Bahrain s Draft Law on Computer Crimes

Similar documents
The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas

CYBERCRIMES AND CYBERSECURITY BILL

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017

KENYA GAZETTE SUPPLEMENT

LME App Terms of Use [Google/ Android specific]

ELECTRONIC COMMUNICATIONS AND TRANSACTIONS ACT, ACT NO. 25 OF 2002 [ASSENTED TO 31 JULY 2002] [DATE OF COMMENCEMENT: 30 AUGUST 2002]

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level

A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME

THE COMPUTER MISUSE ACT, Arrangement of Sections PART I PRELIMINARY PART II OFFENCES

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

Project on Cybercrime

Your Account PATIENT PORTAL

Aspects of Criminal Procedural Law in Argentina.

Project on Cybercrime

T-CY Guidance Note #8 SPAM

Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2.

GLACY+ Global Action on Cybercrime Extended Action globale sur la cybercriminalité élargie

CYBERCRIME LEGISLATION WORLDWIDE UPDATE 2007

T-CY Guidance Note #5

This Bill contains 4 Parts and seeks to provide for the prevention and punishment of electronic crimes.

1. THE SYSTEM AND INFORMATION ACCESS

UOB BUSINESS APPLICATION TERMS AND CONDITIONS

Ethical Hacking. Countermeasures Version 6. Hacking Laws

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010

TU/e REGULATIONS FOR COMPUTER AND NETWORK USE 2012

Software Licence Terms

ICONS Terms of Use. Effective Date: March 1st, 2016

Proposal for a COUNCIL FRAMEWORK DECISION. on attacks against information systems. (presented by the Commission)

ELECTRONIC DATA INTERCHANGE (EDI) TRADING PARTNER AGREEMENT

Economic crime including fraud. Ministry of Interior General Police Directorate Criminal Police Directorate

INFORMATION TECHNOLOGY (AMENDMENT) BILL. THE MINISTER OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (SHRI A. RAJA): Sir, I beg to move :

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses

LIMITED CIRCULATION DRAFT FOR NATIONAL ASSEMBLY STANDING COMMITTEE. PEC Bill as on

WEBSITE TERMS OF USE AGREEMENT

Commission of an Offence relating to Computer Act, B.E (2007)

UAE Federal Decree-Law no. (5) of 2012 of 13 August 2012 ON COMBATING CYBERCRIMES

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA

Legislative Brief The Information Technology (Amendment) Bill, 2006

IT ACT Dr.V.C.Vivekanandan Dean & Professor of Law RGSOIPL IIT Kharagpur

Kenya: Computer and Cybercrimes Bill 2017

CORE BANKING AGREEMENT SWIFT DIRECT CORPORATE ACCESS. Product & Services Terms & Conditions

ELECTION OFFENCES ACT

GLACY GETTING STARTED DAKAR, SENEGAL, MARCH 2014

b) Where we work on a matter jointly for more than one client, the rights and obligations of the joint clients will be joint and several.

Cyber Crime & Information Security A Legislative Regime. Dr. Adrian McCullagh Information Security Institute Queensland University of Technology

Application Terms of Use

@ On computers and other networks by the cyber criminals using authorized or unauthorized entry

Rules and Regulations Implementing Republic Act No , Otherwise Known as the Cybercrime Prevention Act of 2012

Support for Harmonization of the ICT Policies in Sub-Sahara Africa (HIPSSA)

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

SUBSCRIPTION LICENSE AND PROFESSIONAL SERVICES AGREEMENT

Georgia Computer System Protection Act

EUROPEAN PARLIAMENT COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

CCTV, videos and photos in health, aged care and retirement living and disability facilities your rights and obligations

CSE 3482 Introduction to Computer Security. Law & Ethics

Computer Search and Seizure

Sangoma Remote Monitoring Service (RMS)

Please contact the UOB Call Centre at (toll free if calls are made from within Singapore) if you need any assistance.

Terms of Use Agreement

To obtain permission to reuse or republish electronically any material copyrighted by Plaza on the River, please contact

Criminalizing attacks against information systems in the EU

TELECOMMUNICATIONS AND POSTAL OFFENCES ACT

ORGANIZATION, MANAGEMENT and CONTROL MODEL

Anglo American Procurement Solutions Site

GUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol

EUROPEAN UNION. Brussels, 3 February 2006 (OR. en) 2005/0182 (COD) PE-CONS 3677/05 COPEN 200 TELECOM 151 CODEC 1206 OC 981

Regulation of Interception of Act 18 Communications Act 2010

PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE.

TERMS OF USE. 1. Background

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction

Index. Cambridge University Press Cyber Criminals on Trial Russell G. Smith, Peter Grabosky and Gregor Urbas.

Site Builder End User License Agreement

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

BRUNO WORKS MEMBERSHIP AGREEMENT

SHARED WORKSPACE TERMS OF USE

Thailand: Computer Crime Act

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013

STANDARD TERMS AND CONDITIONS OF MAYBANK COE OPEN BIDDING SERVICE

Office of the Dean of Students. Dean of Students

MUTUAL LEGAL ASSISTANCE ACT

TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES CHAPTER 47. FRAUD AND FALSE STATEMENTS 18 USCS 1030

Whistle Blower Policy & Vigil Mechanism JASH Engineering Limited

UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE

Appendix 4 Anti-Money Laundering and Counter-Terrorist Financing Legislation

DMCC TRADEFLOW CLICK-THROUGH USER AGREEMENT

Combating Cybercrime Developments in the European Union

PRIVACY POLICY. The Future Laboratory Limited ("We") are committed to protecting and respecting your privacy.

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

Follow-up Question: How many separate grand juries were used?

Hacking and the Law. John MacKenzie

Website Standard Terms and Conditions of Use

LEGAL TERMS OF USE. Ownership of Terms of Use

Terms and Conditions Revision January 28, 2019

The use of the Service for the following activities is prohibited:

TERMS OF USE COPYRIGHT, TRADEMARK AND OTHER INTELLECTUAL PROPERTY RIGHTS

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

TERMS OF USE AGREEMENT

End User License Agreement for METRONET GO ("Agreement")

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

Transcription:

Bahrain s Draft Law on Computer Crimes Dr. Jameel Al Alawi Economic Development Board Jameel.alalawi@bahrainedb.com Law is based on Cyber Crime Convention Based on Cyber-Crime Convention Advantages of modeling the law on the convention: conciseness, more consensus, Assistance from member countries in Investigating and Prosecuting Cybercrimes after (hopefully) acceding to the convention No extensive introduction of criminal offences as in some other countries in ESCWA Region Provisions of the convention s Additional Protocol concerning the criminalization of acts of a racist and xenophobic nature committed through computer system (2003) not incorporated in the draft

Main Sources Convention on Cybercrime 2001 US Federal Act on Computer Fraud and Abuse Act 1986 (Modified in 1994, 1996, 2001, 2006)- The latest modifications were through the infamous Patriot Act) Commonwealth Model Law on Computer and Computer Related Crimes. Approach. 1 Offences : Criminalize certain acts where : The computer is the subject of a crime (e.g. viruses, warms, trojan horses, logic bombs,, denial of services attacks, hacking) The Computer is the object of a crime

Approach 2 No Copyright Related Offences under proposed Computer Crimes Law Copyright Related Offences are covered under Copyright and Neighboring Rights Law (2006) Approach 3 Procedural Matters : Introduce suitable procedural provisions & ensure words within the procedural law that are unsuitable for computer crimes are appropriately adapted. No effect to the provision on international cooperation as Bahrain is not yet party to the convention.

Offences Unauthorized access Interference with data or system causing damage (include damaging, altering, rendering useless, obstructing, denying access, etc) Interference with data or system causing serious damage (e.g. health, public utilities, physical injury, medical diagnosis or tests) Unauthorized interception of data Offences..Cont. Threatening to cause damage to computer data or system (extortion) Misuses of devices (e.g. program or password) used to commit any of the computer crimes. The offence extends to possession, production and procuring. Child pornography (Why only child pornography?) Forgery Fraud Mens Rea: Always intentional & without authority.

Special Procedural Provisions Applicable to : Computer crimes prescribed in the Computer Crimes Law Any other crime committed using a computer system What are the Special Procedural Provisions? Power to order expedited preservation of stored computer data (includes ordering any person who can do so and demand confidentiality under criminal sanction) Power to order production of data (including subscriber s information) Search and Seizure of computer data (includes access to another computer system where lawfully possible through the original system, order any person to assist in facilitating access) Preserve traffic data and partial disclosure thereof (to identify the route and ISP involved

Procedural Matters Cont. Real time collection and recording of traffic & content data Provide information to enable access to a system, search and preserve. Power to compel person directed to execute the order to maintain its security (under criminal sanction) Special powers to Attorney General under other laws on collection/monitoring are intact (counter- terrorism law) The Penalties Can be substantial Corporate liability Half the penalty for attempt Full penalty for aiding and abetting

E-Evidence & Crimes Current situation not very satisfactory (probably all ESCWA Region) What is Caffrey Case (UK)? Jurists and Law Enforcement Agencies should look into this issue and consider the experience of other developed counties Examples : Good Practice Guide for Computer-Based E-Evidence (UK Police) http://www.acpo.police.uk/asp/policies/data/gpg_computer_based_evidence_v3.pdf & Searching and Seizing Computers and Obtaining E- Evidence in Criminal Investigation (USA DOJ) http://www.usdoj.gov/criminal/cybercrime/s&smanual2002.pdf Investigatory/procedural matters how to seize evidence on computers without contaminating it. how to preserve data in case the owner had sent out a kill program to destroy it. how to track down the originators of a message, particularly when encrypted or using anonymizers.