Identity & the Law. Ross McKean Associate Baker & McKenzie, London ross.mckean@bakernet.com



Similar documents
Standardisation of definitions of identity crime terms: A step towards consistency Report Series No

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

4. Laying of orders and regulations before Houses of Oireachtas.

Electronic Transactions Law

CHAPTER 124B COMPUTER MISUSE

Legal Digest. Money Laundering Offences In Singapore. Naina Parwani. An online repository of various articles published by our lawyers

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT

Standard conditions of purchase

Electronic Transactions Law

RENEWAL Application for Business and Management (BAM) Indemnity Insurance

Privacy Policy. Approved by: College Board, 01/12/2005 Principal from 14/02/2014

SECTION 59, CRIMINAL JUSTICE (THEFT AND FRAUD OFFENCES) ACT, 2001

If you have any questions about any of our policies, please contact the Customer Services Team.

CYBERCRIME AND THE LAW

Family Select Legal Protection

IT SECURITY POLICY (ISMS 01)

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

Cybercrime: risks, penalties and prevention

Crimes (Computer Hacking)

RENEWAL Application for Business and Management (BAM) Indemnity Insurance

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

An Introduction to the UK Anti-Money Laundering Regime. slaughter and may. March 2008

ANTI-FRAUD POLICY Adopted August 13, 2015

ECSA EuroCloud Star Audit Data Privacy Audit Guide

These Terms and Conditions supersede all previous Terms and Conditions

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN better health cover shouldn t hurt

Fact Sheet Restraints of trade: can your employer restrict what you do during and after employment?

Corporate Information Security Policy

AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE

Telephone number (including area code) Postcode. Position. Signature

Electronic Commerce ELECTRONIC COMMERCE ACT Act. No Commencement LN. 2001/ Assent

Domain Name Suspension Request

ELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999

Guidance on professional conduct. For nursing and midwifery students

TEXTURA AUSTRALASIA PTY LTD ACN ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No.:

Formal response to the Consultation Paper: Monitoring and Regulation of Migration

Merchants and Trade - Act No 28/2001 on electronic signatures

Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

APPLICATION & INCOME PAYMENT FORM FOR ANNUITY QUOTATION REF: A Q INCLUDING EXISTING PRUDENTIAL PENSION FUND(S)

Terms and conditions of use

TERMS AND CONDITIONS FOR THE USE OF SINGAPORE POWER SUPPLIER RELATIONSHIP MANAGEMENT SYSTEM (SPSRM)

TELEFÓNICA UK LTD. Introduction to Security Policy

Bacstel-IP. Customer Agreement for the Bacstel-IP Direct Service

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

Daltrak Building Services Pty Ltd ABN: Privacy Policy Manual

Decree Law No. ( ) of 2011 on Electronic Transactions Law

BEFORE THE OFFICE OF ADMINISTRATIVE HEARINGS STATE OF OREGON for the DEPARTMENT OF CONSUMER AND BUSINESS SERVICES INSURANCE DIVISION ) ) ) ) )

ASYLUM SCREENING INTERVIEW AND BIOMETRIC RESIDENCE PERMIT APPLICATION

A BILL for AN ACT. Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour

INTERNATIONAL SOS. Data Protection Policy. Version 1.05

E-Gap Terms and Conditions of Use

ELECTRONIC TRANSACTIONS ACT

Application For Business and Management (BAM) Indemnity Insurance Non-Profit Organizations

A BILL ENTITLED. AN ACT To Facilitate electronic transactions and for connected matters. PART 1 Preliminary

ANTI - MONEY LAUNDERING POLICY

Information Security Policy

ICE CLEAR EUROPE LIMITED. - and - COMPANY NAME

HP terms and conditions of online and phone sales for HP Parts Store (Terms) by Hewlett-Packard Australia Pty Ltd (ABN )

UBS Electronic Trading Agreement Global Markets

CODE OF CONDUCT: BETTING AND RELATED ACTIVITY

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX (210) OFFICE (210) FAX

Website Hosting Agreement

Clause 1. Definitions and Interpretation

Firm Registration Form

Information Governance Policy

Professional Misconduct and Code of Professional Ethics Regulation

Moving Towards an Electronic Real Estate Transaction

UNDERSTANDING MONEY LAUNDERING

COMPUTER MISUSE AND CYBERCRIME ACT

INFORMATION SECURITY MANAGEMENT POLICY

GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES

2002 No. 318 ELECTRONIC COMMUNICATIONS. The Electronic Signatures Regulations 2002

SECTION 8 GARDA SÍOCHÁNA ACT General Direction No. 2

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

January An Overview of U.S. Security Breach Statutes

2. u.s. GOVERNMENT AGENCY ACTIONS REGARDING ILLICIT FOREIGN PAYMENTS. Justice Department. Internal Revenue Service. Securities and Exchange Commission

Acquia Certification Program Agreement

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

Namoi Cotton Co-operative Ltd Capital Stock Trading Policy Effective 24 th August 2010

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

HELPcard Merchant Operating Guide (Rev. Date 12/01/2013)

FedRAMP Package Access Request Form For Review of FedRAMP Security Package

Transcription:

Identity & the Law Ross McKean Associate Baker & McKenzie, London ross.mckean@bakernet.com

Introduction Identity as legal security validity, enforceability & admissibility Identity as private life controlling personal data confidentiality Identity as property Identity theft criminal law e.g. US Anticybersquatting Consumer Protection Act of 1999, 1129

Signatures Legal requirements/practice e.g. Consumer Credit Act 1974 Legal definitions copies & equivalents signature includes a facsimile of a signature by whatever process reproduced any mark which identifies it as the act of the party Signature functions identity, e.g. Goodman v J.Eban Ltd [1954] 1 All ER 763 intention to be bound validate integrity of document

International Developments UNCITRAL Model law on Electronic Commerce (1996) Article 7(1)(b) that method is as reliable as was appropriate for the purposes for which the data message was generated... Model Law on Electronic Signatures (2001) United States Uniform Electronic Transactions Act 1998 s.9(a) An electronic record or electronic signature is attributable to a person if it was the act of the person. The act of the person may be shown in any manner, including a showing of the efficacy of any security procedure applied to determine the person to which the electronic record or electronic signature was attributable. Electronic Signatures in Global and National Commerce Act 2000 15 USC 7001: a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or enforceability solely because it is in electronic form

Directive 99/93/EC Definitions (art. 2) advanced electronic signature it is uniquely linked to the signatory; it is capable of identifying the signatory; it is created using means that the signatory can maintain under his sole control; and it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable Legal effects (art. 5) satisfy and admissible advanced electronic signature; with qualified certificate and created by a secure-signature-creation-device not denied legal effectiveness

UK Law Electronic Communications Act 2000 s. 7 re: admissibility s. 8. secondary legislation e.g. The Companies Act 1985 (Electronic Communications) Order 2000 (No. 3373); The National Health Service (General Medical Services) (Electronic Communications) Order 2001 (No. 2890) The Electronic Signature Regulations 2002 (SI No. 318) advanced electronic signature

Data Protection Act 1998 personal data data (identifiable directly or indirectly) relating to a living individual fair and lawful processing only for one or more specified purposes offence of unlawful obtaining (s. 55) without data controller s consent

Confidentiality Equitable action for breach of confidence quality of confidence, obligation of confidence and unauthorised use R v Department of Health, ex parte Source Informatics (2000) 1 All ER 786 A v B and anor sub nom Gary Flitcroft v Mirror Group Newspapers Ltd (2002) 2 All ER 545 no need for a new cause of action ECHR art. 8 balancing rights

Identity Theft I Cabinet Office Report (July 2002) Interdepartmental Identity Fraud Forum (IIFF) current inadequate response govt. departments lack prosecution arm low priority given to area lack of specific offence Entitlement Card Consultation Paper offence to use a means of identification of another person or a fictitious person without reasonable cause summary only, max. 6 imprisonment defences

Identity Theft II Oxford v Moss (1979) 68 Cr.App.R. 183 Fraud obtaining property/services by deception Forgery and Counterfeiting Act 1981 e.g. R v Gold [1988] AC 1063 Computer Misuse Act 1990 unauthorised access & modification

Identity Theft: US Law Identity Theft and Assumption Deterrence Act of 1998 (18 U.S.C 1028(a)(7)) Knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid and abet, any unlawful activity e.g. unique biometric data, address or routing code from 15-25 years imprisonment illegal under the laws of 49 States