Models for Cyber-legislation in ESCWA member countries

Size: px
Start display at page:

Download "Models for Cyber-legislation in ESCWA member countries"

Transcription

1 Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007 Cyber Space Cyber space (non-jurisdictional International Space; jurisdictional National or local space) - In the broader term, Cyber space means the electronic space globally shared by everyone and not subject to a specific jurisdiction. This space is unable by its nature to be regulated as no legislator has jurisdiction over it. - In the narrower term, Cyber space means the electronic space specific for a connected group of users or connected computers (Intranet, LAN etc..) This space may be subject to regulations whether private for the group or on National level, such as the Commercial Register.

2 Cyber Space 2 Organization of the international Cyber Space: - bilateral and/or multilateral International Conventions or Directives on cyber-related topics. Organization of national Cyber Space: - national enacted laws, compliant with International Conventions and Directives, such as European countries laws with EU Council directives and conventions. Organization on ESCWA region level: - Enacted laws on specified topics: namely E-Commerce (e.g. U.A.E, Bahrain, Jordan, Egypt, Yemen etc..) - Draft of laws pending enactment: (Syria, Lebanon, Qatar, KSA, Kuwait etc..) Main Cyber-related topics Data Protection and Processing Personal data Privacy in cyberspace Protection of Intellectual Property Rights: Copyright, data, Dom ain names, computer programs, patents relating to software etc.. E-Transactions: E-Records, E-Signature, Attribution, E-proof etc. E-Commerce: E-payment, E-Contracts, E-Signature, Consumer Protection e.g. Publicity Censorship and Freedom of Expression in Cyber space. Cyber Crime: 1- Internet crimes (crimes related to) 1.1- persons (pornography, racial) 1.2- consumer goods 1.3- public sector 1.4- information and electronic communication 2- Computer crimes (crimes related to) 2.1- Computer system 2.2- Computer program 2.3- Computer data 2.4- Computer devices

3 Data Protection and Processing Treated in International Conventions and Directives such as: Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data Strasbourg, 28.I.1981 Council of Europe Treaty No. 108 Foreign Laws on the subject matter. Listing of the main national laws and regulations, countries such as USA, France, Germany adopted laws implementing main issues. ESCWA region legal status: mainly lack of legislation,save few articles in telecom laws. Only available law is the DIFC Data Protection Law 2007 of Dubai, which treated the main topics for data protection, also CCL). UAE law also protects privacy rights such as: marital status, health information etc.. Concerning Protection of Privacy, ESCWA countries are still lacking adequate legislations to ensure the said protection online. E-Transactions International: Conventions, Treaties and directives. Model laws to be followed: UNCITRAL Model law on E-signature; Arab League Cyber Model Law, content relates to E-Transactions mainly. Foreign Laws on the subject matter. Listing of the main national laws and regulations ESCWA region: laws on E-Transactions included E-signature, E-Record, E-proof, Acceptance and authentication of e-signature and e-record. Storage of the e-record and attribution. Legal proof value and certification rules. Enacted laws available in: Jordan, Egypt, U.A.E., Bahrain, Yemen Drafts of laws pending enactment: Lebanon, Qatar, Kuwait, KSA and Syria (Palestine: amendments of laws to accept e-signature, e-proof and e-record, but no available law) Absence of legislation: Iraq, Oman Available legislations treat the main topics in International Conventions and treaties and model laws, however, not elaborate as foreign laws (including ASEAN e.g. Singapore)

4 E-Commerce International: Conventions, Treaties and directives. E-Commerce laws and Model laws on the International and regional levels. ESCWA region: Main E-Commerce issues were addressed in E-Transactions laws. Topics like Consumer Protection relating to distance contracts and Publicity are not addressed in laws. E- Payment and E-Banking: regulated in ESCWA region laws: availability in countries such as: Lebanon, U.A.E., Yemen, Oman, Absence in countries such as: Syria, Iraq, Kuwait Cyber Crime International Conventions and treaties, e.g. Convention on Cybercrime issued by the Council of Europe Treaty No. 185 Budapest 23 November Computer-related crimes; International laws: UK Computer-related crimes (illegal access, deterand Content-related crimes ESCWA region: absence in most of the states, save U.A.E, Law No. No. 2 of the year 2006 The Computer Crime Law. Other ESCWA members: rely on penal code, copyright laws to the extent the provisions of which extend to Computer crimes. Main topics of protection: offences against the confidentiality, integrity and availability of computer data and systems, which are: Illegal access, Illegal interception, Data Interference, System interference and misuse of devices. Computer-related offences, of which Computer-related forgery, Computerrelated fraud. Content-related offences, of which offences related to child pornography, xenophobia, racial content, harmful content. Offences related to infringements of copyright and related rights. The convention states that each member shall establish as criminal crimes the infringements pursuant to the national laws, Berne Convention, TRIPs agreement (Trade- Related Aspects of Intellectual Property Rights), the WCT (WIPO Copyright Treaty, Rome Convention and the WPT (WIPO Performances and Phonograms Treaty.

5 Censorship and Freedom of expression Protected by the First Amendment in the US constitution and major European and UN human rights texts and conventions. ESCWA: Absence of laws protecting freedom of expression. Severe censorship regulations relating to political content, public morals, religion. Some countries of the ESCWA region have apprehended authors and writers who have violated censorship rules on the Internet: e.g. Oman. Intellectual Property in Cyber Space ESCWA region international affiliations and members of: Berne Convention, Rome Convention, TRIPs (for WTO members) Protection of: Computer programs and software, Databases. Domain names and Trademarks. ESCWA: copyright laws protect computer programs and databases. No regulations concerning cctld. General IP laws: patent, trademarks apply to infringements online.

6 Thank You

ECONOMIC AND SOCIAL COMMISSION FOR WESTERN ASIA (ESCWA) MODELS FOR CYBER LEGISLATION IN ESCWA MEMBER COUNTRIES

ECONOMIC AND SOCIAL COMMISSION FOR WESTERN ASIA (ESCWA) MODELS FOR CYBER LEGISLATION IN ESCWA MEMBER COUNTRIES ECONOMIC AND SOCIAL COMMISSION FOR WESTERN ASIA (ESCWA) MODELS FOR CYBER LEGISLATION IN ESCWA MEMBER COUNTRIES United Nations ECONOMIC AND SOCIAL COMMISSION FOR WESTERN ASIA (ESCWA) Distr. GENERAL E/ESCWA/ICTD/2007/8

More information

Outline. Recommendations

Outline. Recommendations Follow-up Workshop on Delivery of E-Services in Civil Society, Beirut - Lebanon E-Commerce & Payment Solutions in the Region Rami Zaatari ICT Division www.escwa.un.org 29 Nov. 2010 Outline E-Business and

More information

T-CY Guidance Note #5

T-CY Guidance Note #5 www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)10E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #5 DDOS attacks Adopted by the 9 th Plenary of the T-CY (4-5 June 2013) Contact: Alexander

More information

Ghada Qaisi Audi June 2013

Ghada Qaisi Audi June 2013 Enforcement of DIFC Courts Judgments and Orders within and outside the DIFC Ghada Qaisi Audi June Enforcement of DIFC Courts Judgments within the DIFC Enforcement of DIFC Courts judgments where the assets

More information

Cyber Crime and Data Retention

Cyber Crime and Data Retention COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,

More information

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal 21-27 November 2009 Presenter Adam Mambi,(Advocate of High Court) -Deputy Executive Secretary, Law Reform Commission Tanzania

More information

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

NATIONAL LAW INSTITUTE UNIVERSITY

NATIONAL LAW INSTITUTE UNIVERSITY NATIONAL LAW INSTITUTE UNIVERSITY Kerwa Dam Road, Bhopal -462044, M.P. (INDIA) RAJIV GANDHI NATIONAL CYBER LAW CENTER (Established by MHRD, Govt. of India) Post Graduate Diploma in Cyber Law (Distance

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry

InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry Dino Wilkinson Partner Norton Rose Fulbright (Middle East) LLP 3 February 2015 The growing challenge of cyber risks From

More information

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the

More information

Implementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins

Implementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins Implementation of e-signature in the ESCWA Region: Status and Next Steps By Matthew Perkins Understanding e-signature How do we identify ourselves online? Electronic records of real-world authenticators

More information

European Patents in Morocco from March 2015 OAPI Joins TMclass Qatar s Emir Signs Law on Wage Protection

European Patents in Morocco from March 2015 OAPI Joins TMclass Qatar s Emir Signs Law on Wage Protection February 2015 Issue 73 European Patents in Morocco from March 2015 OAPI Joins TMclass Qatar s Emir Signs Law on Wage Protection indiemaroc IN THIS ISSUE European Patents in Morocco from March 2015 New

More information

BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON

BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON BUSINESS PROCESS OUTSOURCING INDUSTRY IN LEBANON Content SECTOR OVERVIEW p 3 INTERNATIONALLY RENOWNED EDUCATIONAL SYSTEM p 4 COST-COMPETITIVE & HIGHLY SKILLED WORKFORCE ESTABLISHED TRACK RECORD ENABLING

More information

D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors

D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors FP7-SEC-2013.2.5-2 Grant Agreement Number 607775 Collaborative Project E-CRIME The economic impacts of cyber crime D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors

More information

Peace and Justice in Cyberspace

Peace and Justice in Cyberspace Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime

More information

GOVERNANCE IN "CYBERSPACE' Access and Public Interest in Global Communications

GOVERNANCE IN CYBERSPACE' Access and Public Interest in Global Communications KLAUS W. GREWLICH Dr.jur.habil. (Freiburg), Dr.sc.econ. (HEC, Lausanne), LL.M. (Berkeley) Professor, College ofeurope, Bruges GOVERNANCE IN "CYBERSPACE' Access and Public Interest in Global Communications

More information

E-Payments & Saudi Arabian e-infrastructure

E-Payments & Saudi Arabian e-infrastructure MIS 300 - Fundamentals of E-Commerce 072 E-Payments & Saudi Arabian e-infrastructure Mr. Mustafa Faisal Ahmed mfahmed@kfupm.edu.sa Chapter Outline E-Payments Chapter 11 (selected coverage) Online payments

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia

More information

Health Care Services for the Old Middle East Population. Dr. Salwa AL Suwaidi MBBS, Dip. Ger, MRCP (UK), Ar.Board

Health Care Services for the Old Middle East Population. Dr. Salwa AL Suwaidi MBBS, Dip. Ger, MRCP (UK), Ar.Board Health Care Services for the Old Middle East Population Dr. Salwa AL Suwaidi MBBS, Dip. Ger, MRCP (UK), Ar.Board Middle East The world is experiencing a major demographic transformation globally and the

More information

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)

More information

ESCWA Technology Centre

ESCWA Technology Centre ESCWA Technology Centre Newsletter Second Half, 2013 Amman - Jordan www.etc-un.org The Broken Cycle: Universities, Research and Society in the Arab World Proposals for Change Available study online (En,

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

SOFTWARE DEVELOPMENT INDUSTRY and the ICT Sector in the Arab World. Fouad Bajwa. 7 May 2013

SOFTWARE DEVELOPMENT INDUSTRY and the ICT Sector in the Arab World. Fouad Bajwa. 7 May 2013 SOFTWARE DEVELOPMENT INDUSTRY and the ICT Sector in the Arab World Fouad Bajwa 7 May 2013 * All United Nations/UNCTAD/ESCWA related information is shared for information and references purposes only and

More information

The 2013 Amendment to the 1980 Arab League Investment Agreement

The 2013 Amendment to the 1980 Arab League Investment Agreement The 2013 Amendment to the 1980 Arab League Investment Agreement A step towards improving the region s attractiveness to investors NOTE: This draft brochure responds to a request of the League of Arab States

More information

BSA Global Cloud. A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE

BSA Global Cloud. A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE BSA Global Cloud COMPUTING Scorecard A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE A CONTENTS Executive Summary....................................... 1 BSA Cloud Policy Blueprint...2

More information

Tactics and Strategies for Improving and Sustaining Quality in the Middle East

Tactics and Strategies for Improving and Sustaining Quality in the Middle East Tactics and Strategies for Improving and Sustaining Quality in the Middle East Jane Azurin Acting Education Consul Middle East July Sept 2008 Overview Synopsis of the Middle East (ME) Quality Students

More information

Hotel Establishment Statistics

Hotel Establishment Statistics Hotel Establishment Statistics Monthly report December & Full Year 49% 15% 7% Page 1 of 18 Executive Summary December December showed an increase of 25% in guest arrivals when compared to last year, with

More information

Cybercrime & Cybersecurity

Cybercrime & Cybersecurity Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational

More information

DoSPOT (Free Internet Connection Service) - Terms of Use

DoSPOT (Free Internet Connection Service) - Terms of Use DoSPOT (Free Internet Connection Service) - Terms of Use (Purpose) Article 1 The DoSPOT Terms of Use (hereinafter referred to as the "Rules") define the conditions of use that apply to users of DoSPOT

More information

Intellectual Property Rights and Exporting: A Step-by-Step Guide

Intellectual Property Rights and Exporting: A Step-by-Step Guide Intellectual Property Rights and Exporting: A Step-by-Step Guide Bijou Mgbojikwe Office of Intellectual Property Rights International Trade Administration May 1, 2014 Session Objectives After this session,

More information

Directive in German law. Principles.

Directive in German law. Principles. Country Report: Germany Germany has comprehensive cybercrime legislation and up-to-date intellectual property protection in place. The combination of these laws provides reasonable protection for cloud

More information

WIPO TRAINING OF TRAINERS PROGRAM ON EFFECTIVE INTELLECTUAL PROPERTY ASSET MANAGEMENT BY SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs)

WIPO TRAINING OF TRAINERS PROGRAM ON EFFECTIVE INTELLECTUAL PROPERTY ASSET MANAGEMENT BY SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs) WIPO TRAINING OF TRAINERS PROGRAM ON EFFECTIVE INTELLECTUAL PROPERTY ASSET MANAGEMENT BY SMALL AND MEDIUM-SIZED ENTERPRISES (SMEs) IP Law and Administration in the State of Qatar by Malik Al-Kammaz Saba

More information

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof, Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber

More information

Intellectual Property

Intellectual Property Intellectual Property What is intellectual property? How do I get protection for my idea/material? How will my idea/material benefit from IP? How do I enforce my rights? Do I always need permission to

More information

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16

Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Summary The Northern Ireland Human Rights Commission (the Commission):

More information

Trade Facilitation Initiatives in the ESCWA Region

Trade Facilitation Initiatives in the ESCWA Region Trade Facilitation Initiatives in the ESCWA Region E/ESCWA/EDGD/2013/Technical Paper.3 13-0143 Trade facilitation at the WTO On 1 August 2004, the Member States of the World Trade Organization (WTO) agreed

More information

GCC Pharmaceutical Industry

GCC Pharmaceutical Industry GCC Pharmaceutical Industry First coordination meeting for the pharmaceutical industry in the GCC and Yemen Dr. Aasim Qureshi 11 April 2011 Global Pharmaceuticals Industry The pharmaceutical industry is

More information

4 The Privacy Act 1988 (Cth) requires private sector organizations to comply either with

4 The Privacy Act 1988 (Cth) requires private sector organizations to comply either with country report: Australia Australia does not have specific regulations in place for cloud computing today, though the government has been keen to include consideration of cloud computing issues in the

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015: COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national

More information

Investing in Renewable Energies A guide to investment treaty protections available to investors in the Arab Republic of Egypt

Investing in Renewable Energies A guide to investment treaty protections available to investors in the Arab Republic of Egypt Investing in Renewable Energies A guide to investment treaty protections available to investors in the Arab Republic of Egypt Investing in Renewable Energies in the Arab Republic of Egypt The Arab Republic

More information

Malta Companies in International Tax Structuring February 2015

Malta Companies in International Tax Structuring February 2015 INFORMATION SHEET No. 126 Malta in International Tax Structuring February 2015 Introduction Malta is a reputable EU business and financial centre with an attractive tax regime and sound legislative framework.

More information

protection rights are limited. protection rights are limited.

protection rights are limited. protection rights are limited. Score: 44.09 Rank: 22 / 24 Brazil is a fast-growing economy that recognizes the importance of ICT and the digital economy. However, some gaps in law and regulation have acted as barriers to ICT innovation

More information

ESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW

ESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE ESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW RECOMMENDATION No. 35, FIRST edition, adopted by the United Nations Centre for Trade Facilitation

More information

Support for Business Activities in the Middle East and North Africa Region

Support for Business Activities in the Middle East and North Africa Region Support for Business Activities in the Middle East and North Africa Region Felix Neugart Association of German Chambers of Industry and Commerce (DIHK) 22. Februar 2008 Technik als Brücke der Kulturen

More information

Internet of Things IoT Services in the Arab World

Internet of Things IoT Services in the Arab World Internet of Things IoT Services in the Arab World Arab Advisors Group Strategic Research Service December 2015 Analyst: Noor Al Asmar This report has been delivered to Client as part of the subscription

More information

AFRICA REGIONAL INTELLECTUAL PROPERTY ORGANIZATION

AFRICA REGIONAL INTELLECTUAL PROPERTY ORGANIZATION E (A UNITED METHODIST RELATED INSTITUTION) INVESTING IN AFRICA S FUTURE AFRICA REGIONAL INTELLECTUAL PROPERTY ORGANIZATION MIP CURRICULUM WIPO-ARIPO-AU/MIP/15/INF.1PROV. ORIGINAL: ENGLISH DATE: DECEMBER

More information

Cybersecurity Governance

Cybersecurity Governance AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional

More information

The Perks of Doing Business in Malta

The Perks of Doing Business in Malta The Perks of Doing Business in Malta Legal and Tax Opportunities Dr Charles Cassar CCLex.com Malta London 1 2012 2013 - CCLex.com Overview About the Firm Business Environment Legal basics Tax Considerations

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Some laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability.

Some laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability. Country Report: India India is an important regional economy, with a strong interest in ICT services development. The law in India has not entirely kept pace with developments in cloud computing, and some

More information

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Republic of South Africa. Review Report. E-commerce, Cybercrime and Cybersecurity Status, Gaps and the Road Ahead. Final Version.

Republic of South Africa. Review Report. E-commerce, Cybercrime and Cybersecurity Status, Gaps and the Road Ahead. Final Version. Republic of South Africa Review Report E-commerce, Cybercrime and Cybersecurity Status, Gaps and the Road Ahead Final Version 26 November 2013 Detecon International GmbH 04.12.2013 Page 0/383 Review Report

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017 MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO - Podgorica, July CONTENTS 1. INTRODUCTION... 3 2. DEFINITIONS... 5 3. CYBER SECURITY MANAGEMENT SYSTEM... 8 3.1 METHOD OF MONITORING STARTEGY

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

Road Safety. League of Arab States Truck Accident Causation Feasibility Study

Road Safety. League of Arab States Truck Accident Causation Feasibility Study Road Safety League of Arab States Truck Accident Causation Feasibility Study FACILITATING ROAD TRANSPORT FOR MORE GROWTH AND PROSPERITY IN THE ARAB WORLD partners The IDB-AULT-IRU project aims to improve

More information

Samtani Anil Associate Professor Nanyang Technological University Singapore. Intellectual Property Education in the Singapore Universities

Samtani Anil Associate Professor Nanyang Technological University Singapore. Intellectual Property Education in the Singapore Universities CURRENT STATE OF IPR TEACHING AND LEARNING IN SINGAPORE Samtani Anil Associate Professor Nanyang Technological University Singapore Overview Backdrop Intellectual Property Education in the Singapore Universities

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

The Global Flight From Marriage : Has It Come to the Arabic World? A First Look at the Evidence

The Global Flight From Marriage : Has It Come to the Arabic World? A First Look at the Evidence The Global Flight From Marriage : Has It Come to the Arabic World? A First Look at the Evidence Nicholas Eberstadt, Ph.D. Henry Wendt Chair in Political Economy American Enterprise Institute

More information

E-commerce and Development Key Trends and Issues

E-commerce and Development Key Trends and Issues E-commerce and Development Key Trends and Issues Torbjörn Fredriksson Chief, ICT Analysis Section UNCTAD, Division on Technology and Logistics (torbjorn.fredriksson@unctad.org) Workshop on E-Commerce,

More information

COMMENTS ON BRAZIL S PROPOSED LAW 84/99

COMMENTS ON BRAZIL S PROPOSED LAW 84/99 COMMENTS ON BRAZIL S PROPOSED LAW 84/99 November 7, 2011 Proposed Law 84/99, currently under review in the House of Representatives, aims to update the law of Brazil to address various kinds of criminal

More information

A Region by Any Other Name...

A Region by Any Other Name... A Region by Any Other Name.... Janet Hall Bethany Public Schools, Bethany, Oklahoma jhall@bps.k12.ok.us OVERVIEW: It is often true that a place may be categorized as belonging to more than one region,

More information

Country: Canada. Score: 75.79 Rank: 9/24

Country: Canada. Score: 75.79 Rank: 9/24 Score: 75.79 Rank: 9/24 Canada is a world leader in ICT adoption and innovation and has played a leading role in the development of international standards. It has a strong commitment to free trade and

More information

TOTAL FDI Inflow to KSA (Millions of dollars) FDI by Source :

TOTAL FDI Inflow to KSA (Millions of dollars) FDI by Source : Actual Inflows & Stocks of Foreign Direct Investments (Millions of dollars) in KSA by Country & Sector FDI Inflows Total Stock ( Millions of dollars ) TOTAL FDI Inflow to KSA (Millions of dollars) 8 8,,,,88

More information

A Guideline to Enforce Data Protection and Privacy Digital Laws in Iran

A Guideline to Enforce Data Protection and Privacy Digital Laws in Iran 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Guideline to Enforce Data Protection and Privacy Digital Laws in Iran Tahereh Hasani

More information

MALTA TRADING COMPANIES

MALTA TRADING COMPANIES MALTA TRADING COMPANIES Malta Trading Companies Maltese Registered Companies and Trading Operations in Malta Malta, an EU Member State since May 2004, has developed into a leading and reputable financial

More information

Country: Australia. Score: 79.92 Rank: 2/24

Country: Australia. Score: 79.92 Rank: 2/24 Score: 79.92 Rank: 2/24 Australia is keen to promote cloud computing through the development and reform of relevant laws, regulations, and standards. For example, Australia has a strong commitment to international

More information

www.bonddickinson.com Cyber Risks October 2014 2

www.bonddickinson.com Cyber Risks October 2014 2 www.bonddickinson.com Cyber Risks October 2014 2 Why this emerging sector matters Justin Tivey Legal Director T: +44(0)845 415 8128 E: justin.tivey The government estimates that the current cost of cyber-crime

More information

ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010

ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 NRCCL (University of Oslo, Faculty of Law) Topics Overview of

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Comprehensive Study on Cybercrime Draft February 2013 Front cover photo credits (left to right): istockphoto.com/tomml istockphoto.com/mikewesson istockphoto.com/polygraphus UNITED NATIONS OFFICE ON DRUGS

More information

Nuclear Security Education and Training At Naif Arab University for Security Sciences

Nuclear Security Education and Training At Naif Arab University for Security Sciences Nuclear Security Education and Training At Naif Arab University for Security Sciences Dr. Amjad Fataftah Chairman, Forensic Chem. Dept. College of Forensic Sciences Naif Arab University for Security Sciences

More information

Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities

Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities Prof. Dr. HONG XUE Director of BNU Institute for Internet Policy & Law EGM on Integrated Use of Single Windows for TF Bangkok

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

OFFSHORE E-COMMERCE STRATEGIES CONFERENCE. TORONTO, CANADA 19th & 20th February 2001

OFFSHORE E-COMMERCE STRATEGIES CONFERENCE. TORONTO, CANADA 19th & 20th February 2001 OFFSHORE E-COMMERCE STRATEGIES CONFERENCE TORONTO, CANADA 19th & 20th February 2001 THE KEY ADVANTAGES OF THE ISLE OF MAN FOR OFFSHORE E-COMMERCE TIM CRAINE Director of e-commerce, Isle of Man Government

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Global E-commerce and Cyberlaw Developments By Torbjörn Fredriksson UNCTAD

More information

IDENTITY THEFT COMMITTED THROUGH INTERNET

IDENTITY THEFT COMMITTED THROUGH INTERNET IDENTITY THEFT COMMITTED THROUGH INTERNET Adrian Cristian MOISE ABSTRACT: In this study, starting with the presentation of some aspects regarding management of identity in cyberspace, it is carried out

More information

SYLLABUS FOR THREE MONTHS INSTITUTIONAL TRAINING OF EXAMINERS OF PATENTS & DESIGNS

SYLLABUS FOR THREE MONTHS INSTITUTIONAL TRAINING OF EXAMINERS OF PATENTS & DESIGNS SYLLABUS FOR THREE MONTHS INSTITUTIONAL TRAINING OF EXAMINERS OF PATENTS & DESIGNS INDEX Module Duration Page No.. Introduction to the Intellectual Property Rights. week 7 Day Role of IP in business and

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

PERU TRADE BARRIERS FREE TRADE NEGOTIATIONS

PERU TRADE BARRIERS FREE TRADE NEGOTIATIONS PERU TRADE BARRIERS The U.S. trade deficit with Peru was $1.6 billion in 2004, an increase of $895 million from $710 million in 2003. U.S. goods exports in 2004 were $2.1 billion, up 23.4 percent from

More information

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state

More information

Bahrain Telecom Pricing International Benchmarking. April 2014

Bahrain Telecom Pricing International Benchmarking. April 2014 Bahrain Telecom Pricing International Benchmarking April 2014 2014 Contents of this report Report overview 3 PSTN basket results for GCC countries, including time series 4 Mobile basket results for GCC

More information

Technical Questions on Data Retention

Technical Questions on Data Retention Technical Questions on Data Retention 1) The list of data in the annex of the proposed Directive on Data retention is practically identical to the information required in the Council draft Framework Decision.

More information

Draft WGIG Issues Paper on E-Commerce

Draft WGIG Issues Paper on E-Commerce Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not

More information

USAGE GUIDELINES FOR CLOUD SERVICES

USAGE GUIDELINES FOR CLOUD SERVICES USAGE GUIDELINES FOR CLOUD SERVICES These Usage Guidelines for cloud services (hereafter "Usage Guidelines") shall apply to all cloud services offered by innofield AG ("innofield"). By using our cloud

More information

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET. ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.

More information

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as

More information

Clients Legal Needs in HIPAA Security Compliance

Clients Legal Needs in HIPAA Security Compliance Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance

More information

Online Copyright Infringement. Discussion Paper

Online Copyright Infringement. Discussion Paper Online Copyright Infringement Discussion Paper July 2014 Introduction There are a number of factors that contribute to online copyright infringement in Australia. These factors include the availability

More information

GENERAL TERMS AND CONDITIONS FOR SERVICES OF VERSION 1.0

GENERAL TERMS AND CONDITIONS FOR SERVICES OF VERSION 1.0 GENERAL TERMS AND CONDITIONS FOR SERVICES OF SWITCH, WERDSTRASSE 2, 8021 ZURICH VERSION 1.0 These General Terms and Conditions replace the previous General User Regulations for the Services of SWITCH of

More information

MALTA TRADING COMPANIES IN MALTA

MALTA TRADING COMPANIES IN MALTA MALTA TRADING COMPANIES IN MALTA Trading companies in Malta 1. An effective jurisdiction for international trading operations 410.000 MALTA GMT +1 Located in the heart of the Mediterranean, Malta has always

More information