~ 1 ~ Noting that states share sovereignty in cyberspace and have a common interest in its regulation and protection;
|
|
- Alvin Porter
- 5 years ago
- Views:
Transcription
1 ~ 1 ~ Draft Resolutions Section 4 Preamble The participants of the Preparatory Colloquium for Section IV held in Helsinki from 9 to 12 June 2013 propose the following resolutions to the XIX International Congress of Penal Law, to be held in Rio de Janeiro from 31 August to 6 September 2014: Considering that people s lives in the 21 st century are heavily influenced and shaped by information and communication technology (ICT) as well as by the opportunities and risks that accompany information society and cyberspace, and that therefore crimes in these areas affect important personal and collective interests; Noting that states share sovereignty in cyberspace and have a common interest in its regulation and protection; Recognizing that states have made considerable efforts to vest jurisdiction and determine the locus delicti of offences that may affect the integrity of ICT systems and cyberspace as well as the related interests of persons and society; Keeping in mind the particularities of cyberspace, such as the speed at which data flows, its volatility, and the fact that it can be accessed anywhere in the world; Recognizing further the difficulties in localizing information and evidence in cyberspace; Stressing the fundamental importance of the protection of human rights, in particular the principle of legality, the right to privacy, the right to a fair trial, the principle of proportionality in the investigation and prosecution of offences, and in general all the rules and principles regarding due legal process; Referring to international and regional instruments that seek to guide and coordinate efforts and to harmonize legislation, such as the Budapest Convention on Cybercrime of 23 November 2001, EC E-Commerce Directive 2000/31/CE, EU Framework Decision 2005/222/JHA on attacks against information systems, EC Data Retention Directive 2006/24/CE, the Commonwealth of Independent States Agreement on Cooperation in Combating Offences related to Computer Information of 2001, the Arab Convention on Combating Information Technology Offences of 2010, the Shanghai Cooperation Organization Agreement on Cooperation in the Field of International Information Security of 2010, and the draft African Union Convention on the Establishment of a Legal Framework Conducive to Cybersecurity in Africa of 2012; Building on the debates and resolutions of past International Congresses of Penal Law, especially the resolutions of Section II of the XV International Congress (1994) held in Rio de Janeiro, on computer crimes and other crimes against information technology, and the
2 ~ 2 ~ resolutions of Section IV of the XVIII International Congress (2009) held in Istanbul, on universal jurisdiction; recommend the following: A. General Considerations 1. States should develop a coherent response to the challenge of cybercrime, in particular by keeping their legislation and practice under review in order to ensure that their criminal law, criminal procedure and mutual legal assistance regimes meet the needs of today s interconnected globalised world. 2. States should consider acceding to existing international instruments on cybercrime or developing further international legal mechanisms in order to establish the rule of law in cyberspace and avoid potential conflicts between states on the enforcement of their legislation and policies in cyberspace. B. Substantive Jurisdiction and Locus Delicti 3. The principle of territoriality remains the primary principle of jurisdiction also in cyberspace. 4. States should exercise restraint in the establishment of extraterritorial jurisdiction, with a view to preventing conflicts of jurisdiction rather than relying primarily on their resolution once they occur. 5. With the exception of those crimes for which universal jurisdiction is accepted under international law, a state may not apply universal jurisdiction de facto or de jure in cases of prohibited content in cyberspace. 6. Offences may have more than one locus. States may establish a locus delicti within their borders if conduct takes place there or causes effects there. 7. States should exercise restraint in applying the effect theory in situations in which the effect is not pushed by a perpetrator into the state, but pulled into it by an individual in that state. 8. In determining effects, states shall consider the existence of a particular nexus with the offence, such as the intent of the perpetrator.
3 ~ 3 ~ 9. When a state localizes the effects of an offence within its borders, the principle of legality requires that the perpetrator could have had a reasonable expectation that his or her conduct would cause effects in that country. 10. A state may exercise its jurisdiction over an individual on its territory who pulls content that is prohibited under its own legal system, even though it is legal under the legal system of the producer. 11. States may consider establishing corporate criminal liability for legal entities with regard to cybercrime. C. Investigations in Cyberspace 12. No state has exclusive sovereignty over the publicly accessible IT networks. 13. Law enforcement agencies, in the same way as citizens, have the right to navigate the free IT networks without permission from providers, and regardless of where the content looked at is stored. 14. States should consider establishing, under national law, an obligation on service providers to cooperate with law enforcement agencies, by making data transfer in the cyberworld traceable, giving access to passwords, decrypting content or installing search devices for investigative purposes. This obligation is subject to the principle of proportionality. 15. All persons are entitled to the protection of a national legal system, if there is a legitimate expectation of protection by that system. 16. States may, subject to national law, freely use evidence that they find on publicly accessible IT networks. 17. Regardless of the nationality of the person in question, no state may apply coercive measures in another state, unless permitted by the territorial state. D. International Cooperation in Criminal Matters and Enforcement 18. States should implement the necessary investigative techniques that enable them to provide mutual assistance in respect of cyber offences, on the basis of the proportionality principle.
4 ~ 4 ~ 19. States should in particular be able to provide fast assistance, and a provisional order to preserve data should be introduced. Such an obligation to preserve data should be for a reasonable time only. 20. In situations where there is a common understanding of cybercrime offences, the trend towards the elimination of the requirement of double criminality as a condition for mutual legal assistance should be encouraged. 21. Information obtained through mutual legal assistance for investigative purposes may, subject to national law, be used for evidence. 22. A (provisional) decision by a criminal court to close down a server, website or corresponding entity may be enforced directly if provided for by an international agreement or by the law of the state in which the service provider is located. E. Real Human Rights in a Virtual World 23. States shall respect internationally recognized human rights standards also in the context of the digital world. 24. If states act extraterritorially while investigating in cyberspace, they shall comply with the human rights standards applicable to their jurisdiction (agent control standard). 25. States should record investigations in cyberspace with a view to ensuring state accountability in the event of violations of human rights. 26. The responsibilities of a specific state for violations of human rights should be decided after a finding of a violation and not as a condition for admissibility of a complaint with supervisory mechanisms. F. Virtual Court Room 27. Communications may be sent by the authorities directly to the accused, witnesses, victims and experts who are physically present in another state, subject to the acceptance of said state of this method of communication. 28. On condition of the consent of the individual concerned, the possibilities of making use of digital technology, such as videolinks, should be expanded in order to lessen the need for such intrusive measures as extradition.
5 ~ 5 ~ 29. States should be encouraged to consider the possibility of and conditions for the collection of evidence through digital technology, even though the individual was not physically present at the hearing. 30. The security and reliability of the lines of communication in use by the authorities must be of the highest standard. The communications should be protected against hacking.
National Report Japan
National Report Takeshi MATSUDA, Megumi OCHI, Tadashi IWASAKI (B) Jurisdictional issues (1)(a) How does your country locate the place of the commission of a crime in cyberspace? Article 1 of the ese Penal
More informationCybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013
www.coe.int/tcy Strasbourg, 5 November 2013 T-CY (2013)30 Cybercrime Convention Committee (T-CY) Ad-hoc Subgroup on Transborder Access and Jurisdiction Report of the Transborder Group for 2013 Report prepared
More informationProposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Strasbourg, 17.4.2018 COM(2018) 225 final 2018/0108 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on European Production and Preservation Orders for
More information2. What are the main types of encryption mostly encountered during criminal investigations in cyberspace?
SPAIN 3-10-2016 ANNEX 1. How often do you encounter encryption in your operational activities and while gathering electronic evidence/evidence in cyber space in the course of criminal procedures? Often
More informationMutual Legal Assistance: Understanding the Challenges for Law Enforcement in Global Cybercrime Cases
Mutual Legal Assistance: Understanding the Challenges for Law Enforcement in Global Cybercrime Cases Issue Brief - By Adam Palmer - January 2018 Because of the global connectivity of the internet, cybercrime
More informationData protection and privacy aspects of cross-border access to electronic evidence
Statement of the Article 29 Working Party Brussels, 29 November 2017 Data protection and privacy aspects of cross-border access to electronic evidence On 8th June 2017, the European Commission issued a
More informationProposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, 13.9.2017 COM(2017) 489 final 2017/0226 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on combating fraud and counterfeiting of non-cash means
More informationQ. What do the Law Commission and the Ministry of Justice recommend?
Review of the Search and Surveillance Act 2012 Questions and Answers The Act Q. What does the Search and Surveillance Act do? A. The Act outlines rules for how New Zealand Police and some other government
More informationCouncil of the European Union Brussels, 14 September 2017 (OR. en)
Council of the European Union Brussels, 14 September 2017 (OR. en) Interinstitutional File: 2017/0226 (COD) 12181/17 PROPOSAL From: date of receipt: 13 September 2017 To: No. Cion doc.: Subject: DROIPEN
More informationComments of the United States of America to the Draft Comprehensive Study on Cybercrime August 22, 2016
Comments of the United States of America to the Draft Comprehensive Study on Cybercrime August 22, 2016 The Permanent Mission of the United States of America presents its compliments to the Secretariat
More informationProposal for a COUNCIL FRAMEWORK DECISION. on attacks against information systems. (presented by the Commission)
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 19.04.2002 COM(2002) 173 final 2002/0086 (CNS) Proposal for a COUNCIL FRAMEWORK DECISION on attacks against information systems (presented by the Commission)
More informationThe Third Pillar for Cyberspace
1 Judge Stein Schjolberg The Third Pillar for Cyberspace An International Court or Tribunal for Cyberspace Peace and Justice in Cyberspace 2 Chairman, High Level Experts Group (HLEG), ITU, Geneva, (2007-2008)
More informationLegislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism
Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism Section 1: Short Title. This Act may be cited as the.
More informationAnalysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level
Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level Lecturer Adrian Cristian MOISE, PhD. Postdoctoral researcher, Titu Maiorescu
More informationComprehensive Study on Cybercrime
Comprehensive Study on Cybercrime February 2013 Front cover photo credits (left to right): istockphoto.com/tomml istockphoto.com/mikewesson istockphoto.com/polygraphus UNITED NATIONS OFFICE ON DRUGS AND
More informationSALZBURG FORUM MINISTERIAL CONFERENCE. Bucharest, 17 October 2013 COMMON CONCLUSIONS
SALZBURG FORUM MINISTERIAL CONFERENCE Bucharest, 17 October 2013 COMMON CONCLUSIONS Upon the invitation of the Romanian Presidency of the Salzburg Forum, the Home Affairs Ministers of the Salzburg Forum
More informationARTICLE 29 Data Protection Working Party
ARTICLE 29 Data Protection Working Party Brussels, 6 April 2010 D(2010) 5054 Juan Fernando LÓPEZ AGUILAR Chairman of the Committee on Civil Liberties, Justice and Home Affairs European Parliament B-1047
More informationSpring Conference of the European Data Protection Authorities, Cyprus May 2007 DECLARATION
DECLARATION The European Union initiated several initiatives to improve the effectiveness of law enforcement and combating terrorism in the European Union. In this context, the exchange of law enforcement
More informationDeclaration on Media Freedom in the Arab World
Declaration on Media Freedom in the Arab World Preamble Reaffirming that freedom of expression, which includes media freedom, is a fundamental human right which finds protection in international and regional
More informationDavid R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996)
David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev. 1367 (1996) Global computer-based communications cut across territorial borders, creating a new realm
More informationOUTCOME OF THE COUNCIL MEETING. 3455th Council meeting. Justice and Home Affairs. Brussels, 10 and 11 March 2016 P R E S S
Council of the European Union 6969/16 (OR. en) PROVISIONAL VERSION PRESSE 14 PR CO 14 OUTCOME OF THE COUNCIL MEETING 3455th Council meeting Justice and Home Affairs Brussels, 10 and 11 March 2016 Presidents
More informationProposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction
1 Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction Recalling the United Nations Convention against Transnational
More informationThe Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas
www.coe.int/cybercrime The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas Workshop on cybercrime legislation (Bogota, 3-5 Sep 2008) Alexander
More information6339/18 MK/sl 1 DGD 2 LIMITE EN
Council of the European Union Brussels, 26 February 2018 (OR. en) 6339/18 LIMITE JAI 126 COPEN 42 DROIPEN 20 CYBER 33 NOTE From: To: Subject: Presidency Permanent Representatives Committee/Council Improving
More informationOpinion of the European Data Protection Supervisor
EDPS - European Data Protection Supervisor CEPD - Contrôleur européen de la protection des données Opinion of the European Data Protection Supervisor on the Proposal for a Council Decision concerning access
More informationThe Internet Society and African Union Commission Survey on African ICT Policy Makers
The Internet Society and African Union Commission Survey on African ICT Policy Makers FEBRUARY 2016 Disclaimer: The opinions, findings and conclusions in this report reflect the views of the survey participants
More informationCONTRIBUTIONS OF THE DOMINICAN REPUBLIC TO THE ZERO-DRAFT FOR THE HIGH-LEVEL DIALOGUE TO BE HELD ON DECEMBER 15TH AND 16TH
CONTRIBUTIONS OF THE DOMINICAN REPUBLIC TO THE ZERO-DRAFT FOR THE HIGH-LEVEL DIALOGUE TO BE HELD ON DECEMBER 15TH AND 16TH New York, Tuesday October 20th-23rd 2015 DAY 1. PLENARY SESSION GENERAL STATEMENT
More informationA brief outline of The EVIDENCE project
This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under Legal Notice: The views expressed in the course of
More informationEconomic crime including fraud. Ministry of Interior General Police Directorate Criminal Police Directorate
Economic crime including fraud Ministry of Interior General Police Directorate Criminal Police Directorate Overview of the legislation Constitution Criminal Code Criminal Procedure Code Law on Police Law
More informationPresented at the Closing Plenary Session on 11 September 2006
AEBF10 CHAIRMAN S STATEMENT 11 September 2006 The 10 th Asia-Europe Business Forum (AEBF10), Helsinki Chairman s Statement Presented at the Closing Plenary Session on 11 September 2006 The 10 th Asia-Europe
More informationThe Third Pillar for Cyberspace
1 Judge Stein Schjolberg The Third Pillar for Cyberspace An International Court or Tribunal for Cyberspace Peace and Justice in Cyberspace 2 Chairman, High Level Experts Group (HLEG), ITU, Geneva, (2007-2008)
More informationLEGAL BASIS OBJECTIVES ACHIEVEMENTS
PERSONAL DATA PROTECTION Protection of personal data and respect for private life are important fundamental rights. The European Parliament has always insisted on the need to strike a balance between enhancing
More information2nd WORKING DOCUMENT (B)
European Parliament 0-09 Committee on Civil Liberties, Justice and Home Affairs 6..09 nd WORKING DOCUMT (B) on the Proposal for a Regulation on European Production and Preservation Orders for electronic
More informationLEGAL BASIS OBJECTIVES ACHIEVEMENTS
PERSONAL DATA PROTECTION Protection of personal data and respect for private life are important fundamental rights. The European Parliament has always insisted on the need to strike a balance between enhancing
More informationDraft Accra Declaration
Draft Accra Declaration World Press Freedom Day 2018 Keeping Power in Check: Media, Justice and the Rule of Law We, the participants at the UNESCO World Press Freedom Day International Conference, held
More informationP6_TA-PROV(2007)0347 PNR Agreement
P6_TA-PROV(2007)0347 PNR Agreement European Parliament resolution of 12 July 2007 on the PNR agreement with the United States of America The European Parliament, having regard to Article 6 of the Treaty
More informationA Global Protocol on Cybersecurity and Cybercrime
A Global Protocol on Cybersecurity and Cybercrime The Chairman s Model Law for Cybercrime Legislation (5th. edition August 2009) SUMMARY Even if the Council of Europe Convention on Cybercrime (2001) or
More informationBahrain s Draft Law on Computer Crimes
Bahrain s Draft Law on Computer Crimes Dr. Jameel Al Alawi Economic Development Board Jameel.alalawi@bahrainedb.com Law is based on Cyber Crime Convention Based on Cyber-Crime Convention Advantages of
More informationGLACY+ Global Action on Cybercrime Extended Action globale sur la cybercriminalité élargie
GLACY+ Global Action on Cybercrime Extended Action globale sur la cybercriminalité élargie Version 20 November 2016 Comparative analysis of the Malabo Convention of the African Union and the Based on a
More informationEUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981
EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COP 200 TELECOM 151 CODEC 1206 OC 981 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: DIRECTIVE
More informationDebating privacy and ICT
Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal
More informationCYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007
CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007 Professor Pauline C. Reich Waseda University School of Law Director, Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute Tokyo, Japan
More information@ On computers and other networks by the cyber criminals using authorized or unauthorized entry
UNDERSTANDING CYBER CRIMES Introduction The advent of internet and the revolution of cyber space in communication, commerce and information is hailed as a paradigm shift in use of technology and its percolation
More informationSubmission of the. New South Wales Council for Civil Liberties. to the. Commonwealth Attorney-General s Department
Submission of the New South Wales Council for Civil Liberties to the Commonwealth Attorney-General s Department on Australia s proposed accession to the Council of Europe Convention on Cybercrime Authors:
More informationA FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME
A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME Lecturer Adrian Cristian MOISE, PhD. Spiru Haret University of Bucharest (ROMANIA) adriancristian.moise.@gmail.com. Abstract The Council
More informationAdopted on 23 June 2005
ARTICLE 29 Data Protection Working Party 1022/05/EN WP 110 Opinion on the Proposal for a Regulation of the European Parliament and of the Council concerning the Visa Information System (VIS) and the exchange
More informationC 276/8 Official Journal of the European Union
C 276/8 Official Journal of the European Union 17.11.2009 Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament and the Council on an area
More informationOAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM
Downloaded on August 16, 2018 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM Region African Union Subject Security Sub Subject Terrorism Type Conventions Reference Number Place of Adoption
More informationFROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE
Military Art and Science 259 FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE Ilina ARMENCHEVA ilina.armencheva@gmail.com Stefko SMOLENOV "G. S. Rakovski" National Defence
More information14480/1/17 REV 1 MP/mj 1 DG D 2B LIMITE EN
Council of the European Union Brussels, 1 December 2017 (OR. en) NOTE From: To: Presidency Council No. prev. doc.: 14068/17 Subject: 14480/1/17 REV 1 LIMITE JAI 1064 COPEN 361 DAPIX 375 ENFOPOL 538 CYBER
More informationon the proposal for a Regulation of the European Parliament and of the Council concerning customs enforcement of intellectual property rights
Opinion of the European Data Protection Supervisor on the proposal for a Regulation of the European Parliament and of the Council concerning customs enforcement of intellectual property rights THE EUROPEAN
More informationScope of the obligation to provide extradition
chapter 4 International criminal justice cooperation 131 Tool 4.2 Extradition Overview This tool discusses extradition, introduces a range of resources to facilitate entering into extradition agreements
More informationTEXTS ADOPTED Provisional edition
European Parliament 2014-2019 TEXTS ADOPTED Provisional edition P8_TA-PROV(2018)0339 Countering money laundering by criminal law ***I European Parliament legislative resolution of 12 September 2018 on
More information12913/17 EG/np 1 DGD 2C
Council of the European Union Brussels, 11 October 2017 (OR. en) 12913/17 NOTE From: To: Presidency Council No. prev. doc.: 12727/17 Subject: FREMP 110 JAI 880 COHOM 111 DROIPEN 129 ASILE 66 JUSTCIV 228
More informationPALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND TEL: / FAX:
PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 917 9543 / +41 22 917 9738 FAX: +41 22 917 9008 E-MAIL: registry@ohchr.org Mandate of the Special Rapporteur on the promotion and
More informationSOVEREIGNTY IS DEAD! LONG LIVE SOVEREIGNTY! FROM NATION-BASED TO USER CENTRAL JURISDICTION.
Opinion SOVEREIGNTY IS DEAD! LONG LIVE SOVEREIGNTY! FROM NATION-BASED TO USER CENTRAL JURISDICTION. Arno R. Lodder * I. Nation States Losing Sovereignty They used to be so close, the nation state and the
More informationHacking and the Law. John MacKenzie
Hacking and the Law John MacKenzie john.mackenzie@pinsentmasons.com Introduction About Pinsent Masons Hacking The Law Individual rights and responsibilities Employee rights and responsibilities Directors
More informationIT for Change's Contribution to the Consultations on Enhanced Cooperation being held at the United Nations Headquarters in New York in December 2010
NGO in Special Consultative Status with United Nations Economic and Social Council IT for Change's Contribution to the Consultations on Enhanced Cooperation being held at the United Nations Headquarters
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 22.1.2001 COM(2000) 854 final /2 CORRIGENDUM: - ajout de références interinstitutionnelles; concerne uniquement les versions linguistiques FR- DE et EN;
More informationReflection paper on the interoperability of information systems in the area of Freedom, Security and Justice
Reflection paper on the interoperability of information systems in the area of Freedom, Security and Justice 17 November 2017 1 P a g e The European Data Protection Supervisor (EDPS) is an independent
More informationWhat is the Impact of the Harmonisation of Criminal Law on Terrorism, Organised Crime and Illicit Drug Trafficking?
What is the Impact of the Harmonisation of Criminal Law on Terrorism, Organised Crime and Illicit Drug Trafficking? Prof. Dr. Gert Vermeulen Cicero Foundation Paris, 13 May 2004 1 Structure EU institutional/policy
More information84 rd REGULAR SESSION OEA/Ser.Q March 10-14, 2014 CJI/doc. 450/14 Rio de Janeiro, Brazil February 25, 2014 Original: English * Limited
84 rd REGULAR SESSION OEA/Ser.Q March 10-14, 2014 CJI/doc. 450/14 Rio de Janeiro, Brazil February 25, 2014 Original: English * Limited PRIVACY AND DATA PROTECTION (presented by Dr. David P. Stewart) At
More informationAccra Declaration. World Press Freedom Day Keeping Power in Check: Media, Justice and the Rule of Law
Accra Declaration World Press Freedom Day 2018 Keeping Power in Check: Media, Justice and the Rule of Law We, the participants at the UNESCO World Press Freedom Day International Conference, held in Accra,
More information29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States
29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States Key data protection points for the trilogue on the data protection directive in the field
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a COUNCIL FRAMEWORK DECISION. on combating fraud and counterfeiting of non-cash means of payment
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 14.09.1999 COM(1999) 438 final 99/0190 (CNS) Proposal for a COUNCIL FRAMEWORK DECISION on combating fraud and counterfeiting of non-cash means of payment
More informationAmCham EU Proposed Amendments on the General Data Protection Regulation
AmCham EU Proposed Amendments on the General Data Protection Regulation Page 1 of 89 CONTENTS 1. CONSENT AND PROFILING 3 2. DEFINITION OF PERSONAL DATA / PROCESSING FOR SECURITY AND ANTI-ABUSE PURPOSES
More informationH. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation
DIVISION V CLOUD ACT SEC. 101. SHORT TITLE. This division may be cited as the Clarifying Lawful Overseas Use of Data Act or the CLOUD Act. SEC. 102. CONGRESSIONAL FINDINGS. Congress finds the following:
More informationCybersecurity, Privacy & Data Protection Alert
Cybersecurity, Privacy & Data Protection Alert December 21, 2015 If you read one thing The new EU-wide legal framework will have an extremely significant impact on how businesses collect, store, transfer
More informationResolution adopted by the General Assembly on 18 December [on the report of the Third Committee (A/69/489)]
United Nations A/RES/69/196 General Assembly Distr.: General 26 January 2015 Sixty-ninth session Agenda item 105 Resolution adopted by the General Assembly on 18 December 2014 [on the report of the Third
More informationMeijers Committee standing committee of experts on international immigration, refugee and criminal law
CM1802 Comments on the Proposal for a Regulation of the European Parliament and of the Council on establishing a framework for interoperability between EU information systems (police and judicial cooperation,
More informationEXECUTIVE SUMMARY. 3 P a g e
Opinion 1/2016 Preliminary Opinion on the agreement between the United States of America and the European Union on the protection of personal information relating to the prevention, investigation, detection
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 27 November 2009 (OR. en) 16110/09 JAI 838 USA 101 RELEX 1082 DATAPROTECT 73 ECOFIN 805
COUNCIL OF THE EUROPEAN UNION Brussels, 27 November 2009 (OR. en) 16110/09 JAI 838 USA 101 RELEX 1082 DATAPROTECT 73 ECOFIN 805 LEGISLATIVE ACTS AND OTHER INSTRUMENTS Subject : COUNCIL DECISION on the
More informationOfficial Journal of the European Union
L 13/44 (Acts adopted pursuant to Title VI of the Treaty on European Union) COUNCIL FRAMEWORK DECISION 2004/68/JHA of 22 December 2003 on combating the sexual exploitation of children and child pornography
More informationCONTENTS. I. Internal Penal Law. 15 II. International Penal Law. 15. II. - The application by the judge of one state of foreign penal laws...
CONTENTS GENERAL OUTLINE OF THE PROPOSALS AND RESOLUTIONS ADOPTED BY THE CONGRESSES OF THE INTERNATIONAL ASSOCIATION OF PENAL LAW... 10 FIRST INTERNATIONAL CONGRESS OF PENAL LAW (BRUSSELS, 26-29 JULY 1926)...
More informationCONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE)
CCPE(2015)3 Strasbourg, 20 November 2015 CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) Opinion No.10 (2015) of the Consultative Council of European Prosecutors to the Committee of Ministers of the
More informationSupport for Harmonization of the ICT Policies in Sub-Sahara Africa (HIPSSA)
Support for Harmonization of the ICT Policies in Sub-Sahara Africa (HIPSSA) Sadc Harmonised Legal Cyber Security Framework For Southern Africa 15 16 Julyl 2013 Republic of Zimbabwe Mrs. Revai Sweto - Mukuruba
More informationOAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM
OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The member states of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization
More informationOAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM
1 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The Member States of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization
More informationCombating Cybercrime Developments in the European Union
Combating Cybercrime Developments in the European Union Erik O. Wennerström Csaba Sandberg 1 Introduction.. 248 2 The Council of Europe acquis..... 249 2.1 Introduction.. 249 2.2 Implementation of the
More informationCriminalizing attacks against information systems in the EU
Criminalizing attacks against information systems in the EU web.auth.gr/poiniko Introduction Focus of the presentation on COM (2010) 517 final Core question: the underlying foundation of the choices made
More informationCOMMISSION IMPLEMENTING DECISION. of
EUROPEAN COMMISSION Brussels, 19.12.2017 C(2017) 8520 final COMMISSION IMPLEMENTING DECISION of 19.12.2017 concerning the adoption of the work programme for 2018 and the financing for the implementation
More information5418/16 AV/NT/vm DGD 2
Council of the European Union Brussels, 6 April 2016 (OR. en) Interinstitutional File: 2012/0010 (COD) 5418/16 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: DATAPROTECT 1 JAI 37 DAPIX 8 FREMP 3 COMIX 36
More informationEXAM TTM2 Information security, advanced. Technical Tools/Aid: None Duration: (3 hours) Contact person: Svein Willassen, ph.
EXAM TTM2 Information security, advanced Technical Tools/Aid: None Duration: 0900 1200 (3 hours) Contact person: Svein Willassen, ph. 92449678 Part 1 This part consists of 8 questions. Each question can
More informationThe Relevance of Electronic Signatures in Electronic Transactions: An Anlysis of Legal Framework
The Relevance of Electronic Signatures in Electronic Transactions: An Anlysis of Legal Framework Mu'azu Abdullahi Saulawa * Junaidu Bello Marshal 2.Faculty of Law, Umaru Musa Yar'adua University, P.M.B.
More informationCouncil of Europe Convention. Protection of Children against Sexual Exploitation and Sexual Abuse
Council of Europe Convention Protection of Children against Sexual Exploitation and Sexual Abuse Council of Europe Convention Protection of Children against Sexual Exploitation and Sexual Abuse Council
More informationDelegations will find the text of this Resolution in annex II and are invited to present their comments at the COPEN meeting of 28 May 2014.
COUNCIL OF THE EUROPEAN UNION Brussels, 20 May 2014 9968/14 COPEN 153 EUROJUST 99 EJN 57 NOTE from: to: Subject: Presidency Delegations Issues of proportionality and fundamental rights in the context of
More informationLegislative Brief The Information Technology (Amendment) Bill, 2006
Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information
More informationCOMPARISON OF THE TRANSFER OF CRIMINAL PROCEEDING WITH OTHER FORMS OF INTERNATIONAL LEGAL COOPERATION IN CRIMINAL MATTERS Ralitsa VOYNOVA
International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXI No 2 2015 COMPARISON OF THE TRANSFER OF CRIMINAL PROCEEDING WITH OTHER FORMS OF INTERNATIONAL LEGAL COOPERATION IN CRIMINAL MATTERS Ralitsa
More informationCouncil of the European Union Brussels, 12 June 2015 (OR. en) Permanent Representatives Committee (Part 2)/Council
Council of the European Union Brussels, 12 June 2015 (OR. en) 9319/15 "I/A" ITEM NOTE From: To: No. prev. doc.: 9409/15 Subject: General Secretariat of the Council FREMP 120 ECOFIN 415 JAI 387 INF 98 POLGEN
More informationEUROPEAN PARLIAMENT Committee on the Internal Market and Consumer Protection
EUROPEAN PARLIAMT 2009-2014 Committee on the Internal Market and Consumer Protection 2012/0011(COD) 28.1.2013 OPINION of the Committee on the Internal Market and Consumer Protection for the Committee on
More informationCHAPTER V: INTERNATIONAL CONVENTION AND CYBER CRIME POTENTIAL NEW GLOBAL LEGAL MECHANISMS ON COMBATING CYBER CRIME AND GLOBAL CYBER ATTACKS
CHAPTER V: INTERNATIONAL CONVENTION AND CYBER CRIME POTENTIAL NEW GLOBAL LEGAL MECHANISMS ON COMBATING CYBER CRIME AND GLOBAL CYBER ATTACKS 1 Introduction In the prospect of an international criminal court
More informationInternal Security Fund - Police
Internal Security Fund - Police Call for proposals document Call for proposals restricted to Member States for law enforcement cooperation between Member States and relevant third countries along the Silk
More informationSUMMARY OF THE IMPACT ASSESSMENT
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 6.11.2007 SEC(2007) 1422 C6-0465/07 COMMISSION STAFF WORKING DOCUMENT Accompanying document to the Proposal for a COUNCIL FRAMEWORK DECISION on the use
More informationC I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL
Legal tools for prosecution of threat network agents May 26 th, 2017 C I E D C O E This report can be downloaded from: BICES NATO CIED PORTAL BICES COE CIED PORTAL http://www.ciedcoe.org/documents/documents/
More informationGDPR. EU General Data Protection Regulation. ebook Version 1.2
GDPR EU General Data Protection Regulation ebook Version 1.2 Table of Contents Introduction... 6 The GDPR... 6 Source... 6 Objective... 6 Restrictions... 6 Versions... 6 Feedback... 6 CHAPTER I - General
More informationCYBERCRIMES AND CYBERSECURITY BILL
REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette No. 40487 of 9 December
More informationPreparatory Colloquium September 2013, Antalya (Turkey) Section III: Information Society and Penal Law TURKISH NATIONAL REPORT
Preparatory Colloquium 24 27 September 2013, Antalya () Section III: Information Society and Penal Law TURKISH NATIONAL REPORT Serap Keskin KIZIROĞLU / Fulya EROĞLU / İlker TEPE (B). General Questions
More informationEDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents
EDPS Opinion 7/2018 on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents 10 August 2018 1 Page The European Data Protection Supervisor ( EDPS
More informationDEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA
DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further
More informationAre Cybercrime Laws Keeping up with the Triple Convergence of Information, Innovation and Technology?
Are Cybercrime Laws Keeping up with the Triple Convergence of Information, Innovation and Technology? Ramesh Subramanian Information Systems Management Department Quinnipiac University School of Business
More information