TECHNOLOGY UPENDS EXISTING LEGISLATIVE FRAMEWORKS

Slides:



Advertisements
Similar presentations
Beyond Market Access – Domestic Regulation and Mutual Recognition Mode 4 of the GATS – Taking Stock and Moving Forward September 2008 David C. Benton Chief.
Advertisements

Philippine Cybercrime Efforts
European Data Protection Supervisor Security of e-Government, Brussels, 19 February 2013 Privacy and e-Government: the role of Data Protection legislation.
Second Regional Conference on Prospects and Challenges facing the Modernization of the Legal Environment to enable Business and Investment in the MENA.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Net Neutrality a regulator’s vision February 27 th, 2012 Guillaume Mellier.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI.
DeRisk Advisory Services Ltd. Doing Business in Conflict-Affected Countries Lisa Curtis 14 th July 2009.
Role of NGOs in public service delivery in Finland Riitta Särkelä The constitution safeguards economic, social and educational basic rights for.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
An Introduction to regulation, it ’ s significance and rationale Kevin Hinde.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Model For Effective Self-Regulation November 2002 Daniel M. Sibears Senior Vice President & Deputy Member Regulation, NASD.
Information Sharing Challenges, Trends and Opportunities
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Internet Governance Pre-Conference Roundtable Internet Governance Pre-Conference Roundtable.
Towards a European data-driven economy Giuseppe Abbamonte, Director Media and Data European Commission DG for Communications Networks, Content and Technology.
Protection and Prosperity Graham Russell and Ffiona Kyte, Local Better Regulation Office 21 st May 2010 Entrepreneurial Region Conference, Sweden.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
IoT Trust Framework leading to self regulation code of conduct and certification models Craig Spiezle Executive Director & President Online.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Implementation of Insurance Core Principles and FSAP Evaluations The Portuguese FSAP experience Gabriel Bernardino Instituto de Seguros de Portugal.
Cybersecurity Strategy in Japan May 2016 Yasu TANIWAKI Deputy Director-General National center of Incident readiness and Strategy for Cybersecurity (NISC)
Democratic and inclusive street vending urban public policies Luciana Itikawa University of Sao Paulo - Brazil challenges for.
CIO Vision – Senior Officer Meeting 07/05/2014 Food and Agriculture Organization of the United Nations Food and Agriculture Organization of the United.
Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Protecting Data, Sharing Information Graham Wakerley: Director
Automation & Enhanced Safety
IoT Strategic Initiatives in Brazil
Opportunities and Challenges for the DSM
Cyber Security – An Existential Threat? (IIC, Singapore)
New hybrid regulatory frameworks for the Internet
The Role of Regulations for IG
Digital citizenship education
Information Technology Sector
.uk Public Policy Partnership
Pavel Racocha May, 2004 Dubrovnik, Croatia
Deep Shift: 21 Ways Software Will Transform Global Society
Challenges to Competition Reforms in Africa
California Cybersecurity Integration Center (Cal-CSIC)
IAIS Global Seminar London Panel on Conduct of Business 30 June 2017
A BIG DATA WORLD Smaller and smaller and smarter devices
Closing Remarks and Next Steps
FINANCIAL STABILITY- NEW CHALLENGES FOR CENTRAL BANKS
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
6. Politics, Ethics and Law
8 Building Blocks of National Cyber Strategies
“Looking Forward, (No) Looking Back”
TRENDS IN BROADCASTING REGULATION
Intro Cyber forensics needs direction and definition
What do Cyber Careers look like and where do I start?
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Presented by Mr.Tossapon Tassanakunlapan
Interpreting Foresight Process Impacts:
Transforming organisations through an
Forth International Forum
The Cyber Challenge Lessons Learned from the Department of Energy
District and Charter School Collaboration in North Carolina
Sameer Sharma, ITU 7 August, 2018 Dhaka, Bangladesh.
The Case for Self-regulation of Market Conduct
Slide 1 The State of the State in Cyberspace The Hybrid Regulation of Global Data Protection Ralf Bendrath University of Bremen Collaborative Research.
Community of Users.
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Institution and Capacity- Building
Windsor-Essex Smart Cities Challenge:
Reiniger LLC.
Deborah Housen-Couriel, ADV.
Presentation transcript:

TECHNOLOGY UPENDS EXISTING LEGISLATIVE FRAMEWORKS Deborah Housen-Couriel, Adv. Interdisciplinary Cyber Research Center, Tel Aviv Hebrew University Cyber Security Research Center

(1) INNOVATIVE TECHNOLOGIES (2) BIG DATA (3) INNOVATIVE REGULATION

(1) INNOVATIVE TECHNOLOGIES 3 WORDS : 5G, 5G, 5G (1) INNOVATIVE TECHNOLOGIES

REGULATORY CHALLENGE: INFRA-STRUCTURE

GIVEN UBIQUITY – ILLEGAL AND ILLICIT CONTENT RC: GIVEN UBIQUITY – ILLEGAL AND ILLICIT CONTENT

RC: JURISDICTION AND ENFORCE-MENT

PROTECTING CYBER VUL-NERABILITIES IoT Market to Reach $1.7 Trillion by 2020 “The number of ‘IoT endpoints,’ connected devices such as cars, refrigerators and everything in between, will grow from 10.3 billion in 2014 to more than 29.5 billion in 2020.” RC: PROTECTING CYBER VUL-NERABILITIES Thomas A. Campbell, Ph.D. National Intelligence Officer for US Technology National Intelligence Council Office of the Director of National Intelligence

THE INTERSPECIES Internet TED2013 (Vince Cerf, PETER GABRIEL, DIANA REISS, NEIL GERSHENFELD)

(2) BIG DATA ABSOLUTELY UNPRECEDENTED Quantity and quality As a regulatory challenge (2) BIG DATA

“DATA”: THE CONCEPTUAL CHALLENGE PROPERTY NEGOTIABLE GOOD PART OF MY IDENTITY RELATIONSHIP TOOL OR WEAPON PRODUCT OR COMMODITY “DATA”: THE CONCEPTUAL CHALLENGE

(3) INNOVATIVE REGULATION WE NEED THRESHOLDS IN CYBERSPACE Yet states and organizations have checked out of the process of setting normative thresholds (3) INNOVATIVE REGULATION

TWO-PRONGED STRATEGY COMBINING REGULATORY CLARITY AND FLEXIBILITY CURRENT PERCEPTION OF NORMATIVE FAILURE “WE DON’T KNOW HOW TO REGULATE CYBERSPACE”) AS A RESULT, REGULATORY VACUUM FOR NEW TECHNOLOGIES  LACK OF SUPPORT FOR INNOVATION  FOR A LEVEL PLAYING FIELD  UNCERTAINTY TECHNOLOGY REQUIRES MORE SOPHISTICATED REGULATORY MODELS TWO-PRONGED STRATEGY COMBINING REGULATORY CLARITY AND FLEXIBILITY

CLARITY: BACK TO BASIC REGULATORY PRINCIPLES RULE OF LAW IN CYBERSPACE “Rule-based transparent system” (Minister Singh) INTERNATIONAL LAW APPLIES Non-intervention State responsibility for internationally-wrongful acts HUMAN RIGHTS SAFEGUARDS Personal data protection Right to communicate NATIONAL LAWS WITHIN IL FRAMEWORK CLARITY: BACK TO BASIC REGULATORY PRINCIPLES

FLEXIBILITY: INNOVATIVE REGULATORY MODELS CO-REGULATION / SELF-REGULATION (ISACs) REGULATION THROUGH INFOR-MATION (NL) STANDARDS (5G) CHANGE GOV’T (ISRAEL INNOVATION AUTHORITY) CONFIDENCE BUILDING MEASURES (BEST PRACTICES FOR CYBER FORENSICS, POINTS OF CONTACT – CERTS, CSIRTS, HOT LINES SELF-REGULATION BY BUSINESSES (UK INSURANCE SCHEME) FLEXIBILITY: INNOVATIVE REGULATORY MODELS

New role for the private sector in regulatory processes

WRAPPING UP: THE DARE OF CREATING A REGULATORY ROADMAP

MUST BE MULTI-STAKEHOLDER IT’S A LONG-TERM, STRATEGIC GAME OF NORM DEVELOPMENT – NOT A TACTICAL ONE. CHESS, NOT CHECKERS MUST BE MULTI-STAKEHOLDER

WHAT’s AT STAKE: “CYBER CANTONIZATION” v WHAT’s AT STAKE: “CYBER CANTONIZATION” v. COORDINATED GLOBAL TECHNOLOGICAL AND NORMATIVE DEVELOPMENT