Danguolė Morkūnienė Head of Law Division, State Data Protection Inspectorate 16/04/2015 Conference "ID Thefts – Issues, Legal Regulation, International.

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

Module N° 4 – ICAO SSP framework
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Panel themes of the International Conference “Europe against Counterfeit Medicines” G.N. Gildeeva, Deputy head of the Department of Registration of Medicines.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Developing a Records & Information Retention & Disposition Program:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Regulatory Body MODIFIED Day 8 – Lecture 3.
1 Regulatory Challenges During and Following a Major Safety or Security Event Muhammad Iqbal Pakistan Nuclear Regulatory Authority Presentation at General.
Session 3 – Information Security Policies
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
DATA PROTECTION ISSUES COMBINING OF PERSONAL DATA STORED IN DIFFERENT INSTITUTIONS 9th Meeting of Central and Eastern European Commissioners June 4-6 th.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Basics of OHSAS Occupational Health & Safety Management System
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
PUBLIC SECTOR FINANCIAL CONTROL OF THE REPUBLIC OF LITHUANIA By Ms Daina Vaivadienė Chief Specialist of the Internal Audit and Financial Control Methodology.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Intelligent Decisions Lithuanian Customs Tax Accounting and Control Information System MAKIS.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Recent Cyber Attacks and Countermeasures September 2006.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
16-17 November 2005 COSCAP – NA Project Steering Group Guangzhou, China 1 Co-operating with the European Aviation safety Agency.
Topic 5: Basic Security.
SEA in the Czech Republic Prague, 24 September 2008.
Information Systems Unit 3.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
National INFOSEC Organisations and INFOSEC Management in Hungary.
Chapter 8 Auditing in an E-commerce Environment
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
CMG Events 2016 Cybersecurity Briefing 24 February 2016 John Magee William Fry.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Data protection—training materials [Name and details of speaker]
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Lithuanian Water Suppliers Association LEGAL REGULATION OF WASTEWATER DISPOSAL AND TREATMENT IN LITHUANIA.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
MONEY LAUNDERING “The Basics”.
TAIEX-REGIO Workshop on Applying the Partnership Principle in the European Structural and Investment Funds Bratislava, 20/05/2016 Involvement of Partners.
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
Telco related activities in ENISA
Cyber-security and IEC International Standards
PUBLIC SECTOR FINANCIAL CONTROL OF THE REPUBLIC OF LITHUANIA
Neopay Practical Guides #2 PSD2 (Should I be worried?)
PRESENTATION OF MONTENEGRO
What are we talking about?
THE EU LEGAL FRAMEWORK ON EMPLOYEE INVOLVEMENT
Presentation transcript:

Danguolė Morkūnienė Head of Law Division, State Data Protection Inspectorate 16/04/2015 Conference "ID Thefts – Issues, Legal Regulation, International Context" The Law on Cyber Security in Lithuania – First Experiences

Aim of the presentation Why was the Law on Cyber Security necessary? What is the importance of this Law? What are the first results? Has the excitement faded away in the face of reality? 2

Cyber security / space 3 Cyber security – a set of legal, information dissemination, organisational and technical measures to avoid, identify, analyse and react to cyber incidents as well as restore the normal functioning of the management systems of electronic communications networks, information systems or industrial processes in case of such incidents. Cyber space – the environment where individual computers or other information or communication technologies equipment generates and/or transfers electronic information through the computers connected by the network of electronic communications or any other ICT equipment.

Cyber incident 4 Cyber incident – an event or act which: leads or may lead to, or can enable an unauthorised connection to the management system of IS, electronic communications network or industrial processes; disrupts or modifies, including the taking over of control of, the management system of IS, electronic communication network or industrial processes; destroys, damages, erases or modifies electronic information; denies or limits access to electronic information; makes it possible to appropriate or otherwise use non-public information to the persons who do not hold such rights.

2014 Activity Report of the Government of the Republic of Lithuania (TAR, 1 April 2015, No. 4887) ACTIVITY PRIORITIES OF THE GOVERNMENT AND THEIR IMPLEMENTATION DIRECTIONS V. Strengthening of the EU, Foreign and Defence Policy 5.3. Strengthening of cyber security

Report on National Security and Development in I 6 RISK FACTORS, THREATS AND RISKS FOR NATIONAL SECURITY 1.3. Activities of other states against the Republic of Lithuania In 2014, most active in their operations against Lithuania were Russian intelligence and security services. In addition to classical intelligence methods, electronic intelligence and cyber espionage was used actively.

Report on National Security and Development in II Cyber attacks In 2014, the range of cyber incidents was expanding; the technologies, methods and ways to hack into automatic data processing (hereinafter – ADP) systems or networks, or individual computers were becoming more sophisticated. The goals of cyber attacks remained the same: espionage, disruption of the functioning of ADP systems and networks, intention to take over their control or impact, looking for vulnerabilities The number of cyber incidents will keep growing in the future and the cyber space will be one of the main areas both for espionage and for undermining the national security of Lithuania and the defence power of the country, for impairing other important national objects as well as ADP systems, networks and individual computers of the private sector and private individuals.

Report on National Security and Development in III Vulnerability of Economics and Economy More frequent cyber attacks against banking information systems pose risk to the security of personal data and/or money of bank customers as banking institutions are not only likely to suffer significant financial damages but also eventually lose their image of reliable custodians of information and assets. The prevention of this risk is complicated by the fact that such attacks are most often administered from the territories of foreign countries.

Report on National Security and Development in IV Strengthening of electronic information security (cyber security) In 2014, the Law on Cyber Security was adopted which defined the arrangement of the Lithuanian cyber security system, the competence of responsible institutions, the rights and obligations of participants in cyber security as well as the measures to ensure cyber security. Much emphasis in 2014 was placed on the security of information systems, additional security mechanisms were implemented and the existing threats and protection mechanisms were analysed. In order to ensure the prevention of cyber incidents (identify weaknesses), the software was updated, the system and network security was audited. In addition, malware, the mechanisms and consequences of attacks were analysed.

Assessment of the Threats to National Security (National Security Department) 10 With rapid development of IT, the national security is increasingly exposed to the risks of cyber espionage. Endless sophistication of computer viruses take advantage of cyber security gaps and can invisibly steal large amounts of valuable information both from encrypted and non-encrypted information systems. In cyber espionage operations, Russian services use special spyware. It is integrated into different format annexes to s sent to selected addressees. For example, spyware get built into annexes in pdf format. They also use viruses which get into computers through external data storage devices (USB, CDs).

Objectives of the Law on Cyber Security I 11 to regulate the area of cyber security to set the legislative framework for personal data processing for the purposes of ensuring cyber security to identify the institutions to make and implement cyber security policy, their competence, functions, rights and obligations to specify the rights and obligations of controllers and/or managers of the information resources of the state, controllers of the information infrastructure of special significance, providers of public communications networks and/or public electronic communications services and providers of electronic information hosting

Objectives of the Law on Cyber Security II 12 to identify cyber security measures to set minimum organisational and technical cyber security requirements for the information resources of the state controlled by public administration bodies (to the extent not covered by the Law on Management of State Information Resources), for the information infrastructure of special significance, for the providers of electronic communications services (to the extent not covered by the Law on Electronic Communications), and for the providers of electronic information hosting services.

- for regions - for states - for persons 13 Damage

14 Cyber Security Policy-Making and Implementation The Government The Ministry of National Defence The Ministry of the Interior The Communications Regulatory Authority The State Data Protection Inspectorate The Police Department The National Cyber Security Centre The Cyber Security Council Roles: important when taken all together or each individually?

15 Cyber incidents Targeted attacks Distortion of contents Malware DDOS attacks Sabotage Spying...

16 Legislation Framework / Results More than 20 implementing laws had been planned for the implementation of the Law on Cyber Security. Not all implementing legal acts (resolutions / orders) have been adopted. For example, Resolution of the Government of the Republic of Lithuania "On the Approval of the List of the Information Infrastructure Objects of Special Significance"

17 Results achieved by the institutions The Police Department The Communications Regulatory Authority The State Data Protection Inspectorate The National Cyber Security Centre The Cyber Security Council

18 Results - the CRA I Comparison of the incidents dealt with by CERT-LT during Q and Q ( Incident type Number of incidents Number of incidentsChange, % Q Q Malware IS hacking DDos Fake electronic data Compromised integrity Loopholes in device security Manipulating electronic data Other

19 Results - the CRA II The National Computer Emergency Response Team CERT-LT investigated more than incidents in response to the reports received from Lithuanian providers of electronic communications services, foreign CERT services and Lithuanian internet users. Compared to 2013 when 25.3 thous. incidents were reported, the number of cyber incidents in Lithuania has grown by 43 per cent ( incidents). The trend remains the same in 2015.

20 Results / State Data Protection Inspectorate No reports about cyber incidents related to personal data security violations. No inspections have been carried out, hence, there are no findings as to violations of personal data processing on the cyber space. Order of the Director of the State Data Protection Inspectorate No. 1T-11(1.12.E) "On the approval of the description of procedure for communicating information about cyber incidents related to personal data security violations and the measures to manage such incidents to the State Data Protection Inspectorate" (TAR 25/02/2015, No )

21 Results / Police I Order of the Commissioner General of the Lithuanian Police No. 5-V-101 "On the approval of the description of procedure for submitting the information necessary to prevent and investigate cyber incidents with potential elements of criminal offences, for fulfilling instructions of the police and investigating cyber incidents " (TAR 03/05/2015, No )

22 Results / Police II No data available: how many reports have been received about cyber incidents with potential elements of criminal offences; how many orders have been given to restrict temporarily (not longer than for 48 hours without authorisation of the court and longer with authorisation of the court) the provision of public communications networks and/or electronic information hosting services to the customer; how many orders have been given to store the information related to the services provided by them and making it possible to find out the subscriber's identity and other details; how many orders have been given to communicate the data on the service user's traffic, how many times the contents of the information transferred has been controlled (on the basis of a reasoned court ruling).

Cyber security / Identity thefts Can we ensure the national security of the state without ensuring the safety of cyber space? Can we ensure the prevention of identity thefts by ensuring cyber security? 23

24 Identity thefts in Lithuania / in the world The scope is unknown either in Lithuania or globally. Victims of identity thefts always suffer negative consequences. Identity thefts are committed not only by means of modern technologies but also in daily life.

Cyber security is closely linked to the right to privacy. What is more imporant? 25

Criticism I 26 Police powers: instructions to providers of public communication networks and/or public electronic communication services and providers of electronic information hosting services to restrict temporarily (not longer than for 48 hours without authorisation of the court and longer with authorisation of the local court of the place where the service is provided) the provision of public communications networks and/or electronic information hosting services to the customer, when customer or his/her/its ICT equipment is involved in criminal activities and/or instructions to providers of public communication networks and/or public electronic communication services to apply measures to eliminate the preconditions for violations of law on the cyber space and for criminal offences.

27 the right to issue reasoned instructions to providers of public communication networks and/or public electronic communication services and providers of electronic information hosting services to retain the information related to the services they provide to make it possible to identify the type of the communications service used, the technical measures applied and the time of usage, the subscriber's identity, post and geographical location address, telephone and other access number, information about accounts and payments made on the basis of a service contract or agreement and any other information at the place where the communications equipment has been installed under a service contract or agreement, receive such information; as well as obtain, under the procedure provided for by legal acts upon a reasoned order of the court, the customer's traffic data and control the contents of the information communicated. Criticism II

Cyber Security 90 % of companies are attacked several times or attacks are repeated permanently. DDoS attacks: anybody can be a victim, participant, perpetrator Trends: the number of attacks is decreasing but they are becoming more complex, lasting for 1.5 hours approximately. Usually DDoS attacks are up to 300 Gbit/s, but in 2014 there were even attacks of up to 400 Gbit/s. Most of attacks are directed to servers and networks. The worldwide trend – the number of the attacks known already is decreasing, the number of unique attacks is growing (growth of around 20 % per year). 28

29

30

31

We assume liability for cyber security, it means also for the prevention of ID thefts. 32

Thank you for the attention! 33

Project website: