Overview of the Budapest Convention on Cybercrime (2001)

Slides:



Advertisements
Similar presentations
11 COUNTER-TERRORISM COMMITTEE CTED PRESENTATION ON MUTUAL LEGAL ASSISTANCE TO MEMBER STATES presentation by CTED GENERAL LEGAL ISSUES GROUP, INCLUDING.
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
Prosecuting a suspected case of illegal traffic Workshop for Central and Eastern Europe countries on the prosecution of illegal traffic of hazardous and.
EUFJE BRUSSELS CONFERENCE 19 Octobre 2010 Joint meeting EUFJE – public prosecutors,
Rule-Making Book II EU Administrative Procedures – The ReNEUAL Draft Model Rules 2014 Brussels, May th Herwig C.H. Hofmann University of Luxembourg.
State of play and activities in 2014 March 2014
1. Asset Recovery Rules in Jordan 5 th Pan-European High Level Conference on asset Recovery Offices Cyprus Oct Prof. Fayyad Alqudah (LL.B,
The Law of the Lisbon Treaty. Our emerging European Criminal Process ? Professor Dermot P.J. Walsh School of Law University of Limerick.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Combating cyber-crime: the context Justice Canada March 2005.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Cybercrime and the Council of Europe response Strasbourg, October 2007 Alexander Seger Council of Europe, Strasbourg, France Tel
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Regional Conference Intellectual Property Crime Bahrain April 2008.
Cybersecurity Governance in Ethiopia
Tax Information Exchange Agreements Formal Ratification 2011.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
BRIEFING BY THE DOJ&CD ON - (1) THE RATIFICATION OF THE CONVENTION ON CYBERCRIME AND THE ADDITIONAL PROTOCOL TO THE CONVENTION ON CYBERCRIME CONCERNING.
Freedom of Expression in the Information Society : Some Current Issues & Development Dr. A.K. Chakravarti * Adviser Department of Information Technology.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
E-evidence and access to data in the cloud Issues and options under consideration by the Cloud Evidence Group of the Cybercrime.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
TAIEX INTERNAL MARKET WEEK IN BUDAPEST November 2004 Co-operation of Customs Administrations Presentation by: Sandro Le Noci – Italian Customs.
Capacity building and International Cooperation on Cybercrime:
Johannesburg, South Africa
ASEAN v Transnational Crime and Terrorism…..an Introduction
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
The Challenge of Effective Judicial Cooperation
Cybersecurity in the ECOWAS region
ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT (OECD) CONVENTION ON COMBATING BRIBERY OF FOREIGN PUBLIC OFFICIALS IN INTERNATIONAL BUSINESS TRANSACTIONS.
AFRICAN UNION CONVENTION ON PREVENTING AND COMBATING CORRUPTION
RATIFICATION OF NAIROBI INTERNATIONAL CONVENTION ON REMOVAL OF WRECKS ,2007 PRESENTATION TO PORTFOLIO COMMITTEE OF TRANSPORT 23 SEPTEMBER 2014.
Cybersecurity in Belarus a general overview of support areas
3rd ANTI-CYBERCRIME FORUM
3rd ANTI-CYBERCRIME FORUM
U.S. Department of Justice
Sub-Regional Meeting for ASEAN Countries on the Marrakesh Treaty and the Production and Exchange of Accessible Books by the World Intellectual Property.
Cybercrime in the election process:
Forensic and Investigative Accounting
EUROPEAN PUBLIC PROSECUTOR’S OFFICE
DEVELOPING A LEGAL FRAMEWORK TO COMBAT CYBERCRIME
Trade Secrets 2018: International
Prosecuting International Intellectual Property Crimes
Information Sharing Mini Plenary 4 Mongezi Menye
Cybercrime legislation and policies in Africa: Issues for discussion
Presentation to the Portfolio Committee
UNODC and CYBERCRIME October 2009.
Introduction to Digital Forensics
Presentation transcript:

Overview of the Budapest Convention on Cybercrime (2001) Computer Crime and Intellectual Property Section United States Department of Justice United States Department of Justice

United States Department of Justice Agenda Introduction Substantive Offenses Procedural Laws Enhanced Cooperation Current Status United States Department of Justice

United States Department of Justice Origin Council of Europe experts’ group began drafting 1997 Expert’s group included non-European countries: Canada, Japan, South Africa, United States Convention completed and signed by 30 countries in 2001 Now 71 countries: 57 ratifications, 4 signatures, and 10 invitations to accede Cabo Verde, Mauritius, Morocco, and Senegal are member states Intention to accede from Nigeria, Tunisia, and Ghana United States Department of Justice

United States Department of Justice Origin Only instrument of its type to set out an international standard for cybercrime laws Does not dictate statutory language or method of implementation Instead, it sets out CAPABILITIES and allows maximum flexibility in implementation Membership includes countries from every continent United States Department of Justice

Substantive Offenses Attacks on Computers and Data Article 2 - Accessing whole or part of a computer system, without right hacking to steal credit card information or other data Article 3 - Illegal Live Reading/Listening of Content obtaining electronic communications, without right E-mail or voice content United States Department of Justice

Substantive Offenses Attacks on Computers and Data Article 4 - Data Interference deletion, modification or suppression of computer data, without right hacking to delete company’s customer database Article 5 - System Interference serious hindering, without right, of the functioning of a computer system “denial of service” attacks Article 6 - Misuse of Devices Access device fraud; credit card fraud United States Department of Justice

Substantive Offenses Computer-Related Crimes Article 7 - Computer-related Forgery manipulating a computer without right resulting in inauthentic data, with intent it be acted upon Article 8 - Computer-related Fraud manipulating computer data without right to cause loss of property to another United States Department of Justice

United States Department of Justice Substantive Offenses Content Offenses Article 9 - Offenses related to Child Pornography Article 10 - Offenses related to infringements of copyright and related rights United States Department of Justice

Jurisdiction and other liability Article 22 – Jurisdiction: offenses cover crimes within country, aircraft, or ships and by nationals outside of territory Note: articles also cover “attempt” or “aiding abetting,” as well as corporate liability United States Department of Justice

United States Department of Justice Procedural Laws Preservation Article 16: Expedited preservation of computer data for up to 90 day; renewable for additional time Article 17 - Expedited preservation and partial disclosure of traffic data Article 18 - Production Order for data stored by a provider United States Department of Justice

Procedural Laws Seizure and Monitoring Article 19 - Search and seizure of stored computer data Article 20 - Real-time collection of traffic data IP Address, e-mail header information Article 21 – Real-time collection of the content of electronic communications United States Department of Justice

International Cooperation Extradition Article 24 – Extradition: computer crimes will be included offenses under existing extradition treaties If country does not extradite, it generally must be willing to prosecute domestically United States Department of Justice

International Cooperation Other Mechanisms Article 25: Allows for emergency requests by phone, fax, email Article 27: Acts as a Mutual Legal Assistance Treaty (MLAT) where parties do not have an existing MLAT Article 32: Cross-border access to publicly available data or with the consent of the data owner United States Department of Justice

International Cooperation Other Mechanisms Article 29: Expedited preservation of electronic data for foreign requests (with no dual criminality requirement) Article 30: Expedited disclosure of stored traffic data Article 31: Expedited seizure of stored content data Article 35: 24/7 Network United States Department of Justice

United States Department of Justice Guidance Notes Guidance on the applicability of the Convention to: Definition of “computer system” Botnets Transborder access under Article 32 Identity Theft DDOS attacks Critical infrastructure attacks Malware Spam United States Department of Justice

Current Status of Convention Open to any country to request accession to Convention More countries expressing interest Provides important benefits for mutual cooperation to those countries that join it Useful as an international standard whether or not a country joins 80% of countries with modern cybercrime laws used the Convention as a model United States Department of Justice

Implementation Committee (T-CY) Participation in the Implementation Committee (T-CY) The Parties shall, as appropriate, consult periodically to facilitate: the effective use and implementation of this Convention, including the identification of any problems thereof the exchange of information on significant legal, policy or technological developments pertaining to cybercrime consideration of possible supplementation or amendment to the Convention. United States Department of Justice

Support for Capacity Building GLACY+ EU/COE Joint Project on Global Action on Cybercrime “Global Action on Cybercrime Extended” to strengthen the capacities of States worldwide to apply legislation on cybercrime and electronic evidence and enhance their abilities for effective international cooperation Cooperation with African Union Commission to jointly assist African countries in the strengthening of their domestic legislation on the basis of the Budapest Convention and the Malabo Convention and institutional capacities African Forum on Cybercrime, October 16 – 18, 2018, Addis Ababa Cooperation with the ECOWAS Commission on judicial training and electronic evidence US funded capacity building program for legislators, investigators, prosecutors, and judges United States Department of Justice

United States Department of Justice