Part of Legislative Tools and Other Means To Combat Electronic Crime.

Slides:



Advertisements
Similar presentations
EXPERIENCES OF OTHER COUNTRIES IN REGULATION OF PAYMENT CARDS SYSTEM This section reviews the regulatory experiences of other countries with respect to.
Advertisements

STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
1 Credit card operation and the recent CardSystems incident HONG KONG MONETARY AUTHORITY 4 July 2005.
“This workforce solution was funded by a grant awarded under Workforce Innovation in Regional Economic Development (WIRED) as implemented by the U.S. Department.
John J Downes International Travel and Tourism Law Consultant
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
Regulatory Body MODIFIED Day 8 – Lecture 3.
TUTORIAL Grant Preparation & Project Management. Grant preparation What are the procedures during the grant preparations?  The coordinator - on behalf.
Session 3 – Information Security Policies
XML AND THE LEGAL FOUNDATIONS FOR ELECTRONIC COMMERCE: Making XML Pay: Revising Existing Electronic Payments Law to Accommodate Innovation Copyright (c)
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
COMP 6125 An Introduction to Electronic Commerce Session 4: E-Commerce In Developing Countries.
Fair competition commission 1 Fifth Annual African Dialogue Consumer Protection Conference September 10-12, 2013 ● Livingstone, Zambia Empowering and Educating.
Cybersecurity Governance in Ethiopia
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
DIRECT WORKS FORUM 10 June 2008 Andy Ballard. COMMON LAW MANSLAUGHTER Effectively – Death by gross negligence Test – (a) was a (common law) duty of care.
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Regulatory Authority.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Staffing and training. Objectives To understand approaches to the development of strategies and policies for staffing of a Regulatory Authority including.
Compliance Audit Subcommittee Reporting Work Plan Copenhagen, Denmark 6th of May 2010.
Chapter 8 Auditing in an E-commerce Environment
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Presentation on Mechanisms for Reducing Corruption through Private Sector Monitoring and Enforcement by Essa Faal / Thomas F. McInerney General Counsel.
Submitted By : Seamless Chex. Considerably like paper counterparts, checks are used to pay bills and transfer money starting with one bank then onto the.
ETHICAL ISSUES IN HEALTH AND NURSING PRACTICE CODE OF ETHICS, STANDARDS OF CONDUCT, PERFORMANCE AND ETHICS FOR NURSES AND MIDWIVES.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
SUNY Maritime College Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal.
The health and safety at work Act - a new way of thinking
Business Briefing Security Service Providers
Regulations gambling Romania , through National Gambling is among the European countries with the best laws in the field of gambling online: Taxing several.
The Acceptable Use of Technology
CompTIA Security+ Study Guide (SY0-401)
Risk and Insurance Part 5 Managing Growth in the Small Business.
Care Act and young people with Sensory Impairments
Chapter 6 The School Health Program: A Component of Community Health
BASIC PRINCIPLES IN OCCUPATIONAL HYGIENE
Developing an Effective Ethics Program
Data Protection Act and Other Laws
INTERCONNECTION GUIDELINES
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Auditing the Implementation of Multilateral Environmental Agreements (MEAs) (3) Narges Rezapour Tehran- May 2016.
LATIHAN MID SEMINAR AUDIT hiday.
OECD - Introduction It is an organisation of those countries which describe themselves as Democratic and have Market economy. Its HQ is in Paris, France.
Public Procurement and Human Rights in Africa
Establishing the Infrastructure for Radiation Safety Preparatory Actions and Initial Regulatory Activities.
Secretariat for Legal Affairs
Customizable Plans, Turnkey Solutions
GDPR support January GDPR support January 2018.
Cyber Issues Facing Medical Practice Managers
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Communication and Consultation with Interested Parties by the RB
Data protection in the Education Sector - understanding the impact of GDPR Tuesday 23rd January 2018.
IS4550 Security Policies and Implementation
IOSCO MMoU IARC/COSRA March 2005
The Optional Protocol Module 8.
Chapter 8 Developing an Effective Ethics Program
Cyber security Policy development and implementation
Managing TANF Policies and Procedures August 2017
Accountabilities of health and social care practitioners
Governance and Audit Oversight for Capital Market
Neopay Practical Guides #2 PSD2 (Should I be worried?)
ESF monitoring and evaluation in Draft guidance
International Law Sources Binding Force
Lesson 4.2 Banking Services and Fees
Presentation transcript:

Part of Legislative Tools and Other Means To Combat Electronic Crime

Part of Table of Contents Legal Aspects of E-Crime Legal Aspects of E-Crime Other Ways To Prevent Electronic Crimes Or To Be Protected From Such Crimes Other Ways To Prevent Electronic Crimes Or To Be Protected From Such Crimes1 3 What Can The Government Do To Provide Additional Protection To Its Users? What Can The Government Do To Provide Additional Protection To Its Users?2 Electronic Crimes Electronic Crimes4

Part of Legal Aspects of E-crimes

Part of Legislative Vacuum  E-crimes relatively new internationally  New types and methods of e-crimes discovered regularly  There is almost always likely to be a vacuum (bad?)  The reason for a legislative vacuum arises from the time lag in drafting, approving and implementing laws  Laws are stringent and leave little flexibility therefore vacuums can be advantageous to adapt to constantly developing technology and crimes

Part of Steps required to combat e-crimes  Knowledge  Information sharing and dissemination  Cooperation within companies, associations, banks, telecommunications regulatory, with respect to internationally committed e-crimes (most frequent kind) international organizations/treaties with countries that can support Oman ’ s call to combat crimes

Part of Recommendations to avoid vacuums  Allow for a quicker method to regulate because of the dynamic e-commerce nature (i.e. regulations by the telecommunication regulatory as oppose to legislative laws)  Identify key areas of e-crime and legislate thereon  Legislate with a mind for protection as oppose to a limitation  Allow for certain arbitrary decisions to be taken when the need arises  Encourage professional witnesses and expert advice

Part of Laws in connection with e-business  All commercial laws: contract (signatures, binding nature, enforcement, jurisdiction, governing laws), companies (authority to enter into such transactions, liability on such transactions, enforcement), tort (concept of harm), banking (transfer of funds, online banking, purchases, and other financial transactions), maritime (bills of lading, receipt, etc)

Part of Legislation samples to control e-crimes  Not an expert on legislation in various countries however some comments:  U.A.E.:  E-commerce law  VACUUM – EVIDENCE LAW  Jordan:  Telecommunications law  VACUUM – MARITIME  USA/New York

Part of Methods to train the concerned bodies  Capacity building is the key to a more protected electronic world focused on understanding how e- crimes are committed factors involved, possible recourse etc.  Information sharing - maintain an up dated knowledge on the subject matter  Legislatures Get a team of specialist involved in drafting laws Lawyers to write the laws clearly and concisely Judges to be able to handle e-crime cases Business and IT people on what protection is or is not availed to them and likelihood of success

Part of What Can The Government Do To Provide Additional Protection To Its Users?

Part of  A no fault recourse fund  Support of online providers  i.e. Amazon, aramex, visa, mastercard, paypal and other websites that can facilitate a certain degree of additional protection  IT controls and securities  Network controls (Not a preference but a possibility)  Continuously distribute information on support available, new crimes, to raise awareness

Part of Other Ways To Prevent Electronic Crimes Or To Be Protected From Such Crimes

Part of  Private/public initiative  The public at large should also implement methods and systems to increase their protection and decrease their exposure to such crimes.  Each person can limit such crimes by using approved payment sites  Each company can internally limit such crimes  Insurance

Part of Electronic Crimes

Part of How They Occur And How Each User Can Limit Its Occurrence

Part of IP crimes  No supervision  Monitoring of material used  Choose what you buy, read etc. It’s really the consumers that encourage IP crimes

Part of Electronic Signature Fraud  No internal controls or risk management As a receiver: Organization should have internal policies of how to accept electronic signatures As a signatory: clear roles and responsibilities, access to electronic signature  Organization should ensure a chain management policy to minimize risks

Part of Viruses or damage of stored memories  Information management  Backup system of information Breach of general discipline  Lack of knowledge of code in place and/or general accepted discipline  Lack of capacity, guidance and/or support to behave in line with such principles

Part of Slander via electronic methods and violation of rights and causing harm  Insufficient IT control to ensure integrity of electronic communications