UK Cloud Computing Interception - nothing new. Clive Gringras. Olswang LLP
|
|
- Kenneth Spencer
- 8 years ago
- Views:
Transcription
1 UK Cloud Computing Interception - nothing new Clive Gringras Olswang LLP
2 UK Cloud Computing Interception - nothing new Some UK cloud-computing customers are concerned that they should not entrust US cloud-providers with their data for fear of US law enforcement interception. If interception is so much of a concern they should not only avoid US cloud providers but also should avoid using the UK s telephone, the Internet, and the postal system. The interception of communications, whether stored in the 21 st Century cloud or sealed in 16 th Century scrolls, and whether here in the UK or in the US, is nothing new. All communications data, where justified, may be intercepted by the State s watchful and proportional eye. Any access to communications data by public authorities is an intrusion into someone s privacy. To be justified, such intrusion must satisfy the principles of necessity and proportionality These are not the post 9/11 words of a US legislator justifying new legislation to spy on unwitting citizens; they are the words in June from the UK s Interception of Communications Commissioner, Sir Paul Kennedy. Both the US and the UK (together with many other EU Member States) have morally-principled and strong legislation allowing their State s machinery to intercept certain electronic communications stored and transmitted through the cloud. True, the two countries differ in branding: the USA uses the optimistically-pitched PATRIOT Act whilst Britain uses the graveyard-echoing RIP Act. Naming apart, both nations regimes are concerned to intercept, across every system, the plotting and evidence of society s most feared and serious offences. Aware of the mobility of today s criminals and terrorists, legislators in the US and the UK, wanted interception rules to apply to any traffic passing through communications equipment in their territories. These legislators wanted to ensure that terrorists and serious criminals cannot find a digital safe haven in either the UK or the US nor can they simply hide from view by diving behind the firewall of an unwitting enterprise hosted on a cloud computing service. Businesses on either side of the Atlantic wanting to take advantage of cloud computing must accept that just as terrorists might squat in their systems in the UK or in the US, so law enforcement must have rights to intercept communications, whether in Newcastle or New York. Olswang LLP
3 This article briefly sets out the parameters of the USA PATRIOT Act before looking in greater detail at the framework and workings of UK s RIP Act. This analysis will reveal that UK businesses will not escape interception merely by shifting from a cloud provider in the US to one in the UK, or even elsewhere in the EU; to remove entirely a business s exposure to interception one needs to take the Luddite step of stopping all phone calls, all use of the internet and mobile phones and of stopping using any postal systems. In the dark shadow of the 9/11 attacks, the US government joined other governments in strengthening their powers of interception of and access to enterprise customer s data. No doubt with the final acronym in mind, on 26 October 2001 the US passed the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of The USA Patriot Act was mainly an update to pre-existing federal statutes. For example, the Act stretched the investigative tools previously available to fight organised crime to include fighting terrorism. The Act also extended the authorities to defeat cross-border money laundering and terrorism funding. Providing no novel state powers, this legislation was more re-brand than new regulation. And crucially, the Patriot Act, has checks and balances, and oversight, as to when and why data is accessed. A full year earlier on 2 October 2000, the UK brought into force the Regulation of Investigatory Powers Act 2000, or RIPA. Not unlike its US cousin, the RIPA also was not novel. Interception has been on the British Statute book since at least 1663 and the British State is not unfamiliar with interceptions and de-encryption of communications. In the late 1500's Sir Francis Walsingham worked for Queen Elizabeth I, to intercept, and with Thomas Phelippes, decipher and forge, letters between Mary Queen of Scots and her treasonous plotters. The cloud, just like the letters to Queen Mary and the messages intercepted in 1940 s Bletchley Park, merely provides a different medium through which much good, but sometimes bad, communications are shared. RIPA regulates interception of the content of communications as well as disclosure of information as to the who, where and when of these communications. Just as serious criminals and terrorists will resort to using , letters, phone calls and text messages, so the legislation permits the interception, where appropriate, of these and other communication media. UK Cloud-based communications systems are certainly within RIPA s ambit, but so are the Royal Mail and every UK mobile phone network. Legislators have sought to ensure that criminals and terrorists cannot hide from detection by merely using one form of communication over another. Although the types of communication are wide, the power to intercept the content of communications (or the power to access data about the communication) is not provided lightly nor widely. It can only be used relation to the prevention and detection of acts of terrorism and other national security interests and for the prevention and detection of serious crime and in order to safeguard the economic well-being of the UK. Even within these areas, the powers can only be legitimately deployed when it is necessary and proportionate to do so. Olswang LLP
4 The set of government bodies with the rights to intercept these communications naturally are limited to those with investigation and detection remits over the types of offences listed above. As one might expect, therefore, the security services, police forces, local authorities and others can request the information from the relevant communication service provider. Despite this narrow set of intercepting bodies, last year, UK authorities issued almost two-thousand intercept warrants, prompted by "growing problems from serious crime and threats to national security. In the same period, UK public authorities as a wholesubmitted over half-a-million requests for communications data. Whilst nearly two thirds of these requests were for subscriber data (usually in the form of enquiries to determine who owns a mobile phone) there will be some enterprises who see this figure and make the decision that they want to keep their data away from the risks of interception. If they make that decision, after they cancel their phone contracts and disconnect from the Internet, they should remember also to stop sending and receiving letters and parcels too. Clive Gringras Head of Technology T: E: clive.gringras@olswang.com The information contained in this update is intended as a general review of the subjects featured and detailed specialist advice should always be taken before taking or refraining from taking any action. Olswang LLP
5 Berlin Brussels London Madrid Paris Thames Valley +49 (0) (0) (0)
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
More informationEXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of
More informationInterception of Communications Code of Practice. Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000
Interception of Communications Code of Practice Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000 Draft for public consultation February 2015 Contents Contents... 2 1. General...
More informationOnline Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
More informationCONSULTATION PAPER ON A CODE OF PRACTICE FOR VOLUNTARY RETENTION OF COMMUNICATIONS DATA
CONSULTATION PAPER ON A CODE OF PRACTICE FOR VOLUNTARY RETENTION OF COMMUNICATIONS DATA A consultation paper March 2003 CONTENTS 1. Executive Summary 2. Introduction 3. Responses to the Consultation 4.
More informationTHE UK S ANTI-MONEY LAUNDERING LEGISLATION AND THE DATA PROTECTION ACT 1998 GUIDANCE NOTES FOR THE FINANCIAL SECTOR. April 2002
THE UK S ANTI-MONEY LAUNDERING LEGISLATION AND THE DATA PROTECTION ACT 1998 GUIDANCE NOTES FOR THE FINANCIAL SECTOR April 2002 Introduction 1. This guidance has been prepared by the Government departments
More informationDRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL
DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL INTRODUCTION EXPLANATORY NOTES 1. These explanatory notes relate to the Draft Data Retention and Investigatory Powers Bill. They have been prepared by
More informationCloud and surveillance
Cloud and surveillance (These notes formed the basis of Neil Brown s panel session at Broad Group s Cloud Law European Summit on 25th November 2014. CC BY 2.0) Ladies and gentleman, I am delighted to be
More informationTrust and transparency. Small Business, Enterprise and Employment Bill: Trust and transparency
Small Business, Enterprise and Employment Bill: 1 Government proposals to increase transparency of ownership and control of UK businesses came a step closer on 25 June 2014 with the publication of the
More informationExclusive: Storm over Big Brother database
Joan Smith: The male-female divide gets worse as you grow older Exclusive: Storm over Big Brother database By Robert Verkaik and Nigel Morris Wednesday, 15 October 2008 Share Print Email Text Size Normal
More informationDraft Communications Data Bill
Draft Communications Data Bill Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty June 2012 Cm 8359 20.00 Crown copyright 2012 You may re-use this information
More informationInquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014
Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 AUSTRALIAN HUMAN RIGHTS COMMISSION SUBMISSION TO THE PARLIAMENTARY JOINT COMMITTEE ON INTELLIGENCE AND
More informationRetention of Communications Data Code of Practice
Retention of Communications Data Code of Practice Pursuant to regulation 10 of the Data Retention Regulations 2014 and section 71 of the Regulation of Investigatory Powers Act 2000 Draft for public consultation
More informationSTFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
More informationSurveillance Camera Code of Practice. June 2013
Surveillance Camera Code of Practice June 2013 Surveillance Camera Code of Practice Presented to Parliament Pursuant to Section 30 (1) (a) of the Protection of Freedoms Act 2012 June 2013 London: The Stationery
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More information7 August 2015. I. Introduction
Suggestions for privacy-related questions to be included in the list of issues on Hungary, Human Rights Committee, 115th session, October-November 2015 I. Introduction 7 August 2015 Article 17 of the International
More informationTemplate for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)
More informationEUROPEAN CENTRAL BANK
17.2.2005 C 40/9 EUROPEAN CTRAL BANK OPINION OF THE EUROPEAN CTRAL BANK of 4 February 2005 at the request of the Council of the European Union on a proposal for a directive of the European Parliament and
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed
More informationMI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.
Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. MI5 Discretion is vital. You should not discuss your application, other than with your partner or a close
More informationNine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
More informationData Privacy in the Cloud: A Dozen Myths & Facts
Data Privacy in the Cloud: A Dozen Myths & Facts March 7-9 Washington DC Presented by: Barbara Cosgrove, Chief Security Officer, Workday, Inc. Lothar Determann, Partner, Baker & McKenzie LLP We re taking
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationTHOMSON REUTERS HUMAN RIGHTS LAW CONFERENCE 2014. Privacy, data retention and state surveillance: Digital Rights Ireland.
THOMSON REUTERS HUMAN RIGHTS LAW CONFERENCE 2014 Privacy, data retention and state surveillance: Digital Rights Ireland Jessica Simor QC Matrix chambers 1. Anya has spoken about Costeja. That case raises
More informationAn overview of UK data protection law
An overview of UK data protection law Our team Vinod Bange Partner +44 (0)20 7300 4600 v.bange@taylorwessing.com Graham Hann Partner +44 (0)20 7300 4839 g.hann@taylorwessing.com Chris Jeffery Partner +44
More informationOFFICIAL. Operational Case for the Retention of Internet Connection Records
Operational Case for the Retention of Internet Connection Records 1 Contents Chapter Page 1 Key Facts 3-5 2 What is an ICR? 6 3 The Value of ICRs 7 4 Why is there a problem? 8 5 How does this problem relate
More informationSport and Sports Betting Integrity Action Plan Britain s approach to address risks to the integrity of sport and sports betting
Sport and Sports Betting Integrity Action Plan Britain s approach to address risks to the integrity of sport and sports betting Version 2.0 September 2015 Page 1 of 10 Sport and sports betting integrity
More informationPrivacy, data retention and terrorism
Page 1 of 6 18th BILETA Conference:Controlling Information in the Online Environment April, 2003 QMW, London Privacy, data retention and terrorism Diane Rowland University of Wales, Aberystwyth Introduction
More informationInsights and Commentary from Dentons
dentons.com Insights and Commentary from Dentons On March 31, 2013, three pre-eminent law firms Salans, Fraser Milner Casgrain, and SNR Denton combined to form Dentons, a Top 10 global law firm with more
More informationRetention of Communications Data
March 2015 Retention of Communications Data Code of Practice Retention of Communications Data Code of Practice Presented to Parliament pursuant to section 71(4) of the Regulation of Investigatory Powers
More informationA GUIDE TO CRIMINAL INJURIES COMPENSATION
A GUIDE TO CRIMINAL INJURIES COMPENSATION Being a victim of crime such as physical or sexual assault can have significant and long-term consequences for a woman s health and wellbeing. If you have experienced
More informationHow to Monitor Employee Web Browsing and Email Legally
WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business
More informationData Retention and Investigatory Powers Bill
Data Retention and Investigatory Powers Bill CONTENTS Retention of relevant communications data 1 Powers for retention of relevant communications data subject to safeguards 2 Section 1: supplementary Investigatory
More informationCCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
More information29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States
29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States Key data protection points for the trilogue on the data protection directive in the field
More informationFive Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States
Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States Cloud computing is one of the Internet s great innovations, enabling individuals
More informationA GUIDE TO COMPLETING THE RIP(S)A FORMS FOR COVERT SURVEILLANCE AND CHIS
The Regulation of Investigatory Powers (Scotland) Act 2002 A GUIDE TO COMPLETING THE RIP(S)A FORMS FOR COVERT SURVEILLANCE AND CHIS By Ibrahim Hasan LL.B(Hons) Solicitor CONTENTS 1. Author biography 2
More informationStreet Bail. Head of Custody. OBSU Policy Unit
PD 524 Type of Document: Street Bail Procedure Version: 1.4 Registered Owner: Author: Head of Custody OBSU Policy Unit Effective Date: July 2014 Review Date: July 2016 Replaces document (if applicable)
More informationGuidance on political campaigning
I ICO guidance Guidance on political campaigning 3 Guidance on political campaigning Data Protection Act Privacy and Electronic Communications Regulations Contents Introduction... 3 A. Why comply?... 5
More informationHOW WILL FRANCHISORS IN EUROPE MEET THE CHALLENGES EU PROPOSED CYBERCRIME DIRECTIVE
HOW WILL FRANCHISORS IN EUROPE MEET THE CHALLENGES OF THE PROPOSED CYBERCRIME DIRECTIVE? Dr Mark Abell, Graeme Payne and Joseph Jackson, Bird & Bird, London, UK Cybersecurity is arguably receiving more
More informationThank you for your request for information regarding ACPO UAS Steering Group which has now been considered.
c/o PO BOX 481 Fareham Hampshire PO14 9FS Tel: 02380 674255 Email: acpo.request@foi.pnn.police.uk 29/08/2013 Dear Mr Jones FREEDOM OF INFORMATION REQUEST REFERENCE NUMBER: 000113/13 Thank you for your
More informationAcquisition and Disclosure of Communications Data
March 2015 Acquisition and Disclosure of Communications Data Code of Practice Acquisition and Disclosure of Communications Data Code of Practice Presented to Parliament pursuant to section 71(4) of the
More informationMark Corcoran interviews Timothy Pilgrim Australian Privacy Commissioner.
1 Foreign Correspondent. Mark Corcoran interviews Timothy Pilgrim Australian Privacy Commissioner. Q What s your perspective on the significance of this emerging technology, UAV or drone technology, as
More informationCommittee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
More informationPrivacy & Data Security: The Future of the US-EU Safe Harbor
Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT
More informationInsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry
InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry Dino Wilkinson Partner Norton Rose Fulbright (Middle East) LLP 3 February 2015 The growing challenge of cyber risks From
More informationData Protection Division Guidance Note Number 10/08
Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008
More informationThe New Misleading Marketing Regime May 2008
The New Misleading Marketing Regime May 2008 www.olswang.com 1 On 26 May 2008 two new sets of regulations will come into force in the UK, the first of which protects consumers from unfair, misleading and
More informationNo Cloud Over the Patriot Act. March 2012 M-12544192-1 1
No Cloud Over the Patriot Act March 2012 M-12544192-1 1 1. Introduction 1.1. All governments, including Ireland, have become more alert to national security risks in the wake of the 9/11 attacks and the
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES GREEN PAPER
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 11.11.2009 COM(2009) 624 final GREEN PAPER on obtaining evidence in criminal matters from one Member State to another and securing its admissibility
More informationMinister Shatter presents Presidency priorities in the JHA area to European Parliament
Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency
More informationMonitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
More information2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy
Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April
More informationT.38 fax transmission over Internet Security FAQ
August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes
More informationETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive
October 2005 ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive INTRODUCTION 1.- Purpose of the document This document
More informationRoyal Air Force Club
11 th Annual Legal Day Friday, 22 nd January, 2010 This will once again be held at the Royal Air Force Club Piccadilly, London. This year, there is no specific theme for the seminar. Rather, the ISSG has
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationNorwegian Data Inspectorate
Norwegian Data Inspectorate Narvik kommune Postboks 64 8501 NARVIK Norway Your reference Our reference (please quote in any reply) Date 1111/1210-6/PEJA 11/00593-7/SEV 16 January 2012 Notification of decision
More informationREPORT ON. CONFIDENTIALITY AND DATA PROTECTION IN THE ACTIVITY OF FIUs 1. (Good practices)
EN EN EN Brussels, 28 April 2008 EU FINANCIAL INTELLIGENCE UNITS' PLATFORM REPORT ON CONFIDENTIALITY AND DATA PROTECTION IN THE ACTIVITY OF FIUs 1 (Good practices) The EU Financial Intelligence Units'
More informationJurisdiction in the Cloud: Clear Rules to Build Confidence in Cloud Computing. Steve Mutkoski Worldwide Policy Director Microsoft Corporation
Jurisdiction in the Cloud: Clear Rules to Build Confidence in Cloud Computing Steve Mutkoski Worldwide Policy Director Microsoft Corporation Cloud Computing and Jurisdiction Why cloud ma,ers: Dis3nguishing
More informationPIPEDA and Online Backup White Paper
PIPEDA and Online Backup White Paper The cloud computing era has seen a phenomenal growth of the data backup service industry. Backup service providers, by nature of their business, are compelled to collect
More informationPROVINCE OF BRITISH COLUMBIA. Summary Review. Anti-Money Laundering Measures at BC Gaming Facilities
PROVINCE OF BRITISH COLUMBIA Summary Review Anti-Money Laundering Measures at BC Gaming Facilities February 2011 2 P a g e EXECUTIVE SUMMARY In early January 2011, a series of news reports ran on cash
More informationDisclosure Scheme. The Domestic Violence. Keeping People Safe from Domestic Violence
The Domestic Violence Disclosure Scheme Keeping People Safe from Domestic Violence This leaflet is for you if you are in a relationship and you are worried that your partner may have been abusive in the
More informationKnowledge. Practical guide to competition damages claims in the UK
Knowledge Practical guide to competition damages claims in the UK Practical guide to competition damages claims in the UK Contents Reforms to damages litigation in the UK for infringements of competition
More informationA tool for small-to-medium sized businesses. Anti-Money Laundering and Counter-Terrorism Financing Act 2006
Australian Government Australian Transaction Reports and Analysis Centre Risk management A tool for small-to-medium sized businesses Anti-Money Laundering and Counter-Terrorism Financing Act 006 Contents
More informationPurpose of this document
Independent Financial Advisors (IFAs), Mortgage Brokers and Retail Intermediaries: Identifying Risks to your Business and Reporting Suspicious Activity This is a United Kingdom Financial Intelligence Unit
More informationFSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers
July 2011 FSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers FSA reports on how banks deal with high-risk customers, correspondent banking 1
More informationClient Update Fourth Anti-Money Laundering Directive Comes Into Force
1 Client Update Fourth Anti-Money Laundering Directive Comes Into Force OVERVIEW LONDON Karolos Seeger kseeger@debevoise.com Matthew Howard Getz mgetz@debevoise.com Alex Parker aparker@debevoise.com Ceri
More informationI begin by observing that Intelligence Agencies in any free society should not be treated with unqualified enthusiasm.
WADHAM LECTURE 8 th May, 2014, Wadham College, Oxford Intelligence Agencies in the Internet Age - Public Servants or Public Threat? Sir Malcolm Rifkind MP Chairman of the Intelligence and Security Committee
More informationHMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More informationHampstead Parochial CofE Primary School Data Protection Policy Spring 2015
Hampstead Parochial CofE Primary School Data Protection Policy Spring 2015 1. Introduction and Scope 1.1 The Data Protection Act 1998 is the law that protects personal privacy and applies to any school
More informationCOMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Rebuilding Trust in EU-US Data Flows
EUROPEAN COMMISSION Brussels, 27.11.2013 COM(2013) 846 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Rebuilding Trust in EU-US Data Flows EN EN 1. INTRODUCTION: THE
More informationINFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
More informationChanges to disclosure and barring: What you need to know
Changes to disclosure and barring: What you need to know 2 Changes to disclosure and barring: what you need to know What is the purpose of this leaflet? This leaflet tells you about important changes which
More informationSection II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY
Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,
More informationQuestions and Answers about ANPR systems
Questions and Answers about ANPR systems What is Automatic Number Plate Recognition (ANPR)? ANPR devices work by scanning vehicle registrations and checking them against information stored in databases,
More informationFirewalls for small business
By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try
More informationEncryption and Digital Signatures
GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/
More informationAustralia s counter-terrorism laws
Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist
More informationCivil Rights, Security and Consumer Protection in the EU
Internationale Politikanalyse Internationale Politikanalyse International Policy Analysis European Integration Working Group* Civil Rights, Security and Consumer Protection in the EU Civil Liberties: Data
More informationThe USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
More informationMonitoring Employee Communications: Data Protection and Privacy Issues
Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,
More informationCOMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
EUROPEAN COMMISSION Brussels, 20.9.2011 COM(2011) 573 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE
More informationStatutory Disclosure Guidance. Second edition August 2015
Statutory Disclosure Guidance Second edition August 2015 Statutory guidance to chief officers of police on providing information for inclusion in enhanced criminal record certificates PURPOSE OF THIS GUIDANCE
More informationEnforced subject access (section 56)
ICO lo Enforced subject access (section 56) Data Protection Act Contents Introduction... 2 Overview.3 The criminal offence.... 3 Exceptions and penalties.... 7 Relevant records....... 8 Other considerations
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More informationProtecting betting integrity
Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are
More informationSafeguarding your organisation against terrorism financing. A guidance for non-profit organisations
Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN:
More informationIn accordance with Article 14(5) of the Rules of Procedure of the Board of Supervisors, 2 the Board of Supervisors has adopted this Opinion.
EBA-Op-2016-07 12 April 2016 Opinion of the European Banking Authority on the application of customer due diligence measures to customers who are asylum seekers from higher-risk third countries or territories
More informationCloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
More information(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX ("Police Force"),
DATE OF INFORMATION SHARING AGREEMENT JULY 2015 PARTIES (1) LIVE NATION (MUSIC) UK LIMITED (Company Number 02409911) whose registered office is at 2 nd Floor, Regent Arcade House, 19-25 Argyll Street,
More informationTHE EUROPEAN UNION, of the one part, and. THE UNITED STATES OF AMERICA, of the other part, Together hereinafter referred to as "the Parties",
AGREEMENT BETWEEN THE EUROPEAN UNION AND THE UNITED STATES OF AMERICA ON THE PROCESSING AND TRANSFER OF FINANCIAL MESSAGING DATA FROM THE EUROPEAN UNION TO THE UNITED STATES FOR PURPOSES OF THE TERRORIST
More informationThe Internet and Corporate Reputation
The Internet and Corporate Reputation What you need to know Windfall Media How the internet is affecting the corporate reputation of AIM quoted companies Online reputation The power of search engines and
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 February 2005 6566/05 LIMITE COPEN 35 TELECOM 10
COUNCIL OF THE EUROPEAN UNION Brussels, 24 February 2005 6566/05 LIMITE COPEN 35 TELECOM 0 REPORT from : Working Party on cooperation in criminal matters to : Article 36 Committee No. prev. doc. : 5098/04
More informationThe HR Skinny: Effectively managing international employee data flows
The HR Skinny: Effectively managing international employee data flows Topics we will cover today Laws affecting HR data flows HR international data protection challenges and strategic solutions Case study
More informationCriminal Records Checks on Councillors
Corporate Governance and Standards Report Report of Executive Head of Governance Author: John Armstrong, Democratic Services Manager Tel: 01483 444102 Email: john.armstrong@guildford.gov.uk Lead Councillor
More informationGeneral Terms & Conditions
General Terms & Conditions Service Provider This section sets out the terms and conditions under which BestForeignExchange.com will provide you (the customer) with your foreign exchange needs. For the
More informationPO BoxA147 Sydney South NSW 1235 info@alhr.org.au www.alhr.org.au. 10 November 2014
PO BoxA147 Sydney South NSW 1235 info@alhr.org.au www.alhr.org.au The Committee Secretary Parliamentary Joint Committee on Intelligence and Security PO Box 6021 Parliament House Canberra ACT 2600 10 November
More information