The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Prof. Alisdair A. Gillespie De Montfort University, UK.
MEDIA LAW Copenhagen University Session 9 Dirk VOORHOOF Ghent University (->contact)
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Minority Rights and Cultural Rights 10 February 2011.
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Detection and Confiscation of the property obtained by criminal means Dalian, 2012.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
1 CONSTITUTIONAL LAW 17 CRIMINAL LAW POWER: PROVINCIAL POWER TO PUNISH Shigenori Matsui.
Parosha Chandran Human Rights Barrister 1 Pump Court Chambers, London
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
The fight against human trafficking Presentation by Janine Schütze.
Agenda Provisions Policy Punishable Acts Penalties Enforcement Issues Status.
Course: European Criminal Law SS 2009 Hubert Hinterhofer.
EU Criminal Law Introduction, Lisbon Treaty. EU criminal legislation EU cannot adopt a general EU criminal code EU cannot adopt a general EU criminal.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
UNODC support in the field of migrant smuggling and human trafficking legislation Bali Process on People Smuggling, Trafficking in Persons and related.
Applicability of Traditional Substantive Criminal Law Concepts to Contemporary Cybercrime Igor Vuletić, Ph.D. assistant professor Department of criminal.
Litigation of environmental crimes Andrea Kenéz judge ECENA Fővárosi Bíróság Train the Trainer Programme
Criminalising child pornography and sexual abuse on the internet
UNODC Draft Model Legislation on Trafficking in Persons May 2008.
Regional Conference Intellectual Property Crime Bahrain April 2008.
Chinese Foreign Trade Law Jiaxiang Hu Professor of Law, School of Law, SJTU.
ANTI-CORRUPTION INSTITUTIONS AND MEDIA IN ALBANIA.
INTERNATIONAL TRAINING CENTER OF THE ILO - TURIN (ITALY) C.29 Forced Labour Convention, ratifications (*) FORCED OR COMPULSORY LABOUR (*) As of.
Johann Ruben Leiss, MLE, LL.M. (EUI) - PhD Research Fellow, Stipendiat - The CESL and the Initiative on Contract Rules for Online Purchases from a Comparative.
Fight Against Corruption - Integrative Feedback of Domestic and International Activities OHRID, 15th – 16th October 2010 REPUBLIC OF CROATIA Ministry of.
OPSC Optional protocol on sale of children children prostitution and pornography.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Cje Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of Wrocław Lecture Harmonisation.
PRESENTATION BY THE DEPARTMENT OF MINERALS AND ENERGY ON THE ACCESSION TO THE CONVENTION ON THE PHYSICAL PROTECTION OF NUCLEAR MATERIAL (CPPNM) BY SOUTH.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Smuggling of Human Beings – the international legal framework IML Training IOM-UNITAR New York 9-11 June 2010 Kristina Touzenis. IOM.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
CRIMINAL LAW OF THE EUROPEAN UNION 1 April 2015 THE LISBON TREATY AND CRIMINAL LAW Dr. sc. Zoran Burić Department of Criminal Procedural Law University.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Trends in online offence against children online and international regulations and responses Conference against sexual crimes against children online Jakarta,
 New Employee Invention System & Guidelines therefor in Japan Pre-Meeting AIPLA Mid-Winter Institute January 26, 2016 La Quinta Sumiko Kobayashi 1.
Copyright All rights reserved. Copyright All rights reserved. Foreign Corrupt Practices Act (FCPA) – value added for business or competitive.
Evaluation of restrictions: art. 15 and art TAIEX Seminar on the EU Service Directive, 3 May 2007 Carlos Almaraz.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 32– Financial Control Bilateral screening:
Caritas of Archdiocese of Prague Migration Centre Joint Staff Training Event Meeting in Prague 23 th – 27 th 2015.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Cje Karolina Kremens, LL.M., Ph.D. Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
Overview of Standards on Cost Auditing By: CMA Pradip H.Desai.
EXPECTED EFFECTS OF SERIALIZATION SYSTEM IMPLEMENTING FROM THE STANDPOINT OF REGULATORY AUTHORITY 3-4 DECEMBER SHAKARYAN MKRTICH.
PRESENTATION BY THE DEPARTMENT OF MINERALS AND ENERGY ON THE ACCESSION TO THE CONVENTION ON THE PHYSICAL PROTECTION OF NUCLEAR MATERIAL (CPPNM) BY SOUTH.
European case studies relating to the administrative approach
The impact of the EUs counter terrorism strategy for the presumption of innocence and the proportionality principle 26 June 2017.
Data Protection Act and Computer Misuse Act ANSWERS.
Cybercrime in the election process:
Investor protection and MIFID
Computer Misuse Act 1990.
EUROPEAN PUBLIC PROSECUTOR’S OFFICE
Combating Drug Abuse in Montenegro
Cross-Debarment Christopher Yukins.
International framework on migrant smuggling
Security of network and information systems
DEFINING THE CONCEPT OF TRAFFICKING IN PERSONS
Presentation transcript:

The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou Konstantinos, LLM (Heidelberg), LLM (Aristotle University), PhD candidate, Aristotle University of Thessaloniki, Faculty of Law, Department of Criminal Law and Criminology, Scholar of Program “Heraclitus II”

HACKING TOOLS

Possible threats

International provisions regarding the criminalization of acts related to hacking tools Convention on Cybercrime Article 6 – Misuse of devices 1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right: a the production, sale, procurement for use, import, distribution or otherwise making available of: i a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with Articles 2 through 5; ii a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5 Proposal for a Directive on Attacks against information systems Article 7 Tools used for committing offences ( 1) Member States shall take the necessary measures to ensure that the production, sale, procurement for use, import, distribution or otherwise making available of the following is punishable as a criminal offence when committed intentionally and without right, with the intent that it be used for the purpose of committing any of the offences referred to in Articles 3 to 6 at east for cases which are not minor: (a) (…) a computer program, designed or adapted primarily for the purpose of committing any o f the offences referred to in Articles 3 to 6 (b) a computer password, access code, or similar data by which the whole or any part of an information system is capable of being accessed.

Comparison of provisions that prescribe the criminalization of preparatory acts Convention on Cybercrime Article 6 – Misuse of devices 1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right: a the production, sale, procurement for use, import, distribution or otherwise making available of: i a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with Articles 2 through 5; ii a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5 International Convention for the Suppression of Counterfeiting (1929) Art. 3 par. 5 The following should be punishable as ordinary crimes: …(5) The fraudulent making, receiving or obtaining of instruments or other articles peculiarly adapted for the counterfeiting or altering of currency.

Article 149 of the German Criminal Code Article 149 Preparatory acts (1) Whosoever prepares to counterfeit money or stamps by producing, procuring for himself or another, offering for sale, storing or giving over to another plates, frames, type, blocks, negatives, stencils, computer programs or similar equipment which by their nature are suitable for the commission of the offence …. shall be liable to imprisonment not exceeding five years or a fine if he was in the process to counterfeit money, otherwise with imprisonment not exceeding two years or a fine

Provisions of the EU law that prescribe the criminalization of acts that are related to programs peculiarly adapted to committing specific crimes Framework Decision on increasing protection against counterfeiting in connection with the introduction of euro General offences 1. Each Member State shall take the necessary measures to ensure that the following conduct is punishable: … (d) the fraudulent making, receiving, obtaining or possession of — instruments, articles, computer programs and any other means peculiarly adapted for the counterfeiting or altering of currency Framework Decision on combating fraud and counterfeiting of non-cash means of payment Article 4 Offences related to specifically adapted devices Each Member State shall take the necessary measures to ensure hat the following conduct is established as a criminal offence when committed intentionally: the fraudulent making, receiving, obtaining, sale or transfer to another person or possession of: — instruments, articles, computer programmes and any other means peculiarly adapted for the commission of any of the offences described under Article 2(b);

Difficulties in delimitating hacking tools from programs that control the c.i.a. of information systems and electronic data Hacking tools Programs that control the c.i.a. of information systems and electronic data

Proposals Formulation of reservation based on Art. 6 par. 3 of the Convention on Cybercrime regarding the mere possession of hacking tools De legende ferenda criminalization of acts related to the production and distribution of programs that are exclusively designed or adapted for committing crimes against the c.i.a. of the information systems and electronic data