (ESRC) Workshop "What digital Future?", organized by the University of Vienna s Media Governance and Industries Research Group, November 22, Lecture on Telecommunications Law and Net Neutrality as part of the class Basics of Technology Law I at the University of Vienna School of Law, November 13, October 2012 Guest lecture on Identity Theft at Stubenbastei high school (GRG1), October 15, October 2012 October 2012 Lecture on Data Protection as a Challenge for Corporations at the Danube University Krems, October 12, Presentation at the Erste Bank Security Symposium on Security Breaches: Legal Remedies Before and After an Emergency, October 10, October 2012 Guest lecture on Social Engineering at the Erich Fried high school (BRG9), October 3, September 2012 September 2012 June 2012 June 2012 April 2012 April 2012 April 2012 January 2012 Lecture at the annual conference IT-Compliance Fully Compliant Use of Information Technology in the Enterprise, September 26, Presentation together with Kurt Retter on Duties to Provide Cyber Security and Appropriately React to Security Breaches as part of the Marsh Austria event Cyber Risks The Underestimated Threat, September 25, Lecture on Data Protection and ISP Liability from an International Perspective at the Danube University Krems, June 19, Lecture on European E-Commerce & Telecommunications Law at the Santa Clara University Summer School in Vienna, June 1 and June 4, Lecture on Copyright Law & Information Technology in Practice as part of the class Advanced Aspects of IT-Law at the Vienna University of Technology, April 26, Lecture on Telecommunications Law From Net Neutrality to Traffic Data Retention as part of the class European Technology Law at the Vienna University of Technology, April 20, Talk on Security Breaches: Legal Emergency Measures for Affected Corporations at the Security Forum 2012 of the Campus Hagenberg, University of Applied Sciences Upper Austria, April 18, Talk on Legal Challenges in the Area of Critical Information Infrastructure Protection at the 8 th annual Security Day at the St. Pölten University of Applied Sciences, January 31, CV Lukas Feiler, June 2015 page 9

News, Events & Publications

News, Events & Publications News, Events & Publications Lukas Feiler Publications Author, "Zur Vergütung von Vervielfältigungen zum privaten Gebrauch auf Speicherkarten für Mobiltelefone [The Compensation for Private Copies on Storage

More information

Univ.-Prof. Dr. Stephanie Schiedermair

Univ.-Prof. Dr. Stephanie Schiedermair Univ.-Prof. Dr. Stephanie Schiedermair Born on 13 May 1977 in Heidelberg Chair of European Law, International Law and Public Law Burgstraße 21 04109 Leipzig stephanie.schiedermair@uni-leipzig.de http://www.uni-leipzig.de/~eurlaw/eurlaw/

More information

Website Blocking Injunctions under EU and US Copyright Law

Website Blocking Injunctions under EU and US Copyright Law Website Blocking Injunctions under EU and US Copyright Law Slow Death of the Global Internet or Emergence of the Rule of National Copyright Law? Lukas Feiler, Ph.D., SSCP Stanford-Vienna Transatlantic

More information

PROFESSOR DR. SIEGFRIED FINA Jean Monnet Professor of European Union Law Associate Professor of European Union Law and Technology Law

PROFESSOR DR. SIEGFRIED FINA Jean Monnet Professor of European Union Law Associate Professor of European Union Law and Technology Law PROFESSOR DR. SIEGFRIED FINA Jean Monnet Professor of European Union Law Associate Professor of European Union Law and Technology Law EDUCATION 1989 Diploma in Business Administration, Vienna University

More information

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TERMS & CONDITIONS www.tagadab.com INTRODUCTION Tagadab has created this (AUP) for our customers to protect our resources, our customer s resources, and to ensure that Tagadab Ltd

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D

More information

Dr. Ulf Heil. Practice Areas. Practice Summary

Dr. Ulf Heil. Practice Areas. Practice Summary Dr. Ulf Heil German Attorney at Law since 1981 Certified Intellectual Property Law Specialist since 2007 Lecturer at the Academy for Music and the Formative Arts in Frankfurt Partner at SCHIEDERMAIR since

More information

Statement on the general concept of the European Union towards Data Protection by Aktion Freiheit statt Angst e.v.; EU Register ID 17019643006-45

Statement on the general concept of the European Union towards Data Protection by Aktion Freiheit statt Angst e.v.; EU Register ID 17019643006-45 Berlin, 10. Januar 2011 Aktion Freiheit statt Angst Rochstr. 3 Directorate-General Justice Unit C3 Data protection European Commission B - 1049 Brussels Statement on the general concept of the European

More information

Client Update A New Ruling by the French Data Protection Authority: Is the Right to Be Forgotten Crossing the Atlantic to the U.S.?

Client Update A New Ruling by the French Data Protection Authority: Is the Right to Be Forgotten Crossing the Atlantic to the U.S.? 1 Client Update A New Ruling by the French Data Protection Authority: Is the Right to Be Forgotten Crossing the Atlantic to the U.S.? NEW YORK Jeremy Feigelson jfeigelson@debevoise.com PARIS Frederick

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

FRANCE. Chapter XX OVERVIEW

FRANCE. Chapter XX OVERVIEW Chapter XX FRANCE Merav Griguer 1 I OVERVIEW France has an omnibus privacy, data protection and cybersecurity framework law. As a member of the European Union, France has implemented the EU Data Protection

More information

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES. Brightcore Consulting Moodle Hosting Service Agreement Last Revised: September 30, 2013 PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

More information

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies

More information

Information Security Handbook

Information Security Handbook Information Security Handbook Adopted 6/4/14 Page 0 Page 1 1. Introduction... 5 1.1. Executive Summary... 5 1.2. Governance... 5 1.3. Scope and Application... 5 1.4. Biennial Review... 5 2. Definitions...

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information

[TITLE IN CAPS, VERDANA, 32]

[TITLE IN CAPS, VERDANA, 32] [TITLE IN CAPS, VERDANA, 32] On-line piracy, and the intermediaries Joris van Manen FORDHAM meeting New York, April 4th, 2013 On-line counterfeit on the rise Increasing numbers of on-line counterfeit and

More information

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance Evolving Threats and Attacks: A Cloud Service Provider s viewpoint John Howie Senior Director Online Services Security and Compliance Introduction Microsoft s Cloud Infrastructure Evolution of Threats

More information

Supported by. World Trademark Review. Anti-counterfeiting. Poland. Contributing firm Patpol Patent & Trademark Attorneys.

Supported by. World Trademark Review. Anti-counterfeiting. Poland. Contributing firm Patpol Patent & Trademark Attorneys. Supported by World Trademark Review Anti-counterfeiting 2012 Poland Contributing firm A Global Guide Poland Contributing firm Authors Jaromir Piwowar and Bartek Kochlewski Legal framework Rights holders

More information

Current counter-measures and responses by CERTs

Current counter-measures and responses by CERTs Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure

More information

Philipp Niklot Hacker, LL.M. (Yale) Curriculum Vitae

Philipp Niklot Hacker, LL.M. (Yale) Curriculum Vitae Philipp Niklot Hacker, LL.M. (Yale) Curriculum Vitae CONTACT INFORMATION: Kremmener Str. 15A D-10435 Berlin Germany email: philipp.hacker@rewi.hu-berlin.de cell phone number: +49 1575 4854653 DATE OF BIRTH:

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Viktoria H.S.E. Robertson Assistant Professor, Mag. Dr. iur., MJur (Oxon)

Viktoria H.S.E. Robertson Assistant Professor, Mag. Dr. iur., MJur (Oxon) Viktoria H.S.E. Robertson Assistant Professor, Mag. Dr. iur., MJur (Oxon) Department of Austrian and International Corporate and Commercial Law Faculty of Law, University of Graz Universitaetsstraße 15/C4,

More information

Data Protection, Software Licenses and other Legal Issues in the Cloud

Data Protection, Software Licenses and other Legal Issues in the Cloud Data Protection, Software Licenses and other Legal Issues in the Cloud Dr. Hendrik Schöttle Rechtsanwalt, Fachanwalt für IT-Recht OSDC 2012, Nuremberg 26. April 2012 Overview Introduction Data Protection

More information

Protect Yourself in the Cloud Age

Protect Yourself in the Cloud Age Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

CV - Mario Girsch. http://eurescv-search.com/ecv/sammanstallning.asp?wci=sammanstallning_cv_print. Personal data. Presentation 1966-06-28

CV - Mario Girsch. http://eurescv-search.com/ecv/sammanstallning.asp?wci=sammanstallning_cv_print. Personal data. Presentation 1966-06-28 Page 1 of 5 CV - Mario Girsch Personal data First name: Middle name: Last name: C/o address: Mario Karl Girsch Postal address: Satzingerweg 49/1/7 Postal code: A-1210 Town: Country: Wien Austria E-mail

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

ACCEPTABLE USE AND TAKEDOWN POLICY

ACCEPTABLE USE AND TAKEDOWN POLICY ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words

More information

I. Background information

I. Background information A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries I. Background information 1. Please indicate your role for the purpose

More information

C U R I C U L U M V I T A E

C U R I C U L U M V I T A E Univ.-Prof. Dr. Heinz Gärtner Austrian Institute for International Affairs (oiip) Berggasse 7 1090 Vienna, Austria +43 (1) 1 581 11 06 23 heinz.gaertner@oiip.ac.at C U R I C U L U M V I T A E ACADEMIC

More information

Focal Point on Internet Governance and Human Rights

Focal Point on Internet Governance and Human Rights INSTITUTE OF INTERNATIONAL LAW AND INTERNATIONAL RELATIONS Focal Point on Internet Governance and Human Rights Univ.-Prof. Mag. Dr. Wolfgang Benedek Mag. Dr. Matthias C. Kettemann, LL.M. (Harvard) Focal

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Information Sharing and Data Protection in the Area of Freedom, Security and Justice

Information Sharing and Data Protection in the Area of Freedom, Security and Justice Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-level Bearbeitet von Franziska Boehm 1.

More information

Acceptable Use Policy

Acceptable Use Policy Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)

More information

SHORT, August 2015. THE KLEINE ZEITUNG INTRODUCES ITSELF. From the two-shilling daily to a multimedia brand

SHORT, August 2015. THE KLEINE ZEITUNG INTRODUCES ITSELF. From the two-shilling daily to a multimedia brand SHORT, August 2015 THE KLEINE ZEITUNG INTRODUCES ITSELF. From the two-shilling daily to a multimedia brand KLEINE ZEITUNG A CONSTANT PRESENCE IN THE WORLD OF MEDIA SINCE 111 YEARS INDEPENDENCE The Kleine

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

CSE3000.03 Professional Practice in Computing. Controlling Offensive Speech (cont.) Free Speech (continued)

CSE3000.03 Professional Practice in Computing. Controlling Offensive Speech (cont.) Free Speech (continued) FIRST GUEST LECTURE (Next Week) CSE3000.03 Professional Practice in Computing Michael Jenkin (jenkin@cse.yorku.ca) Office: CSEB 3032 M/W 12:00-13:00 www.cse.yorku.ca/~jenkin Michelle Lindsay (September

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW

FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company

More information

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.

More information

The Austrian Swiss Tax Agreement

The Austrian Swiss Tax Agreement Practice Group Tax, Austria Newsletter April 2012 For further information, please contact: The Austrian Swiss Tax Agreement In an unexpectedly speedy process, on April 13, 2012 Austria and Switzerland

More information

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5 PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment

More information

Security Vendor Benchmark 2016 A Comparison of Security Vendors and Service Providers

Security Vendor Benchmark 2016 A Comparison of Security Vendors and Service Providers A Comparison of Security Vendors and Service Providers Information Security and Data Protection An Die Overview digitale Welt of the wird German Realität. and Mit Swiss jedem Security Tag Competitive ein

More information

Overview of Employment and Employee Privacy Laws and Key Trends in Austria

Overview of Employment and Employee Privacy Laws and Key Trends in Austria P a g e 1 Privacy Interviews with Experts August 2011 Toronto / Washington DC / Brussels www.nymity.com Rainer Knyrim Attorney and Partner Preslmayr Attorneys at Law Vienna, Austria Overview of Employment

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

Benutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen

Benutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen Benutzerfreundlich, tiefe Betriebskosten und hohe Sicherheit. Warum sich diese Ziele nicht widersprechen müssen Jean Paul Kölbl CEO IT-Secure.com AG Total access security Heutige Situation Kostendruck

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

Competence. Key services include:

Competence. Key services include: Rüger Barthelt Abel Rüger Barthelt Abel Rüger Barthelt Abel specializes in Intellectual Property law with an emphasis on patents, trade marks and design. The firm s strength lays in combining legal and

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries Questions marked with an asterisk * require an answer to be given.

More information

Service Description for the Webhosting/HomepageTool

Service Description for the Webhosting/HomepageTool Service Description for the Webhosting/HomepageTool 1 Area of application The «Webhosting/Homepagetool Service Description» («Service Description») of Swisscom (Switzerland) AG («Swisscom») applies in

More information

EU regulatory framework for e-commerce

EU regulatory framework for e-commerce EU regulatory framework for e-commerce WTO Workshop Geneva, 18 th June 2013 Denis Sparas European Commission Directorate General for Internal Market and Services Outline E-commerce Directive E-commerce

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Office 365 Sicherheit mit RMS und DLP

Office 365 Sicherheit mit RMS und DLP Office 365 Sicherheit mit RMS und DLP Wie die Cloud Sie in Fragen der Sicherheit unterstützen kann Michael Kirst-Neshva mkn@ankbs.de www.ankbs.de MVP Office 365 Cloud Ambassador Microsoft P-TSP Cloud Sicherheitsoptionen

More information

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg

More information

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses dentons.com Focus on Communications Canada s New Anti-Spam Legislation: Overview and Implications for Businesses January, 2011 Contact Margot Patterson Dentons Canada LLP Counsel, Ottawa margot.patterson@dentons.com

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

Daniel Lucien BUHR Partner. Stampfenbachplatz 4 PO Box 212 8042 Zurich Switzerland dbuhr@lalive.ch Phone: +41 58 105 2100 Fax: +41 58 105 2160

Daniel Lucien BUHR Partner. Stampfenbachplatz 4 PO Box 212 8042 Zurich Switzerland dbuhr@lalive.ch Phone: +41 58 105 2100 Fax: +41 58 105 2160 Daniel Lucien BUHR Partner Stampfenbachplatz 4 PO Box 212 8042 Zurich Switzerland dbuhr@lalive.ch Phone: +41 58 105 2100 Fax: +41 58 105 2160 Admission Switzerland, 1991 Nationality Swiss Languages German

More information

Mit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler

Mit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler Mit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler Deborah Löwenberg Ball und Hyman Bass University of Michigan U.S.A. 43. Jahrestagung für DidakEk der

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

CYBER-ATTACKS THE GLOBAL RESPONSE

CYBER-ATTACKS THE GLOBAL RESPONSE R E P R I N T CYBER-ATTACKS THE GLOBAL RESPONSE REPRINTED FROM: Risk, Governance & Compliance for Financial Institutions 2015 RISK GOVERNANCE & COMPLIANCE for F I N A N C I A L INSTITUTIONS 2 0 1 5 Visit

More information

Business, Institute for Social Policy. Institute for Social Policy Welthandelsplatz.1 1020 Vienna Tel: +43-1-31336-4189 Helene.Dearing@wu.ac.

Business, Institute for Social Policy. Institute for Social Policy Welthandelsplatz.1 1020 Vienna Tel: +43-1-31336-4189 Helene.Dearing@wu.ac. CURRICULUM VITAE Helene Dearing Mag.rer.soc.oec. April 2015 PRESENT POSITION Research Assistant at the Vienna University of Economics and Business, Institute for Social Policy CONTACT Helene Dearing Institute

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C. Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.

More information

For Sound Development of Internet Services - Guideline for codes of practices for Internet Service Providers -

For Sound Development of Internet Services - Guideline for codes of practices for Internet Service Providers - TELESA Guidelines For Sound Development of Internet Services - Guideline for codes of practices for Internet Service Providers - March, 1998 Kazuko Otani TELECOM SERVICES ASSOCIATION TELESA TELESA Guidelines

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

Curriculum Vitae. Contact details. Current positions. Personal. Education and qualications

Curriculum Vitae. Contact details. Current positions. Personal. Education and qualications Curriculum Vitae Contact details Klaus NOWOTNY University of Salzburg Residenzplatz 9 A-5010 Salzburg Austria Tel.: +43 (662) 8044-3722 Fax: +43 (662) 8044-623 E-mail: Klaus.Nowotny@sbg.ac.at Current positions

More information

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral

More information

Yearbook. Building IP value in the 21st century. Taking a ride on the Birthday Train. KUHNEN & WACKER Intellectual Property Law Firm Christian Thomas

Yearbook. Building IP value in the 21st century. Taking a ride on the Birthday Train. KUHNEN & WACKER Intellectual Property Law Firm Christian Thomas Published by Yearbook 2016 Building IP value in the 21st century Taking a ride on the Birthday Train KUHNEN & WACKER Intellectual Property Law Firm Christian Thomas KUHNEN & WACKER Intellectual Property

More information

Charter of Consumer Rights in the Digital World

Charter of Consumer Rights in the Digital World DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create

More information

Wie finde ich die beste The State of VPN-Lösung für mein Unternehmen? Remote Access Security in the U.S. Remote Access

Wie finde ich die beste The State of VPN-Lösung für mein Unternehmen? Remote Access Security in the U.S. Remote Access The Wie State finde ich of die beste Remote VPN-Lösung Access für Security mein Unternehmen? in the U.S. Remote Access Executive Summary 03 Summary of Key Findings 04 About Survey Respondents 05 Key Findings

More information

EMR: Electronic Medical Records Security: International Law Review

EMR: Electronic Medical Records Security: International Law Review EMR: Electronic Medical Records Security: International Law Review HCCA 11 th Annual Compliance Institute, April 2007 Jill Nelson, RN, MBA, JD, CPC, CHC Cleveland Clinic, Director of Corporate Compliance

More information

Open Data Open Government

Open Data Open Government Open Data Open Government Perspective of the Austrian federal level Prague public sector open data meeting Parliament of the Czech Republic, Chamber of Deputies 28th February 2012 Austrian Federal Chancellery

More information

Privacy & Data Security: The Future of the US-EU Safe Harbor

Privacy & Data Security: The Future of the US-EU Safe Harbor Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT

More information

Olympic Consortium WorkSource Wi-Fi Policy and Procedures

Olympic Consortium WorkSource Wi-Fi Policy and Procedures Olympic Consortium WorkSource Wi-Fi Policy and Procedures WIRELESS INTERNET ACCESS: To obtain Access to the WorkSource public Internet please read through the Terms and Policy's listed below. Once you

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all

More information

Top 10 Security Trends

Top 10 Security Trends Top 10 Security Trends Keynote at e-irt Open Workshop on e-infrastructure Audimax HG F30, ETH Zurich April 24th, 2008 Dr. Thomas Dübendorfer, CISSP President ISSS / Software Engineer Tech Lead Google thomas@duebendorfer.ch

More information

Certificate SAP INTEGRATION CERTIFICATION

Certificate SAP INTEGRATION CERTIFICATION Certificate SAP INTEGRATION CERTIFICATION SAP SE hereby confirms that the interface software MCC SR2015 for the product MCC SR2015 of the MEIERHOFER AG. has been certified for integration with SAP ECC

More information

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

IT Sicherheit im Web 2.0 Zeitalter

IT Sicherheit im Web 2.0 Zeitalter IT Sicherheit im Web 2.0 Zeitalter Dirk Beste Consulting System Engineer 1 IT Sicherheit im Web 2.0 Zeitalter Cisco SIO und Global Threat Correlation Nach dem Webinar sollte der Zuhörer in der Lage sein:

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information