Models for Cyber-legislation in ESCWA member countries
|
|
- Adele Booth
- 8 years ago
- Views:
Transcription
1 Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007 Cyber Space Cyber space (non-jurisdictional International Space; jurisdictional National or local space) - In the broader term, Cyber space means the electronic space globally shared by everyone and not subject to a specific jurisdiction. This space is unable by its nature to be regulated as no legislator has jurisdiction over it. - In the narrower term, Cyber space means the electronic space specific for a connected group of users or connected computers (Intranet, LAN etc..) This space may be subject to regulations whether private for the group or on National level, such as the Commercial Register.
2 Cyber Space 2 Organization of the international Cyber Space: - bilateral and/or multilateral International Conventions or Directives on cyber-related topics. Organization of national Cyber Space: - national enacted laws, compliant with International Conventions and Directives, such as European countries laws with EU Council directives and conventions. Organization on ESCWA region level: - Enacted laws on specified topics: namely E-Commerce (e.g. U.A.E, Bahrain, Jordan, Egypt, Yemen etc..) - Draft of laws pending enactment: (Syria, Lebanon, Qatar, KSA, Kuwait etc..) Main Cyber-related topics Data Protection and Processing Personal data Privacy in cyberspace Protection of Intellectual Property Rights: Copyright, data, Dom ain names, computer programs, patents relating to software etc.. E-Transactions: E-Records, E-Signature, Attribution, E-proof etc. E-Commerce: E-payment, E-Contracts, E-Signature, Consumer Protection e.g. Publicity Censorship and Freedom of Expression in Cyber space. Cyber Crime: 1- Internet crimes (crimes related to) 1.1- persons (pornography, racial) 1.2- consumer goods 1.3- public sector 1.4- information and electronic communication 2- Computer crimes (crimes related to) 2.1- Computer system 2.2- Computer program 2.3- Computer data 2.4- Computer devices
3 Data Protection and Processing Treated in International Conventions and Directives such as: Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data Strasbourg, 28.I.1981 Council of Europe Treaty No. 108 Foreign Laws on the subject matter. Listing of the main national laws and regulations, countries such as USA, France, Germany adopted laws implementing main issues. ESCWA region legal status: mainly lack of legislation,save few articles in telecom laws. Only available law is the DIFC Data Protection Law 2007 of Dubai, which treated the main topics for data protection, also CCL). UAE law also protects privacy rights such as: marital status, health information etc.. Concerning Protection of Privacy, ESCWA countries are still lacking adequate legislations to ensure the said protection online. E-Transactions International: Conventions, Treaties and directives. Model laws to be followed: UNCITRAL Model law on E-signature; Arab League Cyber Model Law, content relates to E-Transactions mainly. Foreign Laws on the subject matter. Listing of the main national laws and regulations ESCWA region: laws on E-Transactions included E-signature, E-Record, E-proof, Acceptance and authentication of e-signature and e-record. Storage of the e-record and attribution. Legal proof value and certification rules. Enacted laws available in: Jordan, Egypt, U.A.E., Bahrain, Yemen Drafts of laws pending enactment: Lebanon, Qatar, Kuwait, KSA and Syria (Palestine: amendments of laws to accept e-signature, e-proof and e-record, but no available law) Absence of legislation: Iraq, Oman Available legislations treat the main topics in International Conventions and treaties and model laws, however, not elaborate as foreign laws (including ASEAN e.g. Singapore)
4 E-Commerce International: Conventions, Treaties and directives. E-Commerce laws and Model laws on the International and regional levels. ESCWA region: Main E-Commerce issues were addressed in E-Transactions laws. Topics like Consumer Protection relating to distance contracts and Publicity are not addressed in laws. E- Payment and E-Banking: regulated in ESCWA region laws: availability in countries such as: Lebanon, U.A.E., Yemen, Oman, Absence in countries such as: Syria, Iraq, Kuwait Cyber Crime International Conventions and treaties, e.g. Convention on Cybercrime issued by the Council of Europe Treaty No. 185 Budapest 23 November Computer-related crimes; International laws: UK Computer-related crimes (illegal access, deterand Content-related crimes ESCWA region: absence in most of the states, save U.A.E, Law No. No. 2 of the year 2006 The Computer Crime Law. Other ESCWA members: rely on penal code, copyright laws to the extent the provisions of which extend to Computer crimes. Main topics of protection: offences against the confidentiality, integrity and availability of computer data and systems, which are: Illegal access, Illegal interception, Data Interference, System interference and misuse of devices. Computer-related offences, of which Computer-related forgery, Computerrelated fraud. Content-related offences, of which offences related to child pornography, xenophobia, racial content, harmful content. Offences related to infringements of copyright and related rights. The convention states that each member shall establish as criminal crimes the infringements pursuant to the national laws, Berne Convention, TRIPs agreement (Trade- Related Aspects of Intellectual Property Rights), the WCT (WIPO Copyright Treaty, Rome Convention and the WPT (WIPO Performances and Phonograms Treaty.
5 Censorship and Freedom of expression Protected by the First Amendment in the US constitution and major European and UN human rights texts and conventions. ESCWA: Absence of laws protecting freedom of expression. Severe censorship regulations relating to political content, public morals, religion. Some countries of the ESCWA region have apprehended authors and writers who have violated censorship rules on the Internet: e.g. Oman. Intellectual Property in Cyber Space ESCWA region international affiliations and members of: Berne Convention, Rome Convention, TRIPs (for WTO members) Protection of: Computer programs and software, Databases. Domain names and Trademarks. ESCWA: copyright laws protect computer programs and databases. No regulations concerning cctld. General IP laws: patent, trademarks apply to infringements online.
6 Thank You
ECONOMIC AND SOCIAL COMMISSION FOR WESTERN ASIA (ESCWA) MODELS FOR CYBER LEGISLATION IN ESCWA MEMBER COUNTRIES
ECONOMIC AND SOCIAL COMMISSION FOR WESTERN ASIA (ESCWA) MODELS FOR CYBER LEGISLATION IN ESCWA MEMBER COUNTRIES United Nations ECONOMIC AND SOCIAL COMMISSION FOR WESTERN ASIA (ESCWA) Distr. GENERAL E/ESCWA/ICTD/2007/8
More informationOutline. Recommendations
Follow-up Workshop on Delivery of E-Services in Civil Society, Beirut - Lebanon E-Commerce & Payment Solutions in the Region Rami Zaatari ICT Division www.escwa.un.org 29 Nov. 2010 Outline E-Business and
More informationT-CY Guidance Note #5
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)10E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #5 DDOS attacks Adopted by the 9 th Plenary of the T-CY (4-5 June 2013) Contact: Alexander
More informationGhada Qaisi Audi June 2013
Enforcement of DIFC Courts Judgments and Orders within and outside the DIFC Ghada Qaisi Audi June Enforcement of DIFC Courts Judgments within the DIFC Enforcement of DIFC Courts judgments where the assets
More informationCyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
More informationCYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
More informationHarmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
More informationPublic Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009
Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Presenter Adam Mambi,(Advocate of High Court) -Deputy Executive Secretary, Law Reform Commission Tanzania
More informationLEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
More informationExecutive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
More informationNATIONAL LAW INSTITUTE UNIVERSITY
NATIONAL LAW INSTITUTE UNIVERSITY Kerwa Dam Road, Bhopal -462044, M.P. (INDIA) RAJIV GANDHI NATIONAL CYBER LAW CENTER (Established by MHRD, Govt. of India) Post Graduate Diploma in Cyber Law (Distance
More informationATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
More informationInsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry
InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry Dino Wilkinson Partner Norton Rose Fulbright (Middle East) LLP 3 February 2015 The growing challenge of cyber risks From
More informationT-CY Guidance Note #4 Identity theft and phishing in relation to fraud
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the
More informationImplementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins
Implementation of e-signature in the ESCWA Region: Status and Next Steps By Matthew Perkins Understanding e-signature How do we identify ourselves online? Electronic records of real-world authenticators
More informationEuropean Patents in Morocco from March 2015 OAPI Joins TMclass Qatar s Emir Signs Law on Wage Protection
February 2015 Issue 73 European Patents in Morocco from March 2015 OAPI Joins TMclass Qatar s Emir Signs Law on Wage Protection indiemaroc IN THIS ISSUE European Patents in Morocco from March 2015 New
More informationBUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON
BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON Content SECTOR OVERVIEW p 3 INTERNATIONALLY RENOWNED EDUCATIONAL SYSTEM p 4 COST-COMPETITIVE & HIGHLY SKILLED WORKFORCE ESTABLISHED TRACK RECORD ENABLING
More informationD2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors
FP7-SEC-2013.2.5-2 Grant Agreement Number 607775 Collaborative Project E-CRIME The economic impacts of cyber crime D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors
More informationPeace and Justice in Cyberspace
Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime
More informationGOVERNANCE IN "CYBERSPACE' Access and Public Interest in Global Communications
KLAUS W. GREWLICH Dr.jur.habil. (Freiburg), Dr.sc.econ. (HEC, Lausanne), LL.M. (Berkeley) Professor, College ofeurope, Bruges GOVERNANCE IN "CYBERSPACE' Access and Public Interest in Global Communications
More informationE-Payments & Saudi Arabian e-infrastructure
MIS 300 - Fundamentals of E-Commerce 072 E-Payments & Saudi Arabian e-infrastructure Mr. Mustafa Faisal Ahmed mfahmed@kfupm.edu.sa Chapter Outline E-Payments Chapter 11 (selected coverage) Online payments
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationAustralia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia
More informationHealth Care Services for the Old Middle East Population. Dr. Salwa AL Suwaidi MBBS, Dip. Ger, MRCP (UK), Ar.Board
Health Care Services for the Old Middle East Population Dr. Salwa AL Suwaidi MBBS, Dip. Ger, MRCP (UK), Ar.Board Middle East The world is experiencing a major demographic transformation globally and the
More informationMutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities
Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)
More informationESCWA Technology Centre
ESCWA Technology Centre Newsletter Second Half, 2013 Amman - Jordan www.etc-un.org The Broken Cycle: Universities, Research and Society in the Arab World Proposals for Change Available study online (En,
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationSOFTWARE DEVELOPMENT INDUSTRY and the ICT Sector in the Arab World. Fouad Bajwa. 7 May 2013
SOFTWARE DEVELOPMENT INDUSTRY and the ICT Sector in the Arab World Fouad Bajwa 7 May 2013 * All United Nations/UNCTAD/ESCWA related information is shared for information and references purposes only and
More informationThe 2013 Amendment to the 1980 Arab League Investment Agreement
The 2013 Amendment to the 1980 Arab League Investment Agreement A step towards improving the region s attractiveness to investors NOTE: This draft brochure responds to a request of the League of Arab States
More informationBSA Global Cloud. A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE
BSA Global Cloud COMPUTING Scorecard A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE A CONTENTS Executive Summary....................................... 1 BSA Cloud Policy Blueprint...2
More informationTactics and Strategies for Improving and Sustaining Quality in the Middle East
Tactics and Strategies for Improving and Sustaining Quality in the Middle East Jane Azurin Acting Education Consul Middle East July Sept 2008 Overview Synopsis of the Middle East (ME) Quality Students
More informationHotel Establishment Statistics
Hotel Establishment Statistics Monthly report December & Full Year 49% 15% 7% Page 1 of 18 Executive Summary December December showed an increase of 25% in guest arrivals when compared to last year, with
More informationCybercrime & Cybersecurity
Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational
More informationDoSPOT (Free Internet Connection Service) - Terms of Use
DoSPOT (Free Internet Connection Service) - Terms of Use (Purpose) Article 1 The DoSPOT Terms of Use (hereinafter referred to as the "Rules") define the conditions of use that apply to users of DoSPOT
More informationIntellectual Property Rights and Exporting: A Step-by-Step Guide
Intellectual Property Rights and Exporting: A Step-by-Step Guide Bijou Mgbojikwe Office of Intellectual Property Rights International Trade Administration May 1, 2014 Session Objectives After this session,
More informationDirective in German law. Principles.
Country Report: Germany Germany has comprehensive cybercrime legislation and up-to-date intellectual property protection in place. The combination of these laws provides reasonable protection for cloud
More informationWIPO TRAINING OF TRAINERS PROGRAM ON EFFECTIVE INTELLECTUAL PROPERTY ASSET MANAGEMENT BY SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs)
WIPO TRAINING OF TRAINERS PROGRAM ON EFFECTIVE INTELLECTUAL PROPERTY ASSET MANAGEMENT BY SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs) IP Law and Administration in the State of Qatar by Malik Al-Kammaz Saba
More informationHaving regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber
More informationIntellectual Property
Intellectual Property What is intellectual property? How do I get protection for my idea/material? How will my idea/material benefit from IP? How do I enforce my rights? Do I always need permission to
More informationResponse of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16
Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Summary The Northern Ireland Human Rights Commission (the Commission):
More informationTrade Facilitation Initiatives in the ESCWA Region
Trade Facilitation Initiatives in the ESCWA Region E/ESCWA/EDGD/2013/Technical Paper.3 13-0143 Trade facilitation at the WTO On 1 August 2004, the Member States of the World Trade Organization (WTO) agreed
More informationGCC Pharmaceutical Industry
GCC Pharmaceutical Industry First coordination meeting for the pharmaceutical industry in the GCC and Yemen Dr. Aasim Qureshi 11 April 2011 Global Pharmaceuticals Industry The pharmaceutical industry is
More information4 The Privacy Act 1988 (Cth) requires private sector organizations to comply either with
country report: Australia Australia does not have specific regulations in place for cloud computing today, though the government has been keen to include consideration of cloud computing issues in the
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationThe final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national
More informationInvesting in Renewable Energies A guide to investment treaty protections available to investors in the Arab Republic of Egypt
Investing in Renewable Energies A guide to investment treaty protections available to investors in the Arab Republic of Egypt Investing in Renewable Energies in the Arab Republic of Egypt The Arab Republic
More informationMalta Companies in International Tax Structuring February 2015
INFORMATION SHEET No. 126 Malta in International Tax Structuring February 2015 Introduction Malta is a reputable EU business and financial centre with an attractive tax regime and sound legislative framework.
More informationprotection rights are limited. protection rights are limited.
Score: 44.09 Rank: 22 / 24 Brazil is a fast-growing economy that recognizes the importance of ICT and the digital economy. However, some gaps in law and regulation have acted as barriers to ICT innovation
More informationESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW
UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE ESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW RECOMMENDATION No. 35, FIRST edition, adopted by the United Nations Centre for Trade Facilitation
More informationSupport for Business Activities in the Middle East and North Africa Region
Support for Business Activities in the Middle East and North Africa Region Felix Neugart Association of German Chambers of Industry and Commerce (DIHK) 22. Februar 2008 Technik als Brücke der Kulturen
More informationInternet of Things IoT Services in the Arab World
Internet of Things IoT Services in the Arab World Arab Advisors Group Strategic Research Service December 2015 Analyst: Noor Al Asmar This report has been delivered to Client as part of the subscription
More informationAFRICA REGIONAL INTELLECTUAL PROPERTY ORGANIZATION
E (A UNITED METHODIST RELATED INSTITUTION) INVESTING IN AFRICA S FUTURE AFRICA REGIONAL INTELLECTUAL PROPERTY ORGANIZATION MIP CURRICULUM WIPO-ARIPO-AU/MIP/15/INF.1PROV. ORIGINAL: ENGLISH DATE: DECEMBER
More informationCybersecurity Governance
AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional
More informationThe Perks of Doing Business in Malta
The Perks of Doing Business in Malta Legal and Tax Opportunities Dr Charles Cassar CCLex.com Malta London 1 2012 2013 - CCLex.com Overview About the Firm Business Environment Legal basics Tax Considerations
More informationPolicy No: 2-B8. Originally Released: 2001. Date for Review: 2016
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
More informationSome laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability.
Country Report: India India is an important regional economy, with a strong interest in ICT services development. The law in India has not entirely kept pace with developments in cloud computing, and some
More informationCYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
More informationINFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
More informationCyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
More informationRepublic of South Africa. Review Report. E-commerce, Cybercrime and Cybersecurity Status, Gaps and the Road Ahead. Final Version.
Republic of South Africa Review Report E-commerce, Cybercrime and Cybersecurity Status, Gaps and the Road Ahead Final Version 26 November 2013 Detecon International GmbH 04.12.2013 Page 0/383 Review Report
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More informationMONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO - Podgorica, July CONTENTS 1. INTRODUCTION... 3 2. DEFINITIONS... 5 3. CYBER SECURITY MANAGEMENT SYSTEM... 8 3.1 METHOD OF MONITORING STARTEGY
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More informationRoad Safety. League of Arab States Truck Accident Causation Feasibility Study
Road Safety League of Arab States Truck Accident Causation Feasibility Study FACILITATING ROAD TRANSPORT FOR MORE GROWTH AND PROSPERITY IN THE ARAB WORLD partners The IDB-AULT-IRU project aims to improve
More informationSamtani Anil Associate Professor Nanyang Technological University Singapore. Intellectual Property Education in the Singapore Universities
CURRENT STATE OF IPR TEACHING AND LEARNING IN SINGAPORE Samtani Anil Associate Professor Nanyang Technological University Singapore Overview Backdrop Intellectual Property Education in the Singapore Universities
More informationAcceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
More informationHarmful Interference into Satellite Telecommunications by Cyber Attack
Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,
More informationThe Global Flight From Marriage : Has It Come to the Arabic World? A First Look at the Evidence
The Global Flight From Marriage : Has It Come to the Arabic World? A First Look at the Evidence Nicholas Eberstadt, Ph.D. Henry Wendt Chair in Political Economy American Enterprise Institute
More informationE-commerce and Development Key Trends and Issues
E-commerce and Development Key Trends and Issues Torbjörn Fredriksson Chief, ICT Analysis Section UNCTAD, Division on Technology and Logistics (torbjorn.fredriksson@unctad.org) Workshop on E-Commerce,
More informationCOMMENTS ON BRAZIL S PROPOSED LAW 84/99
COMMENTS ON BRAZIL S PROPOSED LAW 84/99 November 7, 2011 Proposed Law 84/99, currently under review in the House of Representatives, aims to update the law of Brazil to address various kinds of criminal
More informationA Region by Any Other Name...
A Region by Any Other Name.... Janet Hall Bethany Public Schools, Bethany, Oklahoma jhall@bps.k12.ok.us OVERVIEW: It is often true that a place may be categorized as belonging to more than one region,
More informationCountry: Canada. Score: 75.79 Rank: 9/24
Score: 75.79 Rank: 9/24 Canada is a world leader in ICT adoption and innovation and has played a leading role in the development of international standards. It has a strong commitment to free trade and
More informationTOTAL FDI Inflow to KSA (Millions of dollars) FDI by Source :
Actual Inflows & Stocks of Foreign Direct Investments (Millions of dollars) in KSA by Country & Sector FDI Inflows Total Stock ( Millions of dollars ) TOTAL FDI Inflow to KSA (Millions of dollars) 8 8,,,,88
More informationA Guideline to Enforce Data Protection and Privacy Digital Laws in Iran
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Guideline to Enforce Data Protection and Privacy Digital Laws in Iran Tahereh Hasani
More informationMALTA TRADING COMPANIES
MALTA TRADING COMPANIES Malta Trading Companies Maltese Registered Companies and Trading Operations in Malta Malta, an EU Member State since May 2004, has developed into a leading and reputable financial
More informationCountry: Australia. Score: 79.92 Rank: 2/24
Score: 79.92 Rank: 2/24 Australia is keen to promote cloud computing through the development and reform of relevant laws, regulations, and standards. For example, Australia has a strong commitment to international
More informationwww.bonddickinson.com Cyber Risks October 2014 2
www.bonddickinson.com Cyber Risks October 2014 2 Why this emerging sector matters Justin Tivey Legal Director T: +44(0)845 415 8128 E: justin.tivey The government estimates that the current cost of cyber-crime
More informationICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010
ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 NRCCL (University of Oslo, Faculty of Law) Topics Overview of
More informationComprehensive Study on Cybercrime
Comprehensive Study on Cybercrime Draft February 2013 Front cover photo credits (left to right): istockphoto.com/tomml istockphoto.com/mikewesson istockphoto.com/polygraphus UNITED NATIONS OFFICE ON DRUGS
More informationNuclear Security Education and Training At Naif Arab University for Security Sciences
Nuclear Security Education and Training At Naif Arab University for Security Sciences Dr. Amjad Fataftah Chairman, Forensic Chem. Dept. College of Forensic Sciences Naif Arab University for Security Sciences
More informationLegal Interoperability to Enable Cross-Border Data Exchange through SW Facilities
Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities Prof. Dr. HONG XUE Director of BNU Institute for Internet Policy & Law EGM on Integrated Use of Single Windows for TF Bangkok
More informationAcceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationOFFSHORE E-COMMERCE STRATEGIES CONFERENCE. TORONTO, CANADA 19th & 20th February 2001
OFFSHORE E-COMMERCE STRATEGIES CONFERENCE TORONTO, CANADA 19th & 20th February 2001 THE KEY ADVANTAGES OF THE ISLE OF MAN FOR OFFSHORE E-COMMERCE TIM CRAINE Director of e-commerce, Isle of Man Government
More informationExpert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Global E-commerce and Cyberlaw Developments By Torbjörn Fredriksson UNCTAD
More informationIDENTITY THEFT COMMITTED THROUGH INTERNET
IDENTITY THEFT COMMITTED THROUGH INTERNET Adrian Cristian MOISE ABSTRACT: In this study, starting with the presentation of some aspects regarding management of identity in cyberspace, it is carried out
More informationSYLLABUS FOR THREE MONTHS INSTITUTIONAL TRAINING OF EXAMINERS OF PATENTS & DESIGNS
SYLLABUS FOR THREE MONTHS INSTITUTIONAL TRAINING OF EXAMINERS OF PATENTS & DESIGNS INDEX Module Duration Page No.. Introduction to the Intellectual Property Rights. week 7 Day Role of IP in business and
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationPERU TRADE BARRIERS FREE TRADE NEGOTIATIONS
PERU TRADE BARRIERS The U.S. trade deficit with Peru was $1.6 billion in 2004, an increase of $895 million from $710 million in 2003. U.S. goods exports in 2004 were $2.1 billion, up 23.4 percent from
More informationPanel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents
Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state
More informationBahrain Telecom Pricing International Benchmarking. April 2014
Bahrain Telecom Pricing International Benchmarking April 2014 2014 Contents of this report Report overview 3 PSTN basket results for GCC countries, including time series 4 Mobile basket results for GCC
More informationTechnical Questions on Data Retention
Technical Questions on Data Retention 1) The list of data in the annex of the proposed Directive on Data retention is practically identical to the information required in the Council draft Framework Decision.
More informationDraft WGIG Issues Paper on E-Commerce
Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not
More informationUSAGE GUIDELINES FOR CLOUD SERVICES
USAGE GUIDELINES FOR CLOUD SERVICES These Usage Guidelines for cloud services (hereafter "Usage Guidelines") shall apply to all cloud services offered by innofield AG ("innofield"). By using our cloud
More informationENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.
ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.
More informationGlobal Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
More informationClients Legal Needs in HIPAA Security Compliance
Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance
More informationOnline Copyright Infringement. Discussion Paper
Online Copyright Infringement Discussion Paper July 2014 Introduction There are a number of factors that contribute to online copyright infringement in Australia. These factors include the availability
More informationGENERAL TERMS AND CONDITIONS FOR SERVICES OF VERSION 1.0
GENERAL TERMS AND CONDITIONS FOR SERVICES OF SWITCH, WERDSTRASSE 2, 8021 ZURICH VERSION 1.0 These General Terms and Conditions replace the previous General User Regulations for the Services of SWITCH of
More informationMALTA TRADING COMPANIES IN MALTA
MALTA TRADING COMPANIES IN MALTA Trading companies in Malta 1. An effective jurisdiction for international trading operations 410.000 MALTA GMT +1 Located in the heart of the Mediterranean, Malta has always
More information