T-CY Guidance Note #8 SPAM

Similar documents
T-CY Guidance Note #5

Project on Cybercrime

The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas

A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level

Project on Cybercrime

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a COUNCIL FRAMEWORK DECISION. on combating fraud and counterfeiting of non-cash means of payment

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013

ELECTION OFFENCES ACT

Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2.

ELECTRONIC COMMUNICATIONS AND TRANSACTIONS ACT, ACT NO. 25 OF 2002 [ASSENTED TO 31 JULY 2002] [DATE OF COMMENCEMENT: 30 AUGUST 2002]

KENYA GAZETTE SUPPLEMENT

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

AGREEMENT FOR KIB KENANGA AGENCY NETWORK SERVICE

Bahrain s Draft Law on Computer Crimes

Explanatory Report to the Council of Europe Convention against Trafficking in Human Organs

Cyber Crime and Cyber Security Data Protection Implications and Financial Regulation Expectations

EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC) Draft Council of Europe Convention against Trafficking in Human Organs

EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC)

Proposal for a COUNCIL FRAMEWORK DECISION. on attacks against information systems. (presented by the Commission)

ACCEPTABLE USE POLICY. 1. General Notice

CYBERCRIMES AND CYBERSECURITY BILL

ANNEX V REFERRED TO IN ARTICLE 23 PROTECTION OF INTELLECTUAL PROPERTY

Legislation and legal frameworks on cybercrime and electronic evidence: Some comments on developments

EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC) MODEL PROVISIONS FOR COUNCIL OF EUROPE CRIMINAL LAW CONVENTIONS

OJ Ann. I(I) L. 156(I) 2004 No 3851,

ANNEX XVII REFERRED TO IN ARTICLE 5 PROTECTION OF INTELLECTUAL PROPERTY

JURIDICAL PROTECTION OF INTELLECTUAL PROPERTY IN CHINA

TEXTS ADOPTED Provisional edition

EN Official Journal of the European Union L 157/ 45. DIRECTIVE 2004/48/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 29 April 2004

Council of Europe Convention against Trafficking in Human Organs

ANNEX VII REFERRED TO IN ARTICLE 25 PROTECTION OF INTELLECTUAL PROPERTY

The Parties to the contract are komro GmbH (hereinafter referred to as komro ), Am Innreit 2, Rosenheim, and the respective User.

Social Samurai Terms of Use

CHAPTER TEN INTELLECTUAL PROPERTY

Council of the European Union Brussels, 30 May 2017 (OR. en)

COUNCIL OF THE EUROPEAN UNION. Brussels, 13 February 2003 (17.02) (OR. el,en) 6290/03 DROIPEN 8

INTELLECTUAL PROPERTY

ANNEX VI REFERRED TO IN ARTICLE 24 PROTECTION OF INTELLECTUAL PROPERTY

COU CIL OF THE EUROPEA U IO. Brussels, 11 October /13. Interinstitutional File: 2013/0023 (COD)

DIRECTIVE 2014/57/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 16 April 2014 on criminal sanctions for market abuse (market abuse directive)

Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism

Criminalizing attacks against information systems in the EU

GUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol

ANNEX XV REFERRED TO IN ARTICLE 7 PROTECTION OF INTELLECTUAL PROPERTY

TERMS OF AND CONDITIONS OF THE APPLICATION

Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries

Official Journal of the European Union COUNCIL OF EUROPE CONVENTION ON THE PREVENTION OF TERRORISM

Council of Europe Convention. Protection of Children against Sexual Exploitation and Sexual Abuse

Modernization of Romanian Legislation on Preventing and Combating Cybercrime and Implementation Gap at European level. Adrian Cristian Moise

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org

Council of Europe Convention on the Prevention of Terrorism *

Siemens SCM STAR Portal Terms of Use for Suppliers

UOB BUSINESS APPLICATION TERMS AND CONDITIONS

The Trans-Pacific Partnership

Counterfeit medical products and similar crimes

Chile. Information on the filing of Patents, Designs and Trademarks in Chile. COMANAS CORP IP Management Service Group

Prevention and control of trafficking in human organs *

Monitoring EU crime policies using the International Classification of Crime for Statistical Purposes (ICCS)

TAG-Legal tag-legal.com

A Global Protocol on Cybersecurity and Cybercrime

TERMS OF SERVICE. KNR Health and Beauty, LLC.

Proposal to protect the euro and other currencies against counterfeiting

Proposal for a Council Framework Decision on combating terrorism (2001/C 332 E/17) COM(2001) 521 final 2001/0217(CNS)

LICENSE TO USE THIS SITE

STANDARD TERMS AND CONDITIONS OF MAYBANK COE OPEN BIDDING SERVICE

GLACY+ Global Action on Cybercrime Extended Action globale sur la cybercriminalité élargie

LAW ON AMENDMENTS AND ADDITIONS TO LAW No. 312, LAW ON COPYRIGHT AND RELATED RIGHTS. LAW No. 577, Adopted on March 16, 2006

TELECOMMUNICATIONS AND POSTAL OFFENCES ACT

Investigatory Powers Bill

National Report Japan

Council of the European Union Brussels, 14 September 2017 (OR. en)

Hackers in Hong Kong and the attitude of Hong Kong Courts towards hacking. David Leung, 11 November 2000

Ownership of Site; Agreement to Terms of Use

End User License Agreement for METRONET GO ("Agreement")

EUROPEAN UNION. Brussels, 4 April 2014 (OR. en) 2011/0297 (COD) PE-CONS 8/14 DROIPEN 1 EF 6 ECOFIN 21 CODEC 47

Colombia. Information on the filing of Patents, Designs and Trademarks in Colombia. COMANAS CORP IP Management Service Group

CANADIAN ANTI-SPAM LAW [FEDERAL]

LEGAL TERMS OF USE. Ownership of Terms of Use

Initial analysis of Government s Proposed Amendments to PECA: March 2015

E-Channels Customer Master Agreement - HSBCnet (Business) Customer Details. Full Customer (Company) Name: Address: Emirate: Postal Code / PO Box:

COMMISSION OF THE EUROPEAN COMMUNITIES

CRIMINAL LAW AMENDMENT ACT

TU/e REGULATIONS FOR COMPUTER AND NETWORK USE 2012

BID RIGGING CARTELS IN PUBLIC PROCUREMENT

Legislative Brief The Information Technology (Amendment) Bill, 2006

Hacking and the Law. John MacKenzie

c. References herein to the singular includes the plural and vice versa; and

MULTILATERAL TRADE NEGOTIATIONS THE URUGUAY ROUND

Cybercrime Convention Committee (T-CY) Assessment report. Implementation of the preservation provisions of the Budapest Convention on Cybercrime

Contributary Platform User Terms of Service

INTELLECTUAL PROPERTY (UNREGISTERED RIGHTS) (APPLICATION, TRANSITIONAL PROVISIONS AND SAVINGS) (JERSEY) REGULATIONS 2012

Site Terms and Conditions of Use

EUROPEAN CONVENTION RELATING TO QUESTIONS ON COPYRIGHT LAW AND NEIGHBOURING RIGHTS IN THE FRAMEWORK OF TRANSFRONTIER BROADCASTING BY SATELLITE

LIMITED CIRCULATION DRAFT FOR NATIONAL ASSEMBLY STANDING COMMITTEE. PEC Bill as on

Law of Banking and Security DR. ZULKIFLI HASAN

Transcription:

www.coe.int/tcy Strasbourg, 3 December 2014 T-CY(2014)20 Cybercrime Convention Committee (T-CY) T-CY Guidance Note #8 SPAM Adopted by the 12 th Plenary of the T-CY (2-3 December 2014)

Contact Alexander Seger Executive Secretary Cybercrime Convention Committee Directorate General of Human Rights and Rule of Law Council of Europe, Strasbourg, France Tel +33-3-9021-4506 Fax +33-3-9021-5650 Email alexander.seger@coe.int

1 Introduction The Cybercrime Convention Committee (T-CY) at its 8 th Plenary (December 2012) decided to issue Guidance Notes aimed at facilitating the effective use and implementation of the Budapest Convention on Cybercrime, also in the light of legal, policy and technological developments. 1 Guidance Notes represent the common understanding of the Parties to this treaty regarding the use of the Convention. The present Note addresses the question of spam. The Budapest -neutral language so that the substantive criminal law offences may be applied to both current and future 2 This is to ensure that new forms of malware or crime would always be covered by the Convention. This Guidance Note shows how different Articles of the Convention apply to spam. 2 Relevant provisions of the Budapest Convention on Cybercrime (ETS 185) Spam is often defined as unsolicited bulk email, where a message is sent to a significant number of email addresses, wh targeted at many other recipients without distinction. There are separate issues relating to: the content of spam, the action of sending spam, and the mechanism used to transmit spam. The content of spam may or may not be illegal, and where the content is illegal (such as offering fake medicines or fraudulent financial offerings) the offence may fall under the relevant national legislation for those offences. The action of transmitting spam (including bulk transmission of non-objectionable content) may be a civil or criminal offence in jurisdictions. The Convention does not cover spam the contents of which is not illegal and does not cause system interference, but may be a nuisance to end-users. The tools used to transmit spam may be illegal under the Budapest Convention, and spam may be associated with other offences not listed in the matrix below (see, for example, Article 7). As with other guidance notes, each provision contains an intent standard with intent. In some spam cases this intent may be difficult to prove. 1 See the mandate of the T-CY (Article 46 Budapest Convention). 2 Paragraph 36 of the Explanatory Report

3 T-CY interpretation of provisions addressing spam Relevant Articles Article 2 Illegal access Article 3 Illegal interception Article 4 Data interference Article 5 System interference Article 6 Misuse of devices Article 8 Computerrelated fraud Article 10 Offences related to infringements of copyright Article 11 Attempt, aiding and abetting Article 13 Sanctions Examples Spam may contain malware that may access or enable access to a computer system. Spam may contain malware that may illegally intercept or enable the illegal interception of transmissions of computer data. Spam may contain malware that may damage, delete, deteriorate, alter or suppress computer data. The transmission of spam may seriously hinder the functioning of computer systems. Spam may contain malware that seriously hinders the functioning of computer systems. Devices as defined by Article 6 may be used for the transmission of spam. Spam may contain devices as defined by Article 6. Spam may be used as a device for input, alteration, deletion or suppression of computer data or interference with the functioning of a computer system for procuring illegal economic benefit. Spam may be used for advertising the sale of fake goods, including software and other items protected by copyright. Spam and the transmission of spam may be used to attempt or to aid or abet several crimes specified in the treaty (such as Article 7 on computerrelated forgery or Article 8 on computer-related fraud). Spam may serve multiple criminal purposes some of which have serious impact on individuals, or public or private sector institutions. Even if a Party does not criminalise spam per se, it should criminalise spam-related conduct such as the above offences, and it may consider aggravated circumstances. Parties should ensure, pursuant to Article 13, that criminal offences related to spam sanctions, which include the deprivation of liberty For legal persons this may include criminal or non-criminal sanctions, including monetary sanctions. 4 T-CY statement The above list of Articles illustrates the multi-functional criminal use of spam and spam-related offences. Therefore, the T-CY agrees that these aspects of spam are covered by the Budapest Convention.

5 Appendix: Extracts of the Budapest Convention Article 2 Illegal access Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system without right. A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system. Article 3 Illegal interception Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, including electromagnetic emissions from a computer system carrying such computer data. A Party may require that the offence be committed with dishonest intent, or in relation to a computer system that is connected to another computer system. Article 4 Data interference 1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the damaging, deletion, deterioration, alteration or suppression of computer data without right. 2 A Party may reserve the right to require that the conduct described in paragraph 1 result in serious harm. Article 5 System interference Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the serious hindering without right of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data. Article 6 Misuse of devices 1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right: a the production, sale, procurement for use, import, distribution or otherwise making available of: i a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with the above Articles 2 through 5;

ii a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5; and b the possession of an item referred to in paragraphs a.i or ii above, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5. A Party may require by law that a number of such items be possessed before criminal liability attaches. 2 This article shall not be interpreted as imposing criminal liability where the production, sale, procurement for use, import, distribution or otherwise making available or possession referred to in paragraph 1 of this article is not for the purpose of committing an offence established in accordance with Articles 2 through 5 of this Convention, such as for the authorised testing or protection of a computer system. 3 Each Party may reserve the right not to apply paragraph 1 of this article, provided that the reservation does not concern the sale, distribution or otherwise making available of the items referred to in paragraph 1 a.ii of this article. Article 8 Computer-related fraud Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the causing of a loss of property to another person by: a b any input, alteration, deletion or suppression of computer data; any interference with the functioning of a computer system, with fraudulent or dishonest intent of procuring, without right, an economic benefit for oneself or for another person. Article 10 Offences related to infringements of copyright and related rights 1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law the infringement of copyright, as defined under the law of that Party, pursuant to the obligations it has undertaken under the Paris Act of 24 July 1971 revising the Bern Convention for the Protection of Literary and Artistic Works, the Agreement on Trade-Related Aspects of Intellectual Property Rights and the WIPO Copyright Treaty, with the exception of any moral rights conferred by such conventions, where such acts are committed wilfully, on a commercial scale and by means of a computer system. 2 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law the infringement of related rights, as defined under the law of that Party, pursuant to the obligations it has undertaken under the

International Convention for the Protection of Performers, Producers of Phonograms and Broadcasting Organisations (Rome Convention), the Agreement on Trade-Related Aspects of Intellectual Property Rights and the WIPO Performances and Phonograms Treaty, with the exception of any moral rights conferred by such conventions, where such acts are committed wilfully, on a commercial scale and by means of a computer system. 3 A Party may reserve the right not to impose criminal liability under paragraphs 1 and 2 of this article in limited circumstances, provided that other effective remedies are available and the international instruments referred to in paragraphs 1 and 2 of this article.

Article 11 Attempt and aiding or abetting 1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, aiding or abetting the commission of any of the offences established in accordance with Articles 2 through 10 of the present Convention with intent that such offence be committed. 2 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, an attempt to commit any of the offences established in accordance with Articles 3 through 5, 7, 8, and 9.1.a and c. of this Convention. 3 Each Party may reserve the right not to apply, in whole or in part, paragraph 2 of this article. Article 13 Sanctions and measures 1 Each Party shall adopt such legislative and other measures as may be necessary to ensure that the criminal offences established in accordance with Articles 2 through 11 are punishable by effective, proportionate and dissuasive sanctions, which include deprivation of liberty. 2 Each Party shall ensure that legal persons held liable in accordance with Article 12 shall be subject to effective, proportionate and dissuasive criminal or non-criminal sanctions or measures, including monetary sanctions.