Public hearing on transborder access to data. Written contributions

Size: px
Start display at page:

Download "Public hearing on transborder access to data. Written contributions"

Transcription

1 Cybercrime Convention Committee (T-CY) Public hearing on transborder access to data Written contributions Hearing preceding the 9 th Plenary of the T-CY 3 June 2013, Strasbourg, France

2 Contents 1 APWG Ciberdelincuencia Cisco Google Leaseweb ICMEC University of Canberra

3 1 APWG Introduction and Prefatory Remarks The APWG is pleased and honored to submit comments on the Transborder Access to Data hearing. Our commentary is divided into three parts. First, there is an institutional biography of the APWG, followed by a few examples of how industrial cybercrime responders and investigators manage transborder data access between their peers. The third part answers the direct questions based on our examples and experiences from an industry perspective which have coloured our views on the transborder data access matters being engaged by the ad hoc committee. The institution s motivation for submitting this commentary is to broaden committee s understanding of the specific needs of industry and NGOs who routinely and, in many cases in 24/7 automated programs, exchange data related directly to active cybercrimes and criminal activities in order to protect the members of the public. APWG hopes the examples prove instructive to the ad hoc committee as to the role of industry in exchange schemes and again denying the larger society the benefits of unified responses to common, predictable threats. APWG Institutional Profile The APWG, founded in 2003 as the Anti Phishing Working Group, is a US based NGO with over 2000 member enterprises from a majority of the countries around the globe. Its mission is to identify common problems in responding to and managing Internet-- based fraud and other electronically mediated crimes; operate data clearinghouses where e crime related machine event data can be shared amongst APWG members and law enforcement; and to provide non public for a to share best practices and techniques for reducing the number of e-- crime events and therefore victims. Noteworthy projects with global user constituencies include the URL Block List (a clearinghouse for reports of phishing websites and related meta data that distributes report records in real time to responders and technology companies around the world on a 24/7 basis); the STOP. THINK. CONNECT. Messaging Convention (a universal cybersecurity slogan, logo and related online safety advisories composed for a persistent, borderless cybersecurity public awareness campaigns by public and private enterprises worldwide); the APWG/CMU-- CyLab phishing redirection pages (an education program that directs credulous computer users to a warning and education page); and the ecrime Exchange Network a meeting place and data exchange platform for APWG member responders to discover each others forensic interests and exchange data related to cybercrime events. The APWG s membership includes financial institutions, online retailers, ISPs and Telcos, international, national and local enforcement agencies, technology solutions providers, multilateral treaty organizations, research centers, trade associations and government agencies. APWG s directors, members and research correspondents have served as advisors and expert witnesses to national governments the world over and international treaty organizations such as the United Nations Office of Drugs and Crime, Organization of American States, the European Comm ission, the OECD and the Council of Europe s Budapest Convention on Cybercrime. Examples of Industry s Everyday Interventions Against Cybercrime A good deal of the data exchange required to respond persistently and effectively to cybercrime is embedded in security software products developed by industry and mounted on consumers computing devices, more often than not employing a continually refreshed reserve of data to guard users devices, and personal data, from new threats as they emerge. Further, in regards forensic enterprises, many are 3

4 surprised to find out that most all initial ecrime investigation, and response is performed by private parties, in most all cases commercial enterprises and NGOs not sworn law enforcement. As such, clarification and guidance exclusively for law enforcement operations misses the largest base of actual investigators and responders who are largely employed in industry, and the technology sectors that programmatically exchange data for security applications that are used to neutralize cybercrime events before they become damaging to people and enterprises. Automated Data Exchanges for Programmatic Security Schemes Embedded data exchange routines are a key component of computer security software. In fact, computer security software companies programmatically exchange copies of malware with each other that is routinely recovered from customer machines operated by individuals, as well as networked computers managed by commercial enterprises, to update the threat signatures on their security software products. As well, these companies and cybercrime investigators also subscribe to commercial and NGO managed services and government sponsored resources that supply such data as malware samples (and abstractions of them expressed as mathematical fingerprints for quick identification of known malevolent code), attack information, WHOIS data related to cybercrime schemes and events and the network numbers of Internet Protocol (IP) addresses that have been associated with cybercrime and other malevolent or anti-- social behavior. Figure 1: Data table of phishing reports in CSV format These resources inform the security products that consumers use to protect their devices and data from cybercrime and the systems enterprises employ to detect and neutralize cybercrime before it can cause harm to customers. Still, industrial security technologies comprise only part of the story of private law enforcement on the Internet. Brand holders staff security teams and contract with private security companies to investigate cybercrime and, when possessing enough information, make criminal case referrals to public sector law enforcement agencies. These professionals trade all of the data described above and more through automated systems, and manually through trusted networks of peers when forensic narratives emerge from the datasphere and they need assistance in tracing and profiling the actual perpetrators. Industrial Cybercrime Investigator s Work Profile We will examine a relatively simple phishing operation as an example that illustrates the workaday tasks completed by private industry interveners, their roles and responsibilities and, as importantly for the committee s work, the kinds of data that they have to exchange, examine and process (most automatically) every day to complete the counter-- cybercrime tasks that are normal parts of their professional briefs. 4

5 Phishing is an activity where a criminal sends out an or other message ( the lure ) to a set of potential victims. The lure asks the recipient to enter their banking or other username and credentials into a fraudulent webpage ( the collector ) for some spurious rationale (e.g. system update; emergency account closure). The victim s credentials are harvested and stored for later retrieval by the criminal ( the credential database ). Once captured, the banking credentials are used to steal funds from the victim, used as an account to launder money, or as a basis for further identity theft. The phishing operation has three specific phases: 1) the sending of the lure; 2) collecting credentials submitted by credulous ma rks at a counterfeit website imitating the appearance of a trusted brand and 3) abusing the captured credentials for cashing out somehow against the victim s accounts via withdrawals or payment routines. In general practice, the phishing operation is usually detected by a private party, such as a bank s remote channel security team or a security services company working for victimized brand holders, watching for suspicious activity. The observing party could be technicians monitoring the targeted financial institution s online banking services hosted at banks own site or searching for and detecting counterfeit websites spoofing the bank s brand. Or it could be a contracted security monitoring organization, or even reported by the general public, as is the case with the APWG s clearinghouse that has been receiving and redistributing phishing reports from the public since Once detected and verified, an attempt is made to disable the web page (the collector) by contacting the domain owner, if the website has been planted on an existing legitimate website. As most phishing collector web sites domain names and hosting resources are registered with fraudulent or stolen identities attempting to notify the web site owner is a fruitless adventure. Escalating the disablement request to the web server operator or to the domain registrar will result in success but responders first need to verify the request and to attempt to contact the party whom their counsel will accept as the web server owner before proceeding. Reducing the lifetime of the website is crucial to minimizing victimization since the longer the collector and database are available means more time for harvesting new victims. A workable way to enable disablement of the collector server when the actual owner of a website cannot be determined and offer consent needs to be developed. A different set of issues arises for the phishing database system. After the collector is disabled, the phished organization may wish to gather the list of victims to perform mitigation. The same fraudulent identity information used in the collector was probably used for the database system, i.e., there is no real, identifiable, person to give consent for the organization to recover its own data (the account numbers and passwords) to identify and assist victims. An additional challenge is to delete, corrupt, or otherwise render useless the actual data in that database before it can be used by the criminal. Once the collector servers and database systems have been disabled, the initial investigator may exchange details such as tactics, software used, or geographic location -- of the servers, owner identity or characteristics with other investigators to attempt to identify the criminal(s) behind the activity. Once enough actionable infor mation is compiled, this data not evidence but background or intelligence data may be turned over to law enforcement to initiate an operation to track, identify and capture the criminal(s). The data exchange needs to be performed in a way that protects sensitivity of the data but does not signal the criminal(s) that they have been discovered. Most times the three components the lure, collector, and database - are in different jurisdictions, but that fact does not add any real additional complexity to an already complex situation. 5

6 A number of the points raised in this example may be mitigated with the proper wording in users agreement between website owners and the service providers who respond to cybercrime events, although we have found many providers legal counsel reluctant to be the first to actually add that language. In some jurisdictions, finding the right words to balance the privacy versus investigative principles is still a challenge. Actual guidance with concrete language, pointing to use cases may influence the adoption into more user agreements. Correspondents Conception of Article 32b Operational Aspects: Using the current Article 32b of the Budapest Convention on transborder access, the correspondents, viewing its language from an industrial perspective, understand: a. The notion of consent in this Article We understand the concept of consent to imply that an easily identifiable entity that owns or controls private or sensitive data ( the owner ) may voluntarily or upon request produce a copy of that data to aid in an investigation. Said investigation may be conducted by a law enforcement or private investigative group. b. The notion of a private entity being a person who lawfully can provide access or disclose data One shortcoming of the consent principle is that criminals will use known stolen, fictional, fraudulent, opaque, or obtuse identifying information in order to hide their true identity and thwart the consenting activity. Currently, if the true identity of the data owner cannot be ascertained there is no consistent way to escalate the request to the service operator to gain access to the data. In the fast- paced world of e- crime, these delays are costly. One of the issues that arises periodically is when the identifying information is accurate but the data owner intentionally impairs the consent request so they can destroy the offending data. Although the data owner may be charged with spoilage, the actual data which may include victim identification or transaction logs is now lost. Jurisdictions should have some mechanism for a service provider to capture the data requested (much like a preservation request) when the consent requests are ex pected to be troublesome. If consent is not assented, the copy of the data could be destroyed. c. The type of data that can be disclosed by a private sector entity The data that cybercrime responders routinely seek are the logs of a collector, or otherwise compromised server, and the actual victim identifications from the phishing database. The victim identifications can be returned to the credential owner for victim assistance. The log files which will not normally contain personally identifiable information are a great resource in identifying the criminal parties. No operational personnel encountered by the correspondents ever subscribed to the idea that an unenriched Internet Protocol (IP) Address number by itself is considered personally identifiable information, since they change regularly and identify a system not a person. Overwhelmingly, operations personnel regard this interpretation as an impediment to organization of shared data resources that could help scale efforts to detect, halt and investigate cybercriminals. The correspondents believe there are two types of data accesses that should be addressed by 32b: evidentiary data recovered by law enforcement to be used as evidence in a recognized court and often including PII related to real living people and suspects (and subject to all the protections afforded by the data privacy and protection statutes of the EU), as defined by law or treaty; and technical background data, which is used to better understand the criminals illicit activities, their movements through network 6

7 or their techniques. In many cases the background data is correlated and reduced to a specific data set that is turned over to law enforcement for a formal, evidence-- based investigation. This is not to say that the background data is magically turned into evidence, but rather the correlated background data is used as a starting point for formal evidence collection that would provide information admissible to a court. APWG and its data-- exchange correspondents are exploring the concept of machine event data to be shared amongst our members, which is a new term for automatically generated technical background data that can be shared and correlated extremely quickly through computer programs. This type of data is automatically generated by networked computers and security systems (such as intrusion detection or firewall devices) when they discover malicious activity. The ability to correlate multiple sets of machine event data is invaluable when trying to ascertain malicious or distinguish criminal intent from generic user errors -- or to determine criminals attack techniques and assist in identifying likely candidates for further investigation. The correspondents do not believe a consent option is required for this type of data. d. The conditions for disclosing data or prov iding access Private entities should be able to provide access to system logs and other non-- personal data for security applications in which common databases of event data provide greater efficacy or when they suspect criminal activity or when consent is not expected to be given in a timely manner. This type of data access should be considered technical background data as its collection and handling will normally not meet the requirements of actual evidence. Whether law enforcement could request the data or the private entity must start the exchange is an issue that may never get resolved. e. The notion of the person consenting to provide access or disclose data, especially in the situation where that person is somewhere else then in the territory of the requesting state. With the ease at which data can flow and separate into multiple servers in multiple jurisdictions, we follow guidance that says the owner of the data can provide the necessary consent, irrespective of where the data is. If I, as owner or controller of the data, move the data around to gain cost or operational advantage, I m still the owner or controller. This guidance works fine for the small, specific data sets that cybercrime responders and investigators seek, but may not work in all situations. Regarding the proposal to allow for enhanced possibilities for transborder access through an Additional Protocol to the Budapest Convention a. The option of transborder access with consent but without the limitation to data stored in another Party This situation seems analogous to that in section e, above. The data owner s consent should carry wherever the owner s data resides. Since the data disclosure is with consent, if the another Party objects to the transfer, the data owner could just duplicate their data in a more friendly Party and get around the objection. (This brief response does not take into account the data import/export regulations that will significantly impact the duplication operation.) b. The option of transborder access without consent but with lawfully obtained credentials This is a common tactic amongst private investigators. No laws are broken and the resultant data speeds up the identification of the perpetrators. Use of a stronger word than obliged is suggested, though. c. The option of transborder access without consent in good faith or in exigent or other circumstances 7

8 The quick pace of Internet crime makes this an important consideration. As in the non-- Internet world some legal follow-- up should be required if this activity is undertaken. d. The option of extending a search from th e original computer to connected systems without the limitation in its territory (Article 19.3 Budapest Convention) Many Internet applications use multiple servers to implement their services. For example, there may be a web server (front-- end), a java language server to process the web pages, and a database server to hold user input. For cost or disaster recovery purposes the three (or more) physical servers may be scattered across multiple data centers or jurisdictions. Cloud computing is a fine example of this multiple server architecture. If the search is expecting to gather all the related data, it seems odd to limit the data returned to be the data that is only resident in one territory, or one server. As more and more data is scattered across multiple data centers (or jurisdictions) it seems odd to only allow legal search accesses to a portion of the data. A request for data should return the entire requested data set irrespective of where the data is. e. The power of disposal as connecting legal factor We agree with the position stated in Proposal #5 in the protocol v2 paper. It speaks to the reality of distributed data schemes that are increasingly the mode of deployment for computer databases. f. Conditions and safeguards required Current law and multi-- lateral treaty language was in some ways prescient but sometimes falls short in addressing the reality of industrial and NGO responders as the primary investigative agents protecting consumers and enterprises against cybercrime, leaving uncertainty in areas and leaving interpretation open and subject to restrictive and limiting recitations by corporate counsels believing they are managing liabilities that may not be contained in these legal codes. The Convention needs to address the spectrum of data that interveners exchange and the scenarios in which they are traded, as well as the nature of the roles that the interveners play. At one end of this spectrum are real identity data, subject to the protections of the European data privacy laws; and at the other, unenriched machine event data that represents only transactions or data movements between Internet-- connected devices at a specific moment, betraying no content or communications data. g. Other situations that should be covered by an Additional Protocol The trouble is not what is explicit in the laws and regulations regarding data privacy and data protection but lack of instruction regarding safe harbor for usage of different kinds of electronic data in security and forensic applications. Most all of the data that security personnel acquire and use have no connection at all to real, living people. Most all of it refers only to machine events, such as the scanning of an IP address range or the shifting of the network address of a maliciously registered domain name. We posit that these kind of "ʺmachine event data"ʺ as completely separate from and formally distinguished from personally identifiable information that requires an association of an event, address or value to a real person. Machine event data, we posit, may be established as a category of data that can be mobilized with the certainty of its and maintenance of machine event databases of WHOIS data associated with cybercrime events only and having no association with named real, living people. Conclusion Industrial management of cybercrime is a workaday reality that needs to be accommodated in law and regulation as much as law enforcement s role in pursuing cybercriminals, given the roles industry immovably inhabit in its position as custodian of customers interests. The recommendations that the ad hoc committee is formulating would do well to recognize and codify these realities to assure industrial actors that their workaday efforts do not conflict with treaty language. 8

9 APWG gives thanks to the Convention for being invited to submit this commentary and offers any and all of its resources to help the ad hoc committee in the further development of its recommendations and additional protocol. 9

10 2 Ciberdelincuencia The following document contains some personal views of the authors on the issue of transborder access and jurisdiction currently under consideration by the TC-Y Committee of the Budapest Convention. We d like to thank the Chair and the members of the TC-Y Committee for offering the opportunity to provide brief views on this important public hearing. With regards to the three solutions contained in the final report of the TC-Y to be pursued in parallel, we fully support the proposal of further developing a Guidance Note on the scope and effect of Article 32 in the investigation of conduct and access to data by law enforcement authorities (LEAs) in other jurisdictions. Such Guidance Note should reflect further detailed practices and description on how LEAs of countries that have ratified the Budapest Convention are accessing and obtaining data in other countries to investigate crime and obtain evidence to prosecute offenders whose crime has effects on the territory of another country based on the international principles of jurisdiction and mutual legal assistance since this a global issue that might have tremendous repercussions in the field of public international law. Further, we believe such Guidance Note should also reflect practices occurring in other countries, including a description of the technical and legal limitations that prevent countries that are not signatories of the Budapest Convention in order to guide and help them deal with the issue appropriately. We believe such task would bring certainty for a number of non-european countries if they wish to become signatories of such treaty in the future. LEAs in Europe are better positioned in terms of technical and financial resources and operate under established cooperation paths and channels to carry out cybercrime investigations in comparison to LEAs in other countries. This situation is gradually changing in some countries of Latin America and the Caribbean through the Organization of the American States, but unfortunately for many countries of that region the investigation and prosecution of cybercrime is not yet a a priority. As noted in the final report of the TC-Y, the issue of transborder access to data and jurisdiction is not new and has been discussed for more than two decades including during the negotiations of the Budapest Convention 1. With the current decentralization of servers and the deployment of data centers worldwide through cloud computing, the issue of transborder access, the location of data, and the different criteria and current practice of Internet access providers to disclose information and data to LEAs is getting extremely complex and the rules differ significantly from one country to another. Based on these concerns, we firmly believe that the Council of Europe -with the support of national expertsshould facilitate resources to provide capacity and training to LEAs in other countries, on the one hand, to make LEA s aware of the importance of complying with the technical and legal frameworks on access to data and the existing international assistance channels to carry out transborder investigations in other countries, and on the other hand to ensure the compliance with the international and national frameworks on data protection and access to information. With regard to views on the notion of consent under Article 32 b of the Budapest Convention, as far as countries in Latin America are concerned, there is currently no uniform set of practices or guidance for LEAs in the region, therefore LEAs operate under full discretionary powers. 1 Cybercrime Convention Committee (T-CY) Transborder access and jurisdiction: What are the options? Report of the Transborder Group adopted by the T-CY on 6 December 2012, p

11 In many countries of Latin America, the rules on interception of private communications and access to data and disclosure might either fall under the scope of substantial and procedural criminal laws, data protection laws or access to information legislation. For instance in Mexico, Articles of the Federal Law Against Organized Crime (FLAOC) provide the legal hypothesis, modalities and procedures to authorize the interception and access of private communications by law enforcement and judicial authorities in national territory. Article 16 of the FLAOC establishes that activities such as those carried out orally, in writing, by signs, signals or through the use of electronic, wired and wireless devices, computing and equipment systems or any other mean or form that allows for the communication between one or multiple emitting parties or one or multiple receiving parties might be subject to the intervention of private communications. 2 The Federal Code of Criminal Procedure and the Federal Telecommunications Law establishes specific provisions that mandate cooperation of telecommunication and internet services providers with LEAs in order to obtain and disclose information and judicial evidence when requested3 3 and in the identification of real time geographic location of mobile communication equipment associated to telephone lines as part of investigation related to organized crime, crimes against health, kidnapping and particularly extortion threats. 4 Mexico enacted the Federal Law on Protection of Personal Data Held by Private Parties (FLPPDPP) on July 2010 and its Regulation in December Such federal Law and its Regulation regulate the legitimate, controlled and informed processing of personal data in possession of individual and private legal entities, which includes telecommunication providers and Internet access and service providers. The Law and the Regulation establish specific rules and exemptions on the notion of consent for the processing of personal data.5 5 Additionally, Article 52 of the Regulation establishes specific obligations and conditions for the processing of personal data for cloud service providers. Among those obligations are to maintain the confidentiality with respect to the personal data regarding the service provided or offered and to establish mechanisms for impeding access to personal data to individuals who do not have the corresponding access credentials or in the event of a request duly made by a competent authority whereby cloud service providers should inform the data controller on such request. Neither of said laws and regulations estipulate specific rules and conditions for disclosing data or providing access to LEAs of evidence located in other States or foreign jurisdictions nor specific guidance on how Internet service and access providers might facilitate and provide access and disclose data when the perpetrator is located in a territory different than the requesting State of the LEA. On August 2011, a Mexican Court on Constitutional Matters (Primera Sala en Materia Constitucional) issued a judgment on the right to the inviolability of private communications. The judgment found that traffic data such as the identity of the caller, the telephone call duration or identification of an Internet protocol address (IP) should afford the necessary protection in order to preserve the right of privacy of communications pursuant to paragraphs twelfth and thirteenth of Article 16 of the Mexican Constitution. 6 2 VELASCO, Cristos Cyber Law in Mexico, see paragraphs , pp , Wolters Kluwer Law & Business, Fourth Edition, January VELASCO, Op. cit., paragraph 699, p Ibid, paragraph 660, p See Articles 8 to 10 of the Federal Law on Protection of Personal Data Held by Private Parties (FLPPDPP) and Articles 11 to 21 of its Regulation. The FLPPDPP and its Regulation are available in the website of Proteccion Datos Mexico (ProtDataMx) at 6 VELASCO, Op. cit., note 2, paragraph 633, p

12 The great majority of countries in Latin America, including Mexico have entered into bilateral and multilateral agreements on judicial cooperation on criminal matters within the sphere of the Organization of American States (OAS). 7 Although such instruments have been useful to improve the necessary channels for cooperation on criminal investigations, prosecutions and proceeding among countries of the region, the reality is that such instruments have proved to be ineffective when it comes to investigation of computer and Internet related crime that necessarily require immediate reaction from LEAs, national contact points, and the support from private sector entities and Internet intermediaries in order to identify and investigate cross-border crime pursuant to the existing procedural and technical channels. Final Observations We support the TC-Y proposal of further developing a Guidance Note on the scope and effect of Article 32 in the investigation of conduct and access to data by LEAs in other jurisdictions. Such guidance note should not only reflect and describe both, the technical and legal procedures used by countries that have ratified the Budapest Convention regarding the practices use to extend searches and access data stored in servers and data centers located in other jurisdictions, but it should also include a description of the technical and practical legal limitations encountered by LEAs with Internet intermediaries. We believe such initiative would surely guide and help non-signatories of the Budapest Convention to deal with these issues on a better basis and offer them certainty and if they wish to become signatories of such treaty in the future. The Council of Europe should encourage both, signatories and non-signatories countries of the Budapest Convention to establish specialized multi-stakeholder working groups that could function as contact points for the exchange of information and practices related to aspects of jurisdiction and transborder access to data in their own countries. We believe the work and feedback of such national working groups should not only bring a value added to the activities currently undertaken by the TC-Y Committee, but also a source of comparative experiences occurring in other countries. Finally, we d like to underline the importance of facilitating resources to provide capacity and training to LEAs in other countries to help them comply with the technical and legal frameworks on access to data and the existing international assistance channels to carry out transborder investigations in other countries while ensuring the compliance with the international and national frameworks on data protection and access to information that are fundamental human rights. 7 See Inter-American Convention on Mutual Assistance in Criminal Matters of 23 May 1992 and its Optional Protocol of 6 November 1993, available in the website of the Organization of American States at: 12

13 3 Cisco Cisco Systems is pleased to respond to your solicitation for comments of 14 April 2013 regarding clarifications to the Budapest Convention, as well as a proposed additional protocol on enhanced transborder cooperation. We believe the Convention on Cybercrime is an important tool for law enforcement that provides for a means to help address the important issue of cybercrime. Research has previously shown that both accession and even congruence to the Convention provides benefit to countries. The convention itself is now twelve years old, and should take into account recent developments, both in terms of the overall ICT market as well as way in which issues have evolved over this span of time. As a leading global provider of products and services for the Internet, including security and cloud-based services, Cisco has a gained a significant amount of experience in networking and associated issues related to cyberspace. Research has shown that transborder cooperation is an important aspect for addressing cybercrime. Meaningful improvements in the area of transborder cooperation may have a positive impact on overall cybersecurity. We would like to bring to your attention two general concerns when considering proposed changes: a. There should be clear and transparent rules for when a demand for release of information is competent. With forty nine signatories with numerous different legislative frameworks and constitutions, it is important for a recipient of a request for information to understand who is authorized to make a request for information, what form that request should take, what notification should take place (if any), and what the requirements are for preservation of that evidence (if any). The Convention as it stands today is clear on these points. The proposed protocols, however, may introduce uncertainty, especially as relates to third parties. Although physical devices (such as a particular computer) can provide clean boundaries for the scope of any search the issue becomes murkier when networks and storage cross country boundaries, which may be the case with services such as the cloud. Any new proposal should take into account, and address the issues raised by the possibility that information is stored in many devices, and perhaps in many countries. At the same time, it is important for proposals to seek to ensure that businesses are not put in a position where cooperation with one jurisdiction puts that business in legal jeopardy in another jurisdiction. For example, if a signatory were to request information about a subscriber in the EU, under the proposed revision of the Data Protection Framework, the service provider could potentially be required to obtain consent from the data subject before forwarding the information or at least provide information about the request and give them the right of access and to object. This could be in direct conflict with the requirements of the original request. We would request that guidance or additional protocols should take into account such jurisdictional issues and ensure that contradictions are resolved in discussions between Parties as opposed to sanctioning service providers caught in the middle. b. Attention to establishing clear and established procedures Clear and established procedures within the context of the Convention will help facilitate cross-border law enforcement efforts. It is important that the law enforcement community work closely with the Internet community to establish strong lines of communication, and that each trains for these situations. The Forum of Incident Response and Security Teams (FIRST) provides both regional and global training opportunities in this regard with an eye toward improving readiness. 13

14 In conclusion, we hope that providing clear and established procedures that take into account the legal frameworks of both signatories and non-signatories and the rights of their peoples will reduce cybercrime. 14

15 4 Google Google thanks the Council of Europe for the opportunity to submit comments in advance of the public hearing to address transborder access to data and the Budapest Convention on Cybercrime. Based on our experience, we believe that it is critical to focus efforts on improving existing internationally recognized evidence gathering mechanisms, which can protect the public as well as the rights of users and national interests alike. The rationale for our position is outlined below. For more information about how Google handles government requests for user data, please see our Transparency Report and our legal process FAQ. a. Legitimized Hacking into Remote Systems is a Dangerous Step. An arrangement that allows a government to circumvent security of private sector networks to acquire evidence present a serious threat to the sovereignty of other countries, and to the wellbeing of the companies, their networks and the users. b. No Demonstrated Need for Ability to Circumvent Internationally Recognized Mechanisms. Google recognizes the challenges presented by cloud computing and the reality that data important to an investigation may reside outside the territory where the crime took place or is being investigated. But there is little data to suggest that existing Article 32 of the Budapest Convention and other instruments fail to provide adequate mechanisms to address the concern. c. Can Improve GovernmenttoGovernment Evidence Gathering Mechanisms. Even if current international mechanisms were inadequate, focus should be upon improving those instrumentalities rather than adopting unilateral crossborder evidence collection without the knowledge or cooperation of legal authorities of the Party with jurisdiction over the person from whom the data is sought. To that end, Google supports improvements to the MLAT process in particular, because bilateral treaties can address many of the concerns raised in the proposal respect for human rights, dual criminality, protection of users and property, etc. The International Chamber of Commerce has articulated principles that are helpful in that regard. These MLAT improvements should be made before unilateral authorities are deemed necessary or appropriate. 1. Consent Should not be Unlimited or Compelled. Google also is concerned about the proposal s interpretation of consent. Any protocol would have to include the notion that consent may be withdrawn by the person with control over the data. Thus, while an employee in the requesting country may have authorized access to company data stored outside the jurisdiction, the company should be able to withdraw such consent at any time to protect its rights or property. Further, consent must be viewed consistent with the principle of control, which in turn includes the concept of lawful access and disclosure. An employee may be lawfully authorized to access data in another country for legitimate business purposes but the law of country where the data is stored may limit the right of access by precluding disclosure without legal process from the country where the service provider resides or the data is otherwise stored. These protections are critical to avoiding compelled consent where, though voluntary 15

16 in the requesting country, the failure to consent has clearly implied negative ramifications for the individual. 2. Expand to NonSignatories. Google urges the working party to expand its analysis to include countries that are not signatories the creation of international norms is important, and an international norm that embraces unilateral crossborder access may be interpreted by non signatories as acceptance of a procedure that no one agrees with without all the safeguards presented in the proposal, but private entities have to deal with in practice. 16

17 5 Leaseweb 5.1 General overview About LeaseWeb Netherlands B.V. With hosted servers, hosted content that generates 3-4% of all global internet traffic and more than 200 highly skilled employees, LeaseWeb Netherlands B.V. is one of the world s largest Internet hosting service providers. Our core business is to provide high quality computer servers, racks, power supply and a fast Internet infrastructure. The majority of our clients are hosting resellers, who re-rent their LeaseWeb servers to their respective customers to deliver Internet services. LeaseWeb s fast infrastructure also attracts user generated content sites and cloud storage providers. Besides offices in the Netherlands, LeaseWeb also has operations in Germany (LeaseWeb Deutschland GmbH) and in the U.S. (LeaseWeb USA, Inc.). By estimate, LeaseWeb s servers host 2 million websites. This paper represents the position of LeaseWeb Netherlands B.V (hereafter LeaseWeb ) Abuse handling LeaseWeb has a clear business perspective on hosting: it will host anything as long as it is legal in the jurisdiction it is hosted in. For LeaseWeb, this means that as long as customers uphold their contracts and act within the boundaries of the Dutch law, LeaseWeb will provide them with our hosting service and respect confidentiality of business operations and data privacy. To support the fight against cybercrime, LeaseWeb works closely with the Dutch National Police. However, the fight against cybercrime has to be balanced with respect for the privacy of customer data and the confidentiality of lawful businesses operations. In addressing this dilemma, it is LeaseWeb s opinion that it is ultimately only up to the Dutch LEA and courts to assess what is illegal under Dutch law Law Enforcement Requests LeaseWeb s Law Enforcement Transparency Report shows that in 2012 LeaseWeb B.V. received 240 government requests for access to, disclosure of or removal of data related to our dedicated hosting and cloud offerings.1 In addition, the Dutch fiscal police impounded 60 servers owned by one client, a large cloud storage provider, following a Mutual Legal Assistance Treaty (MLAT) request from the U.S. government. 5.2 LeaseWeb s position on guidance on article 32b of the Budapest Convention on Cybercrime On the notion of consent In order for consent to be valid, it should be given freely and must be based on sufficiently specified and understandable information.2 In LeaseWeb s experience, requests of foreign LEAs to voluntary consent to transborder access are frequently not presented as voluntary, nor experienced by Leaseweb as such. Following a refusal to voluntarily consent to cooperate, it is not uncommon to be threatened that criminal proceedings will be initiated against LeaseWeb s management board. Such force and pressure is at odds with the notion of freely given consent and leads to conflicts with privacy and data protection laws, violations of 17

18 commitments to individuals, employees, and customers, as well as risks of political tensions and negative impact on business decisions. In addition, LeaseWeb does not have the legal expertise nor is it in the position to determine the legality or illegality of any foreign request relating to criminal offenses. Moreover, such requests often do not provide specific information, may be written in an unfamiliar language and/or appear disproportionate in regards of the extent of data requested. LeaseWeb rejects law enforcement requests, in total or in part, if they are invalid, incomprehensible, or otherwise have no basis under the law On the person who can provide access or disclose data Following the wording of article 32b of the Convention, consent may be given by the person who stored the requested data, not any intermediary, third or other party Article 32b of the Budapest Convention on Cybercrime allows A Party ( ) without the authorisation of another Party [to] access or receive, through a computer system in its territory, stored computer data located in another Party, if the Party obtains the lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system (emphasis added). Explanatory note 294 further details that, who this person is may vary depending on the circumstances, the nature of the person and the applicable law concerned. For example, a person s e- mail may be stored in another country by a service provider, or a person may intentionally store data in another country. These persons may retrieve the data and, provided that they have the lawful authority, they may voluntarily disclose the data to law enforcement officials or permit such officials to access the data, as provided in the Article (emphasis added). Following the wording of article 32b and its explanatory note, LeaseWeb is convinced that the referred person is in fact the person who stored the data abroad through a computer system. For instance, Anne, a national of the Netherlands, who uses Gmail and whose e- mails are thereby stored on servers in Ireland, may voluntarily consent to the Dutch LEA, who is investigating a criminal case, to retrieve her data stored abroad through her account ( through that computer system ). By providing her account name and password for this goal, Anne provides explicit consent. There is no indication whatsoever in article 32b of the Convention, nor in the explanatory note that this person can also be an ISP or any other third party On the notion of transborder and location and access without authorisation of another Party Any Party s request for transborder access in relation to criminal investigations should follow the formal route It is LeaseWeb s strong conviction that consenting to a voluntary access request by a foreign LEA to data hosted in the Netherlands is at odds with Dutch law, most notably with the right to privacy, and may even be at odds with article 32b of the Budapest Cybercrime Convention.3 Therefore, such requests should never be aimed at an intermediary by means of voluntary consent, but should rather be formally requested, by means of mutual legal assistance, through the LEA of the country under which jurisdiction the intermediary resides. Or following from article 32b of the Convention with consent of the person who intentionally or unintentionally stored his data abroad and is subject to criminal investigations LeaseWeb s position on an Additional Protocol to the Budapest Convention on Cybercrime An Additional Protocol to the Budapest Convention on Cybercrime as suggested, is at odds with the principle of territoriality and legal certainty and creates an unstable business climate. 18

19 As a Dutch company, LeaseWeb is required to uphold and fulfill the requirements of the Dutch law. This way, LeaseWeb has a reasonable understanding of what is legal and what isn t in the Netherlands. This provides security for LeaseWeb to develop and invest in its business and to provide clearly defined services to its customers. LeaseWeb understands the complications that cross-border crime and technical developments entail for tackling cybercrime. However, voluntary compliance with direct requests from foreign authorities to provide access and/or disclose data in relation to investigations of supposed criminal offences in another Party and/or by the law of another Party, is at odds with the principle of territoriality and legal certainty. Unlike international private law, which is much more harmonised on an international level, (substantive) criminal law is still very much a national affair. This may lead to situations of competing sovereignty, whereby Leaseweb has to judge the merits of a particular case and decide whether a request may be fulfilled under local law as well as Dutch law. It is not possible for LeaseWeb to understand and apply another Party s legal framework to determine the legality of a request from a foreign LEA and to weigh it. To create or expand a legal basis for voluntary consent would create even more uncertainty for LeaseWeb on the legal environment in which to develop its business. This problem is exacerbated by the fact that in those cases where LeaseWeb wishes to contest the request, it is has to be familiar with the law of criminal procedure of all signing parties, in practice leaving LeaseWeb without an effective legal remedy. Finally, the legal regime and the protection it provides intermediaries may also differ from country to country, creating an even more uncertain business climate. LeaseWeb follows lawful orders given by the Dutch court or LEA. This includes MLAT requests that are 'translated' into offenses under Dutch law, to the widest extent possible. This approach is in line with the principles of territoriality, legal certainty, and fundamental rights. Furthermore, it allows for a more stable and safe business climate in which innovation can thrive. There is no need for an Additional Protocol to the Budapest Convention on Cybercrime. What is needed is to improve cooperation between LEAs on the use, timeframe and execution of MLAT requests. Transborder access to data in relation to criminal investigations is already possible under a MLAT. Thus, in order to fight cross-border cybercrime more effectively, the Council shouldn t seek to expand the concept of 'voluntary' cooperation to transborder access with consent, 2013 LeaseWeb B.V. 8 but instead try to expand possibilities within MLAT and to improve cooperation between LEA in applying the MLAT, as mentioned in the report of the Transborder Group.4 There already exists a 24/7 hotline for LEAs whereby in urgent cases, LEAs can request MLAT at short notice. Such initiatives should be stimulated and expanded, rather than creating more room in the current legal framework for requesting access to data across borders. This is the only way to guarantee the principles of territoriality and legal certainty are protected, as well as fundamental rights and legitimate business interests. Difficulties between LEAs and their foreign colleagues in the cooperation under MLATs shouldn t become the problem of legitimate businesses and their clients. It will create legal uncertainty that may threaten the fundamental rights and freedoms of our clients and uncertain business climate that will hurt innovation. Contact Mr Alex de Joode, LeaseWeb Senior Regulatory Counsel 19

20 6 ICMEC THE NEED FOR EXPANDED TRANSBORDER ACCESS TO DATA The Internet has created an exciting, new world of information and communication for anyone with access to online services. While this technology offers unparalleled opportunities for children and adults to learn about the world, it has also had an immeasurable impact on child victimization, specifically through the distribution of sexually exploitive images of children. Increased accessibility and the use of home computer technology have revolutionized the distribution of these images by providing greater anonymity, increasing the ease of possession and dissemination and decreasing the cost of production and distribution, especially across international borders. The continual expansion of the access to and use of Information Communication Technologies and the speed at which new technological tools and applications are developed has provided an ideal atmosphere for the criminal element to utilize these tools to commit countless crimes. An increasing amount of available data, use of encryption and other barriers, the fluidity of movement of data between servers and networks worldwide, and cloud based services with unknown locations are all examples of issues that pose serious challenges for law enforcement in collecting electronic evidence, investigating cases, and ultimately prosecuting criminals. There is an evident need for standardized and harmonized laws that facilitate effective cooperation and coordination amongst law enforcement, as well as between them and the private sector, in different countries. This depends on their ability to access data necessary to arrest and prosecute those seeking to use these technologies illicitly, in particular to commit crimes against children. As a global non governmental organization working with law enforcement, industry partners, and other stakeholders worldwide to improve the protection of children, greater transborder access to data is essential to these efforts. Article 32 of the Council of Europe Convention on Cybercrime addresses trans border access to stored computer data with consent or where publicly available. It states: A Party may, without the authorization of another Party: a) access publicly available (open source) stored computer data, regardless of where the data is located geographically; or b) access or receive, through a computer system in its territory, stored computer data located in another Party, if the Party obtains the lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system. The notion of consent as articulated in Article 32b) requires that, in order to access or receive stored computer data located within the jurisdiction of another State Party, the seeking party must request consent from the entity, legal or natural, which has the lawful authority to share that data. The Party with jurisdiction may not be compelled to provide such consent. A private entity, such as an Electronic or Internet Service Provider, Cloud based Provider or other private sector (industry) entity, which has lawful control of the data, can provide access to or disclose such data to the requesting Party. Any electronic data which is stored on the entity s network (cloud or web based) can be disclosed by the private sector entity that has lawful control of the data. The only restrictions/conditions that are currently articulated under Article 32 are: i) the data must be electronic data stored in another Party s jurisdiction; ii) the data must either be publicly available; or iii) if it is not publicly available then lawful and voluntary consent to disclose or provide access to data must be sought; and iv) the entity giving consent and providing access must have the lawful authority to disclose such data. The language of Article 32 is intentionally loose, giving no specific guidelines regarding the location of the person 20

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Promoting Cross Border Data Flows Priorities for the Business Community

Promoting Cross Border Data Flows Priorities for the Business Community Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

MULTILATERAL MEMORANDUM OF UNDERSTANDING CONCERNING CO-OPERATION IN THE EXCHANGE OF INFORMATION FOR AUDIT OVERSIGHT

MULTILATERAL MEMORANDUM OF UNDERSTANDING CONCERNING CO-OPERATION IN THE EXCHANGE OF INFORMATION FOR AUDIT OVERSIGHT MULTILATERAL MEMORANDUM OF UNDERSTANDING CONCERNING CO-OPERATION IN THE EXCHANGE OF INFORMATION FOR AUDIT OVERSIGHT INTERNATIONAL FORUM OF INDEPENDENT AUDIT REGULATORS Adopted on June 30, 2015 1 Table

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Draft WGIG Issues Paper on Spam

Draft WGIG Issues Paper on Spam Draft WGIG Issues Paper on Spam 1. Issue Spam directly engages a very wide range of stakeholders that includes individual consumers, all organizations of whatever size in the private and public sectors

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group "Good Governance. EU Work Plan for Sport

2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group Good Governance. EU Work Plan for Sport EU Work Plan for Sport 2011-2014 Expert Group "Good Governance Deliverable 1 Input on the EU's role in fighting match-fixing J u n e 2012 2 1. INTRODUCTION The EU Work Plan for Sport identifies integrity

More information

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the

More information

PREAMBLE. THE GOVERNMENT OF THE UNITED STATES OF AMERICA and THE GOVERNMENT OF CANADA (hereinafter "the Parties");

PREAMBLE. THE GOVERNMENT OF THE UNITED STATES OF AMERICA and THE GOVERNMENT OF CANADA (hereinafter the Parties); FRAMEWORK AGREEMENT ON INTEGRATED CROSS-BORDER MARITIME LAW ENFORCEMENT OPERATIONS BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF CANADA PREAMBLE THE GOVERNMENT OF THE UNITED

More information

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I. International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

Law enforcement in the clouds - challenges

Law enforcement in the clouds - challenges Octopus Conference 2010 Outlook session on security and privacy in the clouds Law enforcement in the clouds - challenges Strasbourg, 25 March 2010 Alexander Seger Council of Europe, Strasbourg, France

More information

COMPUTER MISUSE AND CYBERCRIME ACT

COMPUTER MISUSE AND CYBERCRIME ACT COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access

More information

Data Breach Readiness

Data Breach Readiness Data Breach Readiness 877.983.9850 Partner@Intersections.com www.intersections.com Introduction Few events can damage a company s reputation more than losing the personal confidential information entrusted

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

EXTRATERRITORIAL ENFORCEMENT OF TAX LAWS

EXTRATERRITORIAL ENFORCEMENT OF TAX LAWS EXTRATERRITORIAL ENFORCEMENT OF TAX LAWS Rita Correia da Cunha 1- ABSTRACT Extraterritorial enforcement of tax laws refers to the attempt of states to collect revenue beyond their territories. It is a

More information

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity

CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the

More information

Privacy in the Cloud A Microsoft Perspective

Privacy in the Cloud A Microsoft Perspective A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Regional Anti-Corruption Action Plan for Armenia, Azerbaijan, Georgia, the Kyrgyz Republic, the Russian Federation, Tajikistan and Ukraine.

Regional Anti-Corruption Action Plan for Armenia, Azerbaijan, Georgia, the Kyrgyz Republic, the Russian Federation, Tajikistan and Ukraine. Anti-Corruption Network for Transition Economies OECD Directorate for Financial, Fiscal and Enterprise Affairs 2, rue André Pascal F-75775 Paris Cedex 16 (France) phone: (+33-1) 45249106, fax: (+33-1)

More information

UNDERSTANDING MONEY LAUNDERING

UNDERSTANDING MONEY LAUNDERING UNDERSTANDING MONEY LAUNDERING Preface In light of the international concerns growing on money laundering and the financing of terrorist activities, many countries have taken rigorous measures to curb

More information

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 On March 10, 2015 the Center for Strategic and International Studies, in conjunction with the Cybersecurity Unit of the U.S. Department of

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia

More information

KEY STEPS FOLLOWING A DATA BREACH

KEY STEPS FOLLOWING A DATA BREACH KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications

Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications Brussels, October 8 th 2008 Online Security, Traffic Data and IP Addresses Review of the Regulatory Framework for Electronic Communications Francisco Mingorance Senior Director Government Affairs franciscom@bsa.org

More information

5581/16 AD/NC/ra DGE 2

5581/16 AD/NC/ra DGE 2 Council of the European Union Brussels, 21 April 2016 (OR. en) Interinstitutional File: 2013/0027 (COD) 5581/16 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: TELECOM 7 DATAPROTECT 6 CYBER 4 MI 37 CSC 15

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

DATA PROTECTION LAWS OF THE WORLD. India

DATA PROTECTION LAWS OF THE WORLD. India DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,

More information

Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation

Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation Position Paper Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation Our reference: SMC-DAT-12-064 Date: 3 September 2012 Related documents: Proposal for

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD

More information

Transborder access and jurisdiction: What are the options?

Transborder access and jurisdiction: What are the options? Cybercrime Convention Committee (T-CY) Ad-hoc Sub-group on Jurisdiction and Transborder Access to Data Transborder access and jurisdiction: What are the options? Report of the Transborder Group adopted

More information

Technical Questions on Data Retention

Technical Questions on Data Retention Technical Questions on Data Retention 1) The list of data in the annex of the proposed Directive on Data retention is practically identical to the information required in the Council draft Framework Decision.

More information

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings: BOR 6432 Cybersecurity and the Constitution Course Description This course examines the scope of cybercrime and its impact on today s system of criminal justice. Topics to be studied include: cybercrime

More information

FAQs Organised Crime and Anti-corruption Legislation Bill

FAQs Organised Crime and Anti-corruption Legislation Bill FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised

More information

Law Enforcement Recommendations Regarding Amendments to the Registrar Accreditation Agreement

Law Enforcement Recommendations Regarding Amendments to the Registrar Accreditation Agreement * 1) The RAA should not explicitly condone or encourage the use of 1. Use of Proxy or Privacy Registrations Proxy Registrations or Privacy Services, as it appears in paragraphs a. In the event ICANN establishes

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199 EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of

More information

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS

PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS PUBLIC HEARING Combating sexual abuse, sexual exploitation of children and child pornography Committee on Civil Liberties, Justice and Home Affairs 28-29

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal

More information

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

COUNCIL OF EUROPE COMMITTEE OF MINISTERS COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

More information

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION 28.6.2012 1 GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION Table of contents 1 Purpose of insurance investigation... 2 2 Investigating staff...

More information

engagement will not only ensure the best possible law, but will also promote the law s successful implementation.

engagement will not only ensure the best possible law, but will also promote the law s successful implementation. US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development RECOMMENDATION OF THE OECD COUNCIL CONCERNING GUIDELINES FOR CONSUMER PROTECTION IN THE

More information

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses dentons.com Focus on Communications Canada s New Anti-Spam Legislation: Overview and Implications for Businesses January, 2011 Contact Margot Patterson Dentons Canada LLP Counsel, Ottawa margot.patterson@dentons.com

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received by the (APWG) came to 23,61 in, a drop of over 6, from January s previous record

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement

More information

Appendix 11 - Swiss Data Protection Act

Appendix 11 - Swiss Data Protection Act GLEIF- LOU Restricted Appendix 11 - Swiss Data Protection Act GLEIF Revision Version: 1.0 2015-09-23 Master Copy page 2 of 11 Applicable Provisions of the Swiss Data Protection Act (DPA) including the

More information

Advisory on Utilization of Whois Data For Phishing Site Take Down March 2008

Advisory on Utilization of Whois Data For Phishing Site Take Down March 2008 Contributors Rod Rasmussen, Internet Identity Patrick Cain, Anti-Phishing Working Group Laura Mather, Anti-Phishing Working Group Ihab Shraim, MarkMonitor Summary Given fundamental policy changes regarding

More information

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10 Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between

More information

Phishing Activity Trends Report June, 2006

Phishing Activity Trends Report June, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

BSA GLOBAL CYBERSECURITY FRAMEWORK

BSA GLOBAL CYBERSECURITY FRAMEWORK 2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access

More information

Anti-bribery and Fraud Protection Policy

Anti-bribery and Fraud Protection Policy Anti-bribery and Fraud Protection Policy Dear Colleagues and Partners, Carbo One Limited is one of the largest coal trading companies in the market and the nature of its business requires interaction with

More information

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together

More information

Migration/ Asylum. Co-operation in the field of drugs

Migration/ Asylum. Co-operation in the field of drugs Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3 DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC

More information

This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal.

This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal. Dear Commissioner Malmström, As you know, we have been closely involved in consultations with the European Commission with regard to the impact assessment on, and probable review of, the Data Retention

More information

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 -------------- w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------

More information

005ASubmission to the Serious Data Breach Notification Consultation

005ASubmission to the Serious Data Breach Notification Consultation 005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to privacy.consultation@ag.gov.au) Your details Name/organisation

More information

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:

More information

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Iowa Health Information Network (IHIN) Security Incident Response Plan

Iowa Health Information Network (IHIN) Security Incident Response Plan Iowa Health Information Network (IHIN) Security Incident Response Plan I. Scope This plan identifies the responsible parties and action steps to be taken in response to Security Incidents. IHIN Security

More information

between Italy and Switzerland

between Italy and Switzerland Roadmap on the Way Forward in Fiscal and Financial Issues between Italy and Switzerland Taking note of the recent developments in the area of international taxation, in particular: the commitment of the

More information

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015: COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

Norwegian Data Inspectorate

Norwegian Data Inspectorate Norwegian Data Inspectorate Narvik kommune Postboks 64 8501 NARVIK Norway Your reference Our reference (please quote in any reply) Date 1111/1210-6/PEJA 11/00593-7/SEV 16 January 2012 Notification of decision

More information

Report of the Strategic Meeting on Cybercrime

Report of the Strategic Meeting on Cybercrime Report of the Strategic Meeting on Cybercrime 19-20 November 2014 Task Force on Cybercrime 07 April 2015 FINAL Table of Contents 1. Introduction... 2 2. Presentations... 2 2.1. Transborder access to data

More information

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION 6 March 2014 1 Good practice guidelines for insurance investigation Table of contents 1 Purpose of insurance investigation... 2 2 Investigating staff...

More information

I N T E L L I G E N C E A S S E S S M E N T

I N T E L L I G E N C E A S S E S S M E N T I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document

More information

Basel Committee on Banking Supervision. Sharing of financial records between jurisdictions in connection with the fight against terrorist financing

Basel Committee on Banking Supervision. Sharing of financial records between jurisdictions in connection with the fight against terrorist financing Basel Committee on Banking Supervision Sharing of financial records between jurisdictions in connection with the fight against terrorist financing April 2002 Sharing of financial records between jurisdictions

More information

2013 Africa Union Framework for Cyber security in Africa

2013 Africa Union Framework for Cyber security in Africa Contributions by DotConnectAfrica 2013 Africa Union Framework for Cyber security in Africa Comments to the DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A CREDIBLE LEGAL FRAMEWORK FOR CYBER SECURITY

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

AS APPROVED BY CONVOCATION, MARCH 25, 2004. (new/amended rules and commentary for rule 2.02)

AS APPROVED BY CONVOCATION, MARCH 25, 2004. (new/amended rules and commentary for rule 2.02) AS APPROVED BY CONVOCATION, MARCH 25, 2004 (new/amended rules and commentary for rule 2.02) When Client an Organization (1.1) Notwithstanding that the instructions may be received from an officer, employee,

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

Draft Communications Data Bill

Draft Communications Data Bill Draft Communications Data Bill Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty June 2012 Cm 8359 20.00 Crown copyright 2012 You may re-use this information

More information