Internet Governance and Regulation Internet Safety : Concrete Ways Forward For Government-Industry Partnerships Baltic IT&T 2005 David Finn Senior Attorney.

Slides:



Advertisements
Similar presentations
What are key underlying principles and accepted strategic approaches for addressing monitoring discrimination? Partnership Participation Child rights approach.
Advertisements

A strategy for a Secure Information Society –
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
UN Comprehensive Study on Cybercrime
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Dealing with Counterfeit at Retail Dave Simpson, Director of Security Nike, Inc. Richard Nessary, Senior Intellectual Property Counsel, e-Bay Brian Brokate,
Challenges & opportunities in Europe Christopher Graham Chairman, EASA.
The Area of Liberty, Security and Justice. Objectives Free movement for EU citizens Security and safety in a Europe without borders Figth against international.
Module 7 Slide 1 NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 7 Enforcement.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
End of Waste – Experiences from the UK Roger Hoare, Environment Agency 3rd October 2013 Malta 2013 IMPEL Conference on Implementation and Enforcement of.
Priorities to Combat Counterfeiting and Piracy Koji Yonetani Director Intellectual Property Affairs Division Ministry of Foreign Affairs of Japan
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
Whistleblower Protection Institution Overview of Georgian Legislation and international experience Maia Dvalishvili Deputy Head, Civil Service Bureau of.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Data Protection and Cybercrime The dilemma of Internet Service Providers CEENET Workshop 22 September 2002 Joe McNamee Regulatory Affairs Manager, EuroISPA.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
FACEBOOK CASE: a French experience Amal TALEB UFC – QUE CHOISIR April 21st, 2015.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
7 March 2013 Counter-terrorism Committee Executive Directorate Facilitating the Provision of Technical Assistance to Member States.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
An invitation to fight bots: the ACDC community Wout de Natris De Natris Consult/reach out officer eco RIPE 67 Athens, Tuesday 15 October 2013.
The U.S. Approach to Consumer Protection in the Online World U.S. Presentation FTAA Joint Government Private Sector Committee on Electronic Commerce 13th.
Business Law for the Entrepreneur and Manager
Luxembourg 12 September Public consultation 12 September 2003 Horst Forster Director, INFSO/E European Commission Safer Internet plus
INHOPE Partnership Model
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
SPARKS Project Nick Lester Director of Transport, Environment & Planning London Councils.
TTIP: an opportunity for the Digital Economy. The TTIP represents an enormous opportunity to re-balance the Digital Economy landscape The regulatory component.
European Life Sciences Infrastructure for Biological Information ELIXIR
Course: European Criminal Law SS 2009 Hubert Hinterhofer.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Anti-counterfeiting Activities by the Korean Intellectual Property Office June 2006 KIPO The Korean Intellectual Property Office.
For Visa Internal Use Only Visa Europe This information is not intended, and should not be construed, as an offer to sell, or as a solicitation of an offer.
Conducting Cross-Border International Internal Investigations Association of Corporate Counsel International Legal Affairs Committee Jeffrey D. Clark Willkie.
Corporate crime prevention project and Best practices manual Dr. Wybe Th. Douma T.M.C. Asser Institute, The Hague.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
VICTIMS’ RIGHTS New EU Directive establishing minimum standards on the rights, support and protection of victims of crime 20 September 2012 CABVIS Conference.
European Commission 1 By Sue BIRD European Commission, DG Employment, Social Affairs and Equal Opportunities Brussels, 17 December 2008 CECOP – CICOPA.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
BC Public Libraries November, 2008 Privacy Principles.
The European Arrest Warrant Project of the European Criminal Bar Association The Role of the Defence The Hague, 16 th June 2006.
SNB - REACT Business Perspective IPR Protection April 1, 2009 Presentation Eli Mufisovski.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
The Internet of Things and Consumer Protection
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
1 The Public Interest Disclosure (Whistleblower Protection) Act.
31 October The African Policing Civilian Oversight Forum (APCOF) is a network of state and civil society African practitioners active in policing.
Investigating Shipping Pollution Violations Pacific Module 3: Domestic Enforcement.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Digital Single Market – the Key to Competitive Economy 32nd Session of the Baltic Assembly and 19th Baltic Council Saeima of the Republic of Latvia
Information Systems (Engineering) in Industry Legal Implications of System Provision Delivered by Dave Thomas, K235 e:
Judicial Protection for IPR in Denmark Erling Vestergaard Chefkonsulent/Chief Legal Adviser Politik & Jura/Policy and Legal Affairs Patent- og Varemærkestyrelsen/Danish.
London Action Plan Wout de Natris OPTA Strasbourg, 12 June 2007.
1 Belfast, Horst Forster European Commission Belfast,
Protecting Data, Sharing Information Graham Wakerley: Director
Surveillance around the world
Closing Remarks and Next Steps
A Better Internet for Kids through Industry collaboration Pat Manson –Inclusion, Skills & Youth Directorate General Communications Networks, Content.
The European Anti-Corruption Report
Overview of Project EU Fruit Network; EUFRUIT (Coordination & Support Action) 21 partners (DK, BE, FR, DE, NL, UK, ES, CH, IT, RO, HU, LT) 3 years at 1.84.
Data Protection in Law Enforcement Area Chapter 9a of the draft law
Introduction to Digital Forensics
Presentation transcript:

Internet Governance and Regulation Internet Safety : Concrete Ways Forward For Government-Industry Partnerships Baltic IT&T 2005 David Finn Senior Attorney and Director, Internet Safety -- Microsoft EMEA Riga, 6th April 2005

Introduction The Challenge of Ensuring Internet Safety Legal: borderless nature of the Internet Technological: fast changing environment (broadband, 3G…) Both Private and Public Sector Own a Part of the Solution 3 Examples of Public-Private Partnerships The Botnet Task Force SpotSpam Child Exploitation Tracking System (CETS)

1.1 The Botnet Threat The Botnet Phenomenon Networks of thousands of zombie computers Surreptitious bot (“robot”) placement = criminal opportunity Botnets are sold to others for malicious purposes DDoS attacks, spam relay, disclose PII, destroy data A Reply: the Botnet Task Force October 2004, Washington, USA Law Enforcement officials from 16 countries April 2005, Prague, the Czech Republic Already one significant prosecution

1.2 The Botnet Task Force Content Case studies and best practices Technical training and support provided by both Microsoft and international law enforcement experts Expected Outcome is to Establish a Protocol: for handling investigative leads for the exchange of information across national boundaries on a more regular basis.

2.1 Our Experience Fighting Spam Legal Actions Since 2003 by Microsoft EMEA 10 lawsuits - DE, FR, IT, UK, IL 10 referrals to public authorities DK, FR, IT, LT, TR 68 cease and desist letters DE, DK, ES, IT, IL, FR, HU, LT, SE, NL, TR Processes trap accounts in the US and Europe Partnerships with existing hotlines (FR, DE) Network of in-house investigators and lawyers, outside counsels, corporate affairs managers

2.2 Existing Spam Rulings in EU Civil Court € in Denmark against Debitel (SMS and spam) (March 05) Microsoft/AOL France v/ M. K. : € in France in damages and various legal costs. Key support of the French Data Protection Authority (May 04) Administrative Microsoft not involved Series of fines amounting to € in NL (Dec. 04 – OPTA) € fine in DK (Jan. 04 – Consumer Ombudsman) Criminal Sanctions Microsoft not involved € in FR against an individual (flooding) (May 02) 52 Nigerian arrested in the Netherlands (Jan. 04)

2.3 Variety of Legal Grounds ISPs Have Some Legal Grounds for Action EU wide, ISP does have some protection Civil: Breach of Contract, Trademark Criminal: Computer Misuse Some specific legislation helps Unfair competition (DE), Property rights (NL) EU Anti-Spam Legislation is User-Centric By far, privacy and consumer protection statutes provide the most serious penalties But little incentive for users to complain Not relevant for ISPs

2.4 A Need for Public-Private Partnership Industry Has Business Interest in Reducing the Nuisance Caused by Spam But industry is not ideally equipped by law Internet Users and Public Authorities are Properly Equipped by Law But individual users don’t have a strong incentive to complain and lack resources to act Spam is received without boundaries Managing complaints at national level is costly

2.5 A Concrete Project: SPOTSPAM SPOTSPAM Self ‐ Regulatory Plan on Tackling Spam Under the EU Safer Internet Action Plan Aims at international co-operation to provide for effective collection and use of evidence (i.e. reports from citizens) for action against spammers Beneficiaries Public authorities are best placed to take advantage of it Internet users and industry will benefit indirectly Challenges Requires trust and commitment from citizens Storage of reports from various countries is legally sensitive Crucial need for close involvement from public authorities

2.6 A Concrete Project: SPOTSPAM Participants Full partners : eco (DE), NASK (PL) Initial partners : UK Anti-Spam Working Group EuroISPA Supported by Microsoft EMEA Status Project evaluated positively on 20 January 2005 Currently in negotiation with the Commission Expected Outcome: Establish new ways to share complaints with public authorities Provide public authorities with relevant information

3.1 The Child Exploitation Tracking System (CETS) What it is Software developed by Microsoft based on requirements of Canadian law enforcement units fighting child exploitation Increase the effectiveness of investigators by giving them tools to store, search, analyze and share, through a network of securely connected police services Already in use by Law Enforcement all over Canada – and that’s just the start

3.2 The Child Exploitation Tracking System (CETS) Expected Outcome Establish new ways to share information within Law Enforcement, at national and international level Through teamwork involving all the experts: investigators, prosecutors, privacy authorities, industry Official Unveiling is Tomorrow in Ottawa

Questions? David Finn