Scoping Cross-Border e-id Management and Facilitating International e-trade

Size: px
Start display at page:

Download "Scoping Cross-Border e-id Management and Facilitating International e-trade"

Transcription

1 Scoping Cross-Border e-id Management and Facilitating International e-trade Prof. dr. HONG XUE Director of Beijing Normal University Institute for Internet Policy & Law UNCITRAL Colloquium on Identity Management and Trust Services Vienna 21 April Prof. dr. Hong Xue

2 e-id Management and International Trade Law UNCITRAL International legal foundation in digital age Global digital economy e-id/digital ID Nature persons Legal persons and other organizations Devices, digital products or other things Critical information infrastructure Beyond the international trade law 2

3 A Scoping e-id management A set of processes to manage the identification, authentication, and authorization of individuals, legal entities, devices, or other things in an online context. Multi-level Establishment (generation) of e-id Verification (authentication) and authorization Cross-border e-id management 3

4 e-id Management Approaches Self-establishment and management Contracts and mutual trust Federated ID system ID beyond contractual relationship Used by multiple parties and purposes in cross-system and organization environment Third-party trust services Cross-border federated system Establishment of e-ids Authentication and authorization 4

5 Cross-Border e-id Management Establishment Principal IDs: domestically Government-issued documents (e.g., a birth certificate, identity card, social security card, driver s license, and passport) Derivative IDs: cross-border Internationalized schemes, such as ASEAN SW Credentials issued by private sector entities (e.g., an employee badge and credit cards) Alternative IDs Limited credential if not linked up with the principal IDs (Mobile wireless SIM card, domain names, IP addresses) Caveats Limit: e-ids within the State, system or organization Multiple e-ids for the same subject?

6 Cross-Border e-id Management Authentication and authorization in a federated system Third-party trust services Domestic regulation (e.g. licensing) Cross-border operation Private arrangement (alliance or association) International agreements Centralized system Uniform criteria, standards and related legal requirements International mutual recognition Intergovernmental: harmonization of technical standards, operational requirements, and legal rules Service providers: multiple areas of regulations Service-level agreements

7 Cross-border e-id Management Not one-set-fit-for-all solution Market demands Multi-facets and different degrees of trust Regulated industry Banking, insurance or other financial industry Market approach v. legal regulations Private-sector initiatives International soft law: legal harmonization International agreements Existing laws and practices E.g. e-signatures and CAs 7

8 Related Laws (Enabling: essential and supporting) Legal or regulatory framework on cross-border e-id management Data integrity, truthfulness and accuracy E-contracts and e-signatures Cyber security law Privacy and data protection law Confidence (governmental agencies and private sector) Liability of service providers Dispute resolution (arbitration, ODR, e-evidence admission, etc.) International trade law Private International law Others Intellectual property law (copyright, trade secret, database, patent) Competition law 8

9 Legal Gaps No widely accepted multilateral international laws Privacy and personal data protection EU-US Privacy Shield Agreement (Feb. 2016) APEC Internet Economy Project 2004 APEC Privacy Framework 2007 Data Privacy Pathfinder initiative 2010 Cross-border Privacy Enforcement Arrangement (CPEA) OECD Guidelines Liabilities of service providers Limitations and exemptions Safe harbor? Harmonization of domestic laws Regulations of contacts Legal presumptions in e-commerce

10 Cyber Security and Cross-Border Data Flow Concerns Lack of international legal framework for data protection and data flow Lack of uniform standards Intensifying cyber-security concerns Data localization/sovereignty Extraterritorial law enforcement Possible solutions Technically EPP model: verified result rather than data, per se, cross border Legally, removal of legal barriers on cross-border data flow and clarify the ambiguity Internationally, adapting to global digital economy 10

11 Building the Framework of Cross-Border e-id Management Principles Technological neutrality Party autonomy Third-party trust services Future Technical standards Law compliance (privacy, liability, security, contacts) Dispute resolution Internationally interoperable and interconnected legal norms developed to enable the development and application of cross-border e-id management 11

12 THANK YOU! 12

Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities

Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities Prof. Dr. HONG XUE Director of BNU Institute for Internet Policy & Law EGM on Integrated Use of Single Windows for TF Bangkok

More information

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic

More information

Legal issues in Cross-border Paperless Trade and E-commerce: Experience from China

Legal issues in Cross-border Paperless Trade and E-commerce: Experience from China Legal issues in Cross-border Paperless Trade and E-commerce: Experience from China Prof. Dr. Hong Xue Director of Beijing Normal University Institute for Internet Policy & Law Workshop on Cross-border

More information

Legal issues relevant for paperless trade facilitation and electronic single window facilities

Legal issues relevant for paperless trade facilitation and electronic single window facilities Legal issues relevant for paperless trade facilitation and electronic single window facilities Luca Castellani UNCITRAL Secretariat subtitle Trade facilitation and paperless trade Trade facilitation aims

More information

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)

More information

ESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW

ESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE ESTABLISHING A LEGAL FRAMEWORK FOR INTERNATIONAL TRADE SINGLE WINDOW RECOMMENDATION No. 35, FIRST edition, adopted by the United Nations Centre for Trade Facilitation

More information

Draft WGIG Issues Paper on E-Commerce

Draft WGIG Issues Paper on E-Commerce Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not

More information

Towards Effective Internet Governance

Towards Effective Internet Governance Towards Effective Internet Governance Risaburo NEZU Director Science, Technology and Industry OECD APEC e- commerce convention May 15, 2000 Tokyo Japan ISSUES 1. Tax 2. Tariffs 3. Privacy protection 4.

More information

TO: Advisory Committee commentators on electronic commerce projects at International organizations

TO: Advisory Committee commentators on electronic commerce projects at International organizations TO: Advisory Committee commentators on electronic commerce projects at International organizations Review of possible future ECom projects We are undertaking a review of private law developments in electronic

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015.

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015. Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 eidas Regulation By Alessandra Sbordoni Legal Officer, eidas Task Force

More information

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM(2012 238 final) {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA

More information

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market [COM(2012) 238 final] {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA

More information

trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE

trust and confidence draw me a sheep POLICY AND REGULATION FOR EUROPE trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE new regulation eidas... "...told him that she was the only one of her kind in all the universe" POLICY AND REGULATION FOR EUROPE

More information

LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION

LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and

More information

Country: Canada. Score: 75.79 Rank: 9/24

Country: Canada. Score: 75.79 Rank: 9/24 Score: 75.79 Rank: 9/24 Canada is a world leader in ICT adoption and innovation and has played a leading role in the development of international standards. It has a strong commitment to free trade and

More information

THE DIGITAL TRADE IMBALANCE AND ITS IMPLICATIONS FOR INTERNET GOVERNANCE

THE DIGITAL TRADE IMBALANCE AND ITS IMPLICATIONS FOR INTERNET GOVERNANCE THE DIGITAL TRADE IMBALANCE AND ITS IMPLICATIONS FOR INTERNET GOVERNANCE Susan Ariel Aaronson, George Washington University Cavalho Fellow, Government Accountability Project PAPER FINDINGS Trade agreements

More information

Program: Master s of Intellectual Property Law (Comprehensive) Syllabus

Program: Master s of Intellectual Property Law (Comprehensive) Syllabus Program: Master s of Intellectual Property Law (Comprehensive) Syllabus Syllabus No. 2005 C A. GENERAL RULES AND CONDITIONS: 1. This plan Conforms to the valid regulations of programs of graduate studies.

More information

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,

More information

How To Respect The Agreement On Trade In Cyberspace

How To Respect The Agreement On Trade In Cyberspace CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

Electronic signature, authentication, identity management & UNCITRAL

Electronic signature, authentication, identity management & UNCITRAL United Nations Commission on International Trade Law Electronic signature, authentication, identity management & Jae Sung LEE Secretariat Legal Officer, International Trade Law Division Office of Legal

More information

Introduction to legal texts on electronic commerce

Introduction to legal texts on electronic commerce Introduction to legal texts on electronic commerce Luca Castellani Legal Officer Secretariat Vienna, Austria Outline 1. Benefits of e-commerce 2. E-commerce fundamentals 3. Legal agenda for e-commerce

More information

Some laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability.

Some laws and standards in India are not technology neutral (e.g., electronic signatures), and these may be a barrier to interoperability. Country Report: India India is an important regional economy, with a strong interest in ICT services development. The law in India has not entirely kept pace with developments in cloud computing, and some

More information

Promoting Cross Border Data Flows Priorities for the Business Community

Promoting Cross Border Data Flows Priorities for the Business Community Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing

More information

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development RECOMMENDATION OF THE OECD COUNCIL CONCERNING GUIDELINES FOR CONSUMER PROTECTION IN THE

More information

Possible future work in the area of electronic commerce legal issues related to identity management and trust services

Possible future work in the area of electronic commerce legal issues related to identity management and trust services United Nations A/CN.9/854 General Assembly Distr.: General 5 May 2015 English Original: English/French United Nations Commission on International Trade Law Forty-eighth session Vienna, 29 June-16 July

More information

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association Navigating the Identity Landscape Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association SAFE-BioPharma Association Overview An overview of US and EU government

More information

Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie

Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie Digital signature and e-government: legal framework and opportunities Raúl Rubio Baker & McKenzie e-government concept Utilization of Information and Communication Technologies (ICTs) to improve and/or

More information

The United States has high levels of Internet use, but access to fast broadband remains patchy.

The United States has high levels of Internet use, but access to fast broadband remains patchy. Country Report: United States The United States has comprehensive and up-to-date laws in place for e-commerce, electronic signatures and cybercrime. The US has signed and implemented the Convention on

More information

Cybersecurity Governance

Cybersecurity Governance AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional

More information

Deciphering the Legal Framework that Governs Online Identity Systems

Deciphering the Legal Framework that Governs Online Identity Systems Deciphering the Legal Framework that Governs Online Identity Systems SESSION ID: LAW-W04A Thomas J. Smedinghoff Partner Edwards Wildman Palmer LLP Chicago, Illinois TSmedinghoff@EdwardsWildman.com @smedinghoff

More information

E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China

E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China Ms. Hemali Shah Department of Business Law and Taxation Monash University Australia Import-Export

More information

NATIONAL LAW INSTITUTE UNIVERSITY

NATIONAL LAW INSTITUTE UNIVERSITY NATIONAL LAW INSTITUTE UNIVERSITY Kerwa Dam Road, Bhopal -462044, M.P. (INDIA) RAJIV GANDHI NATIONAL CYBER LAW CENTER (Established by MHRD, Govt. of India) Post Graduate Diploma in Cyber Law (Distance

More information

The United Nations Convention on the Use of Electronic Communications in International Contracts: policy goals

The United Nations Convention on the Use of Electronic Communications in International Contracts: policy goals The United Nations Convention on the Use of Electronic Communications in International Contracts: policy goals Luca Castellani Legal Officer UNCITRAL Secretariat Vienna, Austria Why a new international

More information

BSA GLOBAL CYBERSECURITY FRAMEWORK

BSA GLOBAL CYBERSECURITY FRAMEWORK 2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access

More information

OECD Digital Identity Management Workshop, May 2007. Audit requirements and the application of Digital Signatures in Oil and Gas Industry

OECD Digital Identity Management Workshop, May 2007. Audit requirements and the application of Digital Signatures in Oil and Gas Industry OECD Digital Identity Management Workshop, May 2007 07-May-2007 File Title Copyright: Shell Exploration & Production Ltd. Audit requirements and the application of Digital Signatures in Oil and Gas Industry

More information

Marketers must: The Political, Legal, and Regulatory Environments of Global Marketing. Nation-States and Sovereignty. The Political Environment

Marketers must: The Political, Legal, and Regulatory Environments of Global Marketing. Nation-States and Sovereignty. The Political Environment Marketers must: The Political, Legal, and Regulatory Environments of Global Marketing Global Marketing Chapter 5 Attempt to comply with each nation s laws and regulations. Keep up with laws and regulations

More information

BSA Global Cloud. A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE

BSA Global Cloud. A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE BSA Global Cloud COMPUTING Scorecard A Blueprint for Economic Opportunity BUSINESS SOFTWARE ALLIANCE A CONTENTS Executive Summary....................................... 1 BSA Cloud Policy Blueprint...2

More information

DS-05-2015: Trust eservices. The policy context: eidas Regulation

DS-05-2015: Trust eservices. The policy context: eidas Regulation DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task

More information

UNCITRAL texts on Secured Transactions

UNCITRAL texts on Secured Transactions United Nations Commission on International Trade Law texts on Secured Transactions Jae Sung LEE Secretariat Legal Officer, International Trade Law Division Office of Legal Affairs, United Nations Importance

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Rolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market

Rolling out eidas Regulation (EU) 910/2014. Boosting trust & security in the Digital Single Market Rolling out eidas Regulation (EU) 910/2014 Boosting trust & security in the Digital Single Market Trust in the Digital World 2016 Conference 15 June 2016 The Hague (NL) Andrea SERVIDA DG CONNECT, European

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

E-Signatures. Chris Reed. Professor of Electronic Commerce Law

E-Signatures. Chris Reed. Professor of Electronic Commerce Law E-Signatures Chris Reed Professor of Electronic Commerce Law Centre for Commercial Law Studies, Queen Mary University of London Of counsel, Lawrence Graham Agenda Rethinking the concept of signature e-signature

More information

Position Paper Ecommerce Europe. E-Payments 2012

Position Paper Ecommerce Europe. E-Payments 2012 Position Paper Ecommerce Europe E-Payments 2012 Contents Introduction: Ecommerce Europe 3 1. Payments from the merchants perspective 5 2. Market outlook 6 3. Card-based payments and related fraud issues

More information

PKI - current and future

PKI - current and future PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi

More information

CLOUT UNCITRAL. Facts about

CLOUT UNCITRAL. Facts about UNCITRAL UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW Facts about CLOUT Case Law On Uncitral Texts A legal database of worldwide court decisions and arbitral awards on UNCITRAL texts UNCITRAL texts

More information

2010/TELMIN/TPD/010 Advancing Cloud Computing Through Public Policy: New Opportunities, New Challenges, New Responsibilities

2010/TELMIN/TPD/010 Advancing Cloud Computing Through Public Policy: New Opportunities, New Challenges, New Responsibilities 2010/TELMIN/TPD/010 Advancing Cloud Computing Through Public Policy: New Opportunities, New Challenges, New Responsibilities Submitted by: Microsoft 8 th Ministerial Meeting on Telecommunications and Information

More information

Paperless Trade Legal & Regulatory Framework of KOREA. Hyun-Ku Kang Vice President / e-document Division

Paperless Trade Legal & Regulatory Framework of KOREA. Hyun-Ku Kang Vice President / e-document Division Paperless Trade Legal & Regulatory Framework of KOREA Hyun-Ku Kang Vice President / e-document Division Paperless TradeLegal & Regulatory Framework of KOREA CONTENTS 1. Concept of Paperless Trade 2. Evolution

More information

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD

More information

engagement will not only ensure the best possible law, but will also promote the law s successful implementation.

engagement will not only ensure the best possible law, but will also promote the law s successful implementation. US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments

More information

An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010

An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 Understanding the information security Technology of Encryption and Electronic signature

More information

Outlines of the Trans-Pacific Partnership Agreement

Outlines of the Trans-Pacific Partnership Agreement Page 1 of 5 Outlines of the Trans-Pacific Partnership Agreement ENHANCING TRADE AND INVESTMENT, SUPPORTING JOBS, ECONOMIC GROWTH AND DEVELOPMENT: OUTLINES OF THE TRANS-PACIFIC PARTNERSHIP AGREEMENT On

More information

POLICIES, RULES AND GUIDELINES

POLICIES, RULES AND GUIDELINES APEC CROSS-BORDER PRIVACY RULES SYSTEM POLICIES, RULES AND GUIDELINES The purpose of this document is to describe the APEC Cross Border Privacy Rules (CBPR) System, its core elements, governance structure

More information

UNCITRAL legislative standards on electronic communications and electronic signatures: an introduction

UNCITRAL legislative standards on electronic communications and electronic signatures: an introduction legislative standards on electronic communications and electronic signatures: an introduction Luca Castellani Legal Officer secretariat International harmonization of e-commerce law Model Law on Electronic

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Global E-commerce and Cyberlaw Developments By Torbjörn Fredriksson UNCTAD

More information

Position Paper e-payments

Position Paper e-payments Position Paper e-payments 10 Recommendations for a Stronger e-payments Landscape in Europe www.ecommerce-europe.eu POSITION PAPER 3 Introduction: Ecommerce Europe Ecommerce Europe (www.ecommerce-europe.eu)

More information

Country: Australia. Score: 79.92 Rank: 2/24

Country: Australia. Score: 79.92 Rank: 2/24 Score: 79.92 Rank: 2/24 Australia is keen to promote cloud computing through the development and reform of relevant laws, regulations, and standards. For example, Australia has a strong commitment to international

More information

Charter of Consumer Rights in the Digital World

Charter of Consumer Rights in the Digital World DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create

More information

OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.

OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively. Joint work between experts from the Article 29 Working Party and from APEC Economies, on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in

More information

EUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE. on a common framework for electronic signatures

EUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE. on a common framework for electronic signatures COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 29.04.1999 COM(1999) 195 fmal 98/0191(COD) Amended proposal for a EUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE on a common framework for electronic signatures

More information

Workshop on E-Commerce, Development and SMEs : The Rise of Trade in Digital Content Trade in IP. 8 April 2013 - International Organization Session

Workshop on E-Commerce, Development and SMEs : The Rise of Trade in Digital Content Trade in IP. 8 April 2013 - International Organization Session Workshop on E-Commerce, Development and SMEs : The Rise of Trade in Digital Content Trade in IP 8 April 2013 - International Organization Session Sacha Wunsch-Vincent** Senior Economic Officer, WIPO **The

More information

WIPO Summer Schools on Intellectual Property

WIPO Summer Schools on Intellectual Property E SUMMER SCHOOL WIPO/ACAD//14/INF.1 ORIGINAL: ENGLISH DATE: JANUARY 2014 WIPO Summer Schools on Intellectual Property organized by the World Intellectual Property Organization (WIPO) in cooperation with

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

4 The Privacy Act 1988 (Cth) requires private sector organizations to comply either with

4 The Privacy Act 1988 (Cth) requires private sector organizations to comply either with country report: Australia Australia does not have specific regulations in place for cloud computing today, though the government has been keen to include consideration of cloud computing issues in the

More information

Government Use of Cloud Computing Legal Challenges

Government Use of Cloud Computing Legal Challenges Government Use of Cloud Computing Legal Challenges Liesbeth Hellemans Liesbeth.hellemans@law.kuleuven.be ICRI/CIR KU Leuven IAPP Europe Data Protection Congress Agenda 1. Cloud for Europe project 2. Legal

More information

Tentative Action Plan

Tentative Action Plan Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information

More information

The Way Forward: a Perspective of a Developing Economy

The Way Forward: a Perspective of a Developing Economy APEC/E-Commerce Convention Powering APEC Economies into the New Millennium 16th May, Akasaka Prince Hotel, Tokyo. The Way Forward: a Perspective of a Developing Economy Thaweesak Koanantakool htk@nectec.or.th

More information

Models for Cyber-legislation in ESCWA member countries

Models for Cyber-legislation in ESCWA member countries Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007 Cyber Space Cyber space (non-jurisdictional International Space; jurisdictional National

More information

Terms and Conditions

Terms and Conditions Terms and Conditions Agreement between user and internetsecurityservices.org Welcome to internetsecurityservices.org. The internetsecurityservices.org website (the "Site") is comprised of various web pages

More information

WIPO LIST OF NEUTRALS. Telephone: +86 10 82425692 Fax No. +86 10 5880 2948 Mobile: +86 136 113 76518 E-mail: hongxueipr@gmail.com hong_xue@hotmail.

WIPO LIST OF NEUTRALS. Telephone: +86 10 82425692 Fax No. +86 10 5880 2948 Mobile: +86 136 113 76518 E-mail: hongxueipr@gmail.com hong_xue@hotmail. ARBITRATION AND MEDIATION CENTER WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA Prof. Dr. Hong XUE School of Law Beijing Normal University 19 Xin Jie Kou Wai Street Beijing 100875 China Telephone: +86 10 82425692

More information

EXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g.

EXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g. EXHIBIT A Part IV Content Identification 1 As this article has been considering certain intellectual property ramifications relating to the transmission of content, it is important to consider how content

More information

Working Party on Information Security and Privacy

Working Party on Information Security and Privacy Unclassified DSTI/ICCP/REG(2008)10/FINAL DSTI/ICCP/REG(2008)10/FINAL Unclassified Organisation de Coopération et de Développement Économiques Organisation for Economic Co-operation and Development 11-Jun-2009

More information

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted

More information

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013 Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

The Development of Consumer Protection Laws in Tanzania for Electronic Consumer Contracts

The Development of Consumer Protection Laws in Tanzania for Electronic Consumer Contracts The Development of Consumer Protection Laws in Tanzania for Electronic Consumer Contracts A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy (PhD) By Theodora Mwenegoha

More information

ROADMAP. A Pan-European framework for electronic identification, authentication and signature

ROADMAP. A Pan-European framework for electronic identification, authentication and signature TITLE OF THE INITIATIVE ROADMAP A Pan-European framework for electronic identification, authentication and signature TYPE OF INITIATIVE CWP Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT

More information

Baseline requirements Version 1.0 Errata

Baseline requirements Version 1.0 Errata Baseline requirements Version 1.0 Errata 1. Auditor Qualification Requirements Effective 1 Jan 2013 A. In Section 3 (References), add: ETSI Electronic Signatures and Infrastructures (ESI); Trust Service

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Norway Post s Electronic ID Case study on authentication. Oslo 17. June 1999 Terje Kolnes, Norway Post

Norway Post s Electronic ID Case study on authentication. Oslo 17. June 1999 Terje Kolnes, Norway Post Norway Post s Electronic ID Case study on authentication Oslo 17. June 1999 Terje Kolnes, Norway Post.0 Presentation Objective The Norway Post National electronic ID, The enabler for e-commerce Global

More information

THE LEADING EDGE OF BORDER SECURITY

THE LEADING EDGE OF BORDER SECURITY THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly

More information

Directive in German law. Principles.

Directive in German law. Principles. Country Report: Germany Germany has comprehensive cybercrime legislation and up-to-date intellectual property protection in place. The combination of these laws provides reasonable protection for cloud

More information

ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010

ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 ICTLECOMM 2010 Introduction to the E-commerce Law Course Maryke Silalahi Nuth Norwegian Research Centre for Computers & Law 2 February 2010 NRCCL (University of Oslo, Faculty of Law) Topics Overview of

More information

Capacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward.

Capacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward. Capacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward. Enabling cross-border paperless trade data exchange findings from regional studies

More information

Toward global Interoperable Identity Management

Toward global Interoperable Identity Management ITU-T Joint Meeting on the IdM Focus Group Reports Toward global Interoperable Identity Management Anthony-Michael Rutkowski Vice-President, VeriSign Chair, ITU-T IdM FG Requirements WG Geneva, 10-11 September

More information

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries

More information

THE NATIONAL PROFESSIONAL PRACTICE EXAMINATION

THE NATIONAL PROFESSIONAL PRACTICE EXAMINATION THE NATIONAL PROFESSIONAL PRACTICE EXAMINATION Regulations 13(1)(c) and 77(1)(c) accompanying The APEGA Engineering and Geoscience Professions Act require that applicants pass a Professional Practice Examination

More information

Report to the Council of Australian Governments. A Review of the National Identity Security Strategy

Report to the Council of Australian Governments. A Review of the National Identity Security Strategy Report to the Council of Australian Governments A Review of the National Identity Security Strategy 2012 Report to COAG - Review of the National Identity Security Strategy 2012 P a g e i Table of contents

More information

Whether you are a practising

Whether you are a practising Introduction By the end of the programme, you will have a specialised knowledge of international business law that reflects the changing commercial, social, political and technical realities of the global

More information

Introduc)on to STORK2.0 project

Introduc)on to STORK2.0 project Introduc)on to STORK2.0 project AAI Workshop Brussels, April 2014 EUROPEAN EID CONTEXT FOR EGOVERNMENT NaKonal online services today with eid CENTRAL GOVERNMENT ONLINE SERVICES LOCAL GOVERNMENT ONLINE

More information

23.9.2015. Kangas Cybersecurity strategy

23.9.2015. Kangas Cybersecurity strategy Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures

More information

Trusted Cloud Europe

Trusted Cloud Europe Trusted Cloud Europe Response of BSA The Software Alliance Overall comments BSA welcomes the Commission s efforts to promote the uptake of cloud computing. Our members share the goal of achieving a single

More information

E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE

E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE Sumanjeet* Abstract Electronic commerce offers exceptional opportunities for the economic development of India, with its huge pool of technology skilled, English

More information

Implementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins

Implementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins Implementation of e-signature in the ESCWA Region: Status and Next Steps By Matthew Perkins Understanding e-signature How do we identify ourselves online? Electronic records of real-world authenticators

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Empirical Analysis of Software Usage to Drive Policy Recommendations May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Outline Introduction to BSA Global Studies and their Methodology 2014 BSA

More information

Data protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner

Data protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner Federal Data Protection and Information Commissioner FDPIC Data protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner Electronic business

More information

The case for adoption of the UN Electronic Communications Convention

The case for adoption of the UN Electronic Communications Convention 2014 UNCITRAL South Asia Seminar The case for adoption of the UN Electronic Communications Convention Joy Cheng, Acting Senior Legal Officer Attorney-General s Department, Australia The role of the Attorney-General

More information

Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market COM(2012)238 of 4.6.2012 ClubPSCo, Paris, 20.6.2012 Gérard GALLER

More information

Identity Management. Critical Systems Laboratory

Identity Management. Critical Systems Laboratory Identity Management Critical Systems What is Identity Management? Identity: a set of attributes and values, which might or might not be unique Storing and manipulating identities Binding virtual identities

More information