Role of Service Providers in Cybercrime Investigations

Slides:



Advertisements
Similar presentations
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
1 DEVELOPING A LEGAL FRAMEWORK TO COMBAT CYBERCRIME Providing Law Enforcement with the Legal Tools to Prevent, Investigate, and Prosecute Cybercrime.
Convention for the protection of individual with regard to automatic processing of personal data “The purpose of this convention is to secure in the territory.
Child Abuse and Criminal Law Prof. Dr. Henrik Kaspersen Council of Europe Zagreb, October 27-28, 2011.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
Communications Briefing: Navigating the clouds Sam Parr and Ian Walden Wednesday 21 October 2009, – 2.00 pm.
Mandatory Retention of Traffic Data: What is next? Prof. Dr. Henrik W.K.Kaspersen Computer/Law Institute Vrije Universiteit Amsterdam- The Netherlands.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Europol’s tailor-made data protection framework
Data Privacy Sebastian Leinmueller - Birgit Hainzlmaier MBA 664 Team Presentation.
ATRIP Conference Montpellier, 8 July 2014 Hiding Behind Technology? Prof. Dr. Martin Senftleben VU University Amsterdam Bird & Bird, The Hague.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
By Drudeisha Madhub Data Protection Commissioner Date:
The challenges of cloud-derived evidence Professor Ian Walden Centre for Commercial Law Studies, Queen Mary, University of London.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Ioannis Iglezakis Directive on privacy and electronic communications.
Standard Operating Procedures Joe Wherton Queen Mary University of London
Judgment of the Court of the European Union (Grand chamber) Retention of Telecommunications Data Holly Raiche Director, Internet Society of Australia.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
ISPs – Internet’s Secret Police? Ian Kerr Canada Research Chair in Ethics, Law & Technology Université D’ Ottawa University of Ottawa Faculté de droit.
The Notification Procedure of national telecoms markets Pál Belényesi 27 October 2006.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen.
Perspectives for an effective European-wide fight against cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Digital evidence in criminal proceedings: legal considerations Arkadiusz Lach Department of Criminal Procedure Faculty of Law University of Nicolaus Copernicus.
Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Ecommerce Applications 2007/8 E-Commerce Applications UK e-Commerce Regulations.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
Consumer rights when subscribing to a mobile telephony service.
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
ROMANIA NATIONAL NATURAL GAS REGULATORY AUTHORITY Public Service Obligations in Romanian Gas Sector Ligia Medrea General Manager – Authorizing, Licensing,
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Independent Centre for Privacy Protection Schleswig-Holstein
Surveillance around the world
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Data Protection: EU & International
Dr. José Ignacio Cubero Marcos University of the Basque Country
Prepared by the Cybercrime Programme Office of the Council of Europe
Prof. Dr. Martin Senftleben VU University Amsterdam
Data protection issues in regulatory investigations
Privacy & Access to Information
U.S. Department of Justice
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Site and Artefact Protection under the 2001 Convention
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
DEVELOPING A LEGAL FRAMEWORK TO COMBAT CYBERCRIME
Prosecuting International Intellectual Property Crimes
Importance of Law and Policies in the Environmental Management System
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
EE DNS FORUM / UADOM Domain name dispute resolution: challenges and alternatives Kateryna Oliinyk Head of Arzinger IP practice, Patent and Trademark Attorney.
PRESENTATION OF MONTENEGRO
Cybercrime legislation and policies in Africa: Issues for discussion
Office of Research Integrity and Protections
EU Data Protection Legislation
Presentation transcript:

Role of Service Providers in Cybercrime Investigations Professor Ian Walden Centre for Commercial Law Studies, Queen Mary, University of London

Service providers Cybercrime Convention: ‘service providers’ “any public or private entity that provides to users of its service the ability to communicate by means of a computer system, and any other entity that processes or stores computer data on behalf of such communication service or users of such service.” Explanatory Report ‘a broad category of persons’: From mobile operators to WhatsApp Free or paid; public or private provision Not a mere provider of content, with no “communication or related data processing services”

Service Provider Data Content Traffic data Subscriber data ‘In transmission’ (lawful intercept) and ‘at rest’ (production orders) “within its existing technical capability” or build ‘intercept capability’? Traffic data Cybercrime Convention, art. 1(d) “any computer data relating to a communication by means of a computer system, generated by a computer system that formed a part in the chain of communication, indicating the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.” Subscriber data

Data Availability Historic Current Future Data Retention Directive 06/24/EC Fixed & mobile telephony, internet access, email & telephony: Communication data not content 6-24 months Current ‘expedited preservation’: ‘quick freeze’ (arts. 16-17) Future Real time collection of traffic data (art. 20) Art. 14(3) Limitation if a ‘closed group of users’ or non-public network and not connected

Obtaining data Mandatory (national) Production order (art. 18) Person ‘in its territory’ or service provider ‘offering its services in the territory’ with ‘possession or control’ Search and seizure (art. 19) Extending the search to networked computer systems Protected data (art. 19(4)) Voluntary (national & international) “obtains the lawful and voluntary consent of the person who has lawful authority to disclose” (art. 32)

Co-operation Council of Europe Guidelines (2008) Common measures Building long term, formalised relationships e.g. Single Points of Contact Need for cost reimbursement or fair compensation Law enforcement measures Requests carried out in accordance with agreed procedures Service provider measures Emergency procedures for urgent circumstances Promoting a ‘culture of co-operation’ Safeguarding fundamental human rights Impact of Snowden revelations?