Public-private cooperation

Slides:



Advertisements
Similar presentations
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Advertisements

Armand Racine Consultant Chemicals Branch
Philippine Cybercrime Efforts
Work on the Council of Europe/UNESCO Recommendation on the recognition of joint degrees Bologna follow-up Workshop Joint degrees – further development,
UN Comprehensive Study on Cybercrime
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
State of play and activities in 2014 March 2014
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
DHS, National Cyber Security Division Overview
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Strategy and Policy Unit: Current Activities and Future Tasks
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Rule of Law: Implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region”, November 2013.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Cartagena protocol on Biosafety to the Convention on Biological Diversity and the International debates (COP- MOP) Stakeholders’ workshop on the Biosafety.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Cybersecurity Governance in Ethiopia
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
European Standards on Confidentiality and Privacy in Healthcare Dr Colin M Harper Division of Psychiatry & Neuroscience Queen’s University.
Legal and institutional foundation of economic statistics Overview of international experience Regional Workshop for African Countries on Compilation of.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
The Case of Estonia New Code of Ethics for Officials Anneli Sihver, Ministry of Finance 2 October 2015.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
ISACA Ireland Cyber Security Policy 9 February 2016.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
GUIDE TO HUMAN RIGHTS FOR INTERNET USERS Implementation Strategy Concept.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
E-evidence and access to data in the cloud Issues and options under consideration by the Cloud Evidence Group of the Cybercrime.
Legal framework of telework – practical solutions for employers Dr. Jacek Męcina.
1 Legal Frameworks for Public and Stakeholder Engagement by Carl Bruch Asia Regional Workshop on Stakeholder Engagement in International Waters Management.
Project: EaP countries cooperation for promoting quality assurance in higher education Maria Stratan European Institute for Political Studies of Moldova.
ANSI – ESOs meeting Washington February 2017
Cyber Security and Georgia. New Challenges
INSPIRE and the role of Spatial Data Interest Communities (SDIC)
Johannesburg, South Africa
UNECE Aarhus Convention Secretariat
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Work on the Council of Europe/UNESCO Recommendation on the recognition of joint degrees Bologna follow-up Workshop Joint degrees – further development,
Behaviours, Knowledge & Skills:
Prepared by the Cybercrime Programme Office of the Council of Europe
MDTFJSS RESULTS IN 2016 Ministry of Justice.
Cybersecurity in Belarus a general overview of support areas
8 Building Blocks of National Cyber Strategies
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Hungarian Integrity Management Development
Short-term rentals in Europe Possible legal solutions
Trust and Security Unit
The role of the ECCP (1) The involvement of all relevant stakeholders – public authorities, economic and social partners and civil society bodies – at.
OECD – Better Policies for Better Lives in Ukraine
Importance of Law and Policies in the Environmental Management System
Securing free and fair European elections
The European Union response to cyber threats
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
DFG Ombudsman Germany Safeguarding Good Scientific Practice Recommendation of the Germany Research Foundation Prof. Ulrike Beisiegel Chair of the DFG Ombudsman.
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Albanian Situation Marsida Xhaferllari and Brunilda Kadi
Role of the Council of Europe - International Partner Organisation Justice Programme Prague, 20 March 2019 Criminal Law Cooperation Unit Action against.
Role of the Council of Europe - International Partner Organisation Justice Programme Prague, 20 March 2019 Criminal Law Cooperation Unit Action against.
Public Protector South Africa Deputy Public Protector of South Africa
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Public-private cooperation Արևելյան Գործընկերություն Східне партнерство Eastern Partnership აღმოსავლეთ პარტნიორობა Parteneriatul Estic Şərq tərəfdaşlığı Partenariat Oriental Усходняе Партнёрства Project Cybercrime@EAP III Public-private cooperation Draft Memorandum of Understanding Markko Kunnapu Ministry of Justice of Estonia Council of Europe www.coe.int/cybercrime

Public-private cooperation Why it is so important? Purposes of using data Need to prevent and investigate crime www.coe.int/cybercrime www.coe.int/cybercrime 2

What are the conditions? Legal framework Organizational framework Contact points Trust www.coe.int/cybercrime www.coe.int/cybercrime 3

Basis for good cooperation Legal clarity Clear regulation and similar understanding Powers, rights and obligations Conditions and safeguards Remedies www.coe.int/cybercrime www.coe.int/cybercrime 4

Developments in Ukraine Series of Council of Europe workshops and meetings since September 2016 Reports in November 2016 and May 2017 Overview of the situation Recommendations to government authorities Draft amendments to legislation www.coe.int/cybercrime www.coe.int/cybercrime 5

The need for a MoU Memorandum of Understanding One of the recommendations to restore trust between public and private sector and to facilitate cooperation To involve major stakeholders in Ukraine and agree on detailed cooperation principles www.coe.int/cybercrime www.coe.int/cybercrime 6

The main elements of the draft MoU Promote the use of the ICT Recognise the need to cooperate and exchange of information Ensure protection of fundamental rights and freedoms To fight crime, in particular cybercrime www.coe.int/cybercrime www.coe.int/cybercrime 7

Draft MoU – areas covered Cooperation based on the rule of law and human rights Rule of law Cooperation based on law Conditions and safeguards Procedural powers – principle of proportionality www.coe.int/cybercrime www.coe.int/cybercrime 8

Draft MoU – areas covered Procedures and protocols of communications Cooperation – exchange of information, access to electronic evidence Procedures for sending and receiving requests Contact points between parties, rights and responsibilities www.coe.int/cybercrime www.coe.int/cybercrime 9

Draft MoU – areas covered Adequate level of knowledge and capacity building Personnel having professional level of knowledge and expertise Develop a system for capacity building and training in the areas of handling cybercrime, cyber-related incidents and electronic evidence Joint trainings including practical exercises for cybercrime and cybersecurity incidents www.coe.int/cybercrime www.coe.int/cybercrime 10

Draft MoU – areas covered Cooperation for prevention of Internet-related crime Identification of resources available Awareness raising measures to prevent crime, including guidelines on safe behaviour on the Internet Support to the Internet resources and Critical Information Infrastructure to ensure safer cyberspace in Ukraine www.coe.int/cybercrime www.coe.int/cybercrime 11

Draft MoU – expected outcome Joint working group to organise and participate in meetings to exchange practical experience and identify issues for improving the cooperation and exchange of information Additional guidelines if necessary Good practice guidance for lawful removal of electronic data, computer systems inspection and seizure of computer systems To facilitate better understanding To increase trust www.coe.int/cybercrime www.coe.int/cybercrime 12

Thank you for your attention www.coe.int/cybercrime www.coe.int/cybercrime 13