Preventing Information Technology Crimes

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
EUFJE BRUSSELS CONFERENCE 19 Octobre 2010 Joint meeting EUFJE – public prosecutors,
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
PART FOUR – COMMERCIAL LEGISLATION in the UAE Legislative Structures affecting business in the UAE: An Overview Ch 16.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
General Awareness Training
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Defining Terrorism Activity Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
OUTLINE Introduction Background of Securities Regulation Objective of Securities Regulation Violations under the Securities Industry Law The Securities.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
International Telecommunication Union Accra, Ghana, June 2009 Towards Cyber Security - Kenyan Experience Christopher Kemei, Asst. Director Licensing.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Computer crimes.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Cyber Law And Ethics And Ethics.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Issues for Computer Users, Electronic Devices, Computer and Safety.
Intentional Torts Chapter 19. Types of Damages Compensatory Damages- money awarded to compensate for monetary loss and pain and suffering Nominal Damages-
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Presenter: Shelley King University of KwaZulu-Natal, South Africa The slow development of legislature in South Africa to combat human trafficking- Challenges.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Information Security and Privacy in HRIS
Cyber Liability Insurance for an unsecure world
Maritime Security as an Integral Part of an
Surveillance around the world
The vulnerability of economic markets to crime in 2015
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Advanced Income Tax Law
Hacking: public policy
COMP3357 Managing Cyber Risk
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Developments in international jurisprudence
Ethical, Social, and Political Issues in E-commerce
Certified Forensic Investigator
APP entities (organisations)
Session II: Communication and Outreach
Data Protection Legislation
8 Building Blocks of National Cyber Strategies
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Computer Systems D Stainton.
Cyber security Policy development and implementation
Tax Crime and Compliance Issues
Faculty of Science IT Department By Raz Dara MA.
1. Introduction to the Convention 2
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
The E-Commerce Act and the Right to Privacy
Ethics IN PRIVATE SECURITY
End User Support By Dominique Stainton.
Presentation transcript:

Preventing Information Technology Crimes Mohamed Gheyath Manager, Technical Affairs Telecommunications Regulatory Authority, UAE

Outline... Introduction Importance of Cyber Crime Law Case Study: Preventing Information Technology Crimes in the UAE addressing the followings: Access Crimes Network Crimes Data Crimes Other Related Crimes Conclusion

Cyber Crime… Due to the anonymous nature of the Internet…it is possible to engage into a variety of criminal activities with freedom… People have been misusing this aspect of the Internet to carry on criminal activities in cyberspace… Hence the need for Cyber Crime law is required in UAE … The Cyber-Crime Law was approved and published early 2006. Non compliance with the Cyber-Crime Law in the UAE leads to: imprisonment and financial penalties; or either of these.

Cont….Cyber Crime… Examples of recent activities:- Phishing Pharming Credit Card Details Theft

Importance of the Cyber-Crime Law… It protects the integrity of the government and reputation of the country. It helps preclude a country from becoming a shelter for bad actors, including terrorist actions using/attacking IT systems. It helps prevent a country from becoming a repository for cyber-criminal data. It increases market confidence and certainty regarding business operations and attract foreign direct investment. It increases national security and deter corruption. It helps develop ICT in the country.

Case Study: Preventing Information Technology Crime in UAE The UAE Cyber-Crime law addresses: Access Crimes (unauthorized access, virus .. hacking, identity theft) Data Crimes (interception, modification, theft, privacy) Network Crimes (interference, sabotage) Other Related Crimes (phising, pharming, cybersquatting, Obscenity)

Access Crimes Intentional Unauthorized / Authorized access

Cont….Access Crimes “Only Access” to systems, DataBase, or network elements Access that lead to data loss or damage or alteration results to higher penalties Access that lead to Personal data loss or damage or alteration results to even higher penalties Access crimes covers trespassing an authorised access to data or system. Access crimes covers assisting access to data and systems.

Network Crimes Network Interference Network Sabotage

Cont…Network Crimes If the network is used to threat or force someone into committing an “act” then imprisonment could reach up to 2 years with fifty thousand Dirhams fine. If the Network is used to threat or force someone into committing a crime or to carry out acts in offense to honor and honesty then imprisonment could reach up to 10 years.

Data Crimes

Cont…Data Crimes Using forged or fraud data willingly leads to the same punishment as the forge or fraud act it self.

Other Related Crimes

Cont…Related Crimes Offending Islam holy shrines or rituals Offending any of other religions’ holy shrine or rituals Assaulting Family principles or values, family life privacy breach of individuals by publishing or news spreading. Drug dealing or facilitating. Money Laundry. Terrorist activities or assisting in activities. Inciting Male or female or seducing into committing obscenity or assisting to commit the same using the network.

Conclusions Extending the rule of law into cyberspace is a critical step to create a trustworthy environment for people and businesses. But this is an ongoing work and it is in progress. organizations today must defend their own systems and information from attack. They may rely secondarily on the deterrence that effective law enforcement can provide. The penalties should provide adequate deterrence for crimes that can have large-scale economic and social effects. Self-protection remains the first line of defense. It is important that private sector develops and adopts strong and efficient technical solutions and management practices for information security.

Cont…Conclusions Little consensus exists among countries regarding exactly which crimes need to be legislated against. In the networked world unless crimes are defined in a similar manner across jurisdictions (with some exceptions), coordinated efforts by law enforcement officials to combat cyber crime will be difficult. A model approach is needed. some countries, particularly developing ones, are seeking a model to follow. But few have the legal and technical resources necessary to address the challenges of adapting local or regional criminal provisions to cyberspace. Public and private coordination to produce a model approach can help in creating a secured and safe Cyber Space haven.

Questions ?