Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Information Security - Building Trust in Cyberspace iLaw Eurasia eGovernance Academy Tallinn December 2004 James X. Dempsey Center for Democracy.
Information Security Policies and Standards
1 Reform of the EU regulatory framework for electronic communications What it means for Access to Emergency Services Reform of the EU regulatory framework.
Europol’s tailor-made data protection framework
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
EU: Bilateral Agreements of Member States
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
EU: Bilateral Agreements of Member States. Formerly concluded international agreements of Member States with third countries Article 351 TFEU The rights.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
3rd session: Corporate Governance
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
INTERNET and CODE OF CONDUCT
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
HUMAN RIGHTS BASED APPROACH See Me Brewing Lab Cathy Asante.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Ioannis Iglezakis Directive on privacy and electronic communications.
NRCCL (University of Oslo, Faculty of Law) Hyperlinks and search engines(I) Jon Bing Norwegian Research Center for Computers and Law Master Lecture 16.
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
Amicus Legal Consultants THE DEPLOYMENT OF SPECIAL INVESTIGATIVE MEANS IN PROACTIVE ANTI-CORRUPTION INVESTIGATIONS.
1 The interplay of stopping computer crime while protecting privacy Svein Yngvar Willassen Department of Telematics, Norwegian University of Science and.
Data Protection Privacy in the Digital Age: the UN General Assembly Resolution Sophie Kwasny, 16 October th International Conference, Mauritius.
Legal Aid of Cambodia Bangkok, August 2015 Mr. RUN Saray Executiva Director and Lawyer Legal Aid of Cambodia WitnessProtection Presentation by.
Judgment of the Court of the European Union (Grand chamber) Retention of Telecommunications Data Holly Raiche Director, Internet Society of Australia.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
1 VIDEO SURVEILLANCE (public/private areas) TOMÁŠ MIČO The Office for Personal Data Protection of the Slovak Republic.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
The law on Intermediary Liability in India
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Digital evidence in criminal proceedings: legal considerations Arkadiusz Lach Department of Criminal Procedure Faculty of Law University of Nicolaus Copernicus.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
DG Information Society The EU and Data Retention Data Retention Meeting London, 14 May 2003 Philippe GERARD, DG Information Society The positions.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
The EU and Access to Environmental Information Unit D4 European Commission, Directorate General for the Environment 1.
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Agencija za zaštitu ličnih/osobnih podataka u Bosni i Hercegovini Агенција за заштиту личних података у Босни и Херцеговини Personal Data Protection Agency.
Privacy in the Digital Age: the UN General Assembly Resolution
Surveillance around the world
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Data Protection: EU & International
WitnessProtection Presentation
Role of Service Providers in Cybercrime Investigations
General Data Protection Regulation
Data Protection & Human Rights
U.S. Department of Justice
The activity of Art. 29. Working Party György Halmos
Is Data Protection a Fundamental Right Protecting the Individual?
Securing free and fair European elections
Free movement of persons
EU Data Protection Legislation
Presentation transcript:

Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September 2003 GIPI Global Internet Policy Initiative

Introduction Cybersecurity is shared responsibility of gov't, service providers, software and hardware makers, and users (large and small). Cybersecurity strategy has many components, including: –industry standards and best practices –information sharing (CERTs) –awareness, education –R&D –obligations under civil law (EU Dir., US examples) –criminal law

Cybercrime and Privacy Cybercrime law protects privacy by making interception and unauthorized access illegal To investigate cybercrime and crimes facilitated by computer, law enforcement agencies need access to –content of communications; –transactional (or traffic) data; –stored data; –data identifying subscriber (e.g., name)

Privacy Protection “Protection of privacy is a key policy objective in the European Union. It was recognized as a basic right under Article 8 of the European Convention on human rights. Articles 7 and 8 of the Charter of Fundamental Rights of the EU also provide the right to respect for family and private life, home and communications and personal data.” Communication from the Commission on Network and Information Security (2001)

COE Cybercrime Treaty - Art. 15 “Each party shall ensure that the establishment, implementation and application of the powers and procedures provided for in this section are subject to conditions and safeguards provided for under its domestic law, which shall provide for adequate protection of human rights and liberties …. “Such conditions and safeguards shall, as appropriate in view of the nature of the procedure or power concerned, inter alia, include judicial or other independent supervision, grounds justifying application, and limitation of the scope and the duration of such power or procedure.”

OECD Cybersecurity Guidelines Principle 5: “Security should be implemented in a manner consistent with the values recognised by democratic societies including the freedom to exchange thoughts and ideas, the free flow of information, the confidentiality of information and communication, the appropriate protection of personal information, openness and transparency.”

Elements of Surveillance Law - Real-Time Interception -ECHR Standards for interception must be spelled out clearly in legislation, with sufficient precision to protect against arbitrary application. Approval should be obtained from an independent official (preferably a judge). Only for the investigation of serious offenses. Only upon a strong factual showing of reason to believe that the target of the search is engaged in criminal conduct. Only when it is shown that other less intrusive techniques will not suffice.

Elements of Surveillance Law -2 Each surveillance order should cover only specifically designated persons or accounts. The rules should be technology neutral – all one-to-one communications should in general be treated the same, whether they involve voice, fax, images or data, wireline or wireless, digital or analog. The scope and length of time of the interception should be limited. The surveillance should be conducted in such a way as to reduce the intrusion on privacy to the minimum necessary to obtain the needed evidence.

Elements of Surveillance Law -3 Information seized or intercepted for criminal investigative purposes may not be used for other ends (except national security). Summary reports back to the approving judge. In criminal investigations, all those who have been the subject of interception should be notified after the investigation concludes, whether or not charges result. Personal redress should be provided for violations of the privacy standards.

Transactional Data Also known as traffic data - connection data, dialed numbers, IP addresses, time, date, duration …. Disclosure implicates privacy interests. Malone, ECHR. But real-time surveillance may be authorized under a standard lower than that applicable to content interception and for all crimes. Internet poses special challenge: drawing line between content and traffic data. COE, Explanatory Report, para. 227.

Stored Data May be content or traffic data. Data stored with user - treated like any other evidence in the home or office and subject to protections accorded written documents. Data stored with service provider or other third party - disclosure generally implicates privacy interests. Distinction may be drawn between immediate seizure and procedures for delivery to government: –Immediate seizure usually requires highest form of approval. –Voluntary disclosures by service providers in some cases.

Data Retention Should service providers be required to keep traffic data beyond time needed operationally? EU law permits but does not require states to adopt data retention laws. COE Cybercrime Treaty does not require companies to retain data or modify their systems to facilitate interception. US law does not require data retention. US law and the COE treaty provide for data preservation upon government request, with disclosure based on appropriate authorization.

Encryption On balance, strong encryption contributes to security and prevention of crime more than it facilitates crime OECD Guidelines and 1998 EC report supported availability of encryption. US, Canada, Germany, Ireland, France, Belgium, among others have eliminated or loosened restrictions on encryption. “The use of encryption technologies … [is] becoming indispensable, particularly with the growth in wireless access.” EC Commun- ication, Creating a Safer Info Society, 2001.

Anonymity In order to … enhance the free expression of information and ideas, member sates should respect the will of users not to disclose their identity.” COE Declaration, “An increasing variety of authentication mechanisms is required to meet our different needs in the environments in which we interact. In some environments, we may need or wish to remain anonymous.” EC Communication, Balance - see recommendations of Art. 29 Data Protection Working Party.

ISP Liability “No provider or user of an interactive computer service shall be treated as a publisher or speaker of any information provided by another information content provider.” Sec. 230, Communications Act, USA. “Providers shall not be responsible for any third-party content to which they only provide access.” Sec. 5(3), Information and Communication Services Act, Germany. COE Declaration, 2003: No general obligation to monitor content. No liability for content that ISPs transmits or provides access to. EU Directive on e-commerce (2000).

ISP Liability under EU Directive "Mere conduit" - service provider is not liable. "Caching" - service provider is not liable for automatic, intermediate and temporary storage for the sole purpose of efficiency. Hosting - service provider not liable if it does not have knowledge, and, upon obtaining knowledge, acts expeditiously to remove or disable access. No general obligation to monitor. Courts can order injunctions. Encourages codes of conduct.

Summary Privacy and security are two sides of the same coin. Cybercrime legislation is one key component of cybersecurity. Government will need access to communications and data, subject to procedural safeguards. No technical mandates on Internet service providers. Network security is the shared responsibility of the gov’t and the private sector. –Gov't protects its own networks, contributes to awareness, info sharing R&D. Balance can be found among industry, privacy and law enforcement interests.

More Information