CSE 4482 Computer Security Management: Assessment and Forensics. Law and Ethics
|
|
- Blake Mathews
- 8 years ago
- Views:
Transcription
1 CSE 4482 Computer Security Management: Assessment and Forensics Law and Ethics Instructor: N. Vlajic, Fall 2013
2 Required reading: Management of Information Security (MIS), by Whitman & Mattord Chapter 12, pp
3 Learning Objectives Upon completion of this material, you should be able to: Differentiate between law and ethics. Identify major US laws that relate to the practice of information security. Identify relevant professional organizations and their Codes of Ethics.
4 Introduction
5 Introduction (cont.) Law written rules adopted & enforced by a government to define expected behavior these rules attempt to balance individual freedoms and social order, which may be in conflict laws are largely drawn from the ethics of a culture Ethics informal set of values and beliefs about right and wrong behavior some ethics are thought to be universal murder, theft, assault are legally and ethically unacceptable in most world s cultures Key difference between law and ethics: law caries the sanction of a governing authority and ethics do not!
6 Introduction (cont.) In majority of cases, what is legal is also ethical and the other way around. However, with the society operating a dynamic and ever-changing environment, there are cases when law and ethics are in conflict.
7 Introduction (cont.) Relationship between Law and Ethics Edward Snowden NSA Leak Case Breaking into Somebody s Account Screening of Web-traffic by Employer Harcourt%20Colledge%20Publishers-Donald%20F.%20Kuratko/chapter_6.htm
8 Introduction to Law
9 Introduction to Law Categories of Law in Canada and USA: Public Law(s): regulate 1) organization and functioning of the state 2) relationship between the state and its subjects concerned with matters that affect society as a whole deals with regulation of behavior generally Private Law(s): regulate relationship between individuals and groups that are not of public importance deals with disputes between parties regulates rights and duties of individuals to each other
10 Introduction to Law Subcategories of Law Public Law(s) Constitutional Law related to interpretation & application of the Constitution of Canada, including the Charter of R&F (freedom of expression & religion, freedom from unreasonable search & seizure, ) Administrative Law addresses actions and operations of government & government agencies Criminal Law deals with behaviors that results in injury to people and/or property (murder, break and enter, sexual assault, etc.) Private / Civil Law(s) Family Law deals with various relationships of family life Contract Law outlines requirements for legally binding agreements Tort Law seeks compensation for loss caused by negligence Property Law outlines relationship between individuals & property Labour Law outlines relationship between employers & employees
11 Criminal vs. Civil Law Case Criminal Law Procedure the victim (may) report the case to the police & they have the responsibility to investigate if charge has been properly laid & there is supporting evidence the Crown Prosecutor represents the case in the courts and public funds finance these services even if a victim starts a prosecution privately, the Attorney General has the power to take over the prosecution Civil Law Procedure the victim must take action to get a legal remedy or adequate compensation victim must hire a private lawyer & pay expenses of pursuing the matter the police does not get involved, beyond the point of restoring the order
12 Criminal vs. Civil Law Case (cont.) Criminal vs. Civil Law Principles In Criminal Law, to convict someone, the guilt must be proven beyond reasonable doubt. In Criminal Law, the sentence to the offender may include one or a combination of the following: fine restitution compensate for victim s loss or damages probation community service imprisonment In Civil Law, to convict someone, the guilt must be proven on balance of probabilities. In Civil Law, monetary remedies (damages) are most common.
13 Criminal vs. Civil Law Case (cont.) beyond reasonable doubt evidence = = clear and convincing evidence ( merely possibility that what is presented is true is not sufficient) balance of probabilities evidence = = evidence with 50% threshold (produces a belief that what is presented is more likely true than not true) More evidence is needed to find the defendant at fault in criminal than in civil ones.
14 Criminal vs. Civil Law Case (cont.)
15
16 Criminal vs. Civil Law Case (cont.) Every crime has two essential parts: the action or "actus reus" and the intent or "mens rea" (guilty mind). For example, the crime of arson has two parts: actually setting fire to a building and doing it wilfully and deliberately. Setting a fire by accident may not be a crime. For most criminal cases both the action and the intent must be proven. If either element is missing, then no crime has been committed.
17 Law and Computer Security attacker victim Is a DDoS a Civil or a Criminal offence? In US, as of 2008, DDoS is considered a criminal offence under Computer Misuse Act. In Canada, DDoS is also a criminal offence under Criminal Code 430: Unauthorized Use of Computer & Mischief.
18 Law and Computer Security (cont.) In the early days of computer security, information security professionals were pretty much left on their own to defend their systems against attacks. They did not have much help from the criminal and civil justice systems. When they did seek assistance from law enforcement, they were met with reluctance by overworked agents who did not have a basic understanding of how something that involved a computer could actually be a crime Fortunately, both our legal system and the man and women of law enforcement have come a long way over the past two decades CISSP: Certified Information Systems Security Professional Study Guide, by J. M. Steward, E. Tittel, M. Chapple (pp. 630)
19 Law and Computer Security (cont.) The first computer security issues addressed by legislators were those involving computer crime. Early computer crime prosecutions were attempted under traditional criminal law, and many were dismissed because judges thought that applying traditional law to this modern type of crime was too far of a stretch. Example: Hearsay evidence! Legislators responded by passing specific statutes that defined computer crime and laid out specific penalties for various crimes Every information security professional should have basic understanding of the law as it relates to information technology. However, the most important lesson to be learned is knowing when it is necessary to call in an attorney CISSP: Certified Information Systems Security Professional Study Guide, by J. M. Steward, E. Tittel, M. Chapple (pp. 633)
20 Law and Computer Security (cont.) To minimize their & their organization s liability, information security professionals must: keep informed about new laws, regulations and ethical issues as they emerge understand the scope of organization s legal and ethical responsibilities educate the management and employees about their legal and ethical obligations and the proper use of information technology
21 Computer Crime Computer Crime criminal activity in which either (aka Cybercrime) of the following is true: computer is a target e.g., somebody attempts to control a computer or interfere with its availability (examples: development and distribution of malware, DDoS attacks, ) computer is a storage device e.g., somebody uses a computer to store stolen or inappropriate content computer is a communication tool e.g., somebody uses computer(s) to conduct illegal sale of drugs or guns
22 Convention on Cybercrime Cybercrime 1 st international agreement seeking to Convention address Computer/Cyber Crimes by (2001) harmonizing national laws & increasing inter-national cooperation initially drawn up by the Council of Europe and active participation of Canada & Japan in 2006, USA became the 16 th nation to ratify the treaty currently, 40 states had ratified, and 11 states had signed (but not ratified) the convention Canada one of them
23
24
25 List of cybercrimes cited in the Convention on Cybercrime represents an international consensus on what constitutes cybercrime and what crimes are considered important. Stallings, Computer Security, 2 nd edition, pp. 596
26 US Laws Key US laws of interest to IS professionals
27 US Laws (cont.) INSTITUTIONS STATE Computer Fraud & Abuse Act Patriot Act Federal Privacy Act Electronic Communications Privacy Act INDIVIDUAL Health Insurance Portability and Accountability Ac Gramm-Leach-Bliley Act Children s Online Privacy Protection Act
28 US Laws: CFA Act Computer Fraud law passed by the US Congress and Abuse Act landmark in the fight against cyber- (CFA Act) crime the first law to address crime of 1986 involving computers initially intended to address offenses to computers of the US government and certain financial institutions amended in 1988, 1994, 1996 and 2001 by the USA Patriot Act through amendments, the scope extended to all protected computers, i.e. any computer connected to the Internet
29 US Laws: CFA Act (cont.) criminal offences under the CFA Act: 1) knowingly accessing a computer without authorization 1 or exceeding authorized access 2 to obtain national security data 2) intentionally accessing a computer without authorization (or 2 ) to obtain one of the following: a) a financial record of a financial institution; b) information from any US-government department or agency; c) information from any protected computer. 3) intentionally accessing without authorization (or 2 ) a government computer and affecting the use of the government s operation of the computer 4) knowingly causing the transmission of a program, information, code or command that causes damage such as: a) loss to one or more persons (or companies) during any one-year period aggregating at least $5,000 in value
30 US Laws: CFA Act (cont.) criminal offences under the CFA Act (cont.) b) the modification or impairment of medical records c) physical injury to any person d) a threat to public health of safety e) damage affecting a government computer system 5) knowingly and with intent to defraud traffics a password or a similar information through which a computer may be accessed without authorization 1 Access without authorization = access by an outsider who breaks in and uses a computer for any malicious purpose 2 Exceeding authorized access = access by an authorized user who obtains or alters information that he/she is not allowed to obtain or alter (e.g. employees)
31 US Laws: CFA Act (cont.) Computer Fraud although the Act does not specifically and Abuse Act mention hacking, malware and (cont.) denial of service, they are its main focus example: 1) knowing transmission of a code that causes damage infection by a virus 2) knowing execution of a command that causes damage DDoS attack Punishment for offences prosecuted under the CFA varies from fines to imprisonment of up to 20 years, or both.
32 US Laws: CFA Act (cont.) Case Study: Morris Case (1988) One of the first cases prosecuted under the CFA Act. Morris, a Ph.D. candidate in CS (Cornell U), wanted to demonstrate the weakness of security measures of computers on the Internet, a network linking university, government and military computers around the United States. His plan was to insert a worm into as many computers as he could gain access to, but to ensure that the worm replicated itself slowly enough that it would not cause the computers to slow down or crash. However, Morris miscalculated how quickly the worm would replicate. By the time he released a message on how to kill the worm, it was too late: Some 6,000 computers had crashed or become "catatonic" at numerous institutions, with estimated damages of $200 to $53,000 for each institution. Morris was sentenced to three years probation and 400 hours of community service, and was fined $10,500.
33 US Laws: Patriot Act US Patriot Act allows law enforcement greater (2001 weeks latitude in combating criminals after Sept. 11) and terrorists who use computers and communication networks [telephone, computer, wireless] L.E. has authority to intercept voice communications in computer hacking investigations L.E. has authority to obtain voice mail and other stored voice communications using standard search warrants rather than wiretap orders L.E. has authority to trace communications on the Internet and other computer networks
34 US Laws: Patriot Act (cont.) US Patriot Act (2001 weeks after Sept. 11) L.E. has authority to issue nationwide search warrants for s and other electronic data ISPs compelled to disclose unopened s ISPs are permitted to disclose customer info in the case of emergency - if they suspect an immediate risk of death or serious physical injury to any person Patriot Act one of the most controversial acts gives away personal freedoms and constitutional rights in exchange for higher levels of (national) safety For more see:
35 US Laws: Patriot Act (cont.) Case Study: Patriot Act vs. Constitution (2004) While conducting surveillance of the defendant and co-defendant, the agents lost track of them. The agents then dialed the defendant s cell phone several times, and used the provider s computer data to determine which cell transmission towers were being hit by that phone. The cell s data revealed the defendant s general location and helped catch him. On appeal of his conviction, the defendant argued that the cell-site data and resulting evidence should have been suppressed because they turned his phone into a tracking device and that violated his constitutional rights The court found that the cell-site data falls under the category of electronic communication, hence was not illegal Computer Forensics: Principles and Practices, pp. 423 by L. Volonino, R. Anzaldua, J. Godwin
36 US Laws: Privacy (1) Federal Privacy regulates the government s use Act (1974) of private information addresses concerns about creation and use of computerized data the act states: government agencies must protect the privacy of individuals and businesses information and are responsible if any portion of information is released without prior written consent of the individual at the same time, individuals CAN access information controlled by others if they can demonstrate that that information is necessary to protect their health & safety
37 US Laws: Privacy (2) Electronic Comm. often referred to as federal Privacy Act wiretapping act (1986) primarily designed to prevent unauthorized government access to private electronic communications sets high standards for search warrants of: wire, oral & electronic communications while in transit communications held in electronic storage dialing, routing, addressing & signaling information some provisions of the act are later weakened by Patriot Act
38 US Laws: Privacy (3) Health Insurance aims to protect confidentiality Portability and and security of health data Accountability requires organizations that retain Act - HIPAA health care information to use (1996) comprehensive information security mechanisms severely restricts dissemination & distribution of private health info without documented consent provides patients right to know who has access to and who has accessed their information gives patients the right to examine & obtain a copy of their own data
39 US Laws: Privacy (4) Gramm-Leach- contains a number of provisions -Bliley that affect banks, security firms, Act (1999) and insurance companies the act requires that such institutions: implement a comprehensive info. security program with appropriate administrative, technical and physical safeguards ensure the security and confidentiality of customer info., and protect customer info. from unauthorized access by third party that could result in harm or inconvenience to the customer Safeguarding the confidentiality and integrity of customer information is no longer just a best practice for financial institutions it is now a legal requirement.
40 US Laws: Privacy (4)
41 US Laws: Privacy (5) Children s Online prohibits certain actions by Privacy Protection websites and similar services Act COPP Act that are directed at children & (1998) by any site that may be visited by a person younger than 13 the act prohibits such sites from: collecting and using identifying info (name, postal code, address, SIN) from children under 13 unless they got verifiable parental consent registration requiring personal info as a requirement for playing games, applying for prizes, etc.
42 US Laws: Privacy Two key Canadian (federal) privacy laws: 1) The Privacy Act - imposes obligations on federal government departments and agencies to respect privacy rights by limiting the collection, use and disclosure of personal information. 2) Personal Information Protection and Electronic Document Act (PIPEDA) - sets out ground rules for how private sector organizations may collect, use or disclose personal information in the course of commercial activities.
43 trade secret = all forms and types of financial, business, scientific, technical, economic or engineering information that the owner has taken reasonable measures to keep secret and that is not known to the public US Laws: Export & Espionage (1) Economic attempts to prevent illegal sharing Espionage of trade secrets Act (1996) first federal law that defines trade secret and severely punishes any individual or organization that knowingly steals, copies, receives, buys or possesses trade secrets or conspires to do so penalties: fines up to $500,00 or 15 years in prison (or both) for individuals, and fines of up to $10 million for organizations
44 US Laws: Export & Espionage (2) Security And provides guidance on the use of encryption, and provides measures of protection from government intervention; specifically, the act Freedom Through Encryption Act (1999) relaxes restrictions concerning the sale and export of cryptographic products - used to be tightly controlled by the government states that the use of encryption is not probable cause to suspect a criminal activity - people can use encryption freely provides additional penalties for unlawful use of encryption in furtherance of a criminal act - e.g., with the intent to conceal a felony
45 US Laws: Copyright Laws No Electronic provides for criminal prosecution Theft Act of individuals who engage in (1997) copyright infringement prior to this act, criminal copyright infringement required that the infringement was for the purpose of commercial advantage or private financial gain merely downloading files on the Internet did not constitute a criminal activity the act permits the use of copyrighted material to support news reporting, teaching, as long as it is not for profit, and as long as proper acknowledgment is provided
46 US Laws: Sarbanes-Oxley Act Sarbanes- passed as a result of a series of financial Oxley Act scandals in 1990s (Enron, WorldCom) (2002) intended to protect general public from accounting errors & fraudulent practices puts far greater responsibility on the shoulder of corporate executives regarding: effective & efficient operation (including IT and Info Sec operation) reliable financial reporting and auditing compliance with applicable laws & regulations the act requires that all business documents (paper & electronic) must be kept for 5 years Canadian equivalent: Bill 198 (2003)
47 US Laws: Sarbanes-Oxley Act (cont.)
48 International Laws Info Sec related laws (may) vary considerably from one country to another. When organizations do business on the Internet, they do it globally; hence, it is important to be sensitive to the law and ethics values of different countries
49 Ethics Code of Ethics sets out general principles about an organization s beliefs on matters Code of Ethics Thou shall not Thou shall not Thou shall not such as mission, quality, privacy or environment effectiveness of such codes depend on the extent to which respective organizations support them with sanctions & rewards doctors and lawyers who violate ethical cannons of their professions could be removed from practice field Information Security (and IT) does not have a binding Code of Ethics instead, professional associations (ACM) and accreditation agencies ((ISC) 2, SANS) work to establish the professions codes of conduct
50 Ethics (cont.) 10 Commandments of Computer Ethics Institute (intended for IT community) 1. Thou shall not use a computer to harm other people. 2. Thou shall not interfere with other people s computer work. 3. Thou shall not snoop around in other people s computer files. 4. Thou shall not use a computer to steal. 5. Thou shall not use a computer to bear false witness. 6. Thou shall not copy or use proprietary software for which you have not paid. 7. Thou shall not use other people s computer resources without without authorization or proper compensation. 8. Thou shall not appropriate other people s intellectual output. 9. Thou shall think about the social consequences of the program you are writing or the system you are designing. 10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.
51 Ethics (cont.) Information Security failure to obey Code of Ethics implies loss of accreditation or certification Organizations with Code of Ethics and consequently (may) result in dramatically reduced marketability and earning power 1. Association of respected non-profit professional society Computing with scientific & educational orientation Machinery (ACM) ACM s code of ethics addresses a wide range of ethical duties the ones related to information security specify that each ACM member should: protect confidentiality of information cause no harm (e.g. loss) of information protect privacy of others protect IP & copyright of others
52 Ethics (cont.) 2. (ISC) 2 non-profit organization; focuses on development & implementation of info. sec. certifications & credentials 4 mandatory canons of (ISC) 2 code of ethics are: protect society, the commonwealth, and the infrastructure act honorably, honestly, justly, responsibly and legally provide diligent and competent service to principals advance and protect the profession 3. SANS professional research & education cooperative organ. Institute - prepares individuals towards GIAC accreditation (GIAC) GIAC s code of ethics is organized into 3 key areas: I will strive to know myself and be honest about my capability I will conduct my business in a manner that assures the IT profession is considered one of integrity professionalism I respect privacy and confidentiality
Chapter 15 Criminal Law and Procedures
Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures
More informationH. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.
F:\SLS\SLS_.XML 0TH CONGRESS D SESSION H. R. To amend titles and, United States Code, to strengthen the protection of intellectual property, and for other purposes. IN THE HOUSE OF REPRESENTATIVES M. introduced
More informationCYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
More informationUpdated Administration Proposal: Law Enforcement Provisions
Updated Administration Proposal: Law Enforcement Provisions [Changes to existing law are in shown in italics, bold, and strikethrough format] SEC. 101. Prosecuting Organized Crime Groups That Utilize Cyber
More informationInformation Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
More informationMARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
More informationCybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
More informationAPPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
More informationCOLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
More informationGlossary. To seize a person under authority of the law. Police officers can make arrests
Criminal Law Glossary Arrest Charge Convicted Court Crime/Offence Crown Attorney or Prosecutor Criminal Custody Guilty Illegal Innocent Lawyer To seize a person under authority of the law. Police officers
More informationCrimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
More informationCriminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws.
Criminal Law Month Content Skills August Introduction to law Define the term jurisprudence. What is law? Explain several reasons for having laws. Discuss the relationship between laws and values. Give
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationTITLE I FORMER VICE PRESIDENT PROTECTION ACT
122 STAT. 3560 PUBLIC LAW 110 326 SEPT. 26, 2008 Sept. 26, 2008 [H.R. 5938] Former Vice President Protection Act of 2008. 18 USC 1 note. Public Law 110 326 110th Congress An Act To amend title 18, United
More informationSan Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0
San Diego Chapter AUDITORS UNCOVERING CRIMINAL ACTS THE REAL BURDEN OF PROOF OR DBPP V1.0 Who is This Guy? George R. Thomas, MBA, CIA, CGAP, CRMA Detective Sergeant San Diego Police Department Current
More informationLaw, Investigations, and Ethics. Ed Crowley 09
Law, Investigations, and Ethics Ed Crowley 09 Topics Computer Laws HIPAA GLB SOX DCMA Computer Ethics Computer Crime Investigations Crime determination Incident response and computer forensics Evidence
More informationCONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
More informationDRINKING AND DRIVING OFFENCE
What to do if you are charged with a DRINKING AND DRIVING OFFENCE This booklet is not about provincial Motor Vehicle Act penalties for drinking and driving. This guide explains what normally happens when
More informationResponsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
More informationTABLE OF CONTENTS. Homicide Case Flowchart...3. Overview of Homicide Trial...4. Location of Local Court Houses...5. General Courtroom Diagram...
A Guide to the Homicide Criminal Justice Process P a g e 2 TABLE OF CONTENTS Homicide Case Flowchart...3 Overview of Homicide Trial...4 Location of Local Court Houses...5 General Courtroom Diagram...6
More informationService Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5
WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds
More informationWISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
More informationVijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India
Intellectual Property & Information Technology Laws Division Flat No 903, Indra Prakash Building, 21, Barakhamba Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationThe Legal System in the United States
The Legal System in the United States At the conclusion of this chapter, students will be able to: 1. Understand how the legal system works; 2. Explain why laws are necessary; 3. Discuss how cases proceed
More informationLaw & Ethics, Policies & Guidelines, and Security Awareness
Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of
More informationLegal and Ethical Issues in Computer Security
Legal and Ethical Issues in Computer Security Prepared By: Rusul M. Kanona Supervised By: Dr. Lo a i A.Tawalbeh Arab Academy for Banking & Financial Sciences (AABFS) Fall 2007 :Objectives for this session
More informationBOBCAT COMPUTING POLICY
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
More informationCOMPUTER MISUSE AND CYBERCRIME ACT
COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access
More informationSTUDENT LEGAL SERVICES THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY A GUIDE TO THE LAW IN ALBERTA REGARDING OF EDMONTON COPYRIGHT AND DISCLAIMER
COPYRIGHT AND DISCLAIMER A GUIDE TO THE LAW IN ALBERTA REGARDING THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY version: 2008 STUDENT LEGAL SERVICES OF EDMONTON GENERAL All information is provided for
More informationJUVENILES AND THE LAW
JUVENILES AND THE LAW When Are You a Juvenile and When Are You an Adult? The answer to this question is complicated because, under Missouri law, when you are considered an adult and when you are considered
More informationINFORMATION FOR CRIME VICTIMS AND WITNESSES CHARLES I. WADAMS PROSECUTING ATTORNEY
INFORMATION FOR CRIME VICTIMS AND WITNESSES CHARLES I. WADAMS PROSECUTING ATTORNEY Garden City, Idaho 6015 Glenwood St., Garden City, ID 83714 (208) 472-2900 www.gardencityidaho.org A MESSAGE Garden City
More informationMISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
More informationPRIVACY AND IDENTITY THEFT 2003:
PRIVACY AND IDENTITY THEFT 2003: Where Are We Now And Where Are We Going.... Huggins v. CitiBank: A Case Study Stephen P. Groves, Sr., Esquire 205 King Street, Suite 400 Charleston, South Carolina 29401
More informationSOCIAL STUDIES 11 CANADA S LEGAL SYSTEM CH. 11
SOCIAL STUDIES 11 CANADA S LEGAL SYSTEM CH. 11 MRS. KAUSHAL 1 The Rule of Law 1. Basic principle is that no one is above the law and everyone is subject to it. This means that we are governed by a fixed
More informationGlossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench
Glossary of Terms The Glossary of Terms defines some of the most common legal terms in easy-tounderstand language. Terms are listed in alphabetical order. A B C D E F G H I J K L M N O P Q R S T U V W
More informationMISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 Current Laws: A person shall not obtain or attempt to obtain
More informationCHAPTER 124B COMPUTER MISUSE
1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.
More informationClients Legal Needs in HIPAA Security Compliance
Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance
More informationAs part of their course on law and/or sociology in this module, participants will be able to:
Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart
More informationLesson 4. Preventing and Policing White-Collar Crime
Preventing and Policing ASSIGNMENT 11 Read this introduction and then read pages 260 294 in White- Collar Crime: The Essentials. White-collar crime is clearly complex and multifaceted. No single theory
More informationChapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART. Section 3.1 What Is a Crime?
Chapter 3 SECTION OPENER / CLOSER: INSERT BOOK COVER ART Section 3.1 Chapter 3 What Criminal Is a Crime? Law Section 3.1 Section 3.2 Particular Crimes Why It s Important Learning the essence of criminal
More informationInformation for Crime Victims and Witnesses
Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)
More informationCOMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised
More informationRHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009
RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 Current Laws: A person commits the crime of identity fraud if
More informationOKLAHOMA LAWS RELATING TO IDENTITY THEFT
OKLAHOMA LAWS RELATING TO IDENTITY THEFT Prepared for VICARS by Legal Aid Services of Oklahoma Introduction: OKLAHOMA LAWS RELATING TO IDENTITY THEFT Identity theft takes place when someone uses your personal
More informationactus reus + mens rea = CRIME
THE CRIMINAL EQUATION: actus reus + mens rea = CRIME Proof of Offences A person charged with a criminal offence is presumed innocent until that person pleads guilty or is proven guilty in court. The Crown
More informationHEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA
TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE
More informationCRIMINAL LAW AND VICTIMS RIGHTS
Chapter Five CRIMINAL LAW AND VICTIMS RIGHTS In a criminal case, a prosecuting attorney (working for the city, state, or federal government) decides if charges should be brought against the perpetrator.
More informationOverview of Federal Criminal Cases
Overview of Federal Criminal Cases Fiscal Year 2012 Glenn R. Schmitt Jennifer Dukes Office of Research and Data The United States Sentencing Commission 1 received information on 84,360 federal criminal
More informationOREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
More informationFedRAMP Package Access Request Form For Review of FedRAMP Security Package
FedRAMP Package Access Request Form For Review of FedRAMP Security Package INSTRUCTIONS: 1. Please complete this form, then print and sign. 2. Distribute to your Government Supervisor for review and signature.
More informationUNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF TENNESSEE DIVISION. UNITED STATES OF AMERICA ) ) ) v. ) No. ) (Judge ) ) )
UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF TENNESSEE DIVISION UNITED STATES OF AMERICA ) ) ) v. ) No. ) (Judge ) ) ) PETITION TO ENTER A PLEA OF GUILTY (Misdemeanor) I,, respectfully represent
More informationFEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
More informationSUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003
SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography
More informationLAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT
LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT S 65/00 REVISED EDITION 2007 B.L.R.O. 3/2007 CAP. 194] LAWS OF BRUNEI Computer Misuse [2007 Ed. p. 1 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 194 COMPUTER
More informationValdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
More informationRetaliatory Hacking: Risky Business or Legitimate Corporate Security?
Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital
More informationCRIMINAL LAW & YOUR RIGHTS MARCH 2008
CRIMINAL LAW & YOUR RIGHTS MARCH 2008 1 What are your rights? As a human being and as a citizen you automatically have certain rights. These rights are not a gift from anyone, including the state. In fact,
More informationEnterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
More informationDISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE 1. Purpose and Scope 1.1 The Company s procedure is designed to help and encourage all workers to achieve and maintain standards of conduct, attendance and job performance. The Company
More informationAn Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy
An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims
More informationWhere can I get help after a sexual assault?
Sexual Assault What is assault? Assault is when someone uses force to hurt you. Slapping, kicking and pushing can be assault. Sometimes touching can be an assault. Threatening or trying to hurt someone
More informationFederal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
More informationCRIMINAL INVESTIGATIONS AND PROSECUTIONS OF TAX FRAUD CASES GUIDELINES
STATE OF NEW YORK DEPARTMENT OF TAXATION AND FINANCE W.A. HARRIMAN CAMPUS ALBANY, NY 12227 CRIMINAL INVESTIGATIONS AND PROSECUTIONS OF TAX FRAUD CASES GUIDELINES Introduction Criminal sanctions play an
More informationINCREASED PENALTIES FOR CYBER SECURITY OFFENSES
Report to the Congress: INCREASED PENALTIES FOR CYBER SECURITY OFFENSES (As required by section 225(c) of the Homeland Security Act of 2002, Public Law 107-296) UNITED STATES SENTENCING COMMISSION May
More informationCRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?
THE LAW OFFICES OF SCOTT L. KRAMER CRIMINAL DEFENSE FAQ ANSWERS FROM AN DELAWARE COUNTY ATTORNEY: QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? No. You are never
More informationThe Witness and the Justice System in Alberta
The Witness and the Justice System in Alberta Introduction This booklet provides basic information about appearing as a witness in the courts of Alberta. It is designed to explain your role as a witness,
More informationBASIC CRIMINAL LAW. Joe Bodiford. Overview of a criminal case Presented by: Board Certified Criminal Trial Lawyer
BASIC CRIMINAL LAW Overview of a criminal case Presented by: Joe Bodiford Board Certified Criminal Trial Lawyer www.floridacriminaldefense.com www.blawgger.com THE FLORIDA CRIMINAL PROCESS Source: http://www.fsu.edu/~crimdo/cj-flowchart.html
More informationEmployment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY
Employment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY CONTENTS INTRODUCTION TO REHABILITATION OF OFFENDERS ACT 1974... 1 EXCEPTIONS TO THE ACT... 1 MODIFICATIONS TO THE ACT... 1 POLICY...
More informationCity of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
More informationMASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
More informationWHAT S OLD IS NEW AGAIN. PROSECUTING WORKERS COMPENSATION FRAUD UNDER THE 2011 AMENDMENTS
WHAT S OLD IS NEW AGAIN. PROSECUTING WORKERS COMPENSATION FRAUD UNDER THE 2011 AMENDMENTS Presented and Prepared by: William M. Blumthal, Jr. Supervisor, Workers' Compensation Fraud Unit Illinois Department
More informationMINNESOTA FALSE CLAIMS ACT
. MINNESOTA FALSE CLAIMS ACT Sec. 24. [15C.01] DEFINITIONS. Subdivision 1. Scope. For purposes of this chapter, the terms in this section have the meanings given them. Subd. 2. Claim. "Claim" includes
More informationGlossary of Court-related Terms
Glossary of Court-related Terms Acquittal Adjudication Appeal Arraignment Arrest Bail Bailiff Beyond a reasonable doubt Burden of proof Capital offense Certification Charge Circumstantial evidence Citation
More informationFEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE
FEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE FEDERAL CIVIL FALSE CLAIMS ACT The federal civil False Claims Act, 31 U.S.C. 3729, et seq., ( FCA ) was originally enacted in 1863 to combat fraud perpetrated
More informationHOUSE DOCKET, NO. 4128 FILED ON: 2/28/2014. HOUSE... No. 4077. The Commonwealth of Massachusetts PRESENTED BY: Paul R. Heroux
HOUSE DOCKET, NO. 4128 FILED ON: 2/28/2014 HOUSE............... No. 4077 The Commonwealth of Massachusetts PRESENTED BY: Paul R. Heroux To the Honorable Senate and House of Representatives of the Commonwealth
More informationTaxation and the Criminal Law
CHAD J. BROWN Presentation Overview 1. Recent History of CRA s Criminal Investigation Program ( CIP ). 2. Offences and Penalties Overview. 3. Typical Offenders. 4. File Chronology. 5. Search Warrants.
More informationCanada s New Anti-Spam Legislation: Overview and Implications for Businesses
dentons.com Focus on Communications Canada s New Anti-Spam Legislation: Overview and Implications for Businesses January, 2011 Contact Margot Patterson Dentons Canada LLP Counsel, Ottawa margot.patterson@dentons.com
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationGENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2012-149 SENATE BILL 707
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2012-149 SENATE BILL 707 AN ACT TO ENACT THE SCHOOL VIOLENCE PREVENTION ACT OF 2012; LIMIT PRAYERS FOR JUDGMENT CONTINUED; AND END SUNSET FOR
More informationWalking Through a Trial
Lesson Overview Overview: This lesson will teach students how the legal system works and how a case progresses through the state courts. Objectives: Students will be able to Define key terms related to
More informationChapter One: Our Laws. Lessons: 1-1 Our Laws & Legal System 1-2 Types of Laws
Chapter One: Our Laws Lessons: 1-1 Our Laws & Legal System 1-2 Types of Laws Lesson 1-2 Goals Explain how constitutional, statutory, case and administrative laws are created Explain how to resolve conflicts
More informationCriminal Justice System Commonly Used Terms & Definitions
Criminal Justice System Commonly Used Terms & Definitions A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Accused: Acquittal: Adjudication: Admissible Evidence: Affidavit: Alford Doctrine: Appeal:
More informationPROFESSIONAL COMPUTING
PROFESSIONAL COMPUTING Lecture 2: Legal Perspectives Dr. Mark Lee m.g.lee@cs.bham.ac.uk School of Computer Science, University of Birmingham Autumn 2014 Disclaimer Dr. Lee is a : Award-winning lecturer
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationYour Criminal Justice System
Your Criminal Justice System Helpful Information for the Victims and Witnesses of Crime Provided by Kansas Attorney General Derek Schmidt Victims Services Division 120 SW 10th Ave, 2nd Floor Topeka, KS
More informationEXECUTIVE SUMMARY Compliance Program and False Claims Recovery
EXECUTIVE SUMMARY Compliance Program and False Claims Recovery INTRODUCTION: The Federal Deficit Reduction Act of 2005, also known as the DRA, requires that providers give their employees, medical staff,
More informationMEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998
INTERNAL REVENUE SERVICE UIL: 9999.92-00 Number: 199911041 Release Date: 3/19/1999 CTMonica January 22, 1999 MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) FROM: Barry J. Finkelstein Assistant
More informationPUBLIC DRUNKENNESS Section 5505 of the Pennsylvania Crimes Code (Title 18)
PUBLIC DRUNKENNESS Section 5505 of the Pennsylvania Crimes Code (Title 18) A person is guilty of a summary offense if he appears in any public place manifestly under the influence of alcohol to the degree
More informationLET S ENCRYPT SUBSCRIBER AGREEMENT
Page 1 of 6 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf
More informationThe Lawyer as Gatekeeper The Backdrop
Lawyers as Gatekeepers The SEC s New Focus on Inside and Outside Counsel Julie M. Allen Frank Zarb National Conference of the Society of Corporate Secretaries and Governance Professionals June 28, 2014
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationThe Foundation of Juvenile Practice Part 1: You are Adversary Counsel, NOT a GAL! Private Bar Certification Forensic Exercise November 19, 2014
The Foundation of Juvenile Practice Part 1: You are Adversary Counsel, NOT a GAL! Private Bar Certification Forensic Exercise November 19, 2014 Role of Juvenile Defense Counsel: Forensic Exercise: Question
More informationFair and Accurate Credit Transactions Act: More Protection for Consumers
Fair and Accurate Credit Transactions Act: More Protection for Consumers Businesses must heed FACTA requirements for protecting consumers credit records or face criminal or monetary consequences Stacey
More informationWASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009
WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009 Current Laws: Washington s identity theft law states that no
More informationComputer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
More informationMonitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
More informationARTICLE 36: KANE COUNTY DRUG REHABILITATION COURT RULES AND PROCEDURES
ARTICLE 36: KANE COUNTY DRUG REHABILITATION COURT RULES AND PROCEDURES (a) Mission: The Illinois General Assembly has recognized that there is a critical need for a criminal justice program that will reduce
More informationCyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
More information