ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive
|
|
|
- Laurence Ball
- 10 years ago
- Views:
Transcription
1 October 2005 ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive INTRODUCTION 1.- Purpose of the document This document analyses some of the most relevant technical aspects involving the impact that the implementation of a generalised data retention obligation would have for ETNO companies as e-communications services providers. Although two parallel legislative initiatives 1 from Council and from Commission exist, the technical requirements for operators and service providers that both regulations raise are practically the same. Thus, this document would generally apply in both cases. 2.- References Currently, last versions: [1] Draft Framework Decision on the retention of data processed and stored in connection with the provision of publicly available electronic communications services or data on public communications networks for the purpose of investigation, detection and prosecution of crime and criminal offences including terrorism. Council of the European Union. Brussels, 10 th October 2005 (12894/1/05 COPEN 153 TELECOM 99). [2] Proposal for a Directive of the European Parliament and of the council on retention of data processed in connection with the provision of public electronic communication services. COM (2005) 438 final. Commission of the European Communities. Brussels, 21 September Council s Draft Framework Decision and Commission s Proposal for a Directive of the EP and the Council. ETNO Expert Contribution EC075 (2005/10) 1
2 1. GENERAL COMMENTS ETNO companies wish to reiterate their commitment to work with the Law Enforcement Agencies (LEAs) in the fight against terrorism and crime. Current co-operation ranges from the real time interception of phone conversations, data preservation to making available traffic data collected for legitimate business purposes. It must be pointed out that there is a major difference in storing data - voluntarily and doing so on a compulsory basis; - for own internal use and to do so for an external party - in bits and pieces in different systems and platforms and to do so in an aggregate manner As stored data under the new provisions may not be used for other purposes than fighting crime, operators will have to duplicate data for their own use (billing, network planning, etc.) There are many ambiguities in the proposed Directive s text and in its Annex. These must be clarified in order for the industry to provide authorities with an accurate feed-back. The principle of proportionality between the data retention obligation and the rights to secrecy of the communications, privacy and protection of data (Art. 52 of the Charter of Fundamental Rights of the European Union) must be respected. In this respect, the proposed measures should combine, in a balanced way: - the needs for security and the fight against crime and - respect for individual rights. Furthermore, any future regulation must have a level of confidentiality that prevents the serious and organised crime from having access to data and from becoming experts of the technical means available. In general, increasing the range of data to be retained will require major investment and increase costs for the industry. For certain types of data, serious doubts are raised about the technical, economic and administrative viability of collecting such data. Any future measure should introduce harmonised criteria in the allocation of costs. This would ensure fair competition among European operators and a level playing field for all operators and service providers across EU. Any regulation must target all actors equally in order to avoid distortion of competition. The battle against crime is first and foremost a public duty whose costs must not be imposed on the telecommunications industry. At the same time, cost compensation is an important factor that helps to restrain the data requests of the law enforcement authorities. ETNO Expert Contribution EC075 (2005/10) 2
3 Having said that, it must be avoided that the question of cost compensation supersedes the more important discussion about the substance of the specific obligations in the proposals. 2. SPECIFIC COMMENTS Data storage: the basic prerequisites Successful collection of huge amounts of session data relating to mobile, fixed and Internet is a difficult task. Trying to make sense of the different data format and interpret them into something that makes sense and is of value for law enforcement agencies is even harder. The quality of the collected data is a major issue to avoid false positives or false negatives during the legal investigation. In addition, most of the data needed to fulfil the data retention requirements are raw data produced by the network. As most of this data is not needed for billing purposes, it is generally not stored or even captured. To store and retrieve this data is a critical issue that most certain require a standardized format. Above all, the main problem is to interpret and implement this data into a data call record and send it to the data processing centre, therefore costly technical upgrades being needed. In order to interpret and use the stored data it must be coded into a specific language, format. Overtime, these formats change which in turn leads to the necessity to continuously update all stored data that one wants to use. This is a costly and complicated process, where the costs are proportionate to the amount of data stored a rule of thumb is that the cost for updating data is in the order of 1/3 of the original investment. When the amount of retained and processed data becomes too voluminous, the data retention operation starts to interfere with network performance. It is difficult to say where the threshold is and at what point this interference will occur without detailed analysis, but it is important to highlight this risk with a view to the large volumes of retained internet data which will be the direct consequence of the Commission s and/or the Council s proposals. At present, there is no search engine/analysing tool capable of analysing the amount of data to be retained under the new proposals. It can be expected that this would require a lot of manual work until industry and LEAs have developed such a search engine. When storage volume becomes an issue, operators may choose to clean out the raw information and only store processed data. This implies that it is no longer possible to revert to the raw data and carry out an analysis for errors. This further entails that operators would have to store both processed and raw data in order to carry out quick and in-depth analyses. When data is exchanged between two or more systems, great efforts must be made to ensure that the different sets of data are compatible to each other and belong together. This is due to the fact that different networks work with ETNO Expert Contribution EC075 (2005/10) 3
4 different data clocks. This matching process is both complex, tedious and costly, and is of course directly proportionate to the amount of data being handled. Based on the volume of retained data the cost will increase due to the complexity of the systems involved in the management of data storage and recovery. The costs curve based on the volume of data to be retained can be considered linear for quantities close to 1 TeraByte 2 (TB). This situation would correspond to the needs of a small operator or Internet services provider. Bearing in mind the state of the art of storage technologies, higher volumes of data would mean incurring non-linear or even exponential costs since they involve a change in the design of the management systems, more powerful and sophisticated platforms, greater security measures, storage and support infrastructures as well as the necessary human resources to handle this type of systems. This is the case of a large operator or service provider. Generated and processed data Apart from the data volumes and retention periods, operators are especially concerned about the obligation to store new data types such as unsuccessful call attempts and location data at the end or even throughout a mobile call. Operators do not currently store these data for business purposes. In any case, in order to comply with the proposed data retention measures, also the processing systems of all operators and service providers would have to be redesigned and/or upgraded in order to allow the exchange of such data. As the extend of the technical effort necessary to retain a certain type of data is dependent on the question to which extend data is already available, it is important that a clarification on the terms generated and processed is introduced in the final text: - It must be noticed that some data are not generated at all by the networks, that is, no relevant signal is available on the network (e.g.: MAC). - Other data provide a relevant signal available on the network, but need to be interpreted and implemented into a data call record (for instance, as it is the case in most operators, it happens with call attempts or location data at the and or throughout a call), the network needs to be upgraded, implying costly investments. - Finally, operators process data, that means the signal/information is already implemented into a data call record and sent to and stored in the processing/billing centre (this data is really 'available' and 'just' has to be stored for a longer period; however additional costs occur for update of storage and processing centres (storage and search capacity). 2 1 Terabyte equals 1024 Gigabytes 4 A prior technical feasibility study should be carried out based on the various Internet equipment manufacturers. ETNO Expert Contribution EC075 (2005/10) 4
5 It should also be pointed out that any obligation to retain specific data referring to the destination of a communication (e.g. name and address of the subscriber or registered recipient, connection label or user ID of the intended recipients, IMSI, IMEI of the called party, internet connection label) is virtually impossible, whenever it involves different service providers. Furthermore, the handling and reshuffling of such enormous data volumes would overload the communications networks. Therefore, any future measure must clarify that only the party offering the respective service can be subject to the data retention obligation. This party is the only one in a direct relationship with the customer and with sovereignty over the data. As an example, those companies which act only as mere carriers cannot identify the he final subscriber of e.g. an service, but only the service provider with a direct relationship with the final user is able to provide this information. This clarification needs the deletion of the obligation for service providers to retain data related to the destination of a communication involving different operators/service providers (with particular reference to Internet service access, Internet and Internet telephony: Annex of the proposed Directive, lett. b) point 3.) and a modification of current art. 3 of the Proposal for a Directive such as: Art Member States shall adopt measures to ensure that data retained in accordance with this Directive are only provided to the competent national authorities BY THE PROVIDER THAT HAS OFFERED THE USED e- COMMUNICATION SERVICE, in specific cases and in accordance with national legislation, for the purpose of the prevention, investigation, detection and prosecution of serious criminal offences, such as terrorism and organised crime. Fixed-line and mobile telephony - UNSUCCESSFUL CALLS. Currently Call Detail Recordings (CDR) corresponding to unsuccessful calls (e.g. called party does to take up, line busy) are not processed by most operators since they are not necessary in the billing process. This type of call involves a considerable percentage of the total number of calls made (in the case of fixed and mobile telephony, it can mean varying on different national situations from around 40% and up to 60% of the total number of calls). Complying with the current proposals and depending on the size and configuration of the network, it would require a big operator to make hardware and software upgrades of up to 1600 switches in order to interpret the signalling information into a data call record and send it to the data processing centre resulting in an additional investment. ETNO Expert Contribution EC075 (2005/10) 5
6 Initial investment cost would be within a 3 digit million Euro range only for this data type. Additional costs occur for updating the data processing centre (storage and search capacity), additional security measures, more human resources. The amount of data generated would require operators to change the Input Output-system. If operators are required to store raw signalling data, the volumes would be considerable. Mobile telephony. - LOCATION DATA AT THE END (or throughout) OF A MOBILE COMMUNICATION. Currently, most operators process the location of a mobile call (Cell-ID) only at the beginning of an answered (successful) mobile call. In order to record the Cell-IDs also at the end of (or even throughout) a call and to transmit them to the data processing centre would require a costly network upgrade. It is doubtful whether this requirement is proportionate since it is already possible to create a movement profile of the user by means of the Cell-IDs that have been stored at the start of each new call, and that there are additional systems in place (interception) to identify a current location, e.g. IMSIcatching. As an example, the retention of unsuccessful calls and information about the cell for a period of six months would mean for a large operator a volume of 14,400 million call registrations. - IMEI Retaining the international number of mobile equipment (IMEI) will have limited use as proof of the user's identity since numbering can be manipulated and can be multiply assigned by manufacturers so that subscribers cannot be clearly identified. Several attempts in the past to implement a unique system have failed. Operators usually do not transmit IMSI/IMEI numbers to each other, and only a small portion can therefore be registered. In addition, calls transmitted through the fixed network will be stripped of IMSI/IMEI numbers because the fixed network does not support forwarding. Internet services. Notions regarding data retention in traditional voice telephony services should be revised whenever they are transferred to Internet services. However, the proposed measures under discussion require the storage of data relating to services and voice over IP (VoIP). ETNO Expert Contribution EC075 (2005/10) 6
7 Data for identifying the connection (i.e. Internet Access Data - IP address, log in and log time, User ID) have proven to be the most important and useful tool for LEA s purposes. Internet access data can be used to determine which IP address with which customer ID was connected to the internet, when, and for how long. With regard to IP address, however, it must be noted that due to the design of certain Internet protocols, network infrastructures do not check the authenticity of the IP origin address. Computer programs exist, which are public and free of charge, that the user can employ to falsify the genuine IP address, static or dynamically assigned by the access service provider (technically known as IP spoofing). Even when restricting the requested data to the Internet Services and VoIP (some Member States even want Chat, http etc), huge additional costs would be incurred for the information systems necessary to answer the requests. Concerning , it should also be noted that many operators only have a small market share in terms of services in the EU. The major mail providers e.g. Hotmail, Yahoo and Google, are all located outside the EU and would not be subject to the proposed provisions. Besides, reasonable doubt exists about whether the retention of Internet service data, such as in the case of the http (as some Member States want to introduce in the Council proposal), could be equivalent to interception of the communication, since the destination Web address can indicate the content that subscribers have accessed. In addition to all the above-mentioned, specific services exist to confer anonymity to calls. Generally located in countries outside the scope of the European legislation these servers, which are public and free of charge, delete and filter the user s personal data and call identifiers, rendering any investigation impossible. - MAC ADDRESS Just like the IP call origin address, the MAC address (Media Access Control address) of the terminal equipment, assigned by the manufacturer, can be falsified (technically known as MAC spoofing) using programs available in the public domain. On the other hand, and in recent years, the uniqueness approach has not been maintained in the serialization by manufacturers, reutilising numbering systems for this type of devices. The MAC is a piece of data used by the low-level protocols and amongst adjacent routers that is not spread either toward the Internet management systems or toward other remote routers (that means the MAC address is not even generated). The retention of the MAC address to include it in the registration of retained data associated with each communication, in the event ETNO Expert Contribution EC075 (2005/10) 7
8 it were technically 4 viable, would force the network infrastructures to be updated, besides penalizing its performance. These considerations about the ambiguity in the identification by MAC address diminish the importance of retaining this data associated with other Internet services different from that of the connection ETNO Expert Contribution EC075 (2005/10) 8
COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed
SERIES A : GUIDANCE DOCUMENTS. Document Nr 3
DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
COUNCIL OF THE EUROPEAN UNION. Brussels, 24 February 2005 6566/05 LIMITE COPEN 35 TELECOM 10
COUNCIL OF THE EUROPEAN UNION Brussels, 24 February 2005 6566/05 LIMITE COPEN 35 TELECOM 0 REPORT from : Working Party on cooperation in criminal matters to : Article 36 Committee No. prev. doc. : 5098/04
Click here for Explanatory Memorandum
Click here for Explanatory Memorandum AN BILLE CUMARSÁIDE (SONRAÍ A CHOIMEÁD) 2009 COMMUNICATIONS (RETENTION OF DATA) BILL 2009 Section 1. Interpretation. Mar a tionscnaíodh As initiated ARRANGEMENT OF
CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS
Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS Section 1. Interpretation. 2. Non-application of Act. 3. Obligation to retain data. 4. Data security. 5. Access to data.
Position Paper 4. Closer understanding of the term third party networks and service providers" in relation to its application in Directive 2006/24/EC
DATRET/EXPGRP (2009) 4 FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of
How To Protect Your Privacy On The Net
International Working Group on Data Protection in Telecommunications Report and Guidance on Data Protection and Privacy on the Internet "Budapest - Berlin Memorandum" adopted at the 20th Meeting in Berlin,
VoIP Regulation Klaus Nieminen Helsinki University of Technology [email protected]
VoIP Regulation Klaus Nieminen Helsinki University of Technology [email protected] Abstract Voice over IP (VoIP) is currently the uppermost telecommunication regulatory question globally. The purpose
This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal.
Dear Commissioner Malmström, As you know, we have been closely involved in consultations with the European Commission with regard to the impact assessment on, and probable review of, the Data Retention
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long for clients to benefit from the vast range of functionality.
The Big Data Mining Company BETTER VISILITY FOR BETTER CONTROL AND BETTER MANAGEMENT 100 Examples on customer use cases Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long
Council of the European Union Brussels, 5 March 2015 (OR. en)
Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:
BRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
Introduction PriorFX LTD Right to Privacy Information
Privacy Policy 1.Introduction 1.1 PriorFX LTD ( PriorFx or we ) is a Cyprus Investment Firm regulated by the Cyprus Securities and Exchange Commission (License No. 221/13). 1.2 PriorFX is operating under
ARTICLE 29 Data Protection Working Party
ARTICLE 29 Data Protection Working Party 00451/06/EN WP 118 Working Party 29 Opinion 2/2006 on privacy issues related to the provision of email screening services Adopted on 21 February 2006 This Working
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
Collection and Use of Information
AVO Privacy Policy AVOapp, Inc. treat with responsibility for the safety of your personal data. Please read the following to be informed about our Privacy Policy ("Policy"). This Policy details how we
Prior checking opinion on the European Surveillance System ("TESSy") notified by the European Centre for Disease Prevention and Control ("ECDC
Prior checking opinion on the European Surveillance System ("TESSy") notified by the European Centre for Disease Prevention and Control ("ECDC") on 22 July 2009 Brussels, 3 September 2010 (case 2009-0474)
Exhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
EUROPEAN DATA PROTECTION SUPERVISOR
20.6.2012 Official Journal of the European Union C 177/1 I (Resolutions, recommendations and opinions) OPINIONS EUROPEAN DATA PROTECTION SUPERVISOR Opinion of the European Data Protection Supervisor on
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Message 791 Communication from the Commission - SG(2012) D/50777 Directive 98/34/EC Notification: 2011/0188/D
Message 791 Communication from the Commission - SG(2012) D/50777 Directive 98/34/EC Notification: 2011/0188/D Reaction of the Commission to the response of a Member State notifying a draft regarding a
Opinion of the European Data Protection Supervisor
Opinion of the European Data Protection Supervisor on the Commission Proposal for a Regulation of the European Parliament and of the Council on a European network of Employment Services, workers' access
ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things
ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things November 2008 Executive Summary The Internet of the future
Statistics on Requests for data under the Data Retention Directive
Statistics on Requests for data under the Data Retention Directive Introduction 1. Directive 2006/24/EC on data retention ('the DRD') 1 requires Member States to provide the Commission on a yearly basis
Online Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
Proxy Services: Good Practice Guidelines
Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:
EAGLE EYE IP TAP. 1. Introduction
1. Introduction The Eagle Eye - IP tap is a passive IP network application platform for lawful interception and network monitoring. Designed to be used in distributed surveillance environments, the Eagle
DATA RETENTION. Guidelines for Service Providers
DATA RETENTION Guidelines for Service Providers The Attorney-General s Department has prepared this guide to assist industry participants to understand the obligations arising from the Telecommunications
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
PREPLY PRIVACY POLICY
PREPLY PRIVACY POLICY Effective Date: November 21, 2012. Welcome to Preply! This Privacy Policy discloses FindGuru, Inc. s ( Preply, we, us or our ) privacy practices and procedures in connection with
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Questions & Answers. on e-cohesion Policy in European Territorial Cooperation Programmes. (Updated version, May 2013)
Questions & Answers on e-cohesion Policy in European Territorial Cooperation Programmes (Updated version, May 2013) This fact sheet was drafted jointly by INTERACT and European Commission (DG Regional
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Draft Communications Data Bill
Draft Communications Data Bill Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty June 2012 Cm 8359 20.00 Crown copyright 2012 You may re-use this information
5581/16 AD/NC/ra DGE 2
Council of the European Union Brussels, 21 April 2016 (OR. en) Interinstitutional File: 2013/0027 (COD) 5581/16 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: TELECOM 7 DATAPROTECT 6 CYBER 4 MI 37 CSC 15
Cyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
Teleworking Technology Guide and Checklist. UW Information Technology. November 2012
Teleworking Technology Guide and Checklist UW Information Technology November 2012 1 Contents Teleworking Technology Guide for UW Faculty and Staff... 3 UW Information Technology Service Catalog and IT
Troy Cablevision, Inc. Subscriber Privacy Policy
Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol
DESTINATION MELBOURNE PRIVACY POLICY
DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber
Council of the European Union Brussels, 24 November 2014 (OR. en)
Council of the European Union Brussels, 24 November 2014 (OR. en) 15701/1/14 REV 1 "I/A" ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11153/2/14 REV 2 Subject: JAI 897 DAPIX 175
COMMISSION REGULATION (EU) No /.. of XXX
EUROPEAN COMMISSION Brussels, XXX D... [ ](2012) XXX draft COMMISSION REGULATION (EU) No /.. of XXX establishing a Union Registry pursuant to Directive 2003/87/EC of the European Parliament and of the
EU: 2015 Place of Supply Changes Changes to the VAT place of supply for e-services
EU: 2015 Place of Supply Changes Changes to the VAT place of supply for e-services EU: 2015 Changes to the place of supply From 1 January 2015, supplies of telecommunications, broadcasting and electronically
Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.
Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how
Networks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19
4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Advanced LCR (Least Cost Router) With SIP Proxy Server
With SIP Proxy Server It s all about Reducing Cost!!! WHY ADVANCED LCR (Least Cost Routing) Advanced LCR is a product by Advanced Communications; the same parent company of AdvancedVoIP.com, a widely used
5439/15 PT/ek 1 DG E
Council of the European Union Brussels, 20 January 2015 5439/15 Interinstitutional File: 2013/0309 (COD) TELECOM 17 COMPET 12 MI 28 CONSOM 13 CODEC 70 NOTE from: Presidency to: Delegations No. Cion prop.:
Charter of Consumer Rights in the Digital World
DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create
Rise Broadband Networks, Inc. Privacy Policy and Customer California Privacy Rights. Effective date: January, 2016
Networks, Inc. Privacy Policy and Customer California Privacy Rights Effective date: January, 2016 knows Customers care about how their personally identifiable information ( Personal Information ) is used
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL
EUROPEAN COMMISSION Brussels, 25.9.2014 COM(2014) 592 final REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on the implementation in the period from 4 December 2011 until 31 December
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
EUROPEAN ECONOMIC AREA JOINT PARLIAMENTARY COMMITTEE. REPORT on E-Commerce and EEA legislation
EUROPEAN ECONOMIC AREA 30 November 2000 Brussels JOINT PARLIAMENTARY COMMITTEE REPORT on E-Commerce and EEA legislation Co-rapporteurs: Ms. Marjo Matikainen-Kallstöm (EPP-ED, Finland) Mr. Vilhjálmur Egilsson
PUBLIC PROCUREMENT CONTRACTS
PUBLIC PROCUREMENT CONTRACTS Public authorities conclude contracts to ensure the supply of works and delivery of services. These contracts, concluded in exchange for remuneration with one or more operators,
Qtel Service Tariff No. B27-01
General Tariff Information Service Provider Name Qatar Telecom (QTel) Q.S.C. License Public Fixed Telecommunications Networks and Services Tariff Number B27-01 Service Name Business Unified Communication
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
[PRIVATE LABEL TELEPHONY SOLUTION]
POWERED BY: [PRIVATE LABEL TELEPHONY SOLUTION] DISTRIBUTION UNDER 3NG NETWORKS NON-DISCLOSURE AGREEMENT ONLY Table of Contents INTRODUCTION:... 3 MISSION:... 4 OVERVIEW:... 5 WHAT DO OUR PARTNERS GET WITH
NETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
EUROPEAN COMMISSION Brussels, XXX [ ](2011) XXX draft COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
