ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen.

Slides:



Advertisements
Similar presentations
ECTELs Universal Service Activities Towards Bridging the Rural Urban Divide.
Advertisements

Data Protection Billy Hawkes Data Protection Commissioner Irish Human Rights Commission 20 November 2010.
Regulators’ Code July Regulators’ Code A statutory Code Came into effect in April 2014, replacing the Regulators’ Compliance Code All local authorities.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
Policy Laundering and International Co-operation as a Good Thing tm.
Internet surveillance in the UK Ian Brown. Signals intelligence Everybody’s at it: Echelon Frenchelon Multinationals “We steal secrets with espionage,
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
Data Protection & Privacy in Singapore
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Health and Safety Executive What’s new in the 2014 Regulations? Genetically Modified Organisms (Contained Use) Regulations 2014 Implements 2009/41/EC (GM.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Legal Context Saskia Mermans  Ispa and the legislation  Legal Framework for the Internet: general observation  Highlights of the legislation.
Lawful Access/Interception: Global Cooperation and Collaboration Anthony M Rutkowski.
PROJECT Towards an Harmonised Approach for National Space Legislation in Europe Berlin, January 2004 NATIONAL SPACE LEGISLATION: THE BELGIAN.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Mandatory Retention of Traffic Data: What is next? Prof. Dr. Henrik W.K.Kaspersen Computer/Law Institute Vrije Universiteit Amsterdam- The Netherlands.
1 Regulatory Framework for C&I Regimes Presented by Andrew Kwan ITU Consultant Conformity and Interoperability Training for ARB Region on Type Approval.
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Ethiopia’s Government Key Policy Commitments Towards G8 Implementation: Current Status and Future challenges Ethiopia’s Country Team Contribution for Agricultural.
Waiting for the “Access” Axe to Fall: New Investigatory Assistance Legislation for Canada PST-2005 St Andrews, NB David A Townsend UNB-Law & NRC-IIT 12.
Cardiff Business School-12 June The Gender Equality Duty: A lever for equal pay? Bronwyn McKenna Director of Organising and Membership.
Data Protection and Cybercrime The dilemma of Internet Service Providers CEENET Workshop 22 September 2002 Joe McNamee Regulatory Affairs Manager, EuroISPA.
1. Any initiative of Government Many bills in Senate and Chamber of Deputies In Senate the Commission of Costitutional Affairs started the discussion.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
1 Brace Centre for Water Resources Management McGill University, Sept. 25 François Boulanger, Regional Director The New Canadian Environmental Assessment.
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
Corporate Compliance Audit Assistance to the employer, to identify and evaluate people-related risks and opportunities of the business, and recommendations.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
1 UNDECLARED WORK IN CROATIA Executive Capacity of Governance and Underground Economy: The Case of Croatia Zagrebl, September 1, 2015.
Data Protection Privacy in the Digital Age: the UN General Assembly Resolution Sophie Kwasny, 16 October th International Conference, Mauritius.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Toronto Vancouver Calgary Edmonton Markham Waterloo Region Whitehorse Washington, D.C. M I L L E R T H O M S O N LLP Current Tax and Legal Developments.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Governance and ethical oversight Professor Graeme Laurie Director, AHRC Research Centre for Studies in Intellectual Property and Technology University.
Environmental Assessment Act – Overview Environmental Media Group.
The European SEA Directive Simon Marsden School of International Business, University of South Australia Module 1: Basics of SEA.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
1 © 2007 ME™ - Your Money Education Resource™ Chapter 5: Attitudes of Clients Chapter 6: Financial Service Regulations Financial Planning.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
BETTER REGULATION STAKEHOLDERS FORUM Overview of developments in Better Regulation November 2012 Presentation by Martin Graham, DETI.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
UNSW CLE 19 July Privacy and Law enforcement in the on-line world – the bigger picture. Nigel Waters Convenor, Australian Privacy Charter Council.
Governance and Sovereignty: North American Perspectives Prepared by Michael Mac Neil For International Dimensions of Internet and e-Commerce Regulation,
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November.
1 The Public Interest Disclosure (Whistleblower Protection) Act.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Freedom of Information Act ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Privacy in the Digital Age: the UN General Assembly Resolution
Surveillance around the world
Rights and Responsibilities
Role of Service Providers in Cybercrime Investigations
RATIFICATION OF NAIROBI INTERNATIONAL CONVENTION ON REMOVAL OF WRECKS ,2007 PRESENTATION TO PORTFOLIO COMMITTEE OF TRANSPORT 23 SEPTEMBER 2014.
PRESENTATION OF THE AUTHORITY’S ANNUAL REPORT TO THE PORTFOLIO COMMITTEE ON SAFETY & SECURITY 4TH NOVEMBER Private Security Industry Regulatory.
Update on Lawful Interception (LI) Directive for ISPs
Afef Abrougui and Koliwe Majama Internet Freedom Festival, March 2017
Implementing good regulation principles
National Environmental Policy Act of 1969
Implementing good regulation principles
Presentation transcript:

ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen

RIC Bill: Context International –USA, Canada, UK, France, etc. –Council of Europe (COE) Cyber-crime Treaty Local –Review of security legislation –COE commitments –Draft 6: tabled 3 Sept; deliberations Sept ‘02 –Promulgation 2002? What is required of ISPs?

RIC Bill: Outline Prohibits unlawful surveillance and interception of communications except for law enforcement purposes Requires all telecoms systems and networks to be capable of surveillance Interception Directions (Chapter 3) –Requires telecom service providers to assist LEA in the execution of direction (Chapter 4, s 28) Interception Centres ISP Assistance Fund (s 38) Offences – some new (Chapter 9)

ISPs Responsibilities (Chapters 4 & 5) Ensure and bear the costs of surveillance capability –ISP ‘small business’ exemption, but: –Still possibly contribute to the Fund? Respond to interception and decryption directions –Routing duplicate signals of indirect communication –Providing communication-related information to the authorities. Store communication related information (3 years) Obtain customer personal/commercial data prior to service Retain indefinitely and hand over to LEA on request

RIC Bill: Implications Privacy Costs –compensation Ministerial discretion Lack of consultation Impact assessment studies? No annual public accounting