Indonesian Legal Framework for Cybersecurity Oleh :
|
|
|
- Iris Clarke
- 10 years ago
- Views:
Transcription
1 Indonesian Legal Framework for Cybersecurity Oleh : Dr. Edmon Makarim, S.Kom, SH, LLM Presented in NISC International Symposium, Japan., 24 October 2013
2 CV Name : Edmon Makarim Education : , S.Kom (computer degree), Informatics Management, Universitas Gunadarma , S.H. (law degree), Economics Law, FH-UI , LL.M. (Lex Legibus Master/Master in Law), Comparative Law, University of Washington School of Law, Seattle , Doctor (Doctoral of Law Sciences, FHUI, Depok). Experience : , Assistant of Lawyer ( SHR Law Firm ) , In-house Legal Counsel ( Sisindosat telematics co) Jan 2008-Dec 2009, Legal Advisor to the Informatics and Communication Ministry (Depkominfo) present, Lecturer in Telematics Law and IP Law, Associate Professor, (Chairman of Research Institute for Technology Law) 2012-present, Arbiter of Indonesian IP Arbitration (BAM-HKI) 2012-present, Members of Advisory Council of Telematics Society (MASTEL) 2013-skrg, Members of Advisory Council of Jakarta Municipal Public Information Commissioners (Komisi Informasi DKI Jakarta). [email protected] & [email protected]
3 MODERN STATE Shifting from structural approach to the functional approach of the governmental activities STATE: Good & Clean Governance Public-Private Partnership PRIVATE: Good Corporate Governance Public services SRO s CSR Good Information Governance??? CIVIL SOCIETY: NGO s welfare state Neo-liberalism National Wealth Creation
4 Ethics: Privacy, Accuracy, Property, Accessibility/Availability Responsibility Accountability Due Process Liability Constitutional Rights & Liabilities Constitution UUD-NRI 1945 (Amend 1-4) Intenational Instruments of Human Rights: Freedom of Expression Access to knowledge Access to technology Access to administration Privacy, Dignity & Reputation Right Against Self-Incrimination Due Process of Law Const l. Liabilities Ps.27 (1), 28 i-j, 30, 31 Other Countries Constitution Individual Rights + Public Interest Freedom of Expression Privacy (Anonymity, Reputation) Property Access to Public Information Rights Against Self Incrimination Government Obligation: Public Trust Obligation Public infrastructure People/citizen Administration E-voting Security etc Government liabilities? Legislation Products and Cases
5 Indonesian Constitution 1945: CHAPTER XII, DEFENSE AND SECURITY ** ) Article 30 (1) Every citizens have the right and duty to participate in the defense and security of the country. ** ) (2) The defense and state security system implemented through the community defense and security of the people by the Indonesian military and the Indonesian National Police of the Republic of Indonesia, as a major power, and the people, as a supporting force. ** ) (3) the Indonesian Armed Forces consist of the Army, Navy and Air Force as a tool of state has the duty to maintain, protect, and maintain the integrity and sovereignty of the country. ** ) (4) The State Police of the Republic of Indonesia as a means of maintaining state security and public order duty to protect, shelter, serving the community, and to uphold the law. ** ) (5) The structure and position of the Indonesian Armed Forces, Indonesian National Police, Indonesian National Armed Forces of authority relations and the Indonesian National Police in conducting their duties, citizen participation requirements in the defense and security set of Law. ** ) (1) Tiap-tiap warga negara berhak dan wajib ikut serta dalam usaha pertahanan dan keamanan negara. **) (2) Usaha pertahanan dan keamanan negara dilaksanakan melalui sistem pertahanan dan keamanan rakyat semesta oleh Tentara Nasional Indonesia dan Kepolisian Negara Indonesia Republik Indonesia, sebagai kekuatan utama, dan rakyat, sebagai kekuatan pendukung. **) (3) Tentara Nasional Indonesia terdiri atas Angkatan Darat, Angkatan Laut dan Angkatan Udara sebagai alat negara bertugas mempertahankan, melindungi, dan memelihara keutuhan dan kedaulatan negara. **) (4) Kepolisian Negara Republik Indonesia sebagai alat negara yang menjaga kemanan dan ketertiban masyarakat bertugas melindungi, mengayomi, melayani masyarakat, serta menegakkan hukum. **) (5) Susunan dan kedudukan Tentara Nasional Indonesia, Kepolisian Negara Republik Indonesia, hubungan kewenangan Tentara Nasional Indonesia dan Kepolisian Negara Republik Indonesia di dalam menjalankan tugasnya, syaratsyarat keikutsertaan warga negara dalam usaha pertahanan dan keamanan diatur dengan undangundang. **)
6 National Security vs Cybersecurity National Security Cybersecurity E-commerce E-government cybercrime 1) What is cyber-security...? 2) What s the Correlation with the Cybercrime and National Security..? 3) Is there any liabilities for all stakeholders: community, private and government?
7 Sources: Regional?
8 (ITU => Cybersecurity) Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user s assets. [Organization and user s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment]. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Availability; Integrity,( which may include authenticity and non-repudiation); Confidentiality The Global Cybersecurity Agenda has seven main strategic goals, built on five work areas: 1) Legal Measures => cybercrime legislation 2) Technical and Procedural Measures => End users and businesses (direct approach); and Service providers and software companies 3) Organizational Structures => highly developed organizational structures, avoid overlapping, 4) Capacity Building & User s education => public campaigns + open communication of the latest cybercrime threats 5) International Cooperation => Mutual Legal Assistance of the LEA s
9 Mapping of Indonesian Criminal Laws Particular Law Indonesian Penal Code (KUHP) Indonesian General Criminal Procedural Code (KUHAP) Press Human Rights corruption Broadcasting Pornogrpahy telecomm terrorism UU-ITE Corporate Document Money & Archives laundering Extraordinary Procedural Law IPR s tax Public services Freedom Of Information
10 Related Laws Law 11/2008 Electronic Information Transaction Law 14/2008, Public Information Law 23/2006. Citizen Administration Law 25/2009 Public Services Law 43/2009 Archives Law 36/2009 Telecommunication Law 32/2002 Broadcasting etc Law 02/2002, Police Law 16/2004, Prosecutor Law 48/2009, Judiciary Power Law 03/2002, Defense Law 17/2011, Intelligent Law 15/2003 Terrorism Notes e-transaction, e-signature e-government cyber-crime privacy and data protection invistigation, evidence and due process Maximum Access limited exemption Citizen Data Protection GCG etc Monitoring and Surveillance => Interception Preventive and Repressive Action => Law Enforcement Mutual Legal Assistance (Law 1/2006)
11 Long journey for Indonesian ICT Policy Reformation Age TKTI (Tim Koordinasi Telematika Indonesia National IT Framework 2001 (a). Formulate the general policies and strategic direction of national development, through utilization of ICT ; (b). Conducting research in the completion of the steps set the strategic issues that arise in the context of ICT development ; (c). To coordinate with the national agency Central Government / Local, state / local enterprises, World of Business, Professional Institutions, and the ICT community, and society in general in the context of ICT development ; (d). Provide approval for the implementation of ICT programs that cut across departments in order to be effective and efficient. Sisfonas Inpres 6/2001 (+) ICT Framework/Kerangka TIK Nusantara (KARTIKA), (+) ICT Evaluation Charter/ Piagam Evaluasi TIK (EVATIK), (+) National ICT Governance/ Guidance Pedoman TIK Nasional, (+) CA Guideline/Pedoman Certification Authority (+) RPP/Perpres E-government, dst Inpres 3/2003 Detiknas Kepres 20/2006. (i) e-education, (ii) e-procurement, (iii) National Single Window (INSW), (iv) e-budgetair, (v) National ID, (vi) Palapa Ring, (vii) Legalization Software.
12 National IT Framework + INPRES 3/2003 E-gov: Architectural Framework Civil Society based on IT Which has competitive advantage in year 2020, In supporting the unity of Republic of Indonesia Funding Mechanism with The new paradigm E-Commerce utk ekonomi kerakyatan E-education E Government for Good Governance IT for Society/ E-society E-Democracy Funding Mechanism with the new paradigm Infrastructure and Supporting Components: Infrastructure of information/computer/telecommunication (ICT), Human Resources, Cyber Law/Legal Framework
13 Institutional concept INCS: Synergy of Various Organizations To counter cyber attacks in the world, at the national level need to be made strong organization. Without having the right organizational structure is very difficult for a country to anticipate threats and attacks. This organization is a form of leadership that will be important for coordination among relevant institutions. Institutional INCS (Detiknas, 2013) The concept of the Indonesian National Cyber Security organization consists of a collection of organization, filled by competent human resources from a variety of fields. The picture is an illustration of the concept of INCS organization consisting of a variety of organizations.
14 Organizational Framework INCS Homeland Security Protect cyberspace environment Executive Coordinator Team Intelligence Preventive and capacity building Defense Protect militer cyberspace environment Coordinator-Incident Response Team Law Enforcement Investigation and prosecution of criminal in cyberspace Strategic Level President and Ministers Tactical Level Senior Experts, Practisioner, Academicians, Civil Servants Incident Response Team Gov-Cert Military-cert Banking-Cert Education- Cert Sectoral Level... Operational Level Experts, Practisioner, Academicians, Civil Servants Critical Infrastructure National ICT Council, 2013
15 Tactical Level: Mapping the Field Work Focus Ministries and Institutions Coordinator Coordination KEMENKOPOLHUKAM Homeland Security Intelligence Defense Law Enforcement Protect cyberspace environment Preventive and capacity building Protect militer cyberspace environment Investigation and Prosecution of criminal in cyberspace KEMKOMINFO BIN LEMSANEG KEMDIKBUD KEMHAN TNI POLRI KEJAKSAAN Coordinator-Incident Response Team
16 Human Resources Qualified Human Resources for Security are needed to handle and to protect the cyberspace in Indonesia. In fact, the condition of the human resource in the field of information security in Indonesia is still limited. However, Indonesia has a huge potential number because many universities and graduation are very large in the field of ICT, which became the basis for the field of Security.. Information Security Consultant Information Security Administrator Information Security Manager Chief Security Officer Information Security Technician/Engi neer Physical Security Manager Physical Security Officer Piramida SDM Keamanan Siber (Detiknas, 2013)
17 ASEAN ICT Master Plan 2015
18 Characteristic of ASEAN Region Most ASEAN country are communal, paternalistic and religious + tolerant (local wisdom) => adopted as public/society norms Some of ASEAN country had already combined the European Continental tradition, Common Law tradition and customary + religious tradition in their National legal system ASEAN want to be integrated as one community
19 Cyber security policy directions to achieve ASEAN ICT Masterplan 2015 Harmonizing the ASEAN Cyberlaw=> Appreciation and Acknowledging of national/community norms (rights and liabilities) => blocking and filtering to the Illegal Content Harmonization between ASEAN member s Cyber security policy and regulation the coordination centre to establish comprehensive, active and united ASEAN Harmonizing the ASEAN National e-authentication Framework => National e-id Management, Cyber-notary to facilitate the exchanging public document (e-apostille). Harmonizing the Cryptography policy and regulation of ASEAN countries Harmonizing the trusted/trustworthy list => e-system Provider which were Registered, Accredited and Certified in order to have mutual cross-border recognition => ASEAN Trustmark trusted list Interoperability between National Root CA and/or Private Root CA => ASEAN Bridging CA for Cross-border certificate Harmonizing the e-public services between the ASEAN members countries Crossborder coordination (24/7 network) => Government and Private incident response (CERT) + cybersecurity council of each state s member ASEAN Mutual Legal Assistance
20 Thank You Capacity Building: Indonesia Sentra Eyes melambangkan wawasan Smile melambangkan optimisme Lamp/Idea melambangkan HKI Chip melambangkan penguasaan ICT Hub Indonesia Sentra Geografis Dunia
21 ASEAN Fundamental Principles the ASEAN Member States have adopted the following fundamental principles, as contained in the Treaty of Amity and Cooperation in Southeast Asia (TAC) of 1976: Mutual respect for the independence, sovereignty, equality, territorial integrity, and national identity of all nations; The right of every State to lead its national existence free from external interference, subversion or coercion; Non-interference in the internal affairs of one another; Settlement of differences or disputes by peaceful manner; Renunciation of the threat or use of force; and Effective cooperation among themselves.
22 ASEAN Community The ASEAN Community is comprised of three pillars, namely: the ASEAN Political-Security Community, ASEAN Economic Community and ASEAN Socio-Cultural Community. Each pillar has its own Blueprint, and, together with the Initiative for ASEAN Integration (IAI) Strategic Framework and IAI Work Plan Phase II ( ), they form the Roadmap for and ASEAN Community
23 ASEAN CHARTER The ASEAN Charter serves as a firm foundation in achieving the ASEAN Community by providing legal status and institutional framework for ASEAN. It also codifies ASEAN norms, rules and values; sets clear targets for ASEAN; and presents accountability and compliance. The ASEAN Charter entered into force on 15 December A gathering of the ASEAN Foreign Ministers was held at the ASEAN Secretariat in Jakarta to mark this very historic occasion for ASEAN. With the entry into force of the ASEAN Charter, ASEAN will henceforth operate under a new legal framework and establish a number of new organs to boost its community-building process. In effect, the ASEAN Charter has become a legally binding agreement among the 10 ASEAN Member States.
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
An Overview of the Development Indonesia National Cyber Security
An Overview of the Development Indonesia National Cyber Security Farisya Setiadi Program of Information System STMIK Indonesia Depok, Indonesia [email protected] Yudho Giri Sucahyo and Zainal A. Hasibuan
Cybersecurity in the Commonwealth: Setting the Stage
Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
Cybersecurity Governance
AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
CYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities
Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA
ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
Peace and Justice in Cyberspace
Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
National Cyber Security Policy (Draft) March 2015
National Cyber Security Policy (Draft) March 2015 ACRONYMS Acronym AMIS CCIP CIIs CMU CS CSIRT/CERT CSOC DDos EA EDPRS EU e-gov FDI G2B G2C G2G GDP GEA GoR GSA HMIS ICT IEC IOS IT IaaS ITSD KIST KLab MOD
CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC
124 CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC Vladimíra Trnkócyová 56 General background Historical overview and future vision of investigation in the Slovak Republic The 2001 Accession Partnership
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
REPUBLIC OF TURKEY. Ministry of Transport, Maritime Affairs and Communications. National Cyber Security Strategy and 2013-2014 Action Plan
REPUBLIC OF TURKEY Ministry of Transport, Maritime Affairs and Communications National Cyber Security Strategy and 2013-2014 Action Plan [The page intentionally left blank.] National Cyber Security Strategy
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
I. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview
Viewpoint: Implementing Japan s New Cyber Security Strategy*
Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released
Tentative Action Plan
Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
Governmental Oversight and Accountability Committee
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) Prepared By: The Professional Staff
Cyber Security in Japan (v.2)
Cyber Security in Japan (v.2) Ryusuke Masuoka ([email protected]) and Tsutomu Ishino ([email protected]) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December
JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga
BACKGROUND Riga, 27 January, 2015 Informal JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga The Informal Meeting of Ministers for JUSTICE and HOME AFFAIRS (JHA) will be chaired
General Assembly. United Nations A/69/723
United Nations A/69/723 General Assembly Distr.: General 13 January 2015 Original: English Sixty-ninth session Agenda item 91 Developments in the field of information and telecommunications in the context
provisions specified by the Preventive Law, the Cabinet of Ministers of Azerbaijan Republic has adopted the following decisions:
REPORT of the Financial Monitoring Service under the Central Bank of the Republic of Azerbaijan on execution of The 2007-2011 Action Plan for implementation of the National Strategy for Combatting Corruption
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND
Towards closer EU-ASEAN collaboration in cybersecurity
Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Towards closer EU-ASEAN collaboration
23 Y.D Berkovitz St. The Museum Tower Fl. 7 Tel Aviv, Israel
23 Y.D Berkovitz St. The Museum Tower Fl. 7 Tel Aviv, Israel Phone +972-3-6935356 +972-544-336056 E-mail: [email protected] Website: www.internetlaws.co.il Dr. Nimrod Kozlovski, Adv. Personal Information
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
The global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
International Dimensions of National (In)Security Concepts, Challenges and Ways Forward. Session III: Cyber Security
9 th Berlin Conference on Asian Security (BCAS) International Dimensions of National (In)Security Concepts, Challenges and Ways Forward Berlin, June 14-16, 2015 A conference jointly organized by Stiftung
National Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
Cybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
Overview of e-asean Initiative
Overview of e-asean Initiative Pichet Durongkaveroj Chairman e-asean Working Group ITU Workshop on Creating Trust in Critical Network Infrastructures 20-22 May 2002 Seoul 1 Coverage Background Implementing
FACULTY OF SOCIAL AND POLITICAL SCIENCES
The Faculty of Social and Political Sciences is one of Indonesia s leading faculties in social subjects constituting of 7 Departments: Communication Studies, Criminology, International Relations, Political
Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
Cybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
LAW OF THE REPUBLIC OF GEORGIA ON CITIZENSHIP OF GEORGIA
/unofficial translation/ LAW OF THE REPUBLIC OF GEORGIA ON CITIZENSHIP OF GEORGIA Citizenship is the stable legal relationship of a person with the state which is expressed in the totality of their mutual
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
a. A brief profile of the higher education system in your country: main policy, higher education providers, access to higher education etc.
Indonesian National Accreditation Agency for Higher Education (BAN-PT) COUNTRY REPORT FOR THE ROUNDTABLE MEETING OF QUALITY ASSURANCE AGENCIES OF THE ORGANIZATION OF ISLAMIC CONFERENCE MEMBER COUNTRIES
Working Towards the 2020 Tokyo Olympics
Working Towards the 2020 Tokyo Olympics - The Current Situation in 2015 Mariko Miya Cyber Defense Institute, Inc. [email protected] Agenda 1. Introduction 2. The current situation in Japan 2015 Analytics
Harmful Interference into Satellite Telecommunications by Cyber Attack
Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,
Home Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
Capacity Building to Strengthen Cybersecurity: Thailand Update
Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
THE DECLARATION ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN AND ELIMINATION OF VIOLENCE AGAINST CHILDREN IN ASEAN
THE DECLARATION ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN AND ELIMINATION OF VIOLENCE AGAINST CHILDREN IN ASEAN WE, the Heads of State/Government of the Member States of the Association of Southeast
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Trends Concerning Cyberspace
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
ASEAN COMMUNITY VISION 2025
ASEAN COMMUNITY VISION 2025 ASEAN Community Vision 2025 ASEAN COMMUNITY VISION 2025 1. We, the Heads of State/Government representing the peoples of the Member States of the Association of Southeast Asian
ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
The role of CyberSecurity Malaysia towards cyber security industry development in Malaysia
The role of CyberSecurity Malaysia towards cyber security industry development in Malaysia Presentation by Dr. Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia NATIONAL CYBERSECURITY
Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014
Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 1 July 2014 RESTRICTED 1 ICT as a Modern Solution Security Threats, Early Detection and Prevention
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
Trends and Tactics in Cyber- Terrorism
Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends
Crime Prevention and Criminal Justice Issues: the UN System and UNODC Mechanisms
Crime Prevention and Criminal Justice Issues: the UN System and UNODC Mechanisms -Ajit Joy Expert, Crime Prevention UNODC Jakarta The mandate of the United Nations Office on Drugs and Crime, the organization
REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND
REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND REPUBLIC OF POLAND Ministry of Administration and Digitisation,
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
How To Be A Successful Company
177 Hitachi s Approach As a global company, upholding the laws and regulations of the countries and regions where we do business is a basic premise of our operations. We have enhanced our compliance framework
A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
SEQUENCE OF PRESENTATION
SEQUENCE OF PRESENTATION I. PHILIPPINE INTEGRATED TRANSFORMATION PROGRAM II. PNP PERFORMANCE GOVERNANCE SYSTEM (PNP Transformation Roadmap 2030) a. Roadmap b. Measures / Scorecard INTEGRATED TRANSFORMATION
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Public Private Partnerships and National Input to International Cyber Security
Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,
CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE
Strasbourg, 29 November 2006 CCPE (2006) 05 Rev final CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) FRAMEWORK OVERALL ACTION PLAN FOR THE WORK OF THE CCPE as approved by the Committee of Ministers
National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA
FEATURE ADDRESS BY THE HON. KHEMRAJ RAMJATTAN, M.P., VICE-PRESIDENT AND MINISTER OF PUBLIC SECURITY AT THE OPENING OF A National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA August 12 13,
Egyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
Building Cyber-security Capacity in the Kingdom of Bhutan
Building Cyber-security Capacity in the Kingdom of Bhutan Drafted by: Taylor Roberts Global Cyber Security Capacity Centre University of Oxford 1 Table of Contents Assessment of Cyber-security Maturity
Draft Е GOVERNANCE DEVELOPMENT STRATEGY 2014 2020 IN THE REPUBLIC OF BULGARIA
Draft Е GOVERNANCE DEVELOPMENT STRATEGY 2014 2020 IN THE REPUBLIC OF BULGARIA Table of Contents INTRODUCTION... 3 1. CURRENT STATE ANALYSIS... 5 2. VISION OF THE E GOVERNANCE IN THE REPUBLIC OF BULGARIA...
Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:
3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant
