Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
UN Comprehensive Study on Cybercrime
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Copyright © 2009 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. CHAPTER 2 International Law and the World’s Legal Systems.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
A Worldwide Forum Ina Brock and Joe Cyr. Pharmaceutical Product Liability in Europe… Is increasingly mass torts litigation involving claims brought in.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Information Warfare Playgrounds to Battlegrounds.
LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Freedom of Expression in the Information Society : Some Current Issues & Development Dr. A.K. Chakravarti * Adviser Department of Information Technology.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Cybercrime What is it, what does it cost, & how is it regulated?
Information Warfare Playgrounds to Battlegrounds.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Information Security and Privacy in HRIS
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Privacy and the Law.
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Legal, Regulations, Compliance and Investigations
Introduction to Computer Forensics
Chapter 11 crime and security in the networked economy
Internet Governance: An Analysis from Developing country’s perspective
Year 10 ICT ECDL/ICDL IT Security.
Securing Information Systems
Tool Server Workstation Router Universal
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Chapter 13 Security and Ethical Challenges.
Cybercrime in the election process:
Chapter four – International Criminal Law:General Introduction
Computer Programming I
UNODC and CYBERCRIME October 2009.
Introduction to Digital Forensics
Presentation transcript:

Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many areas Its more important than ever to legislate on computer or cyber crime

Definitions Computer crimes Cyber Crimes Electronic crimes Characteristics traditional & new criminal activities transnational Problems unreported lack of training

Computer as Target Using a Computer to attack victim computers Attacks on the confidentiality, integrity or availability of information or systems Computer as Tool Fraud Gambling Pornography Piracy Harassment Computer as Accomplice Personal information (diaries, downloaded e- mails) Contraband (porn) Stolen Information (trade secrets, credit cards) Key evidence unknown to suspect!!!

Insider threats (employees) Hackers (teenage thrill-seekers to sophisticated criminals) Hactivists (overloads servers or hack web sites to send political message) Virus writers Criminal groups (attack systems & steal password for financial gain) Sensitive intrusions (sensitive information is obtained via computer intrusions) Information warfare (alternative to military attacks) Terrorists (who have potential to disrupt government systems with computer attacks) Cyber Warfare (attack by sovereigns --- Crime or Declaration of war) Hackers (teenage thrill-seekers to sophisticated criminals)

governing law jurisdiction forum conveniens enforcement of judgments Transnational Crime determining the locus delicti Trans-border investigation jurisdictional conflicts extradition forum convenes

An American Journalist Sued in Australia Files a Petition Seeking Help By ANITA RAMASASTRY I will argue that the U.N. is not the right forum to resolve these key questions. A few years ago, Australian mining magnate Joe Gutnick sued American reporter Bill Alpert for defamation in Australia. Now, in an unprecedented move, Alpert has taken his case to the U.N. - filing a petition with the Human Rights Committee. The case itself) and the disposition of the petition, are likely to be landmarks in the law regarding international jurisdiction with respect to Internet publications. Alpert claims in his petition that a decision by Australia 1 s High Court, forcing him to face suit there, denied him the right of free speech. For this reason, he argues, it breached Article 19 of the United Nations 1 International Covenant on Civil and Political Rights (ICCPR).

An American Journalist Sued in Australia Files a Petition Seeking Help By ANITA RAMASASTRY (Continued) In this instance, the nation in which the case is tried is likely to make a significant different to the outcome. Defamation laws in Australia are stricter than in the US, where the First Amendment generally permits comments such as those made in the article. And if Australian defamation law applies) Internet publication may have to be tailored to the country whose laws are most restrictive - a blow to free speech. The issue the case raises is of crucial importance: Will words that appear on the Internet be subject to defamation (and perhaps other) suits wherever they may be read - that is, in any of the world 1 s 3C 0-plus jurisdictions? And if not, where can suits be brought, and not brought? What is the dividing line?

Can we adapt existing law to cyberspace? Do we need new legislation? Problem comes when very idea of jurisdiction, based on geographic boundaries, is difficult to apply to Internet which does not recognize geographical distinctions What are options other than legislation? International/regional treaties International convention Development by system operators and Internet users of "rules" for behavior on Internet? Options available to individuals to regulate their conduct on a private basis - through contracts, private associations, custom etc.

1977 First comprehensive proposal for computer crime legislation was introduced in US Congress by Senator Ribikoff in Recommendations of expert committee of OECD in Paris in 1983 to ensure legislation for certain categories of computer crime 1986 OECD ‘Computer-Related Crime’ Report Council of Europe Recommendation R(89) 9 on computer misuse Discussed at 13th Congress of International Academy of Comparative Law in Montreal in 1990, at UN’s 8th Criminal Congress in Havana 1990, and at a Conference in Wurzburg, Germany in 1992

1995 Council of Europe Recommendation R(95) 13 (“problems of procedural law connected with information technology”) Interpol organized its International Conference on Computer Crime in 1995, 1996, 1998, and 4th Conference was held in Convention on Cyber-Crime ITU launched the Global Cybersecurity Agenda (GCA) in May 2007 by the Secretary General 2008 ITU's High Level Experts Group delivered Report with recommendations, including on cybercrime legislation, in August ITU in 2011 published a book: Understanding Cybercrime: Phenomena, Challenges and Legal Responses, by Professor Marco Gercke, Germany

 30 states sign Convention at opening ceremony at Budapest, on 23.XI.2001  First international treaty on cyber crimes, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security  Contains a series of powers and procedures such as search of computer networks and interception  Main objective is to pursue a common criminal policy aimed at protection of society against cyber-crime, especially by adopting appropriate legislation and fostering international co- operation  Convention is product of four years of work by experts of Council of Europe, United States, Canada, Japan and other countries which are not members of the Organization

to deter actions directed against confidentiality integrity availability of computer systems networks data misuse of such systems, networks and data to combat such criminal offences, by facilitating detection, investigation Search & seizure prosecution of such criminal offences

Attempt and aiding or abetting Corporate liability Criminal access Criminal data access Cyber stalking Cyber Terrorism Data damageDefamationForgeryForgeryFraud Malicious code Misuse of devices Misuse of encryption ObscenityPhising Spamming System damage Traditional crime Unauthorized access to code Unauthorized interception Waging cyber war DefamationData damage

Investigations by Investigation Officer Power of Investigation Officer to access computer and data Expedited preservation of evidence Real-time collection of traffic data Trans-border access International co- operation Territorial scope of offences

Promote Cyber-computer ethics Convince Government for Legislation Prepare investigation kit & instructions Establish Computer Forensic Lab Center of Excellence on Information Security Training of IOs, lawyers, judges Basic information to computer users