Charter of Consumer Rights in the Digital World
|
|
|
- Beatrice Townsend
- 10 years ago
- Views:
Transcription
1 DOC No: INFOSOC DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create the preconditions for expanded participation in political, economic, social and cultural life which help sustain democratic institutions. They facilitate the free exchange of ideas including across borders and increase access to information. Digital technologies transform the way people use media. They also offer access to new services and enable new business models. As is the case in the analogue world, however, it is important to ensure that there is a fair balance between the interests of consumers and providers of services. Mechanisms are required that enable consumers to effectively assert and protect their rights in the digital world and that provide protection from the damage caused by misuse and criminal attacks. Consumers should also be fully informed about specific risks and new threats so that they can enter the digital market as equal partners and make well informed decisions. The increasing significance of digital media for the modern economy requires a comprehensive consumer policy and the protection of consumer rights in the digital world. In our global society, there should also be fair and non discriminative access to the multifaceted spectrum of forms of cultural expression in the spirit of the UNESCO convention on the protection of cultural diversity. The Charter for Consumer Rights in the Digital World identifies the core rights that the members of TACD regard as indispensable to meeting the challenges presented by the digital world and the utilization of its potentials. These core rights are based on a wide range of TACD resolutions that have previously set out the interests of consumers in the digital world. They are the: 1. Right to access neutral networks 2. Right to access digital media and information 3. Right to secure networks and services 4. Right to privacy and data protection 5. Right to software interoperability 6. Right to barrier free access and equality 7. Right to pluralistic media 1
2 1. Right to access neutral networks 1 The Internet is an increasingly important source of information for consumers. It has become a basic means of communication for individuals and the most important means of access to knowledge and general information. The Internet has also become a platform for consumers access to participate in the public, democratic debate. There is a danger, however, that Internet service providers (ISPs) may block or degrade the access of consumers to certain content and applications, or limit the types of equipment that can be attached to networks. Such behaviour can severely limit the usefulness of the Internet and frustrate consumers. The TACD believes that consumers should have the right to access neutral networks. That means that consumers have the right to attach devices of their choice, the right to access or provide content, services and applications of their choice, and the right for this access to be free from discrimination according to source, destination, content and type of application. The TACD therefore calls upon: Governments to recognise, promote and encourage principles of net neutrality. Regulators to assess the level of competition in broadband Internet access, and to take steps to ensure that consumers have continued access to a neutral network. Regulators to prevent ISPs and network providers from engaging in unfair discrimination against content, services, applications, or devices. Telecommunications and competition regulators to require that ISPs and network providers provide fair and accurate information regarding Internet service plans, including average estimated speeds, any existing caps on bandwidth, and regarding content, services, applications or devices that may be blocked or degraded on their networks. ISPs and network providers should also detail their compliance with net neutrality principles and regulations. ISPs to provide consumers with information about limitations on Internet service plans, as well as any network management occurring on their networks and how that management affects access to particular content, service, application, or devise. Such management should fall within the scope of legitimate network management. 2. Right to access digital media and information 2 In the digital world, there should be a fair balance between the interests of consumers and providers of digital services. Digital Rights Management (DRM) systems, however, continue to be used to restrict the deployment of digital media to the clear disadvantage of consumers, prevent free competition and slow innovation. Furthermore, information about DRM systems is often hidden to consumers or incomprehensible. Consequently, consumers should have the right to access digital media and information. DRMs should only be used under the following cumulatively effective conditions: The practical use of DRMs on the Internet must not generate unnecessary vulnerabilities with regard to consumers equipment or personal information. User profiles must not be created. The anonymity of users of digital media must be protected. 2
3 Copyright owners must not hinder consumers use of digital media within the framework of prevailing legal prescriptions. This particularly applies to the right to make copies for private use and the right to transform content for private use. Because the relevant legal situation is often complicated, copyright infringements for non commercial reasons must not be criminalized. The impact of DRMs on functionality should be limited to what is necessary to protect copyright and should not otherwise affect a consumers use of content. The format of the storage medium must not be used for protectionist barriers that prevent consumers from exercising free choice and their legal rights. Consumers should be allowed to decide for themselves what player or platform they will use, and to move any content they have bought to any medium of their choice. Consumers should be allowed to circumvent DRMs if any of their usage rights are not respected. Copyright holders and providers of digital media must provide users at an early stage with comprehensive information regarding the scope of use permitted for digitalized and copyright protected content. Enterprises must also provide fair, clear and comprehensible contractual conditions. These measures are required to ensure that consumer behaviour is legal and in line with market requirements and to avoid civil proceedings against copyright infringements. Consumers should have clear and fair rights to use digital material and not be penalized for simply moving with the times. The industry should develop new business options that are consistent with consumption patterns and meet consumers needs. 3. Right to secure networks and services 3 Consumer confidence in the security and reliability of the digital world is a decisive precondition for the intensive use of digital services. Ensuring such confidence requires the right to secure networks and services. Furthermore, measures for significantly increasing consumer awareness and competence in relation to data and system security should be provided. The TACD calls for businesses to observe the following fundamental principles to provide secure networks and services: When choosing a security system, providers of Internet based services must ensure that the risks to consumers are minimized as much as possible. Security must be integrated into the technology. That means that security should be the default setting. Internet access providers must ensure that access to online services and offerings is free of manipulation. This presupposes a high standard for the security and reliability of networks and services. The providers of Internet based services must provide consumers of particularly sensitive online services such as online banking and online auctions with regular and timely information regarding current security risks and effective protective measures. Providers of digital products and services should be made legally accountable for losses as a result of damage caused by non observance of appropriate security measures. 4. Right to privacy and data protection 3
4 In the digital world consumers are subject to far more intrusive data gathering by businesses and government than in the past. Moreover, as their personal information is collected, large organizations have become increasingly secretive. Personal information is also more often used for data mining, behavioural targeting for marketing purposes, compiling personal name records and credit scoring. There is a risk that these developments undermine basic human rights of individuals to autonomy and control of their personal information. There is also a danger that security breaches and identity theft increase and new threats to trust and confidence in the digital marketplace emerge. Therefore, consumers should have the right to privacy and data protection. The TACD calls for: Business and governments to be subjected to enforceable Fair Information Practices that give rights to consumers and impose responsibilities on organizations that collect and use personal data. Business and governments to use effective and updated technology to protect confidential personal data against unauthorized use. Business and governments to inform consumers of the measures they can take to protect their own data. Important in this context is information about the form, collection, processing and use of the relevant data. Business and governments to refrain from making the use of services or the claim to special offers contingent on agreement by the consumer to the use of his or her data for other purposes. Businesses to ensure that data about consumers is collected, processed and used only with their expressed and voluntary permission acquired through an opt in procedure in so far as the use of this data is not obligatory for the direct settlement of a contract. Governments to ensure that programs to combat terrorism and organised crime do not undermine self determination in terms of personal information and the protection of individuals privacy. Providers of broadcast and media services as well as governments to preserve the preconditions for free and anonymous use of media in the future. 5. Right to software interoperability 4 Software is a key driver for Information and Communication Technologies. It acts as a glue between the various elements that ultimately deliver the required services to consumers. Yet, from the consumer perspective the usefulness of software is closely related to its ability to work with other software. Therefore, software interoperability is of major importance. Software interoperability ensures that different programmes and applications can communicate or transfer data. For consumers software interoperability is important since interoperability facilitates, inter alia, access to better and more suitable software products and online services; it lowers switching costs; it safeguards data (such as documents, pictures or videos) over a long period of time; it makes more likely that hardware can be used for longer periods of time. TACD fears, however, that businesses limit the interoperability of their software and devices. The TACD therefore calls on governments to: 4
5 Analyse with a clearly defined consumer welfare perspective efficiency, cost, flexibility of all tools available to achieve interoperability. Close gaps in the legal framework that hinder the promotion of interoperability. Promote the creation and adoption of non proprietary hardware and software interfaces through a combination of policy, legislation, regulation and procurement policies in addition to voluntary standards development activities. Adopt and make use of traditional ex ante regulatory approaches. Apply effectively, enforce vigorously and adapt where necessary traditional consumer protection laws to the digital environment by amending information requirements (for example through clear/simple warning labels on products to signal lack of interoperability), adapting unfair commercial practices laws, clarifying unfair contract terms and sales guarantees legislation. Promote open standards through procurement. 6. Right to barrier free access and equality All people within a society, irrespective of their social status, worldviews or age group and irrespective of any disabilities they may have are entitled to participate in the life of that society. They have a right to the free exchange of information and opinion and to individual integration in the world of work. The precondition for this is the right to barrier free access and equality. That means that access to digital services should be provided for all consumers irrespective of their personal and/or technical possibilities. Moreover the complexity of the digital world needs to be reduced and its legal and technical aspects need to be made more manageable for all consumers. TACD calls on businesses and governments to ensure barrier free access and equality by: National governments and European institutions to carefully stimulate the provision of barrier free services by strengthening existing legislation (such as public procurement rules and accessibility requirements in public tendering) and to introduce a horizontal legislative framework addressing the accessibility of ICT products and services not covered by sectoral legislation. Making digital products and services accessible for use by people with disabilities based on national, regional or international standards and other specifications. Creating websites that comply with the accessibility guidelines of the World Wide Web Consortium (W3C). Creating digital products and services that are easy to use by people of all ages, levels of education, and social status, and providing easy to understand instructions and tutorials for their use. 7. Right to Pluralistic Media The Internet offers a wonderful platform for innovation, growth, and the ability of people to express their views. New forms of media are emerging that challenge old paradigms and enable broader public participation. At the same time, dominant Internet firms are moving to consolidate their control over the Internet, to increase the profiling of Internet users, and to manipulate the information and 5
6 services that consumers receive. Two of the three largest media firms in the world are Internet companies, not traditional media companies. TACD believes that consumers have the right to pluralistic media. It is vitally important for Internet users and governments to develop a better understanding of the challenge industry consolidations pose to the open Internet and specifically how dominant Internet firms are able to leverage their position in one market sector to discourage competition other market sectors. TACD calls upon governments to: Assess the impact that the growing concentration of Internet firms will have on the growth of the Internet and the future of the Internet economy. Ensure that competition law is enforced paying particular attention to the increasing vertical integration in this sector. Establish privacy and consumer safeguards as a central requirement in the context of merger review for Internet firms. 1 See also: Resolution on Net Neutrality (Infosoc 36 08) and DRAFT Resolution on The role of Internet Service Providers (ISPs) in mediating online content and communications (IP 04 08) 2 See also: Resolution and Background Paper on Digital Rights Management, The Sequel (IP 03 07): bin/db.cgi?page=view&config=admin/docs.cfg&id=307 and Resolution on Digital Rights Management (IP 01.05): 3 See also: Resolution on Internet Security (Infosoc 34 07): and Resolution on Identity Theft, Phishing and Consumer Confidence (Infosoc 33 07): 4 See also: DRAFT Resolution on Software Interoperability and Open Standards (Infosoc IP 35 08) 6
BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL
BEREC report on IPinterconnection in the context of Net Neutrality BEUC statement Contact: Guillermo Beltra [email protected] Ref.: X/2012/062-09/08/2012 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
DOC NO: INFOSOC 52/14 DATE ISSUED: June 2014. Resolution on the open and neutral Internet
DOC NO: INFOSOC 52/14 DATE ISSUED: June 2014 Resolution on the open and neutral Internet Introduction This resolution builds on the TACD net neutrality resolution of April 2010 1, which called for policies
4-column document Net neutrality provisions (including recitals)
4-column document Net neutrality provisions (including recitals) [Text for technical discussions. It does not express any position of the Commission or its services] Proposal for a REGULATION OF THE EUROPEAN
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
Declaration of Internet Rights Preamble
Declaration of Internet Rights Preamble The Internet has played a decisive role in redefining public and private space, structuring relationships between people and between people and institutions. It
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD
AFRICAN DECLARATION on Internet Rights and Freedoms
AFRICAN DECLARATION on Internet Rights and Freedoms Last updated 28 August 2014 Emphasising that the Internet is an enabling space and resource for the realisation of all human rights, including the right
BEREC Guidelines for Quality of Service in the scope of Net Neutrality
BEREC Guidelines for Quality of Service in the scope of Net Neutrality BEUC response to the public consultation Contact: Guillermo Beltrà [email protected] Ref.: X/2012/060-27/07/2012 BUREAU EUROPÉEN DES
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
(DRAFT)( 2 ) MOTION FOR A RESOLUTION
05 Motions for resolutions, and other B8 documents 05_09. Motions to wind up debate on statements by other institutions: Rule 123(2) Cover page EUROPEAN PARLIAMENT 2014 2019 Plenary sitting [.2014] B[8-/2014](
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
EDRi s. January 2015. European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70
EDRi s Red lines on TTIP January 2015 European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70 ABOUT EDRI European Digital Rights is a network of 34 privacy and
CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
PROPOSED REVISION TO ANNEX I OF THE DECLARATION ON INTERNATIONAL INVESTMENT AND MULTINATIONAL ENTERPRISES
Preface PROPOSED REVISION TO ANNEX I OF THE DECLARATION ON INTERNATIONAL INVESTMENT AND MULTINATIONAL ENTERPRISES OECD GUIDELINES FOR MULTINATIONAL ENTERPRISES 1. The OECD Guidelines for Multinational
ICC Guidelines on Whistleblowing
ICC Guidelines on Whistleblowing Prepared by the ICC Commission on Anti-Corruption A. Introduction 1. No abatement of corruption and economic fraud Fraud remains one of the most problematic issues for
Draft WGIG Issues Paper on E-Commerce
Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not
BoR (16) 94. BEREC Guidelines on the Implementation by National Regulators of European Net Neutrality Rules
BEREC Guidelines on the Implementation by National Regulators of European Net Neutrality Rules June 2016 Contents Background and general aspects... 3 Article 1 Subject matter and scope... 4 Article 2 Definitions...
ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things
ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things November 2008 Executive Summary The Internet of the future
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
RECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE
RECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE UNESCO, Paris CONTENTS PREAMBLE... 1 Development of multilingual content and systems... 2 Facilitating
Country: Canada. Score: 75.79 Rank: 9/24
Score: 75.79 Rank: 9/24 Canada is a world leader in ICT adoption and innovation and has played a leading role in the development of international standards. It has a strong commitment to free trade and
protection rights are limited. protection rights are limited.
Score: 44.09 Rank: 22 / 24 Brazil is a fast-growing economy that recognizes the importance of ICT and the digital economy. However, some gaps in law and regulation have acted as barriers to ICT innovation
Protecting betting integrity
Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are
How To Respect The Agreement On Trade In Cyberspace
CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
COMESA Guidelines on Free and Open Source Software (FOSS)
COMESA Guidelines on Free and Open Source Software (FOSS) Introduction The COMESA Guidelines on Free and Open Source Software are a follow-up to the COMESA Regional FOSS Framework of 2009 whose main objective
General Assembly. United Nations A/66/359
United Nations A/66/359 General Assembly Distr.: General 14 September 2011 Original: English Sixty-sixth session Item 93 of the provisional agenda* Developments in the field of information and telecommunications
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
OECD Policy Guidance on Convergence and Next Generation Networks
2 OECD POLICY GUIDANCE ON CONVERGENCE AND NEXT GENERATION NETWORKS OECD Policy Guidance on Convergence and Next Generation Networks Introduction The digitalisation of content, the emergence of IP, and
5439/15 PT/ek 1 DG E
Council of the European Union Brussels, 20 January 2015 5439/15 Interinstitutional File: 2013/0309 (COD) TELECOM 17 COMPET 12 MI 28 CONSOM 13 CODEC 70 NOTE from: Presidency to: Delegations No. Cion prop.:
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
General Assembly. United Nations A/69/723
United Nations A/69/723 General Assembly Distr.: General 13 January 2015 Original: English Sixty-ninth session Agenda item 91 Developments in the field of information and telecommunications in the context
Promoting Cross Border Data Flows Priorities for the Business Community
Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing
Presidency conclusions on establishing a strategy to combat the manipulation of sport results
COU CIL OF THE EUROPEA U IO EN Presidency conclusions on establishing a strategy to combat the manipulation of sport results 3201st EDUCATIO, YOUTH, CULTURE and SPORT Council meeting Brussels, 26 and 27
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE)
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Regulatory Policy Standardisation Brussels, 9 th November 2005 Doc.: 34/2005 Rev. 1 EN COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34
Internet (over-the-top) services and challenges to regulation Adi Cahan-Gonen Senior Professional Advisor to the Director-General
Internet (over-the-top) services and challenges to regulation Adi Cahan-Gonen Senior Professional Advisor to the Director-General Israel: short snapshot Israel is a developed ICT economy Widespread adoption
Resolution on E-commerce
DOC NO: INFOSOC 40-09 DATE ISSUED: DECEMBER 2009 Resolution on E-commerce The growth of e-commerce and the emergence of new forms of virtual commercial transactions such as mobile commerce, online auctions
COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:
Network neutrality. Guidelines for Internet neutrality. Version 1.0 24 February 2009
Network neutrality Guidelines for Internet neutrality Version 1.0 24 February 2009 The guidelines in general These network neutrality guidelines have been drawn up by the Norwegian Post and Telecommunications
Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, 9.12.2015 COM(2015) 627 final 2015/0284 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on ensuring the cross-border portability of online content
Information security due diligence
web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 [email protected] www.watsonhall.com Identifying information security risk for web applications
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Safeguarding your organisation against terrorism financing. A guidance for non-profit organisations
Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN:
6482/15 GB/ek 1 DG E2B
Council of the European Union Brussels, 25 February 2015 (OR. en) Interinstitutional File: 2013/0309 (COD) 6482/15 NOTE From: To: Presidency Delegations TELECOM 48 COMPET 57 MI 106 CONSOM 36 CODEC 239
CONSUMER INTERESTS IN ECO-DESIGN OF COMPLEX SET TOP BOXES
CONSUMER INTERESTS IN ECO-DESIGN OF COMPLEX SET TOP BOXES - COMMENTS ON THE PROPOSAL FOR A VOLUNATRY INDUSTRY AGREEMENT Contact: Sylvia Maurer [email protected] [email protected] Ref.: ANEC-PT-2009-EuP-054final
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
Ref. Ares(2014)1520151-13/05/2014. l(5)vodafone.com>
Ref. Ares(2014)1520151-13/05/2014 From: Vodafone Group" < Date: 25 Jul 2013 17:51:32 GMT+02:00 To: "Wolf-Dietrich.Grussmann(g)ec.europa.eu l(5)vodafone.com> Subject: virtual access products Dear Dieter,
A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Delegations will find attached a set of Presidency drafting suggestions concerning Articles 1-3 of the above proposal, as well as the Recitals.
COUNCIL OF THE EUROPEAN UNION Brussels, 11 February 2010 6092/10 Interinstitutional File: 2008/0140 (CNS) SOC 75 JAI 108 MI 39 NOTE from : The Presidency to : The Working Party on Social Questions on :
Department of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
The Committee of Ministers, under the terms of Article 15.b of the Statute of the Council of Europe,
Recommendation CM/Rec(2014)1 of the Committee of Ministers to member States on the Council of Europe Charter on shared social responsibilities 1 (Adopted by the Committee of Ministers on 22 January 2014
Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16
Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Summary The Northern Ireland Human Rights Commission (the Commission):
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
Mobile TV: The time to act is now
SPEECH/07/154 Viviane Reding Member of the European Commission responsible for Information Society and Media Mobile TV: The time to act is now Mobile TV Conference, International CeBIT Summit Hannover,
National. icr Policy
National icr Policy TABLE OF CONTENTS Forward Acknowledgements 1. Principles...1 1.0 Introduction...1 1.1 Vision...2 1.2 Mission...2 1.3 Policy Context...2 2. Policy Objectives...4 2.1 ICT Infrastructure...4
Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks
Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.
AGREEMENT AS AMENDED ON 06 DECEMBER 2002
INFORMATION & COMMUNICATION TECHNOLOGIES SECTOR SUMMIT AGREEMENT AS AMENDED ON 06 DECEMBER 2002 1. INTRODUCTION 1.1 At the Presidential Jobs Summit in 1998 Nedlac constituencies Government, organised Labour,
WOLTERS KLUWER COMPANY VALUES AND BUSINESS PRINCIPLES
WOLTERS KLUWER COMPANY VALUES AND BUSINESS PRINCIPLES Mission statement and introduction Wolters Kluwer s customers face critical decisions every day; and the need to get them right. That is why Wolters
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
ITU Global Cybersecurity Agenda (GCA)
International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.
ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
COMMISSION OF THE EUROPEAN COMMUNITIES COMMUNICATION FROM THE COMMISSION. Towards a European Charter on the Rights of Energy Consumers
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 5.7.2007 COM(2007)386 final COMMUNICATION FROM THE COMMISSION Towards a European Charter on the Rights of Energy Consumers EN EN 1. INTRODUCTION In the
Telefónica response to the consultation on the implementation of the Intellectual Property Rights Enforcement Directive
ID REGISTER: Telef05162 Telefónica response to the consultation on the implementation of the Intellectual Property Rights Enforcement Directive Telefónica welcomes the opportunity to comment on the findings
Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.
International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction
Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?
EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud
SUBSCRIBER PRIVACY NOTICE
PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current
European Commission Consultation document on Voice over IP
STELLUNGNAHME European Commission Consultation document on Voice over IP This paper provides the eco comment on the European Commission consultation document. eco is the association of German internet
