~ 1 ~ Noting that states share sovereignty in cyberspace and have a common interest in its regulation and protection;

Size: px
Start display at page:

Download "~ 1 ~ Noting that states share sovereignty in cyberspace and have a common interest in its regulation and protection;"

Transcription

1 ~ 1 ~ Draft Resolutions Section 4 Preamble The participants of the Preparatory Colloquium for Section IV held in Helsinki from 9 to 12 June 2013 propose the following resolutions to the XIX International Congress of Penal Law, to be held in Rio de Janeiro from 31 August to 6 September 2014: Considering that people s lives in the 21 st century are heavily influenced and shaped by information and communication technology (ICT) as well as by the opportunities and risks that accompany information society and cyberspace, and that therefore crimes in these areas affect important personal and collective interests; Noting that states share sovereignty in cyberspace and have a common interest in its regulation and protection; Recognizing that states have made considerable efforts to vest jurisdiction and determine the locus delicti of offences that may affect the integrity of ICT systems and cyberspace as well as the related interests of persons and society; Keeping in mind the particularities of cyberspace, such as the speed at which data flows, its volatility, and the fact that it can be accessed anywhere in the world; Recognizing further the difficulties in localizing information and evidence in cyberspace; Stressing the fundamental importance of the protection of human rights, in particular the principle of legality, the right to privacy, the right to a fair trial, the principle of proportionality in the investigation and prosecution of offences, and in general all the rules and principles regarding due legal process; Referring to international and regional instruments that seek to guide and coordinate efforts and to harmonize legislation, such as the Budapest Convention on Cybercrime of 23 November 2001, EC E-Commerce Directive 2000/31/CE, EU Framework Decision 2005/222/JHA on attacks against information systems, EC Data Retention Directive 2006/24/CE, the Commonwealth of Independent States Agreement on Cooperation in Combating Offences related to Computer Information of 2001, the Arab Convention on Combating Information Technology Offences of 2010, the Shanghai Cooperation Organization Agreement on Cooperation in the Field of International Information Security of 2010, and the draft African Union Convention on the Establishment of a Legal Framework Conducive to Cybersecurity in Africa of 2012; Building on the debates and resolutions of past International Congresses of Penal Law, especially the resolutions of Section II of the XV International Congress (1994) held in Rio de Janeiro, on computer crimes and other crimes against information technology, and the

2 ~ 2 ~ resolutions of Section IV of the XVIII International Congress (2009) held in Istanbul, on universal jurisdiction; recommend the following: A. General Considerations 1. States should develop a coherent response to the challenge of cybercrime, in particular by keeping their legislation and practice under review in order to ensure that their criminal law, criminal procedure and mutual legal assistance regimes meet the needs of today s interconnected globalised world. 2. States should consider acceding to existing international instruments on cybercrime or developing further international legal mechanisms in order to establish the rule of law in cyberspace and avoid potential conflicts between states on the enforcement of their legislation and policies in cyberspace. B. Substantive Jurisdiction and Locus Delicti 3. The principle of territoriality remains the primary principle of jurisdiction also in cyberspace. 4. States should exercise restraint in the establishment of extraterritorial jurisdiction, with a view to preventing conflicts of jurisdiction rather than relying primarily on their resolution once they occur. 5. With the exception of those crimes for which universal jurisdiction is accepted under international law, a state may not apply universal jurisdiction de facto or de jure in cases of prohibited content in cyberspace. 6. Offences may have more than one locus. States may establish a locus delicti within their borders if conduct takes place there or causes effects there. 7. States should exercise restraint in applying the effect theory in situations in which the effect is not pushed by a perpetrator into the state, but pulled into it by an individual in that state. 8. In determining effects, states shall consider the existence of a particular nexus with the offence, such as the intent of the perpetrator.

3 ~ 3 ~ 9. When a state localizes the effects of an offence within its borders, the principle of legality requires that the perpetrator could have had a reasonable expectation that his or her conduct would cause effects in that country. 10. A state may exercise its jurisdiction over an individual on its territory who pulls content that is prohibited under its own legal system, even though it is legal under the legal system of the producer. 11. States may consider establishing corporate criminal liability for legal entities with regard to cybercrime. C. Investigations in Cyberspace 12. No state has exclusive sovereignty over the publicly accessible IT networks. 13. Law enforcement agencies, in the same way as citizens, have the right to navigate the free IT networks without permission from providers, and regardless of where the content looked at is stored. 14. States should consider establishing, under national law, an obligation on service providers to cooperate with law enforcement agencies, by making data transfer in the cyberworld traceable, giving access to passwords, decrypting content or installing search devices for investigative purposes. This obligation is subject to the principle of proportionality. 15. All persons are entitled to the protection of a national legal system, if there is a legitimate expectation of protection by that system. 16. States may, subject to national law, freely use evidence that they find on publicly accessible IT networks. 17. Regardless of the nationality of the person in question, no state may apply coercive measures in another state, unless permitted by the territorial state. D. International Cooperation in Criminal Matters and Enforcement 18. States should implement the necessary investigative techniques that enable them to provide mutual assistance in respect of cyber offences, on the basis of the proportionality principle.

4 ~ 4 ~ 19. States should in particular be able to provide fast assistance, and a provisional order to preserve data should be introduced. Such an obligation to preserve data should be for a reasonable time only. 20. In situations where there is a common understanding of cybercrime offences, the trend towards the elimination of the requirement of double criminality as a condition for mutual legal assistance should be encouraged. 21. Information obtained through mutual legal assistance for investigative purposes may, subject to national law, be used for evidence. 22. A (provisional) decision by a criminal court to close down a server, website or corresponding entity may be enforced directly if provided for by an international agreement or by the law of the state in which the service provider is located. E. Real Human Rights in a Virtual World 23. States shall respect internationally recognized human rights standards also in the context of the digital world. 24. If states act extraterritorially while investigating in cyberspace, they shall comply with the human rights standards applicable to their jurisdiction (agent control standard). 25. States should record investigations in cyberspace with a view to ensuring state accountability in the event of violations of human rights. 26. The responsibilities of a specific state for violations of human rights should be decided after a finding of a violation and not as a condition for admissibility of a complaint with supervisory mechanisms. F. Virtual Court Room 27. Communications may be sent by the authorities directly to the accused, witnesses, victims and experts who are physically present in another state, subject to the acceptance of said state of this method of communication. 28. On condition of the consent of the individual concerned, the possibilities of making use of digital technology, such as videolinks, should be expanded in order to lessen the need for such intrusive measures as extradition.

5 ~ 5 ~ 29. States should be encouraged to consider the possibility of and conditions for the collection of evidence through digital technology, even though the individual was not physically present at the hearing. 30. The security and reliability of the lines of communication in use by the authorities must be of the highest standard. The communications should be protected against hacking.

National Report Japan

National Report Japan National Report Takeshi MATSUDA, Megumi OCHI, Tadashi IWASAKI (B) Jurisdictional issues (1)(a) How does your country locate the place of the commission of a crime in cyberspace? Article 1 of the ese Penal

More information

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013 www.coe.int/tcy Strasbourg, 5 November 2013 T-CY (2013)30 Cybercrime Convention Committee (T-CY) Ad-hoc Subgroup on Transborder Access and Jurisdiction Report of the Transborder Group for 2013 Report prepared

More information

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Strasbourg, 17.4.2018 COM(2018) 225 final 2018/0108 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on European Production and Preservation Orders for

More information

2. What are the main types of encryption mostly encountered during criminal investigations in cyberspace?

2. What are the main types of encryption mostly encountered during criminal investigations in cyberspace? SPAIN 3-10-2016 ANNEX 1. How often do you encounter encryption in your operational activities and while gathering electronic evidence/evidence in cyber space in the course of criminal procedures? Often

More information

Mutual Legal Assistance: Understanding the Challenges for Law Enforcement in Global Cybercrime Cases

Mutual Legal Assistance: Understanding the Challenges for Law Enforcement in Global Cybercrime Cases Mutual Legal Assistance: Understanding the Challenges for Law Enforcement in Global Cybercrime Cases Issue Brief - By Adam Palmer - January 2018 Because of the global connectivity of the internet, cybercrime

More information

Data protection and privacy aspects of cross-border access to electronic evidence

Data protection and privacy aspects of cross-border access to electronic evidence Statement of the Article 29 Working Party Brussels, 29 November 2017 Data protection and privacy aspects of cross-border access to electronic evidence On 8th June 2017, the European Commission issued a

More information

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Brussels, 13.9.2017 COM(2017) 489 final 2017/0226 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on combating fraud and counterfeiting of non-cash means

More information

Q. What do the Law Commission and the Ministry of Justice recommend?

Q. What do the Law Commission and the Ministry of Justice recommend? Review of the Search and Surveillance Act 2012 Questions and Answers The Act Q. What does the Search and Surveillance Act do? A. The Act outlines rules for how New Zealand Police and some other government

More information

Council of the European Union Brussels, 14 September 2017 (OR. en)

Council of the European Union Brussels, 14 September 2017 (OR. en) Council of the European Union Brussels, 14 September 2017 (OR. en) Interinstitutional File: 2017/0226 (COD) 12181/17 PROPOSAL From: date of receipt: 13 September 2017 To: No. Cion doc.: Subject: DROIPEN

More information

Comments of the United States of America to the Draft Comprehensive Study on Cybercrime August 22, 2016

Comments of the United States of America to the Draft Comprehensive Study on Cybercrime August 22, 2016 Comments of the United States of America to the Draft Comprehensive Study on Cybercrime August 22, 2016 The Permanent Mission of the United States of America presents its compliments to the Secretariat

More information

Proposal for a COUNCIL FRAMEWORK DECISION. on attacks against information systems. (presented by the Commission)

Proposal for a COUNCIL FRAMEWORK DECISION. on attacks against information systems. (presented by the Commission) COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 19.04.2002 COM(2002) 173 final 2002/0086 (CNS) Proposal for a COUNCIL FRAMEWORK DECISION on attacks against information systems (presented by the Commission)

More information

The Third Pillar for Cyberspace

The Third Pillar for Cyberspace 1 Judge Stein Schjolberg The Third Pillar for Cyberspace An International Court or Tribunal for Cyberspace Peace and Justice in Cyberspace 2 Chairman, High Level Experts Group (HLEG), ITU, Geneva, (2007-2008)

More information

Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism

Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism Section 1: Short Title. This Act may be cited as the.

More information

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level Lecturer Adrian Cristian MOISE, PhD. Postdoctoral researcher, Titu Maiorescu

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Comprehensive Study on Cybercrime February 2013 Front cover photo credits (left to right): istockphoto.com/tomml istockphoto.com/mikewesson istockphoto.com/polygraphus UNITED NATIONS OFFICE ON DRUGS AND

More information

SALZBURG FORUM MINISTERIAL CONFERENCE. Bucharest, 17 October 2013 COMMON CONCLUSIONS

SALZBURG FORUM MINISTERIAL CONFERENCE. Bucharest, 17 October 2013 COMMON CONCLUSIONS SALZBURG FORUM MINISTERIAL CONFERENCE Bucharest, 17 October 2013 COMMON CONCLUSIONS Upon the invitation of the Romanian Presidency of the Salzburg Forum, the Home Affairs Ministers of the Salzburg Forum

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party Brussels, 6 April 2010 D(2010) 5054 Juan Fernando LÓPEZ AGUILAR Chairman of the Committee on Civil Liberties, Justice and Home Affairs European Parliament B-1047

More information

Spring Conference of the European Data Protection Authorities, Cyprus May 2007 DECLARATION

Spring Conference of the European Data Protection Authorities, Cyprus May 2007 DECLARATION DECLARATION The European Union initiated several initiatives to improve the effectiveness of law enforcement and combating terrorism in the European Union. In this context, the exchange of law enforcement

More information

Declaration on Media Freedom in the Arab World

Declaration on Media Freedom in the Arab World Declaration on Media Freedom in the Arab World Preamble Reaffirming that freedom of expression, which includes media freedom, is a fundamental human right which finds protection in international and regional

More information

David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996)

David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996) David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev. 1367 (1996) Global computer-based communications cut across territorial borders, creating a new realm

More information

OUTCOME OF THE COUNCIL MEETING. 3455th Council meeting. Justice and Home Affairs. Brussels, 10 and 11 March 2016 P R E S S

OUTCOME OF THE COUNCIL MEETING. 3455th Council meeting. Justice and Home Affairs. Brussels, 10 and 11 March 2016 P R E S S Council of the European Union 6969/16 (OR. en) PROVISIONAL VERSION PRESSE 14 PR CO 14 OUTCOME OF THE COUNCIL MEETING 3455th Council meeting Justice and Home Affairs Brussels, 10 and 11 March 2016 Presidents

More information

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction 1 Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction Recalling the United Nations Convention against Transnational

More information

The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas

The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas www.coe.int/cybercrime The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas Workshop on cybercrime legislation (Bogota, 3-5 Sep 2008) Alexander

More information

6339/18 MK/sl 1 DGD 2 LIMITE EN

6339/18 MK/sl 1 DGD 2 LIMITE EN Council of the European Union Brussels, 26 February 2018 (OR. en) 6339/18 LIMITE JAI 126 COPEN 42 DROIPEN 20 CYBER 33 NOTE From: To: Subject: Presidency Permanent Representatives Committee/Council Improving

More information

Opinion of the European Data Protection Supervisor

Opinion of the European Data Protection Supervisor EDPS - European Data Protection Supervisor CEPD - Contrôleur européen de la protection des données Opinion of the European Data Protection Supervisor on the Proposal for a Council Decision concerning access

More information

The Internet Society and African Union Commission Survey on African ICT Policy Makers

The Internet Society and African Union Commission Survey on African ICT Policy Makers The Internet Society and African Union Commission Survey on African ICT Policy Makers FEBRUARY 2016 Disclaimer: The opinions, findings and conclusions in this report reflect the views of the survey participants

More information

CONTRIBUTIONS OF THE DOMINICAN REPUBLIC TO THE ZERO-DRAFT FOR THE HIGH-LEVEL DIALOGUE TO BE HELD ON DECEMBER 15TH AND 16TH

CONTRIBUTIONS OF THE DOMINICAN REPUBLIC TO THE ZERO-DRAFT FOR THE HIGH-LEVEL DIALOGUE TO BE HELD ON DECEMBER 15TH AND 16TH CONTRIBUTIONS OF THE DOMINICAN REPUBLIC TO THE ZERO-DRAFT FOR THE HIGH-LEVEL DIALOGUE TO BE HELD ON DECEMBER 15TH AND 16TH New York, Tuesday October 20th-23rd 2015 DAY 1. PLENARY SESSION GENERAL STATEMENT

More information

A brief outline of The EVIDENCE project

A brief outline of The EVIDENCE project This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under Legal Notice: The views expressed in the course of

More information

Economic crime including fraud. Ministry of Interior General Police Directorate Criminal Police Directorate

Economic crime including fraud. Ministry of Interior General Police Directorate Criminal Police Directorate Economic crime including fraud Ministry of Interior General Police Directorate Criminal Police Directorate Overview of the legislation Constitution Criminal Code Criminal Procedure Code Law on Police Law

More information

Presented at the Closing Plenary Session on 11 September 2006

Presented at the Closing Plenary Session on 11 September 2006 AEBF10 CHAIRMAN S STATEMENT 11 September 2006 The 10 th Asia-Europe Business Forum (AEBF10), Helsinki Chairman s Statement Presented at the Closing Plenary Session on 11 September 2006 The 10 th Asia-Europe

More information

The Third Pillar for Cyberspace

The Third Pillar for Cyberspace 1 Judge Stein Schjolberg The Third Pillar for Cyberspace An International Court or Tribunal for Cyberspace Peace and Justice in Cyberspace 2 Chairman, High Level Experts Group (HLEG), ITU, Geneva, (2007-2008)

More information

LEGAL BASIS OBJECTIVES ACHIEVEMENTS

LEGAL BASIS OBJECTIVES ACHIEVEMENTS PERSONAL DATA PROTECTION Protection of personal data and respect for private life are important fundamental rights. The European Parliament has always insisted on the need to strike a balance between enhancing

More information

2nd WORKING DOCUMENT (B)

2nd WORKING DOCUMENT (B) European Parliament 0-09 Committee on Civil Liberties, Justice and Home Affairs 6..09 nd WORKING DOCUMT (B) on the Proposal for a Regulation on European Production and Preservation Orders for electronic

More information

LEGAL BASIS OBJECTIVES ACHIEVEMENTS

LEGAL BASIS OBJECTIVES ACHIEVEMENTS PERSONAL DATA PROTECTION Protection of personal data and respect for private life are important fundamental rights. The European Parliament has always insisted on the need to strike a balance between enhancing

More information

Draft Accra Declaration

Draft Accra Declaration Draft Accra Declaration World Press Freedom Day 2018 Keeping Power in Check: Media, Justice and the Rule of Law We, the participants at the UNESCO World Press Freedom Day International Conference, held

More information

P6_TA-PROV(2007)0347 PNR Agreement

P6_TA-PROV(2007)0347 PNR Agreement P6_TA-PROV(2007)0347 PNR Agreement European Parliament resolution of 12 July 2007 on the PNR agreement with the United States of America The European Parliament, having regard to Article 6 of the Treaty

More information

A Global Protocol on Cybersecurity and Cybercrime

A Global Protocol on Cybersecurity and Cybercrime A Global Protocol on Cybersecurity and Cybercrime The Chairman s Model Law for Cybercrime Legislation (5th. edition August 2009) SUMMARY Even if the Council of Europe Convention on Cybercrime (2001) or

More information

Bahrain s Draft Law on Computer Crimes

Bahrain s Draft Law on Computer Crimes Bahrain s Draft Law on Computer Crimes Dr. Jameel Al Alawi Economic Development Board Jameel.alalawi@bahrainedb.com Law is based on Cyber Crime Convention Based on Cyber-Crime Convention Advantages of

More information

GLACY+ Global Action on Cybercrime Extended Action globale sur la cybercriminalité élargie

GLACY+ Global Action on Cybercrime Extended Action globale sur la cybercriminalité élargie GLACY+ Global Action on Cybercrime Extended Action globale sur la cybercriminalité élargie Version 20 November 2016 Comparative analysis of the Malabo Convention of the African Union and the Based on a

More information

EUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981

EUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981 EUROPEAN UNION THE EUROPEAN PARLIAMT THE COUNCIL Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COP 200 TELECOM 151 CODEC 1206 OC 981 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: DIRECTIVE

More information

Debating privacy and ICT

Debating privacy and ICT Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal

More information

CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007

CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007 CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007 Professor Pauline C. Reich Waseda University School of Law Director, Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute Tokyo, Japan

More information

@ On computers and other networks by the cyber criminals using authorized or unauthorized entry

@ On computers and other networks by the cyber criminals using authorized or unauthorized entry UNDERSTANDING CYBER CRIMES Introduction The advent of internet and the revolution of cyber space in communication, commerce and information is hailed as a paradigm shift in use of technology and its percolation

More information

Submission of the. New South Wales Council for Civil Liberties. to the. Commonwealth Attorney-General s Department

Submission of the. New South Wales Council for Civil Liberties. to the. Commonwealth Attorney-General s Department Submission of the New South Wales Council for Civil Liberties to the Commonwealth Attorney-General s Department on Australia s proposed accession to the Council of Europe Convention on Cybercrime Authors:

More information

A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME

A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME Lecturer Adrian Cristian MOISE, PhD. Spiru Haret University of Bucharest (ROMANIA) adriancristian.moise.@gmail.com. Abstract The Council

More information

Adopted on 23 June 2005

Adopted on 23 June 2005 ARTICLE 29 Data Protection Working Party 1022/05/EN WP 110 Opinion on the Proposal for a Regulation of the European Parliament and of the Council concerning the Visa Information System (VIS) and the exchange

More information

C 276/8 Official Journal of the European Union

C 276/8 Official Journal of the European Union C 276/8 Official Journal of the European Union 17.11.2009 Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament and the Council on an area

More information

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM Downloaded on August 16, 2018 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM Region African Union Subject Security Sub Subject Terrorism Type Conventions Reference Number Place of Adoption

More information

FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE

FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE Military Art and Science 259 FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE Ilina ARMENCHEVA ilina.armencheva@gmail.com Stefko SMOLENOV "G. S. Rakovski" National Defence

More information

14480/1/17 REV 1 MP/mj 1 DG D 2B LIMITE EN

14480/1/17 REV 1 MP/mj 1 DG D 2B LIMITE EN Council of the European Union Brussels, 1 December 2017 (OR. en) NOTE From: To: Presidency Council No. prev. doc.: 14068/17 Subject: 14480/1/17 REV 1 LIMITE JAI 1064 COPEN 361 DAPIX 375 ENFOPOL 538 CYBER

More information

on the proposal for a Regulation of the European Parliament and of the Council concerning customs enforcement of intellectual property rights

on the proposal for a Regulation of the European Parliament and of the Council concerning customs enforcement of intellectual property rights Opinion of the European Data Protection Supervisor on the proposal for a Regulation of the European Parliament and of the Council concerning customs enforcement of intellectual property rights THE EUROPEAN

More information

Scope of the obligation to provide extradition

Scope of the obligation to provide extradition chapter 4 International criminal justice cooperation 131 Tool 4.2 Extradition Overview This tool discusses extradition, introduces a range of resources to facilitate entering into extradition agreements

More information

TEXTS ADOPTED Provisional edition

TEXTS ADOPTED Provisional edition European Parliament 2014-2019 TEXTS ADOPTED Provisional edition P8_TA-PROV(2018)0339 Countering money laundering by criminal law ***I European Parliament legislative resolution of 12 September 2018 on

More information

12913/17 EG/np 1 DGD 2C

12913/17 EG/np 1 DGD 2C Council of the European Union Brussels, 11 October 2017 (OR. en) 12913/17 NOTE From: To: Presidency Council No. prev. doc.: 12727/17 Subject: FREMP 110 JAI 880 COHOM 111 DROIPEN 129 ASILE 66 JUSTCIV 228

More information

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND TEL: / FAX:

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND   TEL: / FAX: PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 917 9543 / +41 22 917 9738 FAX: +41 22 917 9008 E-MAIL: registry@ohchr.org Mandate of the Special Rapporteur on the promotion and

More information

SOVEREIGNTY IS DEAD! LONG LIVE SOVEREIGNTY! FROM NATION-BASED TO USER CENTRAL JURISDICTION.

SOVEREIGNTY IS DEAD! LONG LIVE SOVEREIGNTY! FROM NATION-BASED TO USER CENTRAL JURISDICTION. Opinion SOVEREIGNTY IS DEAD! LONG LIVE SOVEREIGNTY! FROM NATION-BASED TO USER CENTRAL JURISDICTION. Arno R. Lodder * I. Nation States Losing Sovereignty They used to be so close, the nation state and the

More information

Hacking and the Law. John MacKenzie

Hacking and the Law. John MacKenzie Hacking and the Law John MacKenzie john.mackenzie@pinsentmasons.com Introduction About Pinsent Masons Hacking The Law Individual rights and responsibilities Employee rights and responsibilities Directors

More information

IT for Change's Contribution to the Consultations on Enhanced Cooperation being held at the United Nations Headquarters in New York in December 2010

IT for Change's Contribution to the Consultations on Enhanced Cooperation being held at the United Nations Headquarters in New York in December 2010 NGO in Special Consultative Status with United Nations Economic and Social Council IT for Change's Contribution to the Consultations on Enhanced Cooperation being held at the United Nations Headquarters

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 22.1.2001 COM(2000) 854 final /2 CORRIGENDUM: - ajout de références interinstitutionnelles; concerne uniquement les versions linguistiques FR- DE et EN;

More information

Reflection paper on the interoperability of information systems in the area of Freedom, Security and Justice

Reflection paper on the interoperability of information systems in the area of Freedom, Security and Justice Reflection paper on the interoperability of information systems in the area of Freedom, Security and Justice 17 November 2017 1 P a g e The European Data Protection Supervisor (EDPS) is an independent

More information

What is the Impact of the Harmonisation of Criminal Law on Terrorism, Organised Crime and Illicit Drug Trafficking?

What is the Impact of the Harmonisation of Criminal Law on Terrorism, Organised Crime and Illicit Drug Trafficking? What is the Impact of the Harmonisation of Criminal Law on Terrorism, Organised Crime and Illicit Drug Trafficking? Prof. Dr. Gert Vermeulen Cicero Foundation Paris, 13 May 2004 1 Structure EU institutional/policy

More information

84 rd REGULAR SESSION OEA/Ser.Q March 10-14, 2014 CJI/doc. 450/14 Rio de Janeiro, Brazil February 25, 2014 Original: English * Limited

84 rd REGULAR SESSION OEA/Ser.Q March 10-14, 2014 CJI/doc. 450/14 Rio de Janeiro, Brazil February 25, 2014 Original: English * Limited 84 rd REGULAR SESSION OEA/Ser.Q March 10-14, 2014 CJI/doc. 450/14 Rio de Janeiro, Brazil February 25, 2014 Original: English * Limited PRIVACY AND DATA PROTECTION (presented by Dr. David P. Stewart) At

More information

Accra Declaration. World Press Freedom Day Keeping Power in Check: Media, Justice and the Rule of Law

Accra Declaration. World Press Freedom Day Keeping Power in Check: Media, Justice and the Rule of Law Accra Declaration World Press Freedom Day 2018 Keeping Power in Check: Media, Justice and the Rule of Law We, the participants at the UNESCO World Press Freedom Day International Conference, held in Accra,

More information

29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States

29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States 29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States Key data protection points for the trilogue on the data protection directive in the field

More information

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a COUNCIL FRAMEWORK DECISION. on combating fraud and counterfeiting of non-cash means of payment

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a COUNCIL FRAMEWORK DECISION. on combating fraud and counterfeiting of non-cash means of payment COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 14.09.1999 COM(1999) 438 final 99/0190 (CNS) Proposal for a COUNCIL FRAMEWORK DECISION on combating fraud and counterfeiting of non-cash means of payment

More information

AmCham EU Proposed Amendments on the General Data Protection Regulation

AmCham EU Proposed Amendments on the General Data Protection Regulation AmCham EU Proposed Amendments on the General Data Protection Regulation Page 1 of 89 CONTENTS 1. CONSENT AND PROFILING 3 2. DEFINITION OF PERSONAL DATA / PROCESSING FOR SECURITY AND ANTI-ABUSE PURPOSES

More information

H. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation

H. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation DIVISION V CLOUD ACT SEC. 101. SHORT TITLE. This division may be cited as the Clarifying Lawful Overseas Use of Data Act or the CLOUD Act. SEC. 102. CONGRESSIONAL FINDINGS. Congress finds the following:

More information

Cybersecurity, Privacy & Data Protection Alert

Cybersecurity, Privacy & Data Protection Alert Cybersecurity, Privacy & Data Protection Alert December 21, 2015 If you read one thing The new EU-wide legal framework will have an extremely significant impact on how businesses collect, store, transfer

More information

Resolution adopted by the General Assembly on 18 December [on the report of the Third Committee (A/69/489)]

Resolution adopted by the General Assembly on 18 December [on the report of the Third Committee (A/69/489)] United Nations A/RES/69/196 General Assembly Distr.: General 26 January 2015 Sixty-ninth session Agenda item 105 Resolution adopted by the General Assembly on 18 December 2014 [on the report of the Third

More information

Meijers Committee standing committee of experts on international immigration, refugee and criminal law

Meijers Committee standing committee of experts on international immigration, refugee and criminal law CM1802 Comments on the Proposal for a Regulation of the European Parliament and of the Council on establishing a framework for interoperability between EU information systems (police and judicial cooperation,

More information

EXECUTIVE SUMMARY. 3 P a g e

EXECUTIVE SUMMARY. 3 P a g e Opinion 1/2016 Preliminary Opinion on the agreement between the United States of America and the European Union on the protection of personal information relating to the prevention, investigation, detection

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 27 November 2009 (OR. en) 16110/09 JAI 838 USA 101 RELEX 1082 DATAPROTECT 73 ECOFIN 805

COUNCIL OF THE EUROPEAN UNION. Brussels, 27 November 2009 (OR. en) 16110/09 JAI 838 USA 101 RELEX 1082 DATAPROTECT 73 ECOFIN 805 COUNCIL OF THE EUROPEAN UNION Brussels, 27 November 2009 (OR. en) 16110/09 JAI 838 USA 101 RELEX 1082 DATAPROTECT 73 ECOFIN 805 LEGISLATIVE ACTS AND OTHER INSTRUMENTS Subject : COUNCIL DECISION on the

More information

Official Journal of the European Union

Official Journal of the European Union L 13/44 (Acts adopted pursuant to Title VI of the Treaty on European Union) COUNCIL FRAMEWORK DECISION 2004/68/JHA of 22 December 2003 on combating the sexual exploitation of children and child pornography

More information

CONTENTS. I. Internal Penal Law. 15 II. International Penal Law. 15. II. - The application by the judge of one state of foreign penal laws...

CONTENTS. I. Internal Penal Law. 15 II. International Penal Law. 15. II. - The application by the judge of one state of foreign penal laws... CONTENTS GENERAL OUTLINE OF THE PROPOSALS AND RESOLUTIONS ADOPTED BY THE CONGRESSES OF THE INTERNATIONAL ASSOCIATION OF PENAL LAW... 10 FIRST INTERNATIONAL CONGRESS OF PENAL LAW (BRUSSELS, 26-29 JULY 1926)...

More information

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE)

CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) CCPE(2015)3 Strasbourg, 20 November 2015 CONSULTATIVE COUNCIL OF EUROPEAN PROSECUTORS (CCPE) Opinion No.10 (2015) of the Consultative Council of European Prosecutors to the Committee of Ministers of the

More information

Support for Harmonization of the ICT Policies in Sub-Sahara Africa (HIPSSA)

Support for Harmonization of the ICT Policies in Sub-Sahara Africa (HIPSSA) Support for Harmonization of the ICT Policies in Sub-Sahara Africa (HIPSSA) Sadc Harmonised Legal Cyber Security Framework For Southern Africa 15 16 Julyl 2013 Republic of Zimbabwe Mrs. Revai Sweto - Mukuruba

More information

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The member states of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization

More information

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM 1 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The Member States of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization

More information

Combating Cybercrime Developments in the European Union

Combating Cybercrime Developments in the European Union Combating Cybercrime Developments in the European Union Erik O. Wennerström Csaba Sandberg 1 Introduction.. 248 2 The Council of Europe acquis..... 249 2.1 Introduction.. 249 2.2 Implementation of the

More information

Criminalizing attacks against information systems in the EU

Criminalizing attacks against information systems in the EU Criminalizing attacks against information systems in the EU web.auth.gr/poiniko Introduction Focus of the presentation on COM (2010) 517 final Core question: the underlying foundation of the choices made

More information

COMMISSION IMPLEMENTING DECISION. of

COMMISSION IMPLEMENTING DECISION. of EUROPEAN COMMISSION Brussels, 19.12.2017 C(2017) 8520 final COMMISSION IMPLEMENTING DECISION of 19.12.2017 concerning the adoption of the work programme for 2018 and the financing for the implementation

More information

5418/16 AV/NT/vm DGD 2

5418/16 AV/NT/vm DGD 2 Council of the European Union Brussels, 6 April 2016 (OR. en) Interinstitutional File: 2012/0010 (COD) 5418/16 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: DATAPROTECT 1 JAI 37 DAPIX 8 FREMP 3 COMIX 36

More information

EXAM TTM2 Information security, advanced. Technical Tools/Aid: None Duration: (3 hours) Contact person: Svein Willassen, ph.

EXAM TTM2 Information security, advanced. Technical Tools/Aid: None Duration: (3 hours) Contact person: Svein Willassen, ph. EXAM TTM2 Information security, advanced Technical Tools/Aid: None Duration: 0900 1200 (3 hours) Contact person: Svein Willassen, ph. 92449678 Part 1 This part consists of 8 questions. Each question can

More information

The Relevance of Electronic Signatures in Electronic Transactions: An Anlysis of Legal Framework

The Relevance of Electronic Signatures in Electronic Transactions: An Anlysis of Legal Framework The Relevance of Electronic Signatures in Electronic Transactions: An Anlysis of Legal Framework Mu'azu Abdullahi Saulawa * Junaidu Bello Marshal 2.Faculty of Law, Umaru Musa Yar'adua University, P.M.B.

More information

Council of Europe Convention. Protection of Children against Sexual Exploitation and Sexual Abuse

Council of Europe Convention. Protection of Children against Sexual Exploitation and Sexual Abuse Council of Europe Convention Protection of Children against Sexual Exploitation and Sexual Abuse Council of Europe Convention Protection of Children against Sexual Exploitation and Sexual Abuse Council

More information

Delegations will find the text of this Resolution in annex II and are invited to present their comments at the COPEN meeting of 28 May 2014.

Delegations will find the text of this Resolution in annex II and are invited to present their comments at the COPEN meeting of 28 May 2014. COUNCIL OF THE EUROPEAN UNION Brussels, 20 May 2014 9968/14 COPEN 153 EUROJUST 99 EJN 57 NOTE from: to: Subject: Presidency Delegations Issues of proportionality and fundamental rights in the context of

More information

Legislative Brief The Information Technology (Amendment) Bill, 2006

Legislative Brief The Information Technology (Amendment) Bill, 2006 Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information

More information

COMPARISON OF THE TRANSFER OF CRIMINAL PROCEEDING WITH OTHER FORMS OF INTERNATIONAL LEGAL COOPERATION IN CRIMINAL MATTERS Ralitsa VOYNOVA

COMPARISON OF THE TRANSFER OF CRIMINAL PROCEEDING WITH OTHER FORMS OF INTERNATIONAL LEGAL COOPERATION IN CRIMINAL MATTERS Ralitsa VOYNOVA International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXI No 2 2015 COMPARISON OF THE TRANSFER OF CRIMINAL PROCEEDING WITH OTHER FORMS OF INTERNATIONAL LEGAL COOPERATION IN CRIMINAL MATTERS Ralitsa

More information

Council of the European Union Brussels, 12 June 2015 (OR. en) Permanent Representatives Committee (Part 2)/Council

Council of the European Union Brussels, 12 June 2015 (OR. en) Permanent Representatives Committee (Part 2)/Council Council of the European Union Brussels, 12 June 2015 (OR. en) 9319/15 "I/A" ITEM NOTE From: To: No. prev. doc.: 9409/15 Subject: General Secretariat of the Council FREMP 120 ECOFIN 415 JAI 387 INF 98 POLGEN

More information

EUROPEAN PARLIAMENT Committee on the Internal Market and Consumer Protection

EUROPEAN PARLIAMENT Committee on the Internal Market and Consumer Protection EUROPEAN PARLIAMT 2009-2014 Committee on the Internal Market and Consumer Protection 2012/0011(COD) 28.1.2013 OPINION of the Committee on the Internal Market and Consumer Protection for the Committee on

More information

CHAPTER V: INTERNATIONAL CONVENTION AND CYBER CRIME POTENTIAL NEW GLOBAL LEGAL MECHANISMS ON COMBATING CYBER CRIME AND GLOBAL CYBER ATTACKS

CHAPTER V: INTERNATIONAL CONVENTION AND CYBER CRIME POTENTIAL NEW GLOBAL LEGAL MECHANISMS ON COMBATING CYBER CRIME AND GLOBAL CYBER ATTACKS CHAPTER V: INTERNATIONAL CONVENTION AND CYBER CRIME POTENTIAL NEW GLOBAL LEGAL MECHANISMS ON COMBATING CYBER CRIME AND GLOBAL CYBER ATTACKS 1 Introduction In the prospect of an international criminal court

More information

Internal Security Fund - Police

Internal Security Fund - Police Internal Security Fund - Police Call for proposals document Call for proposals restricted to Member States for law enforcement cooperation between Member States and relevant third countries along the Silk

More information

SUMMARY OF THE IMPACT ASSESSMENT

SUMMARY OF THE IMPACT ASSESSMENT COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 6.11.2007 SEC(2007) 1422 C6-0465/07 COMMISSION STAFF WORKING DOCUMENT Accompanying document to the Proposal for a COUNCIL FRAMEWORK DECISION on the use

More information

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL Legal tools for prosecution of threat network agents May 26 th, 2017 C I E D C O E This report can be downloaded from: BICES NATO CIED PORTAL BICES COE CIED PORTAL http://www.ciedcoe.org/documents/documents/

More information

GDPR. EU General Data Protection Regulation. ebook Version 1.2

GDPR. EU General Data Protection Regulation. ebook Version 1.2 GDPR EU General Data Protection Regulation ebook Version 1.2 Table of Contents Introduction... 6 The GDPR... 6 Source... 6 Objective... 6 Restrictions... 6 Versions... 6 Feedback... 6 CHAPTER I - General

More information

CYBERCRIMES AND CYBERSECURITY BILL

CYBERCRIMES AND CYBERSECURITY BILL REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette No. 40487 of 9 December

More information

Preparatory Colloquium September 2013, Antalya (Turkey) Section III: Information Society and Penal Law TURKISH NATIONAL REPORT

Preparatory Colloquium September 2013, Antalya (Turkey) Section III: Information Society and Penal Law TURKISH NATIONAL REPORT Preparatory Colloquium 24 27 September 2013, Antalya () Section III: Information Society and Penal Law TURKISH NATIONAL REPORT Serap Keskin KIZIROĞLU / Fulya EROĞLU / İlker TEPE (B). General Questions

More information

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents EDPS Opinion 7/2018 on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents 10 August 2018 1 Page The European Data Protection Supervisor ( EDPS

More information

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further

More information

Are Cybercrime Laws Keeping up with the Triple Convergence of Information, Innovation and Technology?

Are Cybercrime Laws Keeping up with the Triple Convergence of Information, Innovation and Technology? Are Cybercrime Laws Keeping up with the Triple Convergence of Information, Innovation and Technology? Ramesh Subramanian Information Systems Management Department Quinnipiac University School of Business

More information