Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel:+230 201 36 04 Helpdesk:+230.

Slides:



Advertisements
Similar presentations
VOLUNTARY PRINCIPLES ON SECURITY & HUMAN RIGHTS. What are the Voluntary Principles? Tripartite, multi-stakeholder initiative Initiated in 2000 by UK Foreign.
Advertisements

Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Philippine Cybercrime Efforts
Data Protection Billy Hawkes Data Protection Commissioner Irish Human Rights Commission 20 November 2010.
Developing harmonious, stable and progressive industrial relations: THE ROLE OF THE VIETNAMESE TRADE UNION MOVEMENT PhD Candidate DONG THI THUONG HIEN.
Training on Data Protection Functions of the Data Protection Office.
The Area of Liberty, Security and Justice. Objectives Free movement for EU citizens Security and safety in a Europe without borders Figth against international.
Office of the U.S. Trade Representative Kira M. Alvarez CHIEF NEGOTIATOR AND DEPUTY ASSISTANT U.S.T.R. For intellectual property enforcement.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Eurojust The European Union’s Judicial Cooperation Unit.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Presented by Mrs Drudeisha Madhub (Data Protection Commissioner) Tel: Helpdesk: Fax:
High Level Meeting on Customs & Taxation Brussels 19 June 2001.
Data Protection Act. Lesson Objectives To understand the data protection act.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Combating cyber-crime: the context Justice Canada March 2005.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Budapest 25 September 2012 Denton Howard INHOPE Training & Services.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
OUTLINE Introduction Background of Securities Regulation Objective of Securities Regulation Violations under the Securities Industry Law The Securities.
Cybersecurity Governance in Ethiopia
Emtel 4G LTE NETWORK. “ The DPO Regulatory Perspective about Cloud Solutions” Presented by Mrs Drudeisha Madhub (The Commissionner )
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Asian Personal Data Privacy.
Strengthening the Protection and Enforcement of Intellectual Property Rights in Ukraine Activity October 2014.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
SNB - REACT Business Perspective IPR Protection April 1, 2009 Presentation Eli Mufisovski.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
TRANSNATIONAL ORGANISED CRIME SECRET. CCSS TIER 1 THREATS: IMMEDIATE SIGNIFICANT THREAT.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
WHOIS Public safety and data protection requirements.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
PROTECTING THE INTERESTS OF CONSUMERS OF FINANCIAL SERVICES Role of Supervisory Authorities Keynote Address to the FinCoNet Open Meeting 22 April 2016.
 Cooperation and information exchange amongst financial supervisors and regulators are essential for effective oversight in an integrated financial system.
Data protection—training materials [Name and details of speaker]
Issues for Computer Users, Electronic Devices, Computer and Safety.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
0 Project Conference – Friday 8 February DEVELOPING THE NATIONAL CAPABILITY FOR INTEGRATED BORDER MANAGEMENT (IBM) IN LEBANON Project Funded by the European.
THE CULTURAL AND CREATIVE HIGH-END INDUSTRY AS A KEY DRIVER FOR THE GROWTH OF THE EUROPEAN ECONOMY Mr. Armando Branchini – ECCIA President November 9th,
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data Protection Officer’s Overview of the GDPR
Johannesburg, South Africa
Advanced Income Tax Law
Cybersecurity in the ECOWAS region
Public-private cooperation
EU policy on combating hate speech online
Threats and Challenges to Data Protection and Privacy :-
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
U.S. Department of Justice
Cybersecurity: the consumer perspective
Cybersecurity Threats and Opportunities in Latin America
Preventing Information Technology Crimes
Securing free and fair European elections
Refreshing New Zealand’s Cyber Security Strategy 2018
EU Data Protection Legislation
UNODC and CYBERCRIME October 2009.
Getting Ready For GDPR Simon Marks Director
Presentation transcript:

Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk: Website: Address: 4th Floor, Emmanuel Anquetil Building, Port Louis Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) p Tel: Helpdesk: Website: Address: 4th Floor, Emmanuel Anquetil Building, Port Louis 28th October 2013 An Open, Safe and Secure Cyberspace

Personal Data- A Commodity? Personal data has become a highly valuable asset. The market for analysis of large sets of data is growing fast per year worldwide The currency for this new digital economy is data and in many cases, Personal Data. Personal data has become a highly valuable asset. The market for analysis of large sets of data is growing fast per year worldwide The currency for this new digital economy is data and in many cases, Personal Data. 28th October 2013

Trust is waning:- It is only when consumers can 'trust' that their data is well protected that they will continue to entrust businesses and authorities with it by buying online and accepting new product developments and services Citizens are also increasingly aware of the risks linked to Cyber-Security It is only when consumers can 'trust' that their data is well protected that they will continue to entrust businesses and authorities with it by buying online and accepting new product developments and services Citizens are also increasingly aware of the risks linked to Cyber-Security 28th October 2013

Cybersecurity concerns:- According to a Eurobarometer survey carried out last year, the level of concern about cyber-security is increasing. 74% of respondents agreed that the risk of becoming a victim of cybercrime has gone up in the past year. According to a Eurobarometer survey carried out last year, the level of concern about cyber-security is increasing. 74% of respondents agreed that the risk of becoming a victim of cybercrime has gone up in the past year. 28th October 2013

Actions Required:- It is in the Government's and the business’ interest to reverse these figures. This lack of trust affects behaviour online A modern set of data protection rules and greater cyber-security resilience will contribute to more people using more online services which directly translates into growth for the companies. It is in the Government's and the business’ interest to reverse these figures. This lack of trust affects behaviour online A modern set of data protection rules and greater cyber-security resilience will contribute to more people using more online services which directly translates into growth for the companies. 28 October 2013

Various Actors Thus Data protection law and Cyber-Security measures are complementary. Data Protection Office, Cert-MU, Cyber Crime Unit of the Police and other bodies have to cooperate and work together. Thus Data protection law and Cyber-Security measures are complementary. Data Protection Office, Cert-MU, Cyber Crime Unit of the Police and other bodies have to cooperate and work together. 28 October 2013

Various Actors Cyber-security and data protection concerns are borderless. The engagement with key international partners and organisations should be enhanced. A Strategy should set out a series of measures that should be taken to address the threat. Cyber-security and data protection concerns are borderless. The engagement with key international partners and organisations should be enhanced. A Strategy should set out a series of measures that should be taken to address the threat. 28 October 2013

The imperative of data protection When personal data is at stake, any information sharing should be compliant with data protection law and take full account of fundamental rights. When fighting cyber-crime, law enforcement authorities should apply investigative measures as sophisticated as the software they are trying to fight. When personal data is at stake, any information sharing should be compliant with data protection law and take full account of fundamental rights. When fighting cyber-crime, law enforcement authorities should apply investigative measures as sophisticated as the software they are trying to fight. 28 October 2013

The imperative of data protection -ctd Bypassing the data protection rules would mean violating citizens' rights and exposing companies to significant legal risks There is a need for Mutual Legal Assistance Agreements to be negotiated between law enforcement authorities of different jurisdictions to combat cybercrime and data protection breaches. Bypassing the data protection rules would mean violating citizens' rights and exposing companies to significant legal risks There is a need for Mutual Legal Assistance Agreements to be negotiated between law enforcement authorities of different jurisdictions to combat cybercrime and data protection breaches. 28 October 2013

Legislations: The Data Protection Act The Data Protection Act 2004 was proclaimed in its entirety on the 16th of February In addition, The Data Protection Act 2004 gives individuals rights to protect them against data protection breaches, and creates obligations for those keeping personal information. Under the Act, individuals have the right to be informed of any data processing activity which relate to them as data subjects. It is also the responsibility of Data controllers to secure the data in their custody. The Data Protection Act 2004 was proclaimed in its entirety on the 16th of February In addition, The Data Protection Act 2004 gives individuals rights to protect them against data protection breaches, and creates obligations for those keeping personal information. Under the Act, individuals have the right to be informed of any data processing activity which relate to them as data subjects. It is also the responsibility of Data controllers to secure the data in their custody. 28th October 2013

Data Protection Act complements the objectives of the Electronic Transactions Act Data Protection Act complements the objectives of the Electronic Transactions Act It : Protects the individual’s right to privacy thus giving them greater confidence in the use of e-commerce and e- government. Provides enhanced protection for the physical and electronic security of personal information. Ensures personal information is used correctly, that the information is accurate and limits access to the information to only those with a legitimate right to the information. Ensures successful facilitation of trading relations with international partners that have similar legislation. It : Protects the individual’s right to privacy thus giving them greater confidence in the use of e-commerce and e- government. Provides enhanced protection for the physical and electronic security of personal information. Ensures personal information is used correctly, that the information is accurate and limits access to the information to only those with a legitimate right to the information. Ensures successful facilitation of trading relations with international partners that have similar legislation. 28th October 2013

Fight against cybercrime Fight against cybercrime The fight against cyber-crime often involves the collection of information about the electronic behaviour of individuals. A law enforcement authority may require information, sometimes personal data, held by a company. The law enforcement body may be in one country and the company in another. How should such requests be tackled? Two imperatives – data protection and law enforcement – have to be weighed against each other. Sensible solutions that reconcile the two need to be found. The fight against cyber-crime often involves the collection of information about the electronic behaviour of individuals. A law enforcement authority may require information, sometimes personal data, held by a company. The law enforcement body may be in one country and the company in another. How should such requests be tackled? Two imperatives – data protection and law enforcement – have to be weighed against each other. Sensible solutions that reconcile the two need to be found. 28th October 2013

DPA exceptions DPA exceptions We have to recognise that while data protection is a fundamental right, it is not absolute. It should shape but not prevent the fight against cyber-crime. The DPA have enacted provisions as exceptions in order to fight crimes - be it cyber crime too. We have to recognise that while data protection is a fundamental right, it is not absolute. It should shape but not prevent the fight against cyber-crime. The DPA have enacted provisions as exceptions in order to fight crimes - be it cyber crime too. 28th October 2013

The right tools for cyber security There is a need to act both on the preventive as well as on the defensive aspects. The right tools have to be available to authorities concerned The manpower have also to be trained to fight cybercrime. There is a need to act both on the preventive as well as on the defensive aspects. The right tools have to be available to authorities concerned The manpower have also to be trained to fight cybercrime. 28th October 2013

Conclusion We have to build synergies among different bodies and partners And Act together to deliver a safe, free Internet for everyone We have to build synergies among different bodies and partners And Act together to deliver a safe, free Internet for everyone 28th October 2013