15-01-20011 E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

AN OVERVIEW OF DATA PROTECTION LAW IN THE GCC NICK OCONNELL, Senior Associate – TMT JUNE 2013.
NAU HIPAA Awareness Training
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
The Data Protection (Jersey) Law 2005.
Getting data sharing right for every child
© 2005 Morrison & Foerster LLP All Rights Reserved Data Security and Incident Notification: The Impact of Foreign Law Presented April 26, 2006 to EDUCAUSE.
Rome I regulation Discussion topics
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
McCarthy Tétrault McCarthy Tétrault LLP An Act respecting the protection of personal information in the private sector (Quebec): « Particularities of the.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Managing Personal Information - Australian Companies Outsourcing to India and the Philippines Professor Margaret Jackson and Marita Shelly.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
INTERNET and CODE OF CONDUCT
Online Privacy Protection in China: Present and Future Yun ZHAO The University of Hong Kong.
Anomalous Aspects of Transfer of Personal Data from the E.U. to the U.S. Stephen R. Bell Willkie Farr & Gallagher ABA Section of International Law New.
Class 13 Internet Privacy Law European Privacy.
THE CHOICES WE MAKE THAT MATTER – International Data Privacy/Protection JILL L. UREY, ASSISTANT GENERAL COUNSEL MID-ATLANTIC CIO FORUM NOVEMBER 20, 2014.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
Standards and Guidelines for Web Page Publishing December 9, 2009.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Customer Service Enforcement After AB 2987 John Risk Communications Support Group, Inc. (c) 2006 John Risk Communications Support Group, Inc. (c) 2006.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
The Data Protection Act 1998 The Eight Principles.
Ide kerülhet az előadás címe CCTV operation at work Belgrade, 11 th April 2013.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Dimensions of E – Commerce Security
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
WHOIS data The EU legal principles ICANN - GNSO meeting 2 March 2004 George Papapavlou, European Commission ICANN - GNSO meeting 2 March 2004 George Papapavlou,
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Legal Issues Contracts & Electronic Discovery Source: CSA Security Guidance Report v.3 Presented by: Toby Tobkin – 1.
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
Getting data sharing right for every child Maureen H Falconer Senior Policy Officer Information Commissioner’s Office.
Data protection—training materials [Name and details of speaker]
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
Agencija za zaštitu ličnih/osobnih podataka u Bosni i Hercegovini Агенција за заштиту личних података у Босни и Херцеговини Personal Data Protection Agency.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
The protection of know-how in franchising networks
Obligations of Educational Agencies: Parents’ Bill of Rights
General Data Protection Regulation
Museums + Heritage webinar, 30 November 2017
Data Protection Legislation
The European Union General Data Protection Regulation (GDPR)
Bob Siegel President Privacy Ref, Inc.
Privacy & Access to Information
General Data Protection Regulation
Information Sensitivity
Data transfers to non-EU countries under the new GDPR
Tools & Approaches for Ongoing Privacy Compliance
General Data Protection Regulation “11 months in”
Presentation transcript:

E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company

2 THE MIDDLE EAST  Vast majority of ME countries do not have any specific privacy or e- commerce laws

3 UNITED ARAB EMIRATES  No specific privacy or e-commerce laws  No provisions in UAE Civil Code pertaining to privacy. There is no right for a private person to sue and demand compensation  Right to privacy protected under - Constitution - Penal Code

4 UAE CONSTITUTION  Article 31 - Freedom of communication by post, telegraph or other means of communication and the secrecy thereof shall be guaranteed in accordance with law. Al Tamimi & Company

5 UAE PENAL CODE  Article Shall be punishable by confinement for a period not exceeding one year and by a fine not exceeding ten thousand Dirhams in both cases or by one of these two penalties any individual who, through any means of publicity, publishes news, pictures or comments pertaining to the secrets of the people's private or familial lives even if such publications are real and true.  Article Shall be punishable by confinement for a minimum period of one year and by a fine of at least twenty thousand Dirhams or by one of these two penalties any individual who by reason of his profession, craft, situation or art is entrusted with a secret and who discloses it in cases other than those permitted by the law, who uses it for his own advantage or another person’s advantage, all this unless the individual to whom the secret pertains has consented that it be disclosed or used.

6 Article Shall be punishable by a fine of at least three thousand Dirhams any individual who opens a letter or telegram without the consent of the addressee, or he who eavesdrops a telephone conversation. Said offender shall be punished with confinement for a minimum period of three months or with a fine of at least five thousand Dirhams if he discloses the letter telegram or telephone conversation to any person other than the addressee without his consent, whenever such disclosure is susceptible of causing prejudice to third parties. UAE PENAL CODE (cont’d)

7 IMPACT OF THE LEGAL VOID  Under EU Data Protection Directive, no business in European Economic Area can transfer data to ME Business without breaching the Principles of the EU Data Protection Directive, unless there exists a trans- border data flow agreement  ISP’s in ME will be hampered in dealing with EU communications because of the EU Data Protection Directive  Business outside the ME maybe be more reluctant to do business in UAE which could damage the expansion of Dubai Internet City  Individuals in UAE are being denied the right to privacy

8 TEMPORARY LEGAL SOLUTIONS  Privacy policies for use on corporate Internet websites. Five elements - Notice - Choice - Security - Data Integrity - Access

9 TEMPORARY LEGAL SOLUTIONS (cont’d)  Privacy policies for use by corporate human resources departments. Principles: -Company must keep secure all personal data including names, addresses and other details of employees, customers, clients, prospects, suppliers and advisers. - Employees not to disclose personal data unless purpose of disclosure is legitimate and person to whom data is disclosed is legitimate recipient - Clear and detailed standards on use, storage and permitted access to messages  Contracts to safeguard privacy of data disclosed to third parties - Contractual undertakings to safeguard privacy may be added to any contract

10 TEMPORARY LEGAL SOLUTIONS (cont’d) Informed Consents - informing users of how their personal information might be used and obtaining explicit consent to such use in advance

11 CONCLUSION  Self-regulating legal solutions and technical solutions are certainly steps in the right directions  However, specific privacy laws are still needed in order to safeguard the privacy rights of individuals