Scoping Cross-Border e-id Management and Facilitating International e-trade
|
|
- Malcolm Randall
- 7 years ago
- Views:
Transcription
1 Scoping Cross-Border e-id Management and Facilitating International e-trade Prof. dr. HONG XUE Director of Beijing Normal University Institute for Internet Policy & Law UNCITRAL Colloquium on Identity Management and Trust Services Vienna 21 April Prof. dr. Hong Xue
2 e-id Management and International Trade Law UNCITRAL International legal foundation in digital age Global digital economy e-id/digital ID Nature persons Legal persons and other organizations Devices, digital products or other things Critical information infrastructure Beyond the international trade law 2
3 A Scoping e-id management A set of processes to manage the identification, authentication, and authorization of individuals, legal entities, devices, or other things in an online context. Multi-level Establishment (generation) of e-id Verification (authentication) and authorization Cross-border e-id management 3
4 e-id Management Approaches Self-establishment and management Contracts and mutual trust Federated ID system ID beyond contractual relationship Used by multiple parties and purposes in cross-system and organization environment Third-party trust services Cross-border federated system Establishment of e-ids Authentication and authorization 4
5 Cross-Border e-id Management Establishment Principal IDs: domestically Government-issued documents (e.g., a birth certificate, identity card, social security card, driver s license, and passport) Derivative IDs: cross-border Internationalized schemes, such as ASEAN SW Credentials issued by private sector entities (e.g., an employee badge and credit cards) Alternative IDs Limited credential if not linked up with the principal IDs (Mobile wireless SIM card, domain names, IP addresses) Caveats Limit: e-ids within the State, system or organization Multiple e-ids for the same subject?
6 Cross-Border e-id Management Authentication and authorization in a federated system Third-party trust services Domestic regulation (e.g. licensing) Cross-border operation Private arrangement (alliance or association) International agreements Centralized system Uniform criteria, standards and related legal requirements International mutual recognition Intergovernmental: harmonization of technical standards, operational requirements, and legal rules Service providers: multiple areas of regulations Service-level agreements
7 Cross-border e-id Management Not one-set-fit-for-all solution Market demands Multi-facets and different degrees of trust Regulated industry Banking, insurance or other financial industry Market approach v. legal regulations Private-sector initiatives International soft law: legal harmonization International agreements Existing laws and practices E.g. e-signatures and CAs 7
8 Related Laws (Enabling: essential and supporting) Legal or regulatory framework on cross-border e-id management Data integrity, truthfulness and accuracy E-contracts and e-signatures Cyber security law Privacy and data protection law Confidence (governmental agencies and private sector) Liability of service providers Dispute resolution (arbitration, ODR, e-evidence admission, etc.) International trade law Private International law Others Intellectual property law (copyright, trade secret, database, patent) Competition law 8
9 Legal Gaps No widely accepted multilateral international laws Privacy and personal data protection EU-US Privacy Shield Agreement (Feb. 2016) APEC Internet Economy Project 2004 APEC Privacy Framework 2007 Data Privacy Pathfinder initiative 2010 Cross-border Privacy Enforcement Arrangement (CPEA) OECD Guidelines Liabilities of service providers Limitations and exemptions Safe harbor? Harmonization of domestic laws Regulations of contacts Legal presumptions in e-commerce
10 Cyber Security and Cross-Border Data Flow Concerns Lack of international legal framework for data protection and data flow Lack of uniform standards Intensifying cyber-security concerns Data localization/sovereignty Extraterritorial law enforcement Possible solutions Technically EPP model: verified result rather than data, per se, cross border Legally, removal of legal barriers on cross-border data flow and clarify the ambiguity Internationally, adapting to global digital economy 10
11 Building the Framework of Cross-Border e-id Management Principles Technological neutrality Party autonomy Third-party trust services Future Technical standards Law compliance (privacy, liability, security, contacts) Dispute resolution Internationally interoperable and interconnected legal norms developed to enable the development and application of cross-border e-id management 11
12 THANK YOU! 12
Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities
Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities Prof. Dr. HONG XUE Director of BNU Institute for Internet Policy & Law EGM on Integrated Use of Single Windows for TF Bangkok
More informationUNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures
Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic
More informationLegal issues in Cross-border Paperless Trade and E-commerce: Experience from China
Legal issues in Cross-border Paperless Trade and E-commerce: Experience from China Prof. Dr. Hong Xue Director of Beijing Normal University Institute for Internet Policy & Law Workshop on Cross-border
More informationLegal issues relevant for paperless trade facilitation and electronic single window facilities
Legal issues relevant for paperless trade facilitation and electronic single window facilities Luca Castellani UNCITRAL Secretariat subtitle Trade facilitation and paperless trade Trade facilitation aims
More informationMutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities
Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)
More informationESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW
UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE ESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW RECOMMENDATION No. 35, FIRST edition, adopted by the United Nations Centre for Trade Facilitation
More informationDraft WGIG Issues Paper on E-Commerce
Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not
More informationTowards Effective Internet Governance
Towards Effective Internet Governance Risaburo NEZU Director Science, Technology and Industry OECD APEC e- commerce convention May 15, 2000 Tokyo Japan ISSUES 1. Tax 2. Tariffs 3. Privacy protection 4.
More informationTO: Advisory Committee commentators on electronic commerce projects at International organizations
TO: Advisory Committee commentators on electronic commerce projects at International organizations Review of possible future ECom projects We are undertaking a review of private law developments in electronic
More informationExpert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015.
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 eidas Regulation By Alessandra Sbordoni Legal Officer, eidas Task Force
More informationProposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM(2012 238 final) {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA
More informationProposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market [COM(2012) 238 final] {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA
More informationtrust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE
trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE new regulation eidas... "...told him that she was the only one of her kind in all the universe" POLICY AND REGULATION FOR EUROPE
More informationLEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and
More informationCountry: Canada. Score: 75.79 Rank: 9/24
Score: 75.79 Rank: 9/24 Canada is a world leader in ICT adoption and innovation and has played a leading role in the development of international standards. It has a strong commitment to free trade and
More informationTHE DIGITAL TRADE IMBALANCE AND ITS IMPLICATIONS FOR INTERNET GOVERNANCE
THE DIGITAL TRADE IMBALANCE AND ITS IMPLICATIONS FOR INTERNET GOVERNANCE Susan Ariel Aaronson, George Washington University Cavalho Fellow, Government Accountability Project PAPER FINDINGS Trade agreements
More informationProgram: Master s of Intellectual Property Law (Comprehensive) Syllabus
Program: Master s of Intellectual Property Law (Comprehensive) Syllabus Syllabus No. 2005 C A. GENERAL RULES AND CONDITIONS: 1. This plan Conforms to the valid regulations of programs of graduate studies.
More informationHarmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
More informationHow To Respect The Agreement On Trade In Cyberspace
CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationElectronic signature, authentication, identity management & UNCITRAL
United Nations Commission on International Trade Law Electronic signature, authentication, identity management & Jae Sung LEE Secretariat Legal Officer, International Trade Law Division Office of Legal
More informationIntroduction to legal texts on electronic commerce
Introduction to legal texts on electronic commerce Luca Castellani Legal Officer Secretariat Vienna, Austria Outline 1. Benefits of e-commerce 2. E-commerce fundamentals 3. Legal agenda for e-commerce
More informationSome laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability.
Country Report: India India is an important regional economy, with a strong interest in ICT services development. The law in India has not entirely kept pace with developments in cloud computing, and some
More informationPromoting Cross Border Data Flows Priorities for the Business Community
Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing
More informationOrganisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development
Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development RECOMMENDATION OF THE OECD COUNCIL CONCERNING GUIDELINES FOR CONSUMER PROTECTION IN THE
More informationPossible future work in the area of electronic commerce legal issues related to identity management and trust services
United Nations A/CN.9/854 General Assembly Distr.: General 5 May 2015 English Original: English/French United Nations Commission on International Trade Law Forty-eighth session Vienna, 29 June-16 July
More informationRich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association
Navigating the Identity Landscape Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association SAFE-BioPharma Association Overview An overview of US and EU government
More informationDigital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie
Digital signature and e-government: legal framework and opportunities Raúl Rubio Baker & McKenzie e-government concept Utilization of Information and Communication Technologies (ICTs) to improve and/or
More informationThe United States has high levels of Internet use, but access to fast broadband remains patchy.
Country Report: United States The United States has comprehensive and up-to-date laws in place for e-commerce, electronic signatures and cybercrime. The US has signed and implemented the Convention on
More informationCybersecurity Governance
AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional
More informationDeciphering the Legal Framework that Governs Online Identity Systems
Deciphering the Legal Framework that Governs Online Identity Systems SESSION ID: LAW-W04A Thomas J. Smedinghoff Partner Edwards Wildman Palmer LLP Chicago, Illinois TSmedinghoff@EdwardsWildman.com @smedinghoff
More informationE-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China
E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China Ms. Hemali Shah Department of Business Law and Taxation Monash University Australia Import-Export
More informationNATIONAL LAW INSTITUTE UNIVERSITY
NATIONAL LAW INSTITUTE UNIVERSITY Kerwa Dam Road, Bhopal -462044, M.P. (INDIA) RAJIV GANDHI NATIONAL CYBER LAW CENTER (Established by MHRD, Govt. of India) Post Graduate Diploma in Cyber Law (Distance
More informationThe United Nations Convention on the Use of Electronic Communications in International Contracts: policy goals
The United Nations Convention on the Use of Electronic Communications in International Contracts: policy goals Luca Castellani Legal Officer UNCITRAL Secretariat Vienna, Austria Why a new international
More informationBSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
More informationOECD Digital Identity Management Workshop, May 2007. Audit requirements and the application of Digital Signatures in Oil and Gas Industry
OECD Digital Identity Management Workshop, May 2007 07-May-2007 File Title Copyright: Shell Exploration & Production Ltd. Audit requirements and the application of Digital Signatures in Oil and Gas Industry
More informationMarketers must: The Political, Legal, and Regulatory Environments of Global Marketing. Nation-States and Sovereignty. The Political Environment
Marketers must: The Political, Legal, and Regulatory Environments of Global Marketing Global Marketing Chapter 5 Attempt to comply with each nation s laws and regulations. Keep up with laws and regulations
More informationBSA Global Cloud. A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE
BSA Global Cloud COMPUTING Scorecard A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE A CONTENTS Executive Summary....................................... 1 BSA Cloud Policy Blueprint...2
More informationDS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
More informationUNCITRAL texts on Secured Transactions
United Nations Commission on International Trade Law texts on Secured Transactions Jae Sung LEE Secretariat Legal Officer, International Trade Law Division Office of Legal Affairs, United Nations Importance
More informationCyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
More informationRolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market
Rolling out eidas Regulation (EU) 910/2014 Boosting trust & security in the Digital Single Market Trust in the Digital World 2016 Conference 15 June 2016 The Hague (NL) Andrea SERVIDA DG CONNECT, European
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationE-Signatures. Chris Reed. Professor of Electronic Commerce Law
E-Signatures Chris Reed Professor of Electronic Commerce Law Centre for Commercial Law Studies, Queen Mary University of London Of counsel, Lawrence Graham Agenda Rethinking the concept of signature e-signature
More informationPosition Paper Ecommerce Europe. E-Payments 2012
Position Paper Ecommerce Europe E-Payments 2012 Contents Introduction: Ecommerce Europe 3 1. Payments from the merchants perspective 5 2. Market outlook 6 3. Card-based payments and related fraud issues
More informationPKI - current and future
PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi
More informationCLOUT UNCITRAL. Facts about
UNCITRAL UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW Facts about CLOUT Case Law On Uncitral Texts A legal database of worldwide court decisions and arbitral awards on UNCITRAL texts UNCITRAL texts
More information2010/TELMIN/TPD/010 Advancing Cloud Computing Through Public Policy: New Opportunities, New Challenges, New Responsibilities
2010/TELMIN/TPD/010 Advancing Cloud Computing Through Public Policy: New Opportunities, New Challenges, New Responsibilities Submitted by: Microsoft 8 th Ministerial Meeting on Telecommunications and Information
More informationPaperless Trade Legal & Regulatory Framework of KOREA. Hyun-Ku Kang Vice President / e-document Division
Paperless Trade Legal & Regulatory Framework of KOREA Hyun-Ku Kang Vice President / e-document Division Paperless TradeLegal & Regulatory Framework of KOREA CONTENTS 1. Concept of Paperless Trade 2. Evolution
More informationCOMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD
More informationengagement will not only ensure the best possible law, but will also promote the law s successful implementation.
US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments
More informationAn introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010
An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 Understanding the information security Technology of Encryption and Electronic signature
More informationOutlines of the Trans-Pacific Partnership Agreement
Page 1 of 5 Outlines of the Trans-Pacific Partnership Agreement ENHANCING TRADE AND INVESTMENT, SUPPORTING JOBS, ECONOMIC GROWTH AND DEVELOPMENT: OUTLINES OF THE TRANS-PACIFIC PARTNERSHIP AGREEMENT On
More informationPOLICIES, RULES AND GUIDELINES
APEC CROSS-BORDER PRIVACY RULES SYSTEM POLICIES, RULES AND GUIDELINES The purpose of this document is to describe the APEC Cross Border Privacy Rules (CBPR) System, its core elements, governance structure
More informationUNCITRAL legislative standards on electronic communications and electronic signatures: an introduction
legislative standards on electronic communications and electronic signatures: an introduction Luca Castellani Legal Officer secretariat International harmonization of e-commerce law Model Law on Electronic
More informationExpert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Global E-commerce and Cyberlaw Developments By Torbjörn Fredriksson UNCTAD
More informationPosition Paper e-payments
Position Paper e-payments 10 Recommendations for a Stronger e-payments Landscape in Europe www.ecommerce-europe.eu POSITION PAPER 3 Introduction: Ecommerce Europe Ecommerce Europe (www.ecommerce-europe.eu)
More informationCountry: Australia. Score: 79.92 Rank: 2/24
Score: 79.92 Rank: 2/24 Australia is keen to promote cloud computing through the development and reform of relevant laws, regulations, and standards. For example, Australia has a strong commitment to international
More informationCharter of Consumer Rights in the Digital World
DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create
More informationOVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.
Joint work between experts from the Article 29 Working Party and from APEC Economies, on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in
More informationEUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE. on a common framework for electronic signatures
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 29.04.1999 COM(1999) 195 fmal 98/0191(COD) Amended proposal for a EUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE on a common framework for electronic signatures
More informationWorkshop on E-Commerce, Development and SMEs : The Rise of Trade in Digital Content Trade in IP. 8 April 2013 - International Organization Session
Workshop on E-Commerce, Development and SMEs : The Rise of Trade in Digital Content Trade in IP 8 April 2013 - International Organization Session Sacha Wunsch-Vincent** Senior Economic Officer, WIPO **The
More informationWIPO Summer Schools on Intellectual Property
E SUMMER SCHOOL WIPO/ACAD//14/INF.1 ORIGINAL: ENGLISH DATE: JANUARY 2014 WIPO Summer Schools on Intellectual Property organized by the World Intellectual Property Organization (WIPO) in cooperation with
More informationIDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More information4 The Privacy Act 1988 (Cth) requires private sector organizations to comply either with
country report: Australia Australia does not have specific regulations in place for cloud computing today, though the government has been keen to include consideration of cloud computing issues in the
More informationGovernment Use of Cloud Computing Legal Challenges
Government Use of Cloud Computing Legal Challenges Liesbeth Hellemans Liesbeth.hellemans@law.kuleuven.be ICRI/CIR KU Leuven IAPP Europe Data Protection Congress Agenda 1. Cloud for Europe project 2. Legal
More informationTentative Action Plan
Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information
More informationThe Way Forward: a Perspective of a Developing Economy
APEC/E-Commerce Convention Powering APEC Economies into the New Millennium 16th May, Akasaka Prince Hotel, Tokyo. The Way Forward: a Perspective of a Developing Economy Thaweesak Koanantakool htk@nectec.or.th
More informationModels for Cyber-legislation in ESCWA member countries
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007 Cyber Space Cyber space (non-jurisdictional International Space; jurisdictional National
More informationTerms and Conditions
Terms and Conditions Agreement between user and internetsecurityservices.org Welcome to internetsecurityservices.org. The internetsecurityservices.org website (the "Site") is comprised of various web pages
More informationWIPO LIST OF NEUTRALS. Telephone: +86 10 82425692 Fax No. +86 10 5880 2948 Mobile: +86 136 113 76518 E-mail: hongxueipr@gmail.com hong_xue@hotmail.
ARBITRATION AND MEDIATION CENTER WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA Prof. Dr. Hong XUE School of Law Beijing Normal University 19 Xin Jie Kou Wai Street Beijing 100875 China Telephone: +86 10 82425692
More informationEXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g.
EXHIBIT A Part IV Content Identification 1 As this article has been considering certain intellectual property ramifications relating to the transmission of content, it is important to consider how content
More informationWorking Party on Information Security and Privacy
Unclassified DSTI/ICCP/REG(2008)10/FINAL DSTI/ICCP/REG(2008)10/FINAL Unclassified Organisation de Coopération et de Développement Économiques Organisation for Economic Co-operation and Development 11-Jun-2009
More informationAttribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements
Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted
More informationSecurity framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013
Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines
More informationGlossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
More informationThe Development of Consumer Protection Laws in Tanzania for Electronic Consumer Contracts
The Development of Consumer Protection Laws in Tanzania for Electronic Consumer Contracts A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy (PhD) By Theodora Mwenegoha
More informationROADMAP. A Pan-European framework for electronic identification, authentication and signature
TITLE OF THE INITIATIVE ROADMAP A Pan-European framework for electronic identification, authentication and signature TYPE OF INITIATIVE CWP Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT
More informationBaseline requirements Version 1.0 Errata
Baseline requirements Version 1.0 Errata 1. Auditor Qualification Requirements Effective 1 Jan 2013 A. In Section 3 (References), add: ETSI Electronic Signatures and Infrastructures (ESI); Trust Service
More informationGLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
More informationNorway Post s Electronic ID Case study on authentication. Oslo 17. June 1999 Terje Kolnes, Norway Post
Norway Post s Electronic ID Case study on authentication Oslo 17. June 1999 Terje Kolnes, Norway Post.0 Presentation Objective The Norway Post National electronic ID, The enabler for e-commerce Global
More informationTHE LEADING EDGE OF BORDER SECURITY
THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly
More informationDirective in German law. Principles.
Country Report: Germany Germany has comprehensive cybercrime legislation and up-to-date intellectual property protection in place. The combination of these laws provides reasonable protection for cloud
More informationICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010
ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 NRCCL (University of Oslo, Faculty of Law) Topics Overview of
More informationCapacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward.
Capacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward. Enabling cross-border paperless trade data exchange findings from regional studies
More informationToward global Interoperable Identity Management
ITU-T Joint Meeting on the IdM Focus Group Reports Toward global Interoperable Identity Management Anthony-Michael Rutkowski Vice-President, VeriSign Chair, ITU-T IdM FG Requirements WG Geneva, 10-11 September
More informationGood Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
More informationTHE NATIONAL PROFESSIONAL PRACTICE EXAMINATION
THE NATIONAL PROFESSIONAL PRACTICE EXAMINATION Regulations 13(1)(c) and 77(1)(c) accompanying The APEGA Engineering and Geoscience Professions Act require that applicants pass a Professional Practice Examination
More informationReport to the Council of Australian Governments. A Review of the National Identity Security Strategy
Report to the Council of Australian Governments A Review of the National Identity Security Strategy 2012 Report to COAG - Review of the National Identity Security Strategy 2012 P a g e i Table of contents
More informationWhether you are a practising
Introduction By the end of the programme, you will have a specialised knowledge of international business law that reflects the changing commercial, social, political and technical realities of the global
More informationIntroduc)on to STORK2.0 project
Introduc)on to STORK2.0 project AAI Workshop Brussels, April 2014 EUROPEAN EID CONTEXT FOR EGOVERNMENT NaKonal online services today with eid CENTRAL GOVERNMENT ONLINE SERVICES LOCAL GOVERNMENT ONLINE
More information23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
More informationTrusted Cloud Europe
Trusted Cloud Europe Response of BSA The Software Alliance Overall comments BSA welcomes the Commission s efforts to promote the uptake of cloud computing. Our members share the goal of achieving a single
More informationE-COMMERCE LAWS IN THE INDIAN PERSPECTIVE
E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE Sumanjeet* Abstract Electronic commerce offers exceptional opportunities for the economic development of India, with its huge pool of technology skilled, English
More informationImplementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins
Implementation of e-signature in the ESCWA Region: Status and Next Steps By Matthew Perkins Understanding e-signature How do we identify ourselves online? Electronic records of real-world authenticators
More informationBusiness-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY
B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov
More informationEmpirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance
Empirical Analysis of Software Usage to Drive Policy Recommendations May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Outline Introduction to BSA Global Studies and their Methodology 2014 BSA
More informationData protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner
Federal Data Protection and Information Commissioner FDPIC Data protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner Electronic business
More informationThe case for adoption of the UN Electronic Communications Convention
2014 UNCITRAL South Asia Seminar The case for adoption of the UN Electronic Communications Convention Joy Cheng, Acting Senior Legal Officer Attorney-General s Department, Australia The role of the Attorney-General
More informationCommission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market COM(2012)238 of 4.6.2012 ClubPSCo, Paris, 20.6.2012 Gérard GALLER
More informationIdentity Management. Critical Systems Laboratory
Identity Management Critical Systems What is Identity Management? Identity: a set of attributes and values, which might or might not be unique Storing and manipulating identities Binding virtual identities
More information