Remote searches in the cloud
|
|
|
- Shana Gordon
- 10 years ago
- Views:
Transcription
1 Remote searches in the cloud A comparative perspective Charlotte Conings & Ruben Roex
2 Setting the scene
3 Elements considered
4 Access to the cloud Network search (art. 88ter CCP) What? Expanding initial search in information system Special access of person entitled to use initial system Interesting data can be seized, deleted, access blocked
5 Access to the cloud Network search (art. 88ter CCP) On whose authority? Investigating judge
6 Access to the cloud Network search (art. 88ter CCP) Conditions? Lawful initial search Necessary to reveal truth Other measures disproportionate OR Risk losing evidence
7 Access to the cloud Network search (art. 125j CCP) What? Expanding initial search Right to access by person using initially searched place Interesting data can be seized, deleted, access blocked
8 Access to the cloud Network search (art. 125j CCP) On whose authority? Depending upon initial search (Police Public Prosecutor Examining Magistrate)
9 Access to the cloud Network search (art. 125j CCP) Conditions? Lawful initial search Reasons to believe relevant data will be found Necessary to reveal truth
10 Access to the cloud Powers of search and seizure (s. 20 PACE) What? Extension of powers of seizure to computerised information Any information stored in electronic form can be taken away Interesting data can be seized in an intelligible form
11 Access to the cloud Powers of search and seizure (s. 20 PACE) On whose authority? Depending on the context of search & seizure Warrant: Justice of the Peace After arrest: senior police officer
12 Access to the cloud Powers of search and seizure (s. 20 PACE) Conditions? Lawful authority to search and seize Accessibility from premises
13 Access across borders Principle: International cooperation (+ art. 32 CC) Exception: Unilateral search (pragmatic) Unintended search abroad/competent state unknown/need to secure evidence Data can only be copied Notification authorities of state concerned (if reasonably identifiable)
14 Access across borders Currently Principle: Network search limited to Dutch territory International cooperation (+ art. 32 CC) Exception: Acting in good faith
15 Access across borders Future Principle: International cooperation (+art. 32 CC) Exception: Unilateral search Securing evidence and blocking access to data Concerned state unknown Concerned state known if necessary
16 Access across borders Principle: International cooperation (+ art. 32 CC) Exception: Unilateral search Passive observer Location data unknown
17 Order to decrypt Order to provide information (art. 88quater, 1 CCP) Who? What? Persons with special knowledge IT-system or service to secure or encrypt data Functioning IT-system Possibilities to obtain access Refusing to cooperate = offence
18 Order to decrypt Order to act (art. 88quater, 2 CCP) Who? Any qualified person, except suspect & certain family members What? Operate IT-system Search, make available, copy, render inaccessible, remove relevant data Refusing to cooperate = offence
19 Order to decrypt Currently (art. 125k CCP) Who? Persons with special knowledge security measures Except suspect, certain family members, holders of professional secrecy What? Provide information or access
20 Order to decrypt Future (proposed art. 125k, 4 CCP) Who? Suspect of terrorism or offences concerning child pornography by profession or custom On whose authority? Public Prosecutor with authorisation of examining magistrate Refusing to cooperate = offence
21 Order to decrypt Notices requiring disclosure (ss RIPA) Who? Authorised personnel (e.g. police officers with a valid seizure warrant under) Order can be given to anyone who has the key (exceptions in corporate settings) What? The key(s) or the decrypted information itself (exceptions in section 51 RIPA) Refusing to cooperate = offence
22 Searching secretly Network search (art. 88ter CCP) Provision is unclear + Duty to inform Doctrine: discussion going on Preparatory documents: Hacking by government as new, secret investigating measure is prohibited
23 Searching secretly Sneak and peek (art. 46quinquies & 89ter CCP) Evolutionary interpretation Not used in practice Clear, detailed legal base as required by ECHR?
24 Searching secretly Currently No specific provision Evolutionary interpretation sneak and peek?
25 Searching secretly Future (proposed art. 125ja CCP) Secretly accessing using technical tool Suspect of criminal act possibly entailing pre-trial detention + serious breach of legal order Order Public Prosecutor + authorisation Examining Magistrate Max. 4 weeks (renewable)
26 Searching secretly Not possible using powers of search and seizure Only possible under special powers granted by RIPA (interception and surveillance)
27 Overview Yes Yes Yes? Yes Today: no Future: yes Today: No Future: Yes Today: No Future: yes Yes Yes Yes No
28 Thank you
CHAPTER 124B COMPUTER MISUSE
1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
A BILL for AN ACT. Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour
Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour A BILL for AN ACT to provide for the prevention of volatile substance abuse and the protection of individuals and communities from
(b) Why do you believe that those documents relate to a matter relevant to the investigation?
APPLICATION FOR SEARCH WARRANT (Criminal Procedure Rules, rule 47.31; section 2, Criminal Justice Act 1987) Use this form ONLY for an application for a search warrant under section 2 of the Criminal Justice
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
Federal Act on Combating Money Laundering and Terrorist Financing in the Financial Sector 1
English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on Combating Money Laundering and Terrorist
COMMISSION RECOMMENDATION. of XXX. on the right to legal aid for suspects or accused persons in criminal proceedings
EUROPEAN COMMISSION Brussels, XXX C(2013) 8179/2 COMMISSION RECOMMENDATION of XXX on the right to legal aid for suspects or accused persons in criminal proceedings EN EN COMMISSION RECOMMENDATION of XXX
Interception of Communications Code of Practice. Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000
Interception of Communications Code of Practice Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000 Draft for public consultation February 2015 Contents Contents... 2 1. General...
Online Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
Criminal Justice (Scotland) Bill [AS INTRODUCED]
Criminal Justice (Scotland) Bill [AS INTRODUCED] CONTENTS Section PART 1 ARREST AND CUSTODY CHAPTER 1 ARREST BY POLICE 1 Power of a constable 2 Exercise of the power Arrest without warrant Procedure following
LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT
LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT S 65/00 REVISED EDITION 2007 B.L.R.O. 3/2007 CAP. 194] LAWS OF BRUNEI Computer Misuse [2007 Ed. p. 1 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 194 COMPUTER
ALLERDALE BOROUGH COUNCIL SECTION. FOOD HYGIENE POLICY & PROCEDURES
ALLERDALE BOROUGH COUNCIL SECTION. FOOD HYGIENE POLICY & PROCEDURES PAGE Food Safety Enforcement Policy Revision No: 0 Date: January 2002 Authorised Signature: FHP... 1. Purpose This document establishes
Protection of Freedoms Bill
EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, are published separately as Bill 146 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Secretary Theresa May has made the following statement
3. In Baker v. Campbell (1983) 153 CLR 52 the question posed in the case stated was:-
GENERAL GUIDELINES BETWEEN THE AUSTRALIAN FEDERAL POLICE AND THE LAW COUNCIL OF AUSTRALIA AS TO THE EXECUTION OF SEARCH WARRANTS ON LAWYERS' PREMISES, LAW SOCIETIES AND LIKE INSTITUTIONS IN CIRCUMSTANCES
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]
Council Tax Reduction Anti-Fraud Policy
Council Tax Reduction Anti-Fraud Policy Richard Davies Head of Revenues and Benefits, Torfaen Head of Benefits, Monmouthshire April 2015 1 Contents Section 1. 3 Background 3 Legislation and Governance
GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION
GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION 6 March 2014 1 Good practice guidelines for insurance investigation Table of contents 1 Purpose of insurance investigation... 2 2 Investigating staff...
COMPUTER MISUSE AND CYBERCRIME ACT
COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
ACT. [Long title substituted by s. 27 (1) of Act 33 of 2004.]
FINANCIAL INTELLIGENCE CENTRE ACT 38 OF 2001 [ASSENTED TO 28 NOVEMBER 2001] [DATE OF COMMENCEMENT: 1 FEBRUARY 2002] (Unless otherwise indicated) (English text signed by the President) as amended by Protection
Naime Ahmeti A DEFENDANT RIGHTS OF THE DEFENDANT IN CRIMINAL PROCEEDINGS
Naime Ahmeti A DEFENDANT RIGHTS OF THE DEFENDANT IN CRIMINAL PROCEEDINGS ABSTRACT Rights of the defendant in criminal proceedings are guaranteed by the Constitution and the Criminal Procedure Code of Kosovo,
ACPO Good Practice Guide ACPO Good Practice Guide March 2012
ACPO Good Practice Guide for Digital Evidence March 2012 ACPO Good Practice Guide for Digital Evidence The Association of Chief Police Officers have agreed to this revised good practice guide being circulated
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised
GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION
GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION 28.6.2012 1 GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION Table of contents 1 Purpose of insurance investigation... 2 2 Investigating staff...
4.2 The Scope Order is made under the power in s 4(2)(e) of the Act.
EXPLANATORY MEMORANDUM TO THE COMPENSATION (REGULATED CLAIMS MANAGEMENT SERVICES) ORDER 2006 THE COMPENSATION (SPECIFICATION OF BENEFITS) ORDER 2006 THE COMPENSATION (CLAIMS MANAGEMENT SERVICES) REGULATIONS
Hessisches Ministerium der Justiz, für Integration und Europa. Folie # 1
Electronic Monitoring in Hesse: Past, Present and Future 7th Conference on Electronic Monitoring in Europe Folie # 1 Electronic Monitoring in Hesse so far Folie # 2 Electronic Monitoring implemented in
Telecommunications (Interception and Access) Act 1979. Annual Report 2012-13
Telecommunications (Interception and Access) Act 979 Annual Report 0 ISBN 9789806 Commonwealth of Australia 0 All material presented in this publication is provided under a Creative Commons Attribution.0
Accessing electronically stored evidence of child exploitation material offences
October 2015 Accessing electronically stored evidence of child exploitation material offences An examination of the legislative limitations of section 154 of the Police Powers and Responsibilities Act
TAIWAN. Edgar Y. CHEN. Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN
TAIWAN Edgar Y. CHEN Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN Phone: G 88-2-27814111 or 66386999 Fax : G 886-2-27213834 or 27315581 Email: G [email protected] 1 1
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
PROCEDURE Street Bail. Number: E 0205 Date Published: 13 July 2011
1.0 About this Procedure This procedure details the process officers must follow concerning the use of the provisions contained within 30A to 30D of Police and Criminal Evidence Act 1984 in relation to
Liquor Control (Supply and Consumption) Bill
Liquor Control (Supply and Consumption) Bill Bill No. 1/2015. Read the first time on 19 January 2015. LIQUOR CONTROL (SUPPLY AND CONSUMPTION) ACT 2015 (No. of 2015) Section ARRANGEMENT OF SECTIONS PART
Court Record Access Policy
SUPREME COURT OF BRITISH COLUMBIA Court Record Access Policy The Supreme Court of British Columbia 800 Smithe Street Vancouver, BC V6Z 2E1 www.courts.gov.bc.ca Page 1 of 39 TABLE OF CONTENTS PART I: GENERAL
(Legislative acts) DIRECTIVES
6.11.2013 Official Journal of the European Union L 294/1 I (Legislative acts) DIRECTIVES DIRECTIVE 2013/48/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 22 October 2013 on the right of access to
Australia s counter-terrorism laws
Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist
THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY
THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY Clause. 1. Interpretation. PART II - CONTROL OF INTERCEPTION AND ESTABLISHMENT OF A MONITORING CENTRE
The Credit Reporting Act
1 CREDIT REPORTING c. C-43.2 The Credit Reporting Act being Chapter C-43.2 of The Statutes of Saskatchewan, 2004 (effective March 1, 2005). NOTE: This consolidation is not official. Amendments have been
Federal Criminal Court
No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled
Computer Crimes Act 1997. An Act to provide for offences relating to the misuse of computers.
Computer Crimes Act 1997 An Act to provide for offences relating to the misuse of computers. BE IT ENACTED by the Seri Paduka Baginda Yang di-pertuan Agong with the advice and consent of the Dewan Negara
Police community support officer powers
Police community support officer powers LIST OF STANDARD POWERS Power Power to issue fixed penalty notices for cycling on a footpath: Power of a constable in uniform to give a person a fixed penalty notice
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
LAW ON MUTUAL ASSISTANCE IN CRIMINAL MATTERS
LAW ON MUTUAL ASSISTANCE IN CRIMINAL MATTERS I GENERAL PROVISIONS Subject and Application of the Law Article 1 This Law shall govern mutual assistance in criminal matters (hereinafter: mutual assistance)
Searching, screening and confiscation. Advice for headteachers, school staff and governing bodies
Searching, screening and confiscation Advice for headteachers, school staff and governing bodies February 2014 Contents Summary 3 About this departmental advice 3 Expiry or review date 3 Who is this advice
This chapter will focus on your right to a lawyer, the different ways to get a lawyer, and what you should expect from your lawyer.
Chapter 3: Getting a Lawyer This chapter will focus on your right to a lawyer, the different ways to get a lawyer, and what you should expect from your lawyer. It is always best to get a lawyer. Other
From: Head of Prison Administration Department, Legislation and International Relations Research Office, Ministry of Justice
Translation of letter Undated From: Head of Prison Administration Department, Legislation and International Relations Research Office, Ministry of Justice To: DG JUST B.1 Ref: US-INT--2-4/4 Subject: Strengthening
NOTICE OF THE POWERS TO SEARCH PREMISES AND OF THE RIGHTS OF OCCUPIERS UNDER SECTION 194 OF THE ENTERPRISE ACT 2002 ( THE ACT )
NOTICE OF THE POWERS TO SEARCH PREMISES AND OF THE RIGHTS OF OCCUPIERS UNDER SECTION 194 OF THE ENTERPRISE ACT 2002 ( THE ACT ) Subject matter and powers [In this notice, references to an officer or officers
journalists assistance to foreign in connection with major events in Denmark
journalists assistance to foreign in connection with major events in Denmark 1 Assistance to foreign journalists in connection with major events in Denmark In 2008 Denmark was ranked as number one in the
REPLIES TO THE QUESTIONNAIRE ON PROTECTION OF WITNESSES AND PENTITI IN RELATION TO ACTS OF TERRORISM POLAND
REPLIES TO THE QUESTIONNAIRE ON PROTECTION OF WITNESSES AND PENTITI IN RELATION TO ACTS OF TERRORISM POLAND a. General Information 1. Please describe the framework (legal provisions and established practice)
What Victims of Crime Should Know About
What Victims of Crime Should Know About Not Criminally Responsible Accused Public Legal Education and Information Service of New Brunswick (PLEIS-NB) is a non-profit organization. Its goal is to provide
MARINE MAMMAL PROTECTION [CH.244A 1 CHAPTER 244A MARINE MAMMAL PROTECTION ARRANGEMENT OF SECTIONS
[CH.244A 1 CHAPTER 244A LIST OF AUTHORISED PAGES 1-12 LRO 1/2008 SECTION ARRANGEMENT OF SECTIONS 1. Short title. 2. Interpretation. 3. Prohibits import, etc. without a permit or licence. 4. Prohibits taking,
Act on Background Checks
NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which
IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION. v. Case No :09-00157-01,03,05/08-CR-W-SOW
IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION UNITED STATES OF AMERICA, Plaintiff, v. Case No :09-00157-01,03,05/08-CR-W-SOW GARLAND HANKINS, STACEY M. WALKER,
Report of the Strategic Meeting on Cybercrime
Report of the Strategic Meeting on Cybercrime 19-20 November 2014 Task Force on Cybercrime 07 April 2015 FINAL Table of Contents 1. Introduction... 2 2. Presentations... 2 2.1. Transborder access to data
Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks
Volume 22, No. 1 September 2012 Criminal Justice Section Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks A case comment on R. v. Spencer and R. v. Trapp Brock Jones 1 A. Peer-to-Peer
Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000
Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Act No. 3 of 2000 Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000 Section TABLE OF PROVISIONS PART 1 PRELIMINARY Page 1 Short title.....................................................
ESSENTIAL ACCIDENT & FATALITY STRATEGY
WORK AT HEIGHT ESSENTIAL ACCIDENT & FATALITY STRATEGY ACCIDENT AND FATALITY STRATEGY No matter how well something is planned, accidents can happen, and when they do people often react to a situation on
SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF)
1 SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF) A. GENERALITIES Purpose of the Rules 1 The Self-Regulation Rules, enacted by the Association romande des intermédiaires
Defendants charged with serious violent and sexual offences (including murder)
Bail Amendment Bill Q+A Defendants charged with serious violent and sexual offences (including murder) How is the Government changing bail rules for defendants charged murder? The Government thinks that
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA. (as amended by Federal Law of 25.11.2009 No.266-FZ) Chapter 1.
27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA (as amended by Federal Law of 25.11.2009 No.266-FZ) Article 1. Scope of This Federal Law Chapter 1. GENERAL Adopted by The State Duma
Mental Health Act 2000. Brief guide to the Act
Mental Health Act 2000 Brief guide to the Act Overview Purpose This brief guide to the Act provides a quick reference to the main provisions and processes under the mental health legislation. It has been
THE COMPUTER MISUSE AND CYBERCRIME ACT 2003. I assent ------------- ARRANGEMENT OF SECTIONS
1 Act No. 22 of 2003 THE COMPUTER MISUSE AND CYBERCRIME ACT 2003 I assent 30 July 2003 KARL AUGUSTE OFFMANN President of the Republic Section ------------- ARRANGEMENT OF SECTIONS PART I - PRELIMINARY
SOUTH AFRICAN POLICE SERVICE ACT 68 OF 1995
Legislation updated to: 28 September 2012 SOUTH AFRICAN POLICE SERVICE ACT 68 OF 1995 [ASSENTED TO 28 SEPTEMBER 1995] [DATE OF COMMENCEMENT: 15 OCTOBER 1995] (Afrikaans text signed by the President) as
GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue
GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue shoplifting Guidance for police in England and Wales First publication: June 2014 1 Introduction 1.
Justice and Other Information Disclosure Bill 2008
Justice and Other Information Disclosure Bill 2008 Explanatory Notes Objectives of the Bill To provide a statutory basis for the sharing of criminal justice information between the Department of Justice
SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME
1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL
Police Officers who Commit Domestic Violence-Related Criminal Offences 1
PUBLIC DOCUMENT Association of Chief Police Officers of England, Wales and Northern Ireland Police Officers who Commit Domestic Violence-Related Criminal Offences 1 This is an ACPO policy relating to police
have to appear before the Youth Justice Court *, or
Chapter 3: Lawyers Part 1: The right to a lawyer 1. When do I need a lawyer? You should talk to a lawyer whenever you: are charged* with breaking the law, are arrested or detained by the police, have to
SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
CZECH REPUBLIC. Richard BACEK. Siemens, s.r.o. Phone: + 420 233 031 354. Email: [email protected]
CZECH REPUBLIC Richard BACEK Siemens, s.r.o. Phone: + 420 233 031 354 Email: [email protected] 1. DEFINITION PRESENTATION What attorney-client privilege is and what it is not? An attorney at law
COMPUTER FORENSIC EXAMINER~E SAFETY HIGH TECH CRIME UNIT CRIME & JUSTICE COMMAND
COMPUTER FORENSIC EXAMINER~E SAFETY HIGH TECH CRIME UNIT CRIME & JUSTICE COMMAND Ref 132/14 Location: Chester le Street Police Office Salary: Lower Grade Scale 5-21,309 to 23,277 Higher Grade Scale 6-24,036
Canadian Nuclear Security Law. Stanley D. Berger Partner, Fogler, Rubinoff LLP Jacques Lavoie, Canadian Nuclear Safety Commission May 1, 2014
Canadian Nuclear Security Law Stanley D. Berger Partner, Fogler, Rubinoff LLP Jacques Lavoie, Canadian Nuclear Safety Commission May 1, 2014 Key Acts And Regulations i) Licensees Obligations Nuclear Safety
Casino, Liquor and Gaming Control Authority Act 2007 No 91
New South Wales Casino, Liquor and Gaming Control Authority Act 2007 No 91 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Definitions 2 4 Meaning of gaming and liquor legislation
Avoid the 5 Biggest Criminal Defense Pitfalls Presented by: The Volk & McElroy Law Firm
Avoid the 5 Biggest Criminal Defense Pitfalls Presented by: The Volk & McElroy Law Firm PITFALL #1: Talking to Police without a Lawyer present Most defendants think cooperating with police is a good thing.
Guide to compensation claims against the police
Tel: 020 8492 2290 I N C O R P O R A T I N G D O N A L D G A L B R A I T H & C O Guide to compensation claims against the police This guide is designed to provide a general overview to bringing compensation
NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994
NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 [ASSENTED TO 23 NOVEMBER 1994] [DATE OF COMMENCEMENT: 1 JANUARY 1995] (English text signed by the President) as amended by National Strategic Intelligence
TOP SECRET STRAP2 UK EYES ONLY
Sian MacLeod From: Date: 13 June 2008 GCHQ Reference: A/9014/9105/55 Mariot Leslie Foreign Secretary ISA-94: APPLICATION FOR RENEWAL OF WARRANT GPW/1160 IN RESPECT OF ACTIVITIES WHICH INVOLVE THE MODIFICATION
The Electronic Transactions Law Chapter I Title and Definition
The Union of Myanmar The State Peace and Development Council The Electronic Transactions Law ( The State Peace and Development Council Law No. 5/2004 ) The 12th Waxing of Kason 1366 M.E. (30th April, 2004)
An Bille um Cheartas Coiriúil (Cionta a bhaineann le Córais Faisnéise), 2016 Criminal Justice (Offences Relating to Information Systems) Bill 2016
An Bille um Cheartas Coiriúil (Cionta a bhaineann le Córais Faisnéise), 16 Criminal Justice (Offences Relating to Information Systems) Bill 16 Mar a tionscnaíodh As initiated [No. of 16] AN BILLE UM CHEARTAS
Brief Overview of the Family Violence Protection Act 2008
Brief Overview of the Family Violence Protection Act 2008 Last updated: 5 January 2011 Table of contents Scope of document 1 Substantive Law 1 1. Separates family violence and stalking matters 1 2. Preamble
DUI (Driving Under the Influence)
DUI (Driving Under the Influence) Driving Under the Influence (DUI) In Illinois, a person is considered to be driving under the influence when: The driver has an alcohol concentration on the breath of.08
PRIVACY BREACH MANAGEMENT POLICY
PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department
Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States
Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States Cloud computing is one of the Internet s great innovations, enabling individuals
New South Wales. 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness?
New South Wales Page 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness? 5 Witness protection program 5 6 Inclusion in the witness protection program 5 7 Assessing witness for inclusion in witness
In Re Boucher United States District Court for the District of Vermont 2007 WL 4246473 (Nov. 29, 2009)
In Re Boucher United States District Court for the District of Vermont 2007 WL 4246473 (Nov. 29, 2009) JEROME J. NIEDERMEIER, United States Magistrate Judge. On December 17, 2006, defendant Sebastien Boucher
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets
CYBERSECURITY BILL, 2011
CYBERSECURITY BILL, 2011 Page 1 of 19 CYBERSECURITY BILL, 2011 ARRANGEMENT OF SECTIONS Sections PART I - GENERAL PROVISIONS 1 Objects and scope PART II OFFENCES AND PENALTIES 2. Unlawful access to a computer
