CYBERCRIME AND THE LAW
|
|
|
- Pierce Floyd
- 10 years ago
- Views:
Transcription
1 CYBERCRIME AND THE LAW
2 INTERNATIONAL LAW
3 CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations pursue a common criminal policy aimed at the protection of society against cybercrime, especially by adopting appropriate legislation and fostering international cooperation Into force 1 July states ratified + 8 further signatories (including SA on 23 July 2001) Drawn up by the Council of Europe with the active participation of South Africa
4 CYBERCRIME CONVENTION Ratified / signed (into force) Not ratified / signed South Africa (n/a) Brazil United Kingdom (1 Sept 2011) Russia USA (1 Jan 2007) India Canada (1 Nov 2015) China Sri Lanka (1 Sept 2015)
5 Additional Protocol to the Convention on Cybercrime into force on 1 March 2006 CYBERCRIME CONVENTION requires criminalisation of dissemination of racist and xenophobic material + threats and insults motivated by racism/xenophobia through computer systems Offences illegal access illegal interception data interference system interference misuse of devices computer-related forgery computer-related fraud offences related to child pornography and offences related to copyright and neighbouring rights.
6 Procedural law issues expedited preservation of stored data CYBERCRIME CONVENTION expedited preservation and partial disclosure of traffic data production order, search and seizure of computer data real-time collection of traffic data, and interception of content data. International mechanisms transborder access to stored computer data which does not require mutual assistance (with consent or where publicly available) setting up of a 24/7 network for ensuring speedy assistance amongst parties
7 AU Convention AU Convention on Cyber Security and Personal Data Protection adopted by AU on 27 June 2014 addresses a wide range of online activities, including electronic commerce, data protection, cybersecurity and cybercrime Cybercrime: states must adopt laws that criminalise Attacks on computer systems Computerised data breaches Content-related offences Offences relating to electronic message security measures Emphasis on capacity building, international cooperation and harmonisation of laws
8 SOUTH AFRICA
9 SOUTH AFRICAN LAW Electronic Communications and Transactions Act 2002 Chapter 13 offences RICA 2002 Procedural provisions of Cybercrime Convention Criminal Law (Sexual Offences and Related Matters) Amendment Act, 2007 Child pornography Film and Publications Act 1996 Child pornography Common law National Cybersecurity Framework May 2012 (not in public domain) Cybercrimes and Cybersecurity Bill
10 CYBERCRIMES & CYBERSECURITY BILL DOJCD mandated to review the cyber security laws to ensure they provide for a coherent and integrated cyber security legal framework Indication that in future may address cryptography, e-identity management and electronic evidence Alignment with Cybercrime Convention New institutional arrangements Over 50 new criminal offences Two chances to comment Process not an event
11 CYBERCRIMES & CYBERSECURITY BILL Unlawful interception of data Unlawful access Personal information and financial information related offences Unlawful acts in respect of software or hardware tools Unlawful interference with data Unlawful interference with computer device, computer network, database, critical database, electronic communications network or National Critical Information Infrastructure Unlawful acts in respect of malware Computer related fraud Unlawful acquisition, possession, provision, receipt or use of passwords, access codes or similar data or devices Computer related appropriation Computer related extortion Computer related forgery and uttering Computer related terrorist activity and related offences Prohibition on incitement of violence and damage to property Harbouring or concealing person who commits offence Computer related espionage and unlawful access to restricted data Prohibited financial transactions Infringement of copyright Prohibition on dissemination of data message which advocates, promotes or incites hate, discrimination or violence Attempting, conspiring, aiding, abetting, inducing, inciting, instigating, instructing, commanding, or procuring to commit offence
12 Procedural law mechanisms Search and seizure CYBERCRIMES & CYBERSECURITY BILL Expedited data preservation direction Data disclosure direction Data preservation direction Obligation to assist LEAs Offence to release without a data disclosure direction
13 24 / 7 contact point Cybercrime Convention Art 35 CYBERCRIME & CYBERSECURITY BILL Countries should designate a contact point for mutual assistance requests available 24/7 in order to ensure assistance in cyber related matters aimed at international information exchange + providing technical assistance and advice, assisting with the preservation of data and collection of evidence, the provision of legal information and the location of suspects Clause 49 of the Bill provides for the establishment of a 24/7 Point of Contact for SA. National Cybercrime Centre dedicated structure to focus on cybercrime
14 CYBERCRIMES & CYBERSECURITY BILL SA Courts to have jurisdiction where the offence was committed in the SA preparation for the offence or any part of the offence was committed in SA or where any result of the offence has had an effect in SA the offence was committed in or outside SA by an SA citizen or a person with permanent residence in SA or by a person carrying on business in SA the offence was committed on board any ship or aircraft registered in SA or on a voyage or flight to or from the SA when the offence was committed the offence was committed outside SA and person charged is a citizen / resident / body of persons or arrested in SA the offence was committed outside SA irrespective of whether constitutes an offence where committed then deemed to have been committed in SA if affects / intended to affect an SA public body + the offender is in SA + no extradition or application to extradite
15 CYBERCRIMES & CYBERSECURITY BILL Definition of electronic communications service provider "electronic communications service provider" means any (a) person who provides an electronic communications service under and in accordance with an electronic communications service licence issued to such person under Chapter 3 of the Electronic Communications Act, 2005 (Act No. 36 of 2005), or who is deemed to be licensed or exempted from being licensed as such in terms of the Electronic Communications Act, 2005; (b) 'financial institution' as defined in section 1 of the Financial Services Board Act, 1990 (Act No. 97 of 1990); or (c) person or entity who or which transmits, receives, processes or stores data (i) on behalf of the person contemplated in paragraph (a) or (b) or the clients of such a person; or (ii) of any other person;
16 Section 64: proposed position with regard to ISPs CYBERCRIMES & CYBERSECURITY BILL 64(1) Obligation to provide information & establish reporting mechanism 64. (1) An electronic communications service provider must (a) take reasonable steps to inform its clients of cybercrime trends which affect or may affect the clients of such an electronic communications service provider; (b) establish procedures for its clients to report cybercrimes with the electronic communications service provider; and (c) inform its clients of measures which a client may take in order to safeguard himself or herself against cybercrime.
17 64(2) Obligation to report and preserve evidence CYBERCRIMES & CYBERSECURITY BILL (2) An electronic communications service provider that is aware or becomes aware that its computer network or electronic communications network is being used to commit an offence provided for in this Act must (a) immediately report the matter to the National Cybercrime Centre; and (b) preserve any information which may be of assistance to the law enforcement agencies in investigating the offence, including information which shows the communication s origin, destination, route, time date, size, duration and the type of the underlying services.
18 CYBERCRIMES & CYBERSECURITY BILL 64(2) Sanctions and interface with National Cybercrime Centre (3) An electronic communications service provider which fails to comply with subsection (1) or (2), is guilty of an offence and is liable on conviction to a fine of R10 000, for each day on which such failure to comply, continues. (4) The Cabinet member responsible for policing, in consultation with the Cabinet member responsible for the administration of justice, must make regulations regulating the manner in which an electronic communications service provider must report the use of its computer network or electronic communications network to commit an offence, to the National Cybercrime Centre.
19 industry-driven initiative to identify infected machines, inform affected consumers that they may be at risk, provide support to enable those consumers to disinfect their machines + reduce their risk of re-infection. Objectives instil a culture of cyber security within SA ISPs and their customers; provide a consistent message in plain language in order to raise awareness of cyber security risks, educate users on steps that they can take to better protect themselves online, and to assist customers who may have infected machines; encourage ISPs to identify compromised computers on their networks; develop mechanisms for ISPs to share information and collaborate on cyber security concerns affecting SA ISPs; and encourage ISPs to identify and report any cyber security issues that may affect SA s critical infrastructure or that may have a national security dimension Voluntary for all SA ISPs
20 thank you questions, queries, quibbles
Cyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
T-CY Guidance Note #5
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)10E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #5 DDOS attacks Adopted by the 9 th Plenary of the T-CY (4-5 June 2013) Contact: Alexander
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
CHAPTER 124B COMPUTER MISUSE
1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
Australia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: [email protected] Australia
CYBERSECURITY BILL, 2011
CYBERSECURITY BILL, 2011 Page 1 of 19 CYBERSECURITY BILL, 2011 ARRANGEMENT OF SECTIONS Sections PART I - GENERAL PROVISIONS 1 Objects and scope PART II OFFENCES AND PENALTIES 2. Unlawful access to a computer
COMPUTER MISUSE AND CYBERCRIME ACT
COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access
T-CY Guidance Note #4 Identity theft and phishing in relation to fraud
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised
Cybercrime & Cybersecurity
Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational
PROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL
REPUBLIC OF SOUTH AFRICA PROHIBITION OF MERCENARY ACTIVITIES AND PROHIBITION AND REGULATION OF CERTAIN ACTIVITIES IN AREAS OF ARMED CONFLICT BILL (As introduced in the National Assembly as a section 75
THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY
THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY Clause. 1. Interpretation. PART II - CONTROL OF INTERCEPTION AND ESTABLISHMENT OF A MONITORING CENTRE
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
Application of the Electronic Communications and Transactions Act to Online Merchants From Other Jurisdictions
Northwestern Journal of Technology and Intellectual Property Volume 1 Issue 1 Spring Article 7 Spring 2003 Application of the Electronic Communications and Transactions Act to Online Merchants From Other
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
THE COMPUTER MISUSE AND CYBERCRIME ACT 2003. I assent ------------- ARRANGEMENT OF SECTIONS
1 Act No. 22 of 2003 THE COMPUTER MISUSE AND CYBERCRIME ACT 2003 I assent 30 July 2003 KARL AUGUSTE OFFMANN President of the Republic Section ------------- ARRANGEMENT OF SECTIONS PART I - PRELIMINARY
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE
AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE Preamble The United States of America and the European Police Office (Europol): considering that it is within their common
Psychoactive Substances Act 2016
Psychoactive Substances Act 2016 CHAPTER 2 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately Psychoactive Substances Act 2016 CHAPTER 2 CONTENTS
Modern Slavery Act 2015
Modern Slavery Act 2015 CHAPTER 30 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 14.25 Modern Slavery Act 2015 CHAPTER 30 CONTENTS PART 1
LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT
LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT S 65/00 REVISED EDITION 2007 B.L.R.O. 3/2007 CAP. 194] LAWS OF BRUNEI Computer Misuse [2007 Ed. p. 1 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 194 COMPUTER
Anti-Money Laundering Measures in the Cayman Islands
Anti-Money Laundering Measures in the Cayman Islands Foreword This memorandum has been prepared for the assistance of those who are considering the law of the Cayman Islands (sometimes referred to as Cayman
The EU approach to Cybersecurity and Cybercrime
The EU approach to Cybersecurity and Cybercrime Ralf Bendrath Policy advisor to Jan Philipp Albrecht MEP, Greens/EFA ISODARCO.it, 12 January 2012 Outline 1. Information & Coordination 2. Internal Security
Peace and Justice in Cyberspace
Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Migration/ Asylum. Co-operation in the field of drugs
Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently
A Global Treaty on Cybersecurity and Cybercrime
Stein Schjolberg and Solange Ghernaouti-Helie A Global Treaty on Cybersecurity and Cybercrime Second edition 2011 Those who fail to anticipate the future are in for a rude shock when it arrives Professor
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
LAW ENFORCEMENT and LEGAL FRAMEWORK (EAST AFRICAN REGION)
LAW ENFORCEMENT and LEGAL FRAMEWORK (EAST AFRICAN REGION) Presentation by: Japheth Kasimbu (ANPPCAN) BACKGROUND 2007 - ANPPCAN held an international conference on child sexual abuse Issues deliberated
The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva
1 By Stein Schjolberg Chief Judge December, 2008 The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva 1. Introduction... 1 2. The History... 2 3. What is cybercrime? The history
OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY
[ ENGLISH TEXT TEXTE ANGLAIS ] OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY The States Parties to the present Protocol,
STATES OF JERSEY DRAFT EU LEGISLATION (CIVIL AVIATION INSURANCE) (JERSEY) REGULATIONS 201-
STATES OF JERSEY r DRAFT EU LEGISLATION (CIVIL AVIATION INSURANCE) (JERSEY) REGULATIONS 201- Lodged au Greffe on 2nd June 2015 by the Minister for External Relations STATES GREFFE 2015 Price code: C P.61
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000
Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Act No. 3 of 2000 Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Section TABLE OF PROVISIONS PART 1 PRELIMINARY Page 1 Short title.....................................................
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol
DISCUSSION OF THE CYBERCRIMES AND CYBERSECURITY BILL
DISCUSSION OF THE CYBERCRIMES AND CYBERSECURITY BILL 1. PURPOSE OF BILL The Cybercrimes and Cybersecurity Bill, 2015 (the Bill ) - * creates offences and prescribes penalties; * further regulates jurisdiction;
COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
EUROPEAN COMMISSION Brussels, 20.9.2011 COM(2011) 573 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
Computer Facilitated Crimes Against Children International Law Enforcement Training
Computer Facilitated Crimes Against Children International Law Enforcement Training The Computer Facilitated Crimes Against Children training seminar was designed to provide law enforcement around the
Optional Protocol on the sale of children, child prostitution and child pornography
United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol
The Electronic Transactions Law Chapter I Title and Definition
The Union of Myanmar The State Peace and Development Council The Electronic Transactions Law ( The State Peace and Development Council Law No. 5/2004 ) The 12th Waxing of Kason 1366 M.E. (30th April, 2004)
ITU TOOLKIT FOR CYBERCRIME LEGISLATION
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n C y b e r c r i m e L e g i s l a t i o n R e s o u r c e s ITU TOOLKIT FOR CYBERCRIME LEGISLATION Developed through the American Bar
The Council of Europe Convention on Cybercrime
The Council of Europe Convention on Cybercrime Michael A. Vatis Steptoe & Johnson LLP I. BACKGROUND The Convention on Cybercrime is an international treaty that seeks to harmonize national laws on cybercrime,
Advance copy of the authentic text. The copy certified by the Secretary-General will be issued at a later time.
PROTOCOL TO PREVENT, SUPPRESS AND PUNISH TRAFFICKING IN PERSONS, ESPECIALLY WOMEN AND CHILDREN, SUPPLEMENTING THE UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME Advance copy of the authentic
FAQs Organised Crime and Anti-corruption Legislation Bill
FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised
SAARC CONVENTION ON PREVENTING AND COMBATING TRAFFICKING IN WOMEN AND CHILDREN FOR PROSTITUTION
SAARC SAARC CONVENTION ON PREVENTING AND COMBATING TRAFFICKING IN WOMEN AND CHILDREN FOR PROSTITUTION THE MEMBER STATES OF THE SOUTH ASIAN ASSOCIATION FOR REGIONAL COOPERATION (SAARC), PARTIES TO THE PRESENT
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
CRC/C/OPSC/SWE/CO/1. Convention on the Rights of the Child. United Nations
United Nations Convention on the Rights of the Child CRC/C/OPSC/SWE/CO/1 Distr.: General 23 January 2012 Original: English Committee on the Rights of the Child Fifty-eighth session 19 September 7 October
Legal and Regulatory Framework in Africa for Cyber Security
2 nd East Africa IT and Cyber security Convention Legal and Regulatory Framework in Africa for Cyber Security 27th Nov 2013 Nairobi, Kenya Attorney Sizwe Lindelo Snail Ka Mtuze TABLE OF CONTENTS Part 1:
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,
Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach, Organized by American Chamber of Commerce in Cyprus, 30 October
GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue
GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue shoplifting Guidance for police in England and Wales First publication: June 2014 1 Introduction 1.
Having regard to the Treaty on the Functioning of the European Union, and in particular Article 16 thereof,
Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber
"Transmission of any material in violation of any Country, Federal, State or Local regulation is prohibited."
Bahnhof - a Free Speech ISP Bahnhof is proud to be known as a Free Speech ISP. We do not enforce tighter restrictions on "speech" than the law demands. If the site and content is legal in Sweden, you may
Models for Cyber-legislation in ESCWA member countries
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007 Cyber Space Cyber space (non-jurisdictional International Space; jurisdictional National
Information Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS
RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS 1. WHY CAN T THE GOVERNMENT BAN USE OF THE INTERNET TO SPREAD HATEFUL AND RACIST IDEOLOGY IN THE UNITED STATES? The Internet is probably
Protection from Harassment Bill
Protection from Harassment Bill Bill No. 12/2014. Read the first time on 3rd March 2014. PROTECTION FROM HARASSMENT ACT 2014 (No. of 2014) Section ARRANGEMENT OF SECTIONS PART I PRELIMINARY 1. Short title
Asia Pacific Legislative Analysis: Current and Pending Online Safety and Cybercrime Laws. A Study by Microsoft.
Asia Pacific Legislative Analysis: Current and Pending Online Safety and Cybercrime Laws. A Study by Microsoft. Table of Contents Legislative Gap Analysis Internet on Safety, Security and Privacy SECTION
ACT. [Long title substituted by s. 27 (1) of Act 33 of 2004.]
FINANCIAL INTELLIGENCE CENTRE ACT 38 OF 2001 [ASSENTED TO 28 NOVEMBER 2001] [DATE OF COMMENCEMENT: 1 FEBRUARY 2002] (Unless otherwise indicated) (English text signed by the President) as amended by Protection
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Updated Administration Proposal: Law Enforcement Provisions
Updated Administration Proposal: Law Enforcement Provisions [Changes to existing law are in shown in italics, bold, and strikethrough format] SEC. 101. Prosecuting Organized Crime Groups That Utilize Cyber
TERMS OF SERVICE TELEPORT REQUEST RECEIVERS
TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,
Interpretative Note to Special Recommendation III: Freezing and Confiscating Terrorist Assets
Objectives Interpretative Note to Special Recommendation III: Freezing and Confiscating Terrorist Assets 1. FATF Special Recommendation III consists of two obligations. The first requires jurisdictions
Fraud Act 2006 CHAPTER 35 CONTENTS
Fraud Act 2006 CHAPTER 35 CONTENTS Fraud 1 Fraud 2 Fraud by false representation 3 Fraud by failing to disclose information 4 Fraud by abuse of position 5 Gain and loss 6 Possession etc. of articles for
TERRORISM (PREVENTION) (AMENDMENT) ACT, 2013 EXPLANATORY MEMORANDUM
TERRORISM (PREVENTION) (AMENDMENT) ACT, 2013 EXPLANATORY MEMORANDUM This Act amends the Terrorism (Prevention) Act No. 10, 2011, makes provision for extra-territorial application of the Act and strengthens
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
Comprehensive Study on Cybercrime
Comprehensive Study on Cybercrime Draft February 2013 Front cover photo credits (left to right): istockphoto.com/tomml istockphoto.com/mikewesson istockphoto.com/polygraphus UNITED NATIONS OFFICE ON DRUGS
An Introduction to the UK Anti-Money Laundering Regime. slaughter and may. March 2008
An Introduction to the UK Anti-Money Laundering Regime slaughter and may March 2008 contents 1. Introduction 1 1.1 Money Laundering 1 1.2 The Regulated Sector 1 2. UK Anti-Money Laundering Measures 3 2.1
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
Remote Gambling Bill
Remote Gambling Bill Bill No. 23/2014. Read the first time on 8 September 2014. REMOTE GAMBLING ACT 2014 (No. of 2014) Section ARRANGEMENT OF SECTIONS PART 1 PRELIMINARY 1. Short title and commencement
NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994
NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 [ASSENTED TO 23 NOVEMBER 1994] [DATE OF COMMENCEMENT: 1 JANUARY 1995] (English text signed by the President) as amended by National Strategic Intelligence
Australia s counter-terrorism laws
Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist
