ESSENTIALS OF INFORMATION TECHNOLOGY LAW

Size: px
Start display at page:

Download "ESSENTIALS OF INFORMATION TECHNOLOGY LAW"

Transcription

1 ESSENTIALS OF INFORMATION TECHNOLOGY LAW

2

3 ESSENTIALS OF INFORMATION TECHNOLOGY LAW Sujata Pawar Yogesh Kolekar

4 Notion Press 5 Muthu Kalathy Street, Triplicane, Chennai First Published by Notion Press 2015 Copyright Sujata Pawar and Yogesh Kolekar 2015 All Rights Reserved. ISBN: No part of this publication can be reproduced or transmitted in any form or by any means, without prior written permission of the authors. This publication containing information, comments and views are merely for guidance and reference. It must not be taken as authority of or being binding on, the author, editors, publishers, and sellers, who do not owe any responsibility whatsoever for any loss, damage, or distress to any person, whether or not a purchaser of this publication, on account of any action taken or not taken on the basis of this publication. Despite all the care taken, error or omission may have crept inadvertently into this publication. For the authoritative text information, please contact the department concerned or refer to the Government publication or Gazette publication.

5 Contents Foreword Preface ix xi 1. Information Technology Law in India 1 Uncitral Model Law on Electronic Commerce 2 The Information Technology Act, The Information Technology (Amendment) Act, Scheme of The Information Technology Act, 2000 (With 2008 Amendment) Offences Related to s 15 Advantages of s 19 Crime Related to s 20 Phishing Scams 21 Sending Offensive Messages 23 Sending of Sexually Explicit Contents 26 Cyber Terrorism 32 Precautionary Measures for using Safely E-Governance in India 39 Advantages of E-Governance 41 Access to Vital Information at a Click 42 Transparency 42 Cost Saving 42 Centralization 43 Accountability 43 Educative Value 43 The National E-Governance Plan 44 Examples of National E-Governance Plan 45 Income Tax 45 Mca21 45

6 vi Contents Judis 46 Legal Framework for E-Governance 47 Legal Recognition of Electronic Records 47 Legal Recognition of Electronic Signature 48 Electronic Records and Electronic Signatures in Government Agencies 48 Audit of Documents Etc., Maintained in Electronic Form 50 Publication of Rule, Regulation, etc., in Electronic Gazette Electronic Signature - Function and Offences 52 Technical Aspect of Digital Signature 54 Digital Signature Certificates 56 Legal Aspect of Digital Signature 57 Functions of Electronic Signature 59 Offences Related to Electronic Signature E- Contracts 64 E-Contracts Under The Information Technology Law 66 Types of e-contract 72 Click wrap contract 72 Browse wrap contract 73 Shrink wrap contract 74 Transaction to which the Act is not applicable Data Protection 76 Data theft 78 Compensation for Failure to Protect Data 82 Power to Intercept, Monitor and Decrypt Information Electronic Evidence 90 Electronic Evidence 92 Admissibility of Electronic Evidence 96 Presumptions of Electronic Evidence 102 Presumption as to Gazettes in Electronic Forms 102 Presumption as to Electronic Agreements 102

7 Contents vii Presumption as to Electronic Records and Digital Signatures 102 Presumption as to Digital Signature Certificates 103 Presumption as to Electronic Messages 103 Presumption as to Electronic Records Five Year Old Regulatory Authority 105 Controller of Certifying Authorities 106 The Cyber Appellate Tribunal 108 Adjudicating Officer 111 Investigation Officer 112 Appendices 114 The Information Technology Act, 2000 as amended by The Information Technology (Amendment) Act, 2008 The Information Technology (Electronic Service Delivery) Rules, 2011 The Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 The Information Technology (Intermediaries guidelines) Rules, 2011 The Information Technology (Guidelines for Cyber Cafe) Rules, 2011

8

9 Foreword The Information Technology has brought remarkable changes in the different area of society including teaching learning process. Today education is no more restricted to classrooms. The online teaching leaning process has widened it scope with far reaching effect, cutting across boundaries. The growth of e-commerce has opened new avenues for both business community and consumers. The technology is no more restricted to elite, and, falling prices of smart phones and internet tariff have given the power of cyber space into hands of masses. However it has also increased its hazards, as common men is neither aware of its laws nor of its implication. The growth of Information Technology has presented new challenges of both social and legal nature. The use of technology for crime especially cyber terrorism, cyber defamation or cyber frauds is a matter of concern, in terms of its effect and aftermath. Information Technology law has created special jurisdiction for dealing special jurisdiction for dealing with cyber-crimes, however, many times common man and police personnel are equally unaware and reluctant to pursue the formalities under cyber law. Young generation, professionals and student community is comparatively more techno savvy but lack of legal awareness may create difficulties of adherence to Cyber Law. This book goes a long way in generation of interest and creation of legal and technical expertise in this much awaited field of cyber jurisdiction. Writing a book on information technology and law can be a difficult task as alluring the interest of readers in complex phrases is tricky and hard. However this book has done away with such technical and legal jargon. Both the authors are learned in Law as well as Computer Technology and, the book very well keeps the interest of reader with its simple illustrations and screenshots and makes reading appealing and vivid. Chapters are designed keeping in view, interest of both, novel as well as advance reader and the detailed footnotes are added advantage for research students and keen academic readers. The

10 x Foreword book very well stands to its name as it is inclined towards the vital areas of information technology law. The Chapters covering offences related to s, e-governance, Data protection, electronic signature, Digital evidence are areas which every law student and persons in legal fraternity must know. The book is highly informative and covers almost everything that, legal professionals as well as laymen must know about Information Technology Law. I am confident that it will serve its intended goal to reach out to all in this cyber age and disseminate cyber knowledge to create digital society. Prof. Dr Dilip Ukey Ex Vice Chancellor of SRTM University, Nanded, Professor and Head, Dept. of Law, Savitribai Phule University, Pune

11 Preface In this era of information technology, significant developments in cyber space, 2G, 3G, 4G spectrums and technological advancements in electronic instruments of mass communication, are transforming human life at galloping speed with repercussions in socio-legal, economic as well as administrative, commercial and political fields. The growth of telecom sector and use of smart phones has given the power of internet technology into the hand of masses. The information technology can be said to be the fifth pillar of democracy, after free press. A technology driven Government is a need of large size country like India, where millions of people still live in remote areas, far from bureaucratic setup. E-Governance is a panacea for people and antidote for ill information, delay and denial. Information technology has simplified communication both at personal as well as business level, making this world truly a global village and has increased opportunities and avenues of trade and commerce globally where a buyer buys a product or books a ticket at mere click of a button. These technological advancements have been used as facilitating tools by educators, bankers, executives and administrators, in e governance. But at the same time, it has also created new series of crimes, with means and methods beyond contemplation of common man, where a culprit can easily cause havoc sitting far way from place of crime. The earnest desire behind writing this book is, to make people aware of different concepts associated with the Information Technology Act. In law fraternity, there is no dearth of books on Information Technology law but most of them are too foreign in concept or too technical, making concept difficult to understand. Burtrand Russell once stated that, Law seeks clarity at the cost of brevity, and, in the process looses both. We have made sincere efforts to avoid legal jargon while explaining the provisions and have added illustrations when found relevant and necessary. This is an attempt to simplify both, concepts of law and the technology, while intensively dealing with, only the essentials of IT Law. We hope the readers would find examples and illustrations given in this book practical and useful. This book covers the legislative history behind Information Technology Act, 2000 which is based on UNCITRAL Model draft and covers important concepts like cyber space, s, e-contract, e-signature, e-governance, followed by related offences and the penalties in the respective chapters. This book also narrates various presumptions created by law regarding electronic

12 xii Preface evidence and the rules about data protection and power of surveillance, interception and decryption available with the authorities. Information Technology Act has created a special jurisdiction for cyber crimes and everyone must know the powers and functions of adjudicating officer and investing officer which have been explained along with other necessary information about the regulating authorities. This book will prove useful not only for students of Law and Commerce, but also for candidates appearing for various UPSC, MPSC, Banking and Competitive exams. The book may also be used by Police and adjudicating or investigating officers while dealing with Cyber Crimes. It is equally useful and indispensible for a common man, who is constantly and invariably indulged in the use of information technology, through computers, internet, mobiles, tablets and other electronic devices. Innovative and effective use of the information technology has transformed the means and methods of social communication and commercial transactions, through e-banking, e-payment, social networking, twitters and blog writing, bringing the world closer, at our finger tips. Numerous opportunities are created in spread of education, art, literature, networking by media, governance and business, transgressing all narrow, regional frontiers, and at the same time, have increased the risk and threat of cyber crime and cyber terrorism at an alarming speed. This necessitates that; the knowledge of information technology law must be possessed by everyone, by elite and masses equally, for taking necessary precautions to avoid deceit. We have taken our best efforts to provide up to date, correct and useful information with academic precision backed by authentic research, as far as possible and have attempted to avoid errors. However, regardless of our efforts if any mistake has crept in, we shall be grateful to hear from readers, for necessary rectification in future edition. Dr. Sujata Pawar Yogesh Kolekar

13 1 INFORMATION TECHNOLOGY LAW IN INDIA Today we live in technology driven world. Industrial revolution gave birth to giant machines for industrial advancement 1 and information technology has delivered intelligent machines to revolutionize human development. Today we are surrounded by automated smart technology which has touched almost all spheres of human life, from military to medicine and from education to election. We live in a world with boundaries which is secured but still it can be intruded virtually. 2 This is real and this is cyber space. 3 The New Oxford Dictionary Image courtesy Image page at 1 The Industrial Revolution is the name given the movement in which machines changed people s way of life as well as their methods of manufacture. 2 UK, National Criminal Intelligence Services, Director of Intelligence, Roger Gaspar, says The internet is a global system; we can now be attacked by criminals who do not need to come to this territory. Lots of policing arrangements have their roots in the fact that victim and offender are geographically co-located. co.uk/hi/english/static/in_depth/uk/2001/life_of_crime/cybercrime.stm 3 William Gibson in his novel Neuromancer, 1984 had coined the word cyber space.

14 2 Essentials of Information Technology Law defines cyberspace as The notional environment in which communication over computer networks occurs 4 The new boon brought by information technology is also accompanied by its bane i.e. new technology crimes. The conventional provisions of penal laws are insufficient to address this issue, 5 likewise the new business environment required new regulations for its legal endorsement as more and more business communities are moving towards electronic commerce and trans-border contracts. To address this issue the United Nation through its core agency United Nations Commission on International Trade Law 6 (UNCITRAL) had formulated 7 model legislation on electronic commerce 8. UNCITRAL MODEL LAW ON ELECTRONIC COMMERCE The increase in use of electronic data interchange 9 and electronic commerce in international trade necessitated the need of securing legal sanctity to such transaction. 10 The United Nations commission on international trade law formulated model law on electronic commerce which sets out rules for providing equal treatment of electronic documents with paper documents. The purpose of UNICITRAL model law on electronic commerce is to provide frame work for commerce through electronic means providing guidelines to individual countries to prepare their own legislation. The model law contains seventeen articles and is divided into two parts. 11 The model law seeks to provide legal recognition to electronic documents and electronic commerce and validates Crimes like tampering with computer source documents, hacking with computer system, publishing of information which is obscene in electronic form are not adequately protected under traditional penal laws. 6 Resolutions adopted by the General Assembly during its twenty-first session, 2205 (XXI)17 December June 1996 (additional article 5 bis adopted in 1998) Article 2(b) of United Nations Model Law on Electronic Commerce, Electronic data interchange means the electronic transfer from computer to computer of information using an agreed standard to structure the information 10 Statement of object, UNCITRAL model law on Electronic commerce, Noting that an increasing number of transactions in international trade are carried out by means of electronic data interchange and other means of communication, commonly referred to as electronic commerce, which involve the use of alternatives to paperbased methods of communication and storage of information 11 Part one: Electronic commerce in general and Part two: Electronic commerce in specific areas

15 Information Technology Law in India 3 contracts concluded through electronic means. 12 The Information Technology Act 2000, 13 enacted by the Government of India 14 is also based on this model law. UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW (UNCITRAL) The United Nations commission on international trade law was established in 1966 to further the goal of harmonizing and modernizing international commercial law. It prepares and promote legislative and non legislative instrument in field of commercial law. Certain core areas include alternate dispute resolution, international contract, electronic commerce, international payment etc. THE INFORMATION TECHNOLOGY ACT 2000 The Information Technology Act, is a prime legislation in India dealing with cyber offences 16 and electronic commerce 17 in India, and is based on the United Nations Model Law on Electronic Commerce adopted by the United 12 Article 11, Formation and validity of contracts 13 The object of the Act provides that An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce, which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto. 14 The Act received the assent of the President on the 9 th June, Without amendments 16 The term is nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. Cybercrime is a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cyber criminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication documents or data storage. Criminals who perform these illegal activities are often referred to as hackers. Cybercrime may also be referred to as computer crime The object of the Information Technology Act, 2000 defines ecommerce as. transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce, which involve the use of alternatives to paper-based methods of communication and storage of information..

16 4 Essentials of Information Technology Law Nations Commission on International Trade Law. The Act initially contained 94 sections divided into 13 chapters and 4 schedules. The Act is applicable to the whole of India 18 including offences or contravention committed outside the territory of India by any person irrespective of his nationality. 19 The Act is provides for legal recognition to electronic records 20 and facilitates electronic filing of documents with Government agencies. 21 The core object of the Information Technology Act, 2000 was, a) To provide legal recognition of e-records. b) To provide legal recognition of digital signature. 22 Traditional signatures are prone to forgery and tempering, hence insufficient for online transaction and contracts. Online transaction requires unique and strong protection which is fulfilled by the legal provisions related to digital signature. c) To provide legal recognition to electronic governance. 23 The term e-governance implies technology driven government, where government adopts technology to provide efficient delivery of services, information and education. 18 S. 1(2). It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention there under committed outside India by any person. 19 S. 75. Act to apply for offences or contravention committed outside India. (1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any offence or contravention committed outside India by any person irrespective of his nationality. (2) For the purposes of sub-section (1), this Act shall apply to an offence or contravention committed outside India by any person if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India. 20 S. 4. Legal recognition of electronic records 21 S. 6. Use of electronic records and digital signatures in Government and its agencies 22 S. 5. Legal recognition of digital signatures 23 The US E-Government Act of 2002 (Section 3601) defines electronic Government to mean electronic Government means the use by the Government of web-based Internet applications and other information technologies, combined with processes that implement these technologies, to - (A) enhance the access to and delivery of Government information and services to the public, other agencies, and other Government entities; or (B) bring about improvements in Government operations that may include effectiveness, efficiency, service quality, or transformation.

17 ESSENTIALS OF INFORMATION TECHNOLOGY LAW

International Journal of Enterprise Computing and Business Systems

International Journal of Enterprise Computing and Business Systems PREVENTING CYBER CRIME: A STUDY REGARDING AWARENESS OF CYBER CRIME IN TRICITY Ms.Arpana(PhD in Progress) Lecturer GJIMT, Ph-II,Mohali,India Dr.Meenal Chauhan Assistant Professor GJIMT,Ph-II, Mohali, India

More information

E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE

E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE Sumanjeet* Abstract Electronic commerce offers exceptional opportunities for the economic development of India, with its huge pool of technology skilled, English

More information

Data protection and outsourcing industry - A study. By Kumar Mihir

Data protection and outsourcing industry - A study. By Kumar Mihir Data protection and outsourcing industry - A study By Kumar Mihir Scientia Potenti Est- Knowledge is power. The said maxim is apt to describe the primary business model in the 21 st century when information

More information

Models for Cyber-legislation in ESCWA member countries

Models for Cyber-legislation in ESCWA member countries Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007 Cyber Space Cyber space (non-jurisdictional International Space; jurisdictional National

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

NATIONAL LAW INSTITUTE UNIVERSITY

NATIONAL LAW INSTITUTE UNIVERSITY NATIONAL LAW INSTITUTE UNIVERSITY Kerwa Dam Road, Bhopal -462044, M.P. (INDIA) RAJIV GANDHI NATIONAL CYBER LAW CENTER (Established by MHRD, Govt. of India) Post Graduate Diploma in Cyber Law (Distance

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

Law in online business with special focus on India

Law in online business with special focus on India Law in online business with special focus on India Name: Radha krishan Immatriculation Number: 230456 Course: BCM Subject: E-Business Technologies Professor: Dr. Eduard Heindl 1 Declaration I here by declare

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian

More information

Cyber Crimes in India A Closer look

Cyber Crimes in India A Closer look Cyber Crimes in India A Closer look CMA. CS. DR.V.N. PARTHIBAN, PHD., FCMA, FCS, CPA, CA(I), LLM, ASM, AMT, MSW, FIII, FIIMM, M.L., MBA, MHRM, MBL, M.COM,M.PHIL, MS,* Email: vnparthiban@yahoo.co.in Introduction

More information

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India Intellectual Property & Information Technology Laws Division Flat No 903, Indra Prakash Building, 21, Barakhamba Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia

More information

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013 Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,

More information

CYBER LÄW IN INDIA. (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar

CYBER LÄW IN INDIA. (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar CYBER LÄW IN INDIA (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar New Era Law Publications Law Book Publishers, 1159, Outrem Linea, DELHI Contents Preface

More information

Cyber Security, Cyber Crimes and Cyber Laws

Cyber Security, Cyber Crimes and Cyber Laws Continuing Education Programme on Cyber Security, Cyber Crimes and Cyber Laws Name of the Proposer: Anil K. Roy and Manik Lal Das Other Instructors: arranged by CLS, Ahmedabad Course Objectives: Information

More information

Does it matter that on the internet one can be anonymous. Is it a correct statement?is it relevant for the session on cyber crimes?

Does it matter that on the internet one can be anonymous. Is it a correct statement?is it relevant for the session on cyber crimes? ON THE INTERNET, NOBODY KNOWS THAT YOU ARE A DOG: Fundamentals of Cyber crime (Text of talk delivered by Justice Yatindra Singh, Judge, Allahabd High Court, in cyber meet/ seminar of the IT secretaries

More information

LEGISLATIVE MEASURES TO DEAL WITH ECONOMIC CRIMES IN INDIA

LEGISLATIVE MEASURES TO DEAL WITH ECONOMIC CRIMES IN INDIA LEGISLATIVE MEASURES TO DEAL WITH ECONOMIC CRIMES IN INDIA Animesh Bharti* I. INTRODUCTION Economic Offences form a separate category of criminal offences. Economic Offences not only victimize individuals

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

2/24/2011. What is Cyber Security? Law Enforcement Perspective. IT professional s Perspective. Managerial Perspective. Netizen s Perspective

2/24/2011. What is Cyber Security? Law Enforcement Perspective. IT professional s Perspective. Managerial Perspective. Netizen s Perspective Cyber Security & Internet Technology Laws in India What is Cyber Security? By (LBSIT on 24 th Feb 2011) There could be different Perspectives IT professional s Perspective Law Enforcement Perspective Netizen

More information

SORNA Substantial Implementation Review State of Tennessee

SORNA Substantial Implementation Review State of Tennessee September 2011 SORNA Substantial Implementation Review State of Tennessee The U.S. Department of Justice, Office of Justice Programs, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering,

More information

[Brought into force by appointed day notice on 16 th June 2003.]

[Brought into force by appointed day notice on 16 th June 2003.] [Brought into force by appointed day notice on 16 th June 2003.] AN ACT TO PROVIDE FOR THE LEGAL RECOGNITION OF ELECTRONIC WRITING, ELECTRONIC CONTRACTS, ELECTRONIC SIGNATURES AND ORIGINAL INFORMATION

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

ONLINE MARKETING - CHALLENGES IN FUTURE

ONLINE MARKETING - CHALLENGES IN FUTURE IMPACT: International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL) ISSN(E): 2321-8878; ISSN(P): 2347-4564 Vol. 2, Issue 4, Apr 2014, 183-188 Impact Journals ONLINE MARKETING

More information

E-Commerce and Business Society

E-Commerce and Business Society Global Journal of Business Management and Information Technology. Volume 1, Number 1 (2011), pp. 43-47 Research India Publications http://www.ripublication.com E-Commerce and Business Society Goutam Chatterjee

More information

CYBER CRIME AWARENESS

CYBER CRIME AWARENESS SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 2, March-April (ISSN 2278 5973) CYBER CRIME AWARENESS RITU DHANOA* ABSTRACT: Cyber crime is emerging as

More information

EMR: Electronic Medical Records Security: International Law Review

EMR: Electronic Medical Records Security: International Law Review EMR: Electronic Medical Records Security: International Law Review HCCA 11 th Annual Compliance Institute, April 2007 Jill Nelson, RN, MBA, JD, CPC, CHC Cleveland Clinic, Director of Corporate Compliance

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

NONPROFIT ORGANISATIONS ACT

NONPROFIT ORGANISATIONS ACT REPUBLIC OF SOUTH AFRICA NONPROFIT ORGANISATIONS ACT REPUBLIEK VAN SUID-AFRIKA WET OP ORGANISASIES SONDER WINSOOGMERK No, 1997 ACT To provide for an environment in which nonprofit organisations can flourish;

More information

RIGHTS & REMEDIES AVAILABLE TO CONSUMERS

RIGHTS & REMEDIES AVAILABLE TO CONSUMERS 4 RIGHTS & REMEDIES AVAILABLE TO CONSUMERS 4.0 INTRODUCTION Man is a social & rational animal. He has throughout his evolution tried to improve upon everything, he has laid his hands upon, anything which

More information

Some laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability.

Some laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability. Country Report: India India is an important regional economy, with a strong interest in ICT services development. The law in India has not entirely kept pace with developments in cloud computing, and some

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994

NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 [ASSENTED TO 23 NOVEMBER 1994] [DATE OF COMMENCEMENT: 1 JANUARY 1995] (English text signed by the President) as amended by National Strategic Intelligence

More information

Consolidated Insurance Mediation Act 1

Consolidated Insurance Mediation Act 1 Consolidated Insurance Mediation Act 1 Act no. 930 of 18 September 2008 This is an Act to consolidate the Insurance Meditation Act, cf. Consolidated Act no. 401 of 25 April 2007, as amended by section

More information

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510 TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated

More information

Optional Protocol on the sale of children, child prostitution and child pornography

Optional Protocol on the sale of children, child prostitution and child pornography United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol

More information

Phishing Victims Likely Will Suffer Identity Theft Fraud

Phishing Victims Likely Will Suffer Identity Theft Fraud Markets, A. Litan Research Note 14 May 2004 Phishing Victims Likely Will Suffer Identity Theft Fraud Fifty-seven million U.S. adults think they have received a phishing e-mail. More than 1.4 million users

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Protection from Harassment Bill

Protection from Harassment Bill Protection from Harassment Bill Bill No. 12/2014. Read the first time on 3rd March 2014. PROTECTION FROM HARASSMENT ACT 2014 (No. of 2014) Section ARRANGEMENT OF SECTIONS PART I PRELIMINARY 1. Short title

More information

ITU Global Cybersecurity Agenda (GCA)

ITU Global Cybersecurity Agenda (GCA) International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,

More information

Cyber Crimes: Information Security, Digital Evidence and Cyber Laws. V Rajendran venkrajen@yahoo.com http://venkrajen.in 044-22473849; 9444073849

Cyber Crimes: Information Security, Digital Evidence and Cyber Laws. V Rajendran venkrajen@yahoo.com http://venkrajen.in 044-22473849; 9444073849 Cyber Crimes: Information Security, Digital Evidence and Cyber Laws V Rajendran venkrajen@yahoo.com http://venkrajen.in 044-22473849; 9444073849 Security: Definition, Need and types Security: Being free

More information

ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010

ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 NRCCL (University of Oslo, Faculty of Law) Topics Overview of

More information

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

SORNA Substantial Implementation Review State of Florida

SORNA Substantial Implementation Review State of Florida SORNA Substantial Implementation Review State of Florida The U.S. Department of Justice, Office of Justice Program, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking

More information

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Citizen and E-Governance- Cyber Law and Related. Issues

Citizen and E-Governance- Cyber Law and Related. Issues Citizen and E-Governance- Cyber Law and Related Issues By Na.Vijayahankar Cyber Law Solutions Ltd Chennai (Presented at the AMIC Seminar in Chennai on December 12, 2000) E-Governance has two dimensions.

More information

Is the Content of Spam Illegal?

Is the Content of Spam Illegal? Is the Content of Spam Illegal? 1 Introduction The E-Privacy Directive prohibits the sending of unsolicited marketing emails to individuals within the European Union. The only exception is where there

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

Cyber Crime ACC Crime

Cyber Crime ACC Crime AGENDA ITEM 10 STRATEGIC POLICING AND CRIME BOARD 3 rd December 2013 Cyber Crime ACC Crime PURPOSE OF REPORT 1. The purpose of this report is to provide members of the Strategic Police and Crime Board

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

ELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999

ELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999 [Date of Assent 5 August 1999] [Operative Date 4 October 1999] ARRANGEMENT OF SECTIONS 1 Citation PART I PRELIMINARY 2 Definitions 3 Crown to be bound

More information

ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT

ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT By John S. Stolz and John D. Cromie 2001 American Bar Association. Reprinted with permission On October 1, 2000, the United States took a substantial

More information

LAW ON ELECTRONIC TRANSACTIONS

LAW ON ELECTRONIC TRANSACTIONS Lao People s Democratic Republic Peace Independence Democracy Unity Prosperity National Assembly No 20/NA Vientiane Capital, Date: 7 December 2012 (Unofficial Translation) LAW ON ELECTRONIC TRANSACTIONS

More information

FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS

FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS IAEA NUCLEAR SECURITY SERIES NO. FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS Revision 17.04 Page 1 of 20 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME]

More information

COMPUTER, NETWORK AND INTERNET USE POLICY

COMPUTER, NETWORK AND INTERNET USE POLICY 4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate

More information

BERMUDA ELECTRONIC TRANSACTIONS ACT 1999 1999 : 26

BERMUDA ELECTRONIC TRANSACTIONS ACT 1999 1999 : 26 QUO FA T A F U E R N T BERMUDA ELECTRONIC TRANSACTIONS ACT 1999 1999 : 26 TABLE OF CONTENTS 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Citation Definitions Crown to be bound Objects Regulatory policy

More information

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission

More information

Safeguarding your organisation against terrorism financing. A guidance for non-profit organisations

Safeguarding your organisation against terrorism financing. A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN:

More information

Parsonage Vandenack Williams LLC Attorneys at Law

Parsonage Vandenack Williams LLC Attorneys at Law MEDICAL RECORDS ACCESS GUIDE NEBRASKA Parsonage Vandenack Williams LLC Attorneys at Law Parsonage Vandenack Williams LLC 2008 For more information, contact info@pvwlaw.com TABLE OF CONTENTS RESPONDING

More information

Ten Deadly Sins of Computer Forensics

Ten Deadly Sins of Computer Forensics Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This

More information

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access

More information

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013 ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013 1 CONTENT INTRODUCTION COMESA CYBER SECUIRTY PROGRAMME CYBER SECURITY ECONOMICS WHY PPPs? PPPs ACTORs CHALLENGES

More information

The Transfer of Funds (Sark) Ordinance, 2007 a

The Transfer of Funds (Sark) Ordinance, 2007 a The Transfer of Funds (Sark) Ordinance, 2007 a [CONSOLIDATED TEXT] NOTE This consolidated version of the enactment incorporates all amendments listed in the footnote below. However, while it is believed

More information

CYBER SECURITY STRATEGY AN OVERVIEW

CYBER SECURITY STRATEGY AN OVERVIEW CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

THE CRIMINAL JUSTICE RESPONSE TO CORRUPTION (IN THE CONTEXT OF NEPAL)

THE CRIMINAL JUSTICE RESPONSE TO CORRUPTION (IN THE CONTEXT OF NEPAL) 139TH INTERNATIONAL TRAINING COURSE RESOURCE VISITING MATERIAL EXPERTS SERIES PAPERS No.79 THE CRIMINAL JUSTICE RESPONSE TO CORRUPTION (IN THE CONTEXT OF NEPAL) Rajan Prasad Bhattarai * I. HISTORICAL BACKGROUND

More information

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

How To Use The Blog Safely And Responsibly

How To Use The Blog Safely And Responsibly BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed

More information

Paperless Trade Legal & Regulatory Framework of KOREA. Hyun-Ku Kang Vice President / e-document Division

Paperless Trade Legal & Regulatory Framework of KOREA. Hyun-Ku Kang Vice President / e-document Division Paperless Trade Legal & Regulatory Framework of KOREA Hyun-Ku Kang Vice President / e-document Division Paperless TradeLegal & Regulatory Framework of KOREA CONTENTS 1. Concept of Paperless Trade 2. Evolution

More information

REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL DRAFT FOR PUBLIC COMMENT

REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL DRAFT FOR PUBLIC COMMENT REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL DRAFT FOR PUBLIC COMMENT (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette

More information

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers

More information

Managing cyber crimes in India issues and challenges

Managing cyber crimes in India issues and challenges Managing cyber crimes in India issues and challenges *Mrs.Vineetha.P.K *Principal, Sarada Vilas Law College, Mysore Abstract The use of internet has become the part and parcel of every educated person

More information

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

AGREEMENT AND TERMS OF USE

AGREEMENT AND TERMS OF USE AGREEMENT AND TERMS OF USE The website located at www.100womeninhedgefunds.org and the services of 100 Women in Hedge Funds ( 100WHF ) available thereon (collectively, the Site ), together with the networking

More information

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Presenter Adam Mambi,(Advocate of High Court) -Deputy Executive Secretary, Law Reform Commission Tanzania

More information

Supplementary Policy on Data Breach Notification Legislation

Supplementary Policy on Data Breach Notification Legislation http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 4 May 2013 Supplementary Policy on Data Breach Notification Legislation Introduction It has been reported

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Queensland WHISTLEBLOWERS PROTECTION ACT 1994

Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Act No. 68 of 1994 Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Section PART 1 PRELIMINARY TABLE OF PROVISIONS Division 1 Title and commencement Page 1 Short

More information

FRANCE. Chapter XX OVERVIEW

FRANCE. Chapter XX OVERVIEW Chapter XX FRANCE Merav Griguer 1 I OVERVIEW France has an omnibus privacy, data protection and cybersecurity framework law. As a member of the European Union, France has implemented the EU Data Protection

More information

LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE

LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007, amend. SG.

More information

Title of Course: Cyberlaw New Course: 10/25/02

Title of Course: Cyberlaw New Course: 10/25/02 Department: Accounting and Management Information Systems Course No. IU300 Title of Course: Cyberlaw New Course: 10/25/02 I. Catalog Description and Credit Hours of Course: Provides a foundation in law

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012.

STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012. THE EAST AFRICAN COMMUNITY STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012. to the East African Community Gazette No. 7 of 11th May, 2012. Printed by the Uganda Printing and Publishing Corporation,

More information

The Transfer of Funds (Alderney) Ordinance, 2007

The Transfer of Funds (Alderney) Ordinance, 2007 The Transfer of Funds (Alderney) Ordinance, 2007 ARRANGEMENT OF SECTIONS PART I INFORMATION TO ACCOMPANY TRANSFERS OF FUNDS 1. Application. 2. Information accompanying transfers of funds and record keeping.

More information

Identity Cards Act 2006

Identity Cards Act 2006 Identity Cards Act 2006 CHAPTER 15 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 6 50 Identity Cards Act 2006 CHAPTER 15 CONTENTS Registration

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information