Remote searches in the cloud

Size: px
Start display at page:

Download "Remote searches in the cloud"

Transcription

1 Remote searches in the cloud A comparative perspective Charlotte Conings & Ruben Roex

2 Setting the scene

3 Elements considered

4 Access to the cloud Network search (art. 88ter CCP) What? Expanding initial search in information system Special access of person entitled to use initial system Interesting data can be seized, deleted, access blocked

5 Access to the cloud Network search (art. 88ter CCP) On whose authority? Investigating judge

6 Access to the cloud Network search (art. 88ter CCP) Conditions? Lawful initial search Necessary to reveal truth Other measures disproportionate OR Risk losing evidence

7 Access to the cloud Network search (art. 125j CCP) What? Expanding initial search Right to access by person using initially searched place Interesting data can be seized, deleted, access blocked

8 Access to the cloud Network search (art. 125j CCP) On whose authority? Depending upon initial search (Police Public Prosecutor Examining Magistrate)

9 Access to the cloud Network search (art. 125j CCP) Conditions? Lawful initial search Reasons to believe relevant data will be found Necessary to reveal truth

10 Access to the cloud Powers of search and seizure (s. 20 PACE) What? Extension of powers of seizure to computerised information Any information stored in electronic form can be taken away Interesting data can be seized in an intelligible form

11 Access to the cloud Powers of search and seizure (s. 20 PACE) On whose authority? Depending on the context of search & seizure Warrant: Justice of the Peace After arrest: senior police officer

12 Access to the cloud Powers of search and seizure (s. 20 PACE) Conditions? Lawful authority to search and seize Accessibility from premises

13 Access across borders Principle: International cooperation (+ art. 32 CC) Exception: Unilateral search (pragmatic) Unintended search abroad/competent state unknown/need to secure evidence Data can only be copied Notification authorities of state concerned (if reasonably identifiable)

14 Access across borders Currently Principle: Network search limited to Dutch territory International cooperation (+ art. 32 CC) Exception: Acting in good faith

15 Access across borders Future Principle: International cooperation (+art. 32 CC) Exception: Unilateral search Securing evidence and blocking access to data Concerned state unknown Concerned state known if necessary

16 Access across borders Principle: International cooperation (+ art. 32 CC) Exception: Unilateral search Passive observer Location data unknown

17 Order to decrypt Order to provide information (art. 88quater, 1 CCP) Who? What? Persons with special knowledge IT-system or service to secure or encrypt data Functioning IT-system Possibilities to obtain access Refusing to cooperate = offence

18 Order to decrypt Order to act (art. 88quater, 2 CCP) Who? Any qualified person, except suspect & certain family members What? Operate IT-system Search, make available, copy, render inaccessible, remove relevant data Refusing to cooperate = offence

19 Order to decrypt Currently (art. 125k CCP) Who? Persons with special knowledge security measures Except suspect, certain family members, holders of professional secrecy What? Provide information or access

20 Order to decrypt Future (proposed art. 125k, 4 CCP) Who? Suspect of terrorism or offences concerning child pornography by profession or custom On whose authority? Public Prosecutor with authorisation of examining magistrate Refusing to cooperate = offence

21 Order to decrypt Notices requiring disclosure (ss RIPA) Who? Authorised personnel (e.g. police officers with a valid seizure warrant under) Order can be given to anyone who has the key (exceptions in corporate settings) What? The key(s) or the decrypted information itself (exceptions in section 51 RIPA) Refusing to cooperate = offence

22 Searching secretly Network search (art. 88ter CCP) Provision is unclear + Duty to inform Doctrine: discussion going on Preparatory documents: Hacking by government as new, secret investigating measure is prohibited

23 Searching secretly Sneak and peek (art. 46quinquies & 89ter CCP) Evolutionary interpretation Not used in practice Clear, detailed legal base as required by ECHR?

24 Searching secretly Currently No specific provision Evolutionary interpretation sneak and peek?

25 Searching secretly Future (proposed art. 125ja CCP) Secretly accessing using technical tool Suspect of criminal act possibly entailing pre-trial detention + serious breach of legal order Order Public Prosecutor + authorisation Examining Magistrate Max. 4 weeks (renewable)

26 Searching secretly Not possible using powers of search and seizure Only possible under special powers granted by RIPA (interception and surveillance)

27 Overview Yes Yes Yes? Yes Today: no Future: yes Today: No Future: Yes Today: No Future: yes Yes Yes Yes No

28 Thank you

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

A BILL for AN ACT. Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour

A BILL for AN ACT. Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour A BILL for AN ACT to provide for the prevention of volatile substance abuse and the protection of individuals and communities from

More information

(b) Why do you believe that those documents relate to a matter relevant to the investigation?

(b) Why do you believe that those documents relate to a matter relevant to the investigation? APPLICATION FOR SEARCH WARRANT (Criminal Procedure Rules, rule 47.31; section 2, Criminal Justice Act 1987) Use this form ONLY for an application for a search warrant under section 2 of the Criminal Justice

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

Federal Act on Combating Money Laundering and Terrorist Financing in the Financial Sector 1

Federal Act on Combating Money Laundering and Terrorist Financing in the Financial Sector 1 English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on Combating Money Laundering and Terrorist

More information

COMMISSION RECOMMENDATION. of XXX. on the right to legal aid for suspects or accused persons in criminal proceedings

COMMISSION RECOMMENDATION. of XXX. on the right to legal aid for suspects or accused persons in criminal proceedings EUROPEAN COMMISSION Brussels, XXX C(2013) 8179/2 COMMISSION RECOMMENDATION of XXX on the right to legal aid for suspects or accused persons in criminal proceedings EN EN COMMISSION RECOMMENDATION of XXX

More information

Interception of Communications Code of Practice. Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000

Interception of Communications Code of Practice. Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000 Interception of Communications Code of Practice Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000 Draft for public consultation February 2015 Contents Contents... 2 1. General...

More information

Online Research and Investigation

Online Research and Investigation Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law

More information

Criminal Justice (Scotland) Bill [AS INTRODUCED]

Criminal Justice (Scotland) Bill [AS INTRODUCED] Criminal Justice (Scotland) Bill [AS INTRODUCED] CONTENTS Section PART 1 ARREST AND CUSTODY CHAPTER 1 ARREST BY POLICE 1 Power of a constable 2 Exercise of the power Arrest without warrant Procedure following

More information

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT S 65/00 REVISED EDITION 2007 B.L.R.O. 3/2007 CAP. 194] LAWS OF BRUNEI Computer Misuse [2007 Ed. p. 1 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 194 COMPUTER

More information

ALLERDALE BOROUGH COUNCIL SECTION. FOOD HYGIENE POLICY & PROCEDURES

ALLERDALE BOROUGH COUNCIL SECTION. FOOD HYGIENE POLICY & PROCEDURES ALLERDALE BOROUGH COUNCIL SECTION. FOOD HYGIENE POLICY & PROCEDURES PAGE Food Safety Enforcement Policy Revision No: 0 Date: January 2002 Authorised Signature: FHP... 1. Purpose This document establishes

More information

Protection of Freedoms Bill

Protection of Freedoms Bill EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 146 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Secretary Theresa May has made the following statement

More information

3. In Baker v. Campbell (1983) 153 CLR 52 the question posed in the case stated was:-

3. In Baker v. Campbell (1983) 153 CLR 52 the question posed in the case stated was:- GENERAL GUIDELINES BETWEEN THE AUSTRALIAN FEDERAL POLICE AND THE LAW COUNCIL OF AUSTRALIA AS TO THE EXECUTION OF SEARCH WARRANTS ON LAWYERS' PREMISES, LAW SOCIETIES AND LIKE INSTITUTIONS IN CIRCUMSTANCES

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]

More information

Council Tax Reduction Anti-Fraud Policy

Council Tax Reduction Anti-Fraud Policy Council Tax Reduction Anti-Fraud Policy Richard Davies Head of Revenues and Benefits, Torfaen Head of Benefits, Monmouthshire April 2015 1 Contents Section 1. 3 Background 3 Legislation and Governance

More information

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION 6 March 2014 1 Good practice guidelines for insurance investigation Table of contents 1 Purpose of insurance investigation... 2 2 Investigating staff...

More information

COMPUTER MISUSE AND CYBERCRIME ACT

COMPUTER MISUSE AND CYBERCRIME ACT COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

ACT. [Long title substituted by s. 27 (1) of Act 33 of 2004.]

ACT. [Long title substituted by s. 27 (1) of Act 33 of 2004.] FINANCIAL INTELLIGENCE CENTRE ACT 38 OF 2001 [ASSENTED TO 28 NOVEMBER 2001] [DATE OF COMMENCEMENT: 1 FEBRUARY 2002] (Unless otherwise indicated) (English text signed by the President) as amended by Protection

More information

Naime Ahmeti A DEFENDANT RIGHTS OF THE DEFENDANT IN CRIMINAL PROCEEDINGS

Naime Ahmeti A DEFENDANT RIGHTS OF THE DEFENDANT IN CRIMINAL PROCEEDINGS Naime Ahmeti A DEFENDANT RIGHTS OF THE DEFENDANT IN CRIMINAL PROCEEDINGS ABSTRACT Rights of the defendant in criminal proceedings are guaranteed by the Constitution and the Criminal Procedure Code of Kosovo,

More information

ACPO Good Practice Guide ACPO Good Practice Guide March 2012

ACPO Good Practice Guide ACPO Good Practice Guide March 2012 ACPO Good Practice Guide for Digital Evidence March 2012 ACPO Good Practice Guide for Digital Evidence The Association of Chief Police Officers have agreed to this revised good practice guide being circulated

More information

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised

More information

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION 28.6.2012 1 GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION Table of contents 1 Purpose of insurance investigation... 2 2 Investigating staff...

More information

4.2 The Scope Order is made under the power in s 4(2)(e) of the Act.

4.2 The Scope Order is made under the power in s 4(2)(e) of the Act. EXPLANATORY MEMORANDUM TO THE COMPENSATION (REGULATED CLAIMS MANAGEMENT SERVICES) ORDER 2006 THE COMPENSATION (SPECIFICATION OF BENEFITS) ORDER 2006 THE COMPENSATION (CLAIMS MANAGEMENT SERVICES) REGULATIONS

More information

Hessisches Ministerium der Justiz, für Integration und Europa. Folie # 1

Hessisches Ministerium der Justiz, für Integration und Europa. Folie # 1 Electronic Monitoring in Hesse: Past, Present and Future 7th Conference on Electronic Monitoring in Europe Folie # 1 Electronic Monitoring in Hesse so far Folie # 2 Electronic Monitoring implemented in

More information

Telecommunications (Interception and Access) Act 1979. Annual Report 2012-13

Telecommunications (Interception and Access) Act 1979. Annual Report 2012-13 Telecommunications (Interception and Access) Act 979 Annual Report 0 ISBN 9789806 Commonwealth of Australia 0 All material presented in this publication is provided under a Creative Commons Attribution.0

More information

Accessing electronically stored evidence of child exploitation material offences

Accessing electronically stored evidence of child exploitation material offences October 2015 Accessing electronically stored evidence of child exploitation material offences An examination of the legislative limitations of section 154 of the Police Powers and Responsibilities Act

More information

TAIWAN. Edgar Y. CHEN. Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN

TAIWAN. Edgar Y. CHEN. Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN TAIWAN Edgar Y. CHEN Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN Phone: G 88-2-27814111 or 66386999 Fax : G 886-2-27213834 or 27315581 Email: G [email protected] 1 1

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information

PROCEDURE Street Bail. Number: E 0205 Date Published: 13 July 2011

PROCEDURE Street Bail. Number: E 0205 Date Published: 13 July 2011 1.0 About this Procedure This procedure details the process officers must follow concerning the use of the provisions contained within 30A to 30D of Police and Criminal Evidence Act 1984 in relation to

More information

Liquor Control (Supply and Consumption) Bill

Liquor Control (Supply and Consumption) Bill Liquor Control (Supply and Consumption) Bill Bill No. 1/2015. Read the first time on 19 January 2015. LIQUOR CONTROL (SUPPLY AND CONSUMPTION) ACT 2015 (No. of 2015) Section ARRANGEMENT OF SECTIONS PART

More information

Court Record Access Policy

Court Record Access Policy SUPREME COURT OF BRITISH COLUMBIA Court Record Access Policy The Supreme Court of British Columbia 800 Smithe Street Vancouver, BC V6Z 2E1 www.courts.gov.bc.ca Page 1 of 39 TABLE OF CONTENTS PART I: GENERAL

More information

(Legislative acts) DIRECTIVES

(Legislative acts) DIRECTIVES 6.11.2013 Official Journal of the European Union L 294/1 I (Legislative acts) DIRECTIVES DIRECTIVE 2013/48/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 22 October 2013 on the right of access to

More information

Australia s counter-terrorism laws

Australia s counter-terrorism laws Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist

More information

THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY

THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY Clause. 1. Interpretation. PART II - CONTROL OF INTERCEPTION AND ESTABLISHMENT OF A MONITORING CENTRE

More information

The Credit Reporting Act

The Credit Reporting Act 1 CREDIT REPORTING c. C-43.2 The Credit Reporting Act being Chapter C-43.2 of The Statutes of Saskatchewan, 2004 (effective March 1, 2005). NOTE: This consolidation is not official. Amendments have been

More information

Federal Criminal Court

Federal Criminal Court No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled

More information

Computer Crimes Act 1997. An Act to provide for offences relating to the misuse of computers.

Computer Crimes Act 1997. An Act to provide for offences relating to the misuse of computers. Computer Crimes Act 1997 An Act to provide for offences relating to the misuse of computers. BE IT ENACTED by the Seri Paduka Baginda Yang di-pertuan Agong with the advice and consent of the Dewan Negara

More information

Police community support officer powers

Police community support officer powers Police community support officer powers LIST OF STANDARD POWERS Power Power to issue fixed penalty notices for cycling on a footpath: Power of a constable in uniform to give a person a fixed penalty notice

More information

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as

More information

LAW ON MUTUAL ASSISTANCE IN CRIMINAL MATTERS

LAW ON MUTUAL ASSISTANCE IN CRIMINAL MATTERS LAW ON MUTUAL ASSISTANCE IN CRIMINAL MATTERS I GENERAL PROVISIONS Subject and Application of the Law Article 1 This Law shall govern mutual assistance in criminal matters (hereinafter: mutual assistance)

More information

Searching, screening and confiscation. Advice for headteachers, school staff and governing bodies

Searching, screening and confiscation. Advice for headteachers, school staff and governing bodies Searching, screening and confiscation Advice for headteachers, school staff and governing bodies February 2014 Contents Summary 3 About this departmental advice 3 Expiry or review date 3 Who is this advice

More information

This chapter will focus on your right to a lawyer, the different ways to get a lawyer, and what you should expect from your lawyer.

This chapter will focus on your right to a lawyer, the different ways to get a lawyer, and what you should expect from your lawyer. Chapter 3: Getting a Lawyer This chapter will focus on your right to a lawyer, the different ways to get a lawyer, and what you should expect from your lawyer. It is always best to get a lawyer. Other

More information

From: Head of Prison Administration Department, Legislation and International Relations Research Office, Ministry of Justice

From: Head of Prison Administration Department, Legislation and International Relations Research Office, Ministry of Justice Translation of letter Undated From: Head of Prison Administration Department, Legislation and International Relations Research Office, Ministry of Justice To: DG JUST B.1 Ref: US-INT--2-4/4 Subject: Strengthening

More information

NOTICE OF THE POWERS TO SEARCH PREMISES AND OF THE RIGHTS OF OCCUPIERS UNDER SECTION 194 OF THE ENTERPRISE ACT 2002 ( THE ACT )

NOTICE OF THE POWERS TO SEARCH PREMISES AND OF THE RIGHTS OF OCCUPIERS UNDER SECTION 194 OF THE ENTERPRISE ACT 2002 ( THE ACT ) NOTICE OF THE POWERS TO SEARCH PREMISES AND OF THE RIGHTS OF OCCUPIERS UNDER SECTION 194 OF THE ENTERPRISE ACT 2002 ( THE ACT ) Subject matter and powers [In this notice, references to an officer or officers

More information

journalists assistance to foreign in connection with major events in Denmark

journalists assistance to foreign in connection with major events in Denmark journalists assistance to foreign in connection with major events in Denmark 1 Assistance to foreign journalists in connection with major events in Denmark In 2008 Denmark was ranked as number one in the

More information

REPLIES TO THE QUESTIONNAIRE ON PROTECTION OF WITNESSES AND PENTITI IN RELATION TO ACTS OF TERRORISM POLAND

REPLIES TO THE QUESTIONNAIRE ON PROTECTION OF WITNESSES AND PENTITI IN RELATION TO ACTS OF TERRORISM POLAND REPLIES TO THE QUESTIONNAIRE ON PROTECTION OF WITNESSES AND PENTITI IN RELATION TO ACTS OF TERRORISM POLAND a. General Information 1. Please describe the framework (legal provisions and established practice)

More information

What Victims of Crime Should Know About

What Victims of Crime Should Know About What Victims of Crime Should Know About Not Criminally Responsible Accused Public Legal Education and Information Service of New Brunswick (PLEIS-NB) is a non-profit organization. Its goal is to provide

More information

MARINE MAMMAL PROTECTION [CH.244A 1 CHAPTER 244A MARINE MAMMAL PROTECTION ARRANGEMENT OF SECTIONS

MARINE MAMMAL PROTECTION [CH.244A 1 CHAPTER 244A MARINE MAMMAL PROTECTION ARRANGEMENT OF SECTIONS [CH.244A 1 CHAPTER 244A LIST OF AUTHORISED PAGES 1-12 LRO 1/2008 SECTION ARRANGEMENT OF SECTIONS 1. Short title. 2. Interpretation. 3. Prohibits import, etc. without a permit or licence. 4. Prohibits taking,

More information

Act on Background Checks

Act on Background Checks NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION. v. Case No :09-00157-01,03,05/08-CR-W-SOW

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION. v. Case No :09-00157-01,03,05/08-CR-W-SOW IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION UNITED STATES OF AMERICA, Plaintiff, v. Case No :09-00157-01,03,05/08-CR-W-SOW GARLAND HANKINS, STACEY M. WALKER,

More information

Report of the Strategic Meeting on Cybercrime

Report of the Strategic Meeting on Cybercrime Report of the Strategic Meeting on Cybercrime 19-20 November 2014 Task Force on Cybercrime 07 April 2015 FINAL Table of Contents 1. Introduction... 2 2. Presentations... 2 2.1. Transborder access to data

More information

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks Volume 22, No. 1 September 2012 Criminal Justice Section Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks A case comment on R. v. Spencer and R. v. Trapp Brock Jones 1 A. Peer-to-Peer

More information

Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000

Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Act No. 3 of 2000 Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Section TABLE OF PROVISIONS PART 1 PRELIMINARY Page 1 Short title.....................................................

More information

ESSENTIAL ACCIDENT & FATALITY STRATEGY

ESSENTIAL ACCIDENT & FATALITY STRATEGY WORK AT HEIGHT ESSENTIAL ACCIDENT & FATALITY STRATEGY ACCIDENT AND FATALITY STRATEGY No matter how well something is planned, accidents can happen, and when they do people often react to a situation on

More information

SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF)

SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF) 1 SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF) A. GENERALITIES Purpose of the Rules 1 The Self-Regulation Rules, enacted by the Association romande des intermédiaires

More information

Defendants charged with serious violent and sexual offences (including murder)

Defendants charged with serious violent and sexual offences (including murder) Bail Amendment Bill Q+A Defendants charged with serious violent and sexual offences (including murder) How is the Government changing bail rules for defendants charged murder? The Government thinks that

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA. (as amended by Federal Law of 25.11.2009 No.266-FZ) Chapter 1.

27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA. (as amended by Federal Law of 25.11.2009 No.266-FZ) Chapter 1. 27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA (as amended by Federal Law of 25.11.2009 No.266-FZ) Article 1. Scope of This Federal Law Chapter 1. GENERAL Adopted by The State Duma

More information

Mental Health Act 2000. Brief guide to the Act

Mental Health Act 2000. Brief guide to the Act Mental Health Act 2000 Brief guide to the Act Overview Purpose This brief guide to the Act provides a quick reference to the main provisions and processes under the mental health legislation. It has been

More information

THE COMPUTER MISUSE AND CYBERCRIME ACT 2003. I assent ------------- ARRANGEMENT OF SECTIONS

THE COMPUTER MISUSE AND CYBERCRIME ACT 2003. I assent ------------- ARRANGEMENT OF SECTIONS 1 Act No. 22 of 2003 THE COMPUTER MISUSE AND CYBERCRIME ACT 2003 I assent 30 July 2003 KARL AUGUSTE OFFMANN President of the Republic Section ------------- ARRANGEMENT OF SECTIONS PART I - PRELIMINARY

More information

SOUTH AFRICAN POLICE SERVICE ACT 68 OF 1995

SOUTH AFRICAN POLICE SERVICE ACT 68 OF 1995 Legislation updated to: 28 September 2012 SOUTH AFRICAN POLICE SERVICE ACT 68 OF 1995 [ASSENTED TO 28 SEPTEMBER 1995] [DATE OF COMMENCEMENT: 15 OCTOBER 1995] (Afrikaans text signed by the President) as

More information

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue shoplifting Guidance for police in England and Wales First publication: June 2014 1 Introduction 1.

More information

Justice and Other Information Disclosure Bill 2008

Justice and Other Information Disclosure Bill 2008 Justice and Other Information Disclosure Bill 2008 Explanatory Notes Objectives of the Bill To provide a statutory basis for the sharing of criminal justice information between the Department of Justice

More information

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME 1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL

More information

Police Officers who Commit Domestic Violence-Related Criminal Offences 1

Police Officers who Commit Domestic Violence-Related Criminal Offences 1 PUBLIC DOCUMENT Association of Chief Police Officers of England, Wales and Northern Ireland Police Officers who Commit Domestic Violence-Related Criminal Offences 1 This is an ACPO policy relating to police

More information

have to appear before the Youth Justice Court *, or

have to appear before the Youth Justice Court *, or Chapter 3: Lawyers Part 1: The right to a lawyer 1. When do I need a lawyer? You should talk to a lawyer whenever you: are charged* with breaking the law, are arrested or detained by the police, have to

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

CZECH REPUBLIC. Richard BACEK. Siemens, s.r.o. Phone: + 420 233 031 354. Email: [email protected]

CZECH REPUBLIC. Richard BACEK. Siemens, s.r.o. Phone: + 420 233 031 354. Email: richard.bacek@siemens.com CZECH REPUBLIC Richard BACEK Siemens, s.r.o. Phone: + 420 233 031 354 Email: [email protected] 1. DEFINITION PRESENTATION What attorney-client privilege is and what it is not? An attorney at law

More information

COMPUTER FORENSIC EXAMINER~E SAFETY HIGH TECH CRIME UNIT CRIME & JUSTICE COMMAND

COMPUTER FORENSIC EXAMINER~E SAFETY HIGH TECH CRIME UNIT CRIME & JUSTICE COMMAND COMPUTER FORENSIC EXAMINER~E SAFETY HIGH TECH CRIME UNIT CRIME & JUSTICE COMMAND Ref 132/14 Location: Chester le Street Police Office Salary: Lower Grade Scale 5-21,309 to 23,277 Higher Grade Scale 6-24,036

More information

Canadian Nuclear Security Law. Stanley D. Berger Partner, Fogler, Rubinoff LLP Jacques Lavoie, Canadian Nuclear Safety Commission May 1, 2014

Canadian Nuclear Security Law. Stanley D. Berger Partner, Fogler, Rubinoff LLP Jacques Lavoie, Canadian Nuclear Safety Commission May 1, 2014 Canadian Nuclear Security Law Stanley D. Berger Partner, Fogler, Rubinoff LLP Jacques Lavoie, Canadian Nuclear Safety Commission May 1, 2014 Key Acts And Regulations i) Licensees Obligations Nuclear Safety

More information

Casino, Liquor and Gaming Control Authority Act 2007 No 91

Casino, Liquor and Gaming Control Authority Act 2007 No 91 New South Wales Casino, Liquor and Gaming Control Authority Act 2007 No 91 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Definitions 2 4 Meaning of gaming and liquor legislation

More information

Avoid the 5 Biggest Criminal Defense Pitfalls Presented by: The Volk & McElroy Law Firm

Avoid the 5 Biggest Criminal Defense Pitfalls Presented by: The Volk & McElroy Law Firm Avoid the 5 Biggest Criminal Defense Pitfalls Presented by: The Volk & McElroy Law Firm PITFALL #1: Talking to Police without a Lawyer present Most defendants think cooperating with police is a good thing.

More information

Guide to compensation claims against the police

Guide to compensation claims against the police Tel: 020 8492 2290 I N C O R P O R A T I N G D O N A L D G A L B R A I T H & C O Guide to compensation claims against the police This guide is designed to provide a general overview to bringing compensation

More information

NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994

NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 [ASSENTED TO 23 NOVEMBER 1994] [DATE OF COMMENCEMENT: 1 JANUARY 1995] (English text signed by the President) as amended by National Strategic Intelligence

More information

TOP SECRET STRAP2 UK EYES ONLY

TOP SECRET STRAP2 UK EYES ONLY Sian MacLeod From: Date: 13 June 2008 GCHQ Reference: A/9014/9105/55 Mariot Leslie Foreign Secretary ISA-94: APPLICATION FOR RENEWAL OF WARRANT GPW/1160 IN RESPECT OF ACTIVITIES WHICH INVOLVE THE MODIFICATION

More information

The Electronic Transactions Law Chapter I Title and Definition

The Electronic Transactions Law Chapter I Title and Definition The Union of Myanmar The State Peace and Development Council The Electronic Transactions Law ( The State Peace and Development Council Law No. 5/2004 ) The 12th Waxing of Kason 1366 M.E. (30th April, 2004)

More information

An Bille um Cheartas Coiriúil (Cionta a bhaineann le Córais Faisnéise), 2016 Criminal Justice (Offences Relating to Information Systems) Bill 2016

An Bille um Cheartas Coiriúil (Cionta a bhaineann le Córais Faisnéise), 2016 Criminal Justice (Offences Relating to Information Systems) Bill 2016 An Bille um Cheartas Coiriúil (Cionta a bhaineann le Córais Faisnéise), 16 Criminal Justice (Offences Relating to Information Systems) Bill 16 Mar a tionscnaíodh As initiated [No. of 16] AN BILLE UM CHEARTAS

More information

Brief Overview of the Family Violence Protection Act 2008

Brief Overview of the Family Violence Protection Act 2008 Brief Overview of the Family Violence Protection Act 2008 Last updated: 5 January 2011 Table of contents Scope of document 1 Substantive Law 1 1. Separates family violence and stalking matters 1 2. Preamble

More information

DUI (Driving Under the Influence)

DUI (Driving Under the Influence) DUI (Driving Under the Influence) Driving Under the Influence (DUI) In Illinois, a person is considered to be driving under the influence when: The driver has an alcohol concentration on the breath of.08

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department

More information

Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States

Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States Cloud computing is one of the Internet s great innovations, enabling individuals

More information

New South Wales. 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness?

New South Wales. 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness? New South Wales Page 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness? 5 Witness protection program 5 6 Inclusion in the witness protection program 5 7 Assessing witness for inclusion in witness

More information

In Re Boucher United States District Court for the District of Vermont 2007 WL 4246473 (Nov. 29, 2009)

In Re Boucher United States District Court for the District of Vermont 2007 WL 4246473 (Nov. 29, 2009) In Re Boucher United States District Court for the District of Vermont 2007 WL 4246473 (Nov. 29, 2009) JEROME J. NIEDERMEIER, United States Magistrate Judge. On December 17, 2006, defendant Sebastien Boucher

More information

technical factsheet 176

technical factsheet 176 technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection

More information

London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY

London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets

More information

CYBERSECURITY BILL, 2011

CYBERSECURITY BILL, 2011 CYBERSECURITY BILL, 2011 Page 1 of 19 CYBERSECURITY BILL, 2011 ARRANGEMENT OF SECTIONS Sections PART I - GENERAL PROVISIONS 1 Objects and scope PART II OFFENCES AND PENALTIES 2. Unlawful access to a computer

More information