CLE Conference, 24-25 October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

European Commission Justice 26 October 2011 Council Framework Decision 2008/913/JHA on combating certain forms and expressions of racism and xenophobia.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
Policy Laundering and International Co-operation as a Good Thing tm.
Purpose MLA and extradition (and other forms of international judicial cooperation) with 3rd countries is part of the external policy of the Union Purpose.
Ensuring respect of international anti-corruption standards Laura Sanz-Levia Council of Europe.
MEDIA LAW Copenhagen University Session 9 Dirk VOORHOOF Ghent University (->contact)
INTER- GOVERNMENTALISM AND INTERNET SECURITY DR IAN BROWN, OXFORD / OII.OX.AC.UK.
Minority Rights and Cultural Rights 10 February 2011.
Child Abuse and Criminal Law Prof. Dr. Henrik Kaspersen Council of Europe Zagreb, October 27-28, 2011.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Mandatory Retention of Traffic Data: What is next? Prof. Dr. Henrik W.K.Kaspersen Computer/Law Institute Vrije Universiteit Amsterdam- The Netherlands.
C UNHCR and Immigrant Council of Ireland National Conference on Statelessness in Ireland 21st October 2014, European Parliament Office National launch.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
The Council of Europe Convention on Cybercrime: status quo and future challenges Cristina Schulman Council of Europe Strasbourg, France Tel
6 December 2010 Judicial cooperation in the EU From mutual legal assistance to mutual recognition Adrienne Boerwinkel Senior Legal Adviser Dutch Ministry.
EU joining the ECHR New opportunities under two legal systems EQUINET HIGH-LEVEL LEGAL SEMINAR Brussels, 1 – 2 July 2010 Dr. Mario OETHEIMER EU Agency.
Optional Protocol to the Convention on the Rights of the Child on the sale of Children, Child Prostitution and Child Pornography.
Criminalising child pornography and sexual abuse on the internet
Cybercrime and the Council of Europe response Strasbourg, October 2007 Alexander Seger Council of Europe, Strasbourg, France Tel
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Regional Conference Intellectual Property Crime Bahrain April 2008.
Conference for LGBT families in Europe Overview of the work of the Council of Europe in the field of family law Sabrina Cajoly - Council of Europe Directorate.
GLOBAL FORUM V ON FIGHTING CORRUPTION AND SAFEGUARDING INTEGRITY INTER-RELATIONSHIP AMONG THE VARIOUS FRAMEWORKS.
Digitalization of courts in the context of mutual assistance in criminal matters Dr Arkadiusz Lach Department of Criminal Procedure University of Nicolaus.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Data Protection Privacy in the Digital Age: the UN General Assembly Resolution Sophie Kwasny, 16 October th International Conference, Mauritius.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
The African Children’s Charter Prof Julia Sloth-Nielsen.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Trade Union Training on Social Security and Social Protection INTRODUCTION TO INTERNATIONAL LABOUR STANDARDS Turin, 5 May 2004.
BRIEFING BY THE DOJ&CD ON - (1) THE RATIFICATION OF THE CONVENTION ON CYBERCRIME AND THE ADDITIONAL PROTOCOL TO THE CONVENTION ON CYBERCRIME CONCERNING.
Chapter IV. International Cooperation. 2 2 International Cooperation Mandatory Offences Optional Offences Narrow Dual Criminality Requirements In MLAs.
The acquis Council Framework Decision of 19 July 2002 on combating trafficking in human beings (2002/629/JHA). Council Directive 2004/81/EC of 24 April.
Trade Union Training on Economic and Financial Analyses of Enterprises INTERNATIONAL LABOUR STANDARDS: PROCEDURES AND SUPERVISION Turin, 9 August 2005.
2002 Symantec Corporation, All Rights Reserved The EU Regulations and IT security An industry perspective Ilias Chantzos, Government Relations EMEA Terena.
MODULE II: THE INSTRUMENTS OF JUDICIAL COOPERATION IN CRIMINAL MATTERS IN THE CONTEXT OF THE COUNCIL OF EUROPE.- TUTOR: JOSÉ MIGUEL GARCÍA MORENO Red Europea.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Cje Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of Wrocław Lecture Harmonisation.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
EU measures combating hate speech ERIO Conference on combating hate speech against Roma and the role of Equality bodies Brussels 16/10/2015 DG JUSTICE.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
© International Training Centre of the ILO Training Centre of the ILO 1 International Labour Standards (ILS) and their.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
Experience of Slovenia in implementation of European Arrest Warrant
Practical Analysis of Obstacles Encountered by Legal Services as Part of Access to Information Requests Presentation to the Canadian Institute at the Conference.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign, Security and.
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
Ethical and legal aspects of organ donation; the Santiago Convention
Privacy in the Digital Age: the UN General Assembly Resolution
Georgetown, Guyana 14, 2016 Ignacio Goicoechea
Surveillance around the world
Monitoring and Detecting Online Hate Speech
Role of Service Providers in Cybercrime Investigations
European case studies relating to the administrative approach
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
SADC PROTOCOL ON WILDLIFE CONSERVATION AND LAW ENFORCEMENT
Cybercrime legislation and policies in Africa: Issues for discussion
UNODC and CYBERCRIME October 2009.
Presentation transcript:

CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The Netherlands

CoE Cyber Crime Convention Sydney October 24 & 25, Overview of the presentation n reason for international negotiations n the content of the cyber crime convention n discussion of some dilemma’s n meaning of the convention

CoE Cyber Crime Convention Sydney October 24 & 25, Procedure in the Council of Europe n Start :1997 n Completion: officially December 2000, factually August 2001 n Adoption by Committee of Ministers: November 2001 n Signature Ceremony: Budapest November 23, 2001 n ETS 185, coming into force: ??

CoE Cyber Crime Convention Sydney October 24 & 25, Negotiating Parties n Council of Europe Member States n U.S.A. n Canada n Japan n South Africa

CoE Cyber Crime Convention Sydney October 24 & 25, Signatories to the Convention EU-member states (out of 15): 13 Non-European States: 4 === (includes All G-7) 17 Other CoE members states, 14 === Parties to the Convention 31 Ratifications: 1

CoE Cyber Crime Convention Sydney October 24 & 25, Aim of the Cyber Crime Convention n Harmonisation of criminal substantive law, basis R (89) 9. n Harmonisation of criminal procedural law, basis R (95) 13. n Instruments for mutual legal assistance, basis existing co-operation instruments. n Codification of international law n Framework for future developments

CoE Cyber Crime Convention Sydney October 24 & 25, Scope of the Cyber Crime Convention n Minimum character n Substantive law: – categorisation; distinction cyber crime in narrow and in broad sense. n Procedural law – specific investigative powers related to IT, preliminary measures

CoE Cyber Crime Convention Sydney October 24 & 25, Scope CCC- continued n Mutual assistance – supplementing existing bilateral and multilateral instruments – extradition – scope of application of coercive powers – further assistance

CoE Cyber Crime Convention Sydney October 24 & 25, Harmonising of substantive criminal law n Cyber crime in the narrow sense – C.i.a.-offences: artt. 2-6 n Cyber Crime in the broader sense: – Computer-related offences: artt. 7-8 – Content-related offences: art. 9 – I.p.r.-related offences: art. 10 n Accessory provisions: artt

CoE Cyber Crime Convention Sydney October 24 & 25, General provisions n Definitions: art. 1 – computer system – computer data n Element: “without right” n Element: “intentionally”

CoE Cyber Crime Convention Sydney October 24 & 25, Content-related offences n Child porn – Defines child porn material n refers to sexually explicit conduct including adult actors and realistic virtual material – Criminalised Conduct n possession, production, distribution of digital child porn material including procurement, offering, making available by means of a computer system n Exemptions: to be defined under domestic law as “with right”

CoE Cyber Crime Convention Sydney October 24 & 25, Issues considered but not included n Surreptitiously gathering of personal data (“Cookies”) n Spam (unsolicited ) n Spoofing n Racism and xenophobia (see hereafter) n Other Content-related offences (e.g. gambling) n Non-liability of ISP’s

CoE Cyber Crime Convention Sydney October 24 & 25, Jurisdiction n Scope art. 22: only substantive provisions n Principle: territoriality n Includes ships and aircrafts n Restricted nationality principle n Dedere aut judicare n Conflicts: Consulting mechanism (substantial link)

CoE Cyber Crime Convention Sydney October 24 & 25, Criminal procedural law n Starting point: CoE R(95) 13 n Aim: gathering of electronic evidence of a specific criminal offence n Scope: cyber crimes art.14: a) offences established in the CCC; b) computer system instrument of the crime; c) any other crime for which electronic evidence is needed.

CoE Cyber Crime Convention Sydney October 24 & 25, Criminal Procedural law- general principles n Scope: art. 14 n Scope, conditions and safeguards art. 15: domestic law n Distinction between stored data and flowing data

CoE Cyber Crime Convention Sydney October 24 & 25, Definitions n art. 1 n computer system n computer data n service provider: communication services: TO and ISP equal footing n traffic data: functional definition (path, source)

CoE Cyber Crime Convention Sydney October 24 & 25, Measures concerning stored computer data n Search of computer system and files: art. 19 n Production order: art. 18 n Expedited preservation: art. 16 n Expedited preservation of stored traffic data: art. 17

CoE Cyber Crime Convention Sydney October 24 & 25, Preservation of traffic data n EU-directive Telecommunications and Privacy 1997: – deletion of non-billing data n Other Parties: no restrictions n Principle CCC: “preserve traffic data as is”

CoE Cyber Crime Convention Sydney October 24 & 25, Real time collection of traffic data/interception of content n Art. 20/21 parallel in structure n Art. 21: serious crime only (domestic law) n Specific communication by means of a computer system n Law enforcement authorities or service provider n “As is available”, no technical requirements n Confidentiality clause possibility

CoE Cyber Crime Convention Sydney October 24 & 25, Measures considered but not included n Measures to undo encryption n Specification of individual safeguards n Mandatory retention of traffic data – efficacy vs burden innocent third parties – reasonable time limit – legal safeguards n International harmonisation of collection/interception

CoE Cyber Crime Convention Sydney October 24 & 25, International mutual legal assistance n General principles, art. 24, 26 – to the widest extent possible – scope: art. 14 – expedited, flexible, modern means of communication – basis always domestic law – no refusal for fiscal offences – flexible interpretation of ‘dual criminality’ – spontaneous information

CoE Cyber Crime Convention Sydney October 24 & 25, Mutual legal assistance in general n Extradition: extraditable offences (art. 24) n Factual co-operation:  Can the request be executed on the basis of an existing bilateral or multilateral instrument? (EI) Y, proceed. N, apply art. 27 CCC (comprehensive set for MLA).  Is the application of specific measures necessary? Apply CCC or EI or both.

CoE Cyber Crime Convention Sydney October 24 & 25, Mutual legal assistance- specific measures n Expedited preservation of computer data (art. 29) n Expedited partial disclosure in case of traffic data (art. 30) n Access to computer systems and data (art. 31) n Transborder investigative measures that are lawful (art. 32) n Real time collection of traffic data (art. 33) n Real time interception of content (art. 34) n 24/7 network

CoE Cyber Crime Convention Sydney October 24 & 25, Transborder investigative measures n Only through MLA, except – Accessing and downloading of “Open source” – With permission of the person in control on the territory – Possibly through production order n Notification in EU MLA

CoE Cyber Crime Convention Sydney October 24 & 25, Mutual assistance instruments considered but not included n Adaptation of existing MLA- instruments n Data protection exception n Misuse of jurisdiction n International order for collection/retention of traffic data n Trans-border network search

CoE Cyber Crime Convention Sydney October 24 & 25, Final provisions n Coming into force: 5 ratifications n Accession: unanimity of Parties and majority of Committee of Ministers CoE n Declarations, reservations n Conference of Parties n Amendments n Dispute Resolution: consultation

CoE Cyber Crime Convention Sydney October 24 & 25, Cyber Crime Convention- final observations (I) n Minimum character: electronic environment n Framework character: ongoing development n Need for flanking, internationally co- ordinated measures n Enhances practical co-operation of law enforcement authorities – exchange of expertise – training and education – prevention

CoE Cyber Crime Convention Sydney October 24 & 25, Cyber Crime Convention - final observations (II) n Transparency of the drafting process n Industry and NGO involvement n Human rights and privacy concerns Internet brings people more together than some administrations would like to see.

CoE Cyber Crime Convention Sydney October 24 & 25, st Additonal Protocol on Racism and Xenophobia Procedure: – decision by CDPC in June 2001 – drafting December 2001-April 2002 – adoption CDPC June 2002; Parliamentary Assembly September 2002 – adoption by Committee of Ministers November 6, 2002 – opening for signature: January 2003

CoE Cyber Crime Convention Sydney October 24 & 25, Meaning of the Protocol n harmonising criminal offences concerning dissemination of racist and xenophobic material and related acts in computer networks n provide for adequate means of criminal investigations as defined by the Cyber Crime Convention n address a smaller group of Parties

CoE Cyber Crime Convention Sydney October 24 & 25, Crimes under the 1st Add. Protocol n art. 3: dissemination n art 4: threats n art. 5: insults n art. 6: denial n art. 7: aiding and abetting

CoE Cyber Crime Convention Sydney October 24 & 25, art. 3: dissemination – dissemination or otherwise making available through a computer system n excludes private communications n excludes production, possession, procurement – racist and xenophobic material (art. 2) – intentionally – without right – reservation clauses

CoE Cyber Crime Convention Sydney October 24 & 25, art. 2: racist and xenophobic material n written or any other representation – data carrier required n thoughts and theories n advocating, promoting, inciting n hatred, discrimination, violence n race, colour, decent, national or ethnic origin, religion (qualified)

CoE Cyber Crime Convention Sydney October 24 & 25, art. 4 threats n threat – (private communications included) n with commission of a serious crime n factors from art. 2

CoE Cyber Crime Convention Sydney October 24 & 25, art. 5 insults n insulting publicly n intentionally/without right n iactors from art. 2 n reservation clauses

CoE Cyber Crime Convention Sydney October 24 & 25, art. 6 denial n denial, gross minimisation n holocaust or future genocide or crime against humanity n reservation clause

CoE Cyber Crime Convention Sydney October 24 & 25, Other issues n attempt to art. 3-6 not criminal n copying of the definitions of the Cyber Crime Convention n powers and instruments of the Cyber Crime Convention applicable

CoE Cyber Crime Convention Sydney October 24 & 25, Not included in the Protocol n factors of art. 2: gender, sexual nature, age etc. n set up, running and supporting of racist and xenophobic associations n specific investigative measures

CoE Cyber Crime Convention Sydney October 24 & 25, Conclusion n framework of human rights, Rome Convention 1950 n major step forward in global approach since UN-CERD 1967 n meaning Protocol not restricted to – computer networks – scope of art. 2; role national judge – parties to the protocol or the convention