Research on Legislation in Data Privacy, Security and the Prevention of Cybercrime

Total Page:16

File Type:pdf, Size:1020Kb

Research on Legislation in Data Privacy, Security and the Prevention of Cybercrime International Telecommunication Union Research on legislation in data privacy, security and the prevention of cybercrime Contact information: Alexander Ntoko Chief, E-Strategies Unit Telecommunication Development Bureau International Telecommunication Union Place des Nations 1211 Geneva 20 Switzerland E-mail: [email protected] Website: www.itu.int/ITU-D/e-strategy Research on legislation in data privacy, security and the prevention of cybercrime on legislation in data privacy, Research Printed in Switzerland Geneva, 2006 International Telecommunication Union Research on legislation in data privacy, security and the prevention of cybercrime © ITU, 2006 International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland First printing 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. The views expressed in this paper are those of the author and do not necessarily represent the opinions of ITU or its membership. The terms and definitions used are the author’s own and can on no account be regarded as replacing the official ITU definitions. Denominations and classifications employed in this publication do not imply any opinion on the part of the International Telecommunication Union concerning the legal or other status of any territory or any endorsement or acceptance of any boundary. Disclaimer This report is the result of research and analysis carried out by Ms Michela Menting Yoell as part of her internship at the ITU/BDT E-strategies Unit for a Master of Laws (LL/M) law degree, with the objective of providing some guidelines to developing countries on legislation in data privacy, security and prevention of cybercrime. The opinions expressed are those of the authors and do not engage ITU in any way. FOREWORD Within the framework of the WTDC-02 Istanbul Action Plan Programme 3 (E-Strategies and E-Services/Applications), ITU is mandated to assist Member States in developing laws and model legislation for e-services, prevention of cybercrime, security and data privacy. Within this context, Ms Michela Menting Yoell undertook research as an intern in the ITU/BDT E-Strategies Unit as part of her postgraduate work for a Master in Law (LLM) in information technology, media and e-commerce at the University of Essex in the United Kingdom. The result of this internship is this report on Research on legislation in data privacy, security and the prevention of cybercrime, which is aimed at assisting developing countries through the case studies included herein, analysis and research to provide guidelines on legislative issues that are part of the mandate of Programme 3. Foreword iii ABSTRACT The information age has made the public and private sectors of modern society increasingly dependent on technology, in which telecommunications play a vital role. Over the past thirty years, developed nations’ transit from the industrial era to the new information age has enabled them to develop the nascent technology and produce ever greater quality in standards and value. The past decades have also delivered many opportunities in which the flaws and faults of the system have been exploited and mended, by hackers and legitimate users alike. The new society has engendered new types of crimes, such as phishing and botnets, and facilitated the commission of old crimes, for example the violation of intellectual property rights, with new technology facilitating breaches of copyright in music, films and software. As society grows ever more reliant on these technologies, so does the concern for security, especially in cyberspace. The emancipation of the internet has leaped ahead of the judicial system, but the authorities have taken heed and the wheels of the legal machine have started turning. The difficulty, however, has been that the internet-based society has no physical boundaries and thus much traffic escapes national supremacy. Therefore, looking to an international framework would immensely facilitate regulation in this area. The European Union has enabled harmonized implementation of regulation on electronic commerce through directives in almost all European countries, with non- member countries aligning themselves with the EU movement. As founding father to the internet, the US has both important knowledge and experience in the legal field of cybersecurity, with significant influence in the area. Developing countries are jumping onto the bandwagon. However, many of those countries are coming straight from an agricultural society and, with the technological know-how of developed nations, are starting to create the infrastructure needed to support a technology-based society. The problem is nonetheless that many have neither the expertise nor the experience to deal with the legal and policy issues necessary. In order to promote the develop- ment and use of technologies and the internet, security must be assured, especially for e-commerce businesses. The International iv Abstract Telecommunication Union’s Development Bureau mandate is to assist such developing countries to acquire the knowledge and develop the founding blocks for an information society. One of these founding blocks is cybersecurity. In order to compile general but adequate guidelines on such a vast area, research on existing legislation in developing countries and multinational frameworks is examined on both a content level, encompassing intellectual property, digital rights management and anti-circumvention, and a network security level, incorporating areas such as technical standards and integrity of data, with a close look at the security of information infrastructure (privacy and data protection) and computer-related crimes (spamming and identity theft), among other topics. Abstract v ACKNOWLEDGEMENTS I would like to thank Professor Rohan Kariyawasam, Law Lecturer at the University of Essex in the United Kingdom, and Alexander Ntoko, Chief of ITU/BDT E-Strategies Unit, for supervising my work, Bogdan Manolea, legal advisor at INTERNEWS in the RITI dot-Gov project at Romanian Information Technology Initia- tive (www.legi-internet.ro/en/index.htm) for his contribution on Romania, and Peter Menting, Lawyer for the International Counsel Bureau in Kuwait, for editing of the report. Michela Menting Yoell vi Acknowledgements TABLE OF CONTENTS Page Introduction........................................................................ 1 Intellectual property rights ............................................... 9 Copyright and digital rights management............................ 9 United States................................................................. 11 European Union............................................................ 15 Canada ......................................................................... 18 Trademark and domain name............................................... 20 International.................................................................. 21 United States................................................................. 24 European Union............................................................ 27 United Kingdom ........................................................... 28 Europe........................................................................... 29 Hypertext linkages, framing and metatagging ..................... 29 Hypertext linking.................................................................. 29 United States................................................................. 30 Europe........................................................................... 30 Japan… ......................................................................... 31 Germany ....................................................................... 32 Framing................................................................................ 33 United States................................................................. 33 Metatagging ......................................................................... 34 Network Security................................................................ 37 Authentication...................................................................... 37 International.................................................................. 40 European Union............................................................ 44 Table of contents vii Page United Kingdom ........................................................... 47 Europe........................................................................... 51 United States................................................................. 53 Argentina ...................................................................... 54 Access Control and Communication Security ..................... 56 Council of Europe......................................................... 57 European Union............................................................ 60 United Kingdom ........................................................... 61 United States................................................................. 65 Australia........................................................................ 66 Security of information infrastructure ............................ 69 Integrity of data: data security, privacy and confidentiality ............................................................. 69 Council of Europe......................................................... 70 United Nations.............................................................
Recommended publications
  • Conference Overview and Papers Program
    https://doi.org/10.2352/ISSN.2470-1173.2019.5.MWSF-A05 PROCEEDINGS © 2019, Society for Imaging Science and Technology January 201 – 1 +BOuary 201 • Burlingame, CA, USA Media Watermarking, Security, and Forensics 201 Editors: Adnan M. Alattar, Digimarc Corp. (United States), Nasir D. Memon, Tandon School of Engineering, New York Univ. (United States), Gaurav Sharma, University of Rochester (United States) These papers represent the program of Electronic Imaging 201, held January – 1 +BOuary 201, at the Hyatt Regency San Francisco Airport in Burlingame, CA. Copyright 201 Society for Imaging Science and Technology 7003 Kilworth Lane • Springfield, VA 22151 USA 703/642-9090 703/642-9094 fax [email protected] www.imaging.org All rights reserved. These proceedings, or parts thereof, may not be reproduced in any form without the written permission of the Society. ISSN 2470-1173 https://doi.org/10.2352/ISSN.2470-1173.201..MWSF-" Manuscripts are reproduced from PDFs as submitted and approved by authors no editorial changes have been made. electronicimaging.org MWSF Media Watermarking, Security, and Forensics 2016 Document Processing and Media Conference Chairs: Adnan M. Alattar, Digimarc Media Watermarking, Security, Corporation (United States), Nasir D. Memon, Security Tandon School of Engineering, New York Uni- and Forensics 2019 versity (United States), and Gaurav Sharma, University of Rochester (United States) Conference overview The ease of capturing, manipulating, distributing, and consuming digital me- Program Committee: Mauro Barni, University dia (e.g., images, audio, video, graphics, and text) has enabled new applications and degli Studi di Siena (Italy); Sebastiane Battiato, brought a number of important security challenges to the forefront.
    [Show full text]
  • APPENDICES APPENDIX A: Additional Reserch
    APPENDICES APPENDIX A: Additional Reserch Objective Wellbeing The precise definition of Objective wellbeing and its contributing factors can vary depending on the source, but can be summed up into external and circumstantial factors described briefly (Voukelatou, 2020): Health The condition of one’s health, which is connected to diet and physical activity but also dependent on genetics, disabilities and illness. Job Opportunities Low unemployment rates of the residing country, a healthy working culture and economic opportunity is an important factor also connected to SWB dimensions of realisation of potential and life satisfaction. Economic situation The economic situation has a nonlinear correlation to happiness and has its biggest impact in the lower numbers, until a threshold is reached where one can afford to pay all the bills, live at a reasonable living standard and can afford medical emergencies without the fear of not being able to manage unexpected expenses. Environment Nature, clean water and fresh air are essential for human’s wellbeing. This dimension is under threat by climate change and addressed by the UN environmental sustainability goals (Arora, 2019) Safety Safety can with factors like crime rates and potential of suffering from physical or psychological trauma, varying by country. Stability Stability in terms of political stability and governmental management of public funds is an essential factor in wellbeing also connected to trust and social cohesion on a local and national level. (Factors like corruption level, Public funds, political structure, Leadership stability) Factors of objective wellbeing are also intertwined and connected to subjective wellbeing and form the foundation for it. Fulfilment of important factors in objective wellbeing forms a basis for subjective wellbeing which is less dependent but still connected to external and contextual factors like OWB.
    [Show full text]
  • Untitled Bomb Shelter at the 2005 New Territories/National Live Art Review in Glasgow
    Smart clothes and wearable technology The Textile Institute and Woodhead Publishing The Textile Institute is a unique organisation in textiles, clothing and footwear. Incorporated in England by a Royal Charter granted in 1925, the Institute has individual and corporate members in over 90 countries. The aim of the Institute is to facilitate learning, recognise achievement, reward excellence and disseminate information within the global textiles, clothing and footwear industries. Historically, The Textile Institute has published books of interest to its members and the textile industry. To maintain this policy, the Institute has entered into part- nership with Woodhead Publishing Limited to ensure that Institute members and the textile industry continue to have access to high calibre titles on textile science and technology. Most Woodhead titles on textiles are now published in collaboration with The Textile Institute. Through this arrangement, the Institute provides an Editorial Board which advises Woodhead on appropriate titles for future publication and suggests possible editors and authors for these books. Each book published under this arrangement carries the Institute’s logo. Woodhead books published in collaboration with The Textile Institute are offered to Textile Institute members at a substantial discount. These books, together with those published by The Textile Institute that are still in print, are offered on the Woodhead web site at: www.woodheadpublishing.com. Textile Institute books still in print are also available directly from the Institute’s website at: www. textileinstitutebooks.com. A list of Woodhead books on textile science and technology, most of which have been published in collaboration with The Textile Institute, can be found at the end of the contents pages.
    [Show full text]
  • Cloning and Training Collective Intelligence with Generative Adversarial Networks
    This is a self-archived version of an original article. This version may differ from the original in pagination and typographic details. Author(s): Terziyan, Vagan; Gavriushenko, Mariia; Girka, Anastasiia; Gontarenko, Andrii; Kaikova, Olena Title: Cloning and training collective intelligence with generative adversarial networks Year: 2021 Version: Published version Copyright: © 2021 The Authors. IET Collaborative Intelligent Manufacturing published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. Rights: CC BY 4.0 Rights url: https://creativecommons.org/licenses/by/4.0/ Please cite the original version: Terziyan, V., Gavriushenko, M., Girka, A., Gontarenko, A., & Kaikova, O. (2021). Cloning and training collective intelligence with generative adversarial networks. IET Collaborative Intelligent Manufacturing, 3(1), 64-74. https://doi.org/10.1049/cim2.12008 Received: 27 April 2020 Revised: 28 October 2020 Accepted: 11 November 2020 IET Collaborative Intelligent Manufacturing DOI: 10.1049/cim2.12008 ORIGINAL RESEARCH- PAPER- - Cloning and training collective intelligence with generative adversarial networks Vagan Terziyan | Mariia Gavriushenko | Anastasiia Girka | Andrii Gontarenko | Olena Kaikova Faculty of Information technology, University of Abstract Jyväskylä, Jyväskylä, Finland Industry 4.0 and highly automated critical infrastructure can be seen as cyber‐physical‐ social systems controlled by the Collective Intelligence. Such systems are essential for the Correspondence Vagan Terziyan, Faculty of Information technology, functioning of the society and economy. On one hand, they have flexible infrastructure of University of Jyväskylä, Jyväskylä, Finland. heterogeneous systems and assets. On the other hand, they are social systems, which Email: [email protected] include collaborating humans and artificial decision makers. Such (human plus machine) resources must be pre‐trained to perform their mission with high efficiency.
    [Show full text]
  • Final Program
    FINAL PROGRAM 13 – 17 January 2019 • Burlingame, CA, USA • SHORT COURSES • EXHIBITS • DEMONSTRATION SESSION • PLENARY TALKS • • INTERACTIVE PAPER SESSION • SPECIAL EVENTS • TECHNICAL SESSIONS • EI2019 Conference Locations*/Acronyms/Names LOCATION* ACRONYM CONFERENCE NAME Regency C 3DMP 3D Measurement and Data Processing GP FG AVM Automonous Vehicles and Machines Cypress B COLOR Color Imaging XXIV: Displaying, Processing, Hardcopy, and Applications Harbour AB COIMG Computational Imaging XVII GP BC ERVR The Engineering Reality of Virtual Reality GP A HVEI Human Vision and Electronic Imaging Regency C IPAS Image Processing: Algorithms and Systems XVII GP E IQSP Image Quality and System Performance XVI Regency C IMSE Image Sensors and Imaging Systems Harbour AB IMAWM Imaging and Multimedia Analytics in a Web and Mobile World Regency B IRIACV Intelligent Robotics and Industrial Applications using Computer Vision Cypress A MAAP Material Appearance Cypress C MWSF Media Watermarking, Security, and Forensics Regency AB PMII Photography, Mobile, and Immersive Imaging GP BC SD&A Steroscopic Displays and Applications XXX Harbour B VDA Visualization andS Data Analysis * GP = Grand Penninsula Please see program for location of joint sessions. Hyatt San Francisco Airport Floor Plans Lobby Level Atrium Level E 3 SIXTY G C RESTAURANT V THE GROVE D D C IV F GRAND PENINSULA B B BALLROOM B 3 SIXTY SANDPEBBLE C BAR ROOM BAYSIDE S HARBOUR REGENCY ROOM REGENCY B ROOM FOYER BALLROOM RESTROOMS BOARD ROOMS B A E A A MARKET III RESTROOMS RESTROOMS A A SKY LOUNGE II RESTROOMS GRAND PENINSULA FOYER I CONFERENCE OFFICE FRONT DESK C B A A CYPRESS ROOM 13-17 January 2019 Hyatt Regency San Francisco Airport 1333 Bayshore Highway Burlingame, California USA 2019 Symposium Co-Chair Welcome Andrew Woods Curtin University (Australia) On behalf of IS&T (the Society for Imaging Science and Technology) and the Electronic Imaging (EI) community, we would like to welcome you to the 31st annual International Symposium on Electronic Imaging.
    [Show full text]
  • Responsible VR. Protect Consumers in Virtual Reality
    Responsible VR. Protect consumers in virtual reality Responsible VR. Protect consumers in virtual reality 2 Authors Dhoya Snijders, Sophie Horsman, Linda Kool, Rinie van Est Cover photograph Hollandse Hoogte Preferred citation: Snijders, D., S. Horsman, L. Kool, R. van Est (2020). Responsible VR. Protect consumers in virtual reality. The Hague: Rathenau Instituut Responsible VR. Protect consumers in virtual reality 3 Foreword I recently watched an episode of the Netflix series Black Mirror, in which virtual reality (VR) plays a pivotal role. Two friends are playing a VR fighting game. Danny chooses a male character and Karl steps into the shoes of the seductive Roxanne. Danny and Karl are so absorbed in the game that they lose themselves in their virtual characters. Their fighting soon turns into an intimate entanglement. The question is soon posed whether a virtual sexual experience counts as adultery. Black Mirror asks us whether a VR experience that feels ‘real’ also has ‘real’ consequences. This report shows that this question is not only posed in science fiction. Scientists, technology journalists and the VR sector itself are concerned about the way consumers are using VR. They are worried about social relationships, but also about the physical, mental and legal impact of VR. They wonder whether VR is so invasive that it should be regulated as a medical technology. The literature on this subject also alludes to the possible abuse of market power, given all the data collected about consumers in this gaming environment. Facebook, Google, Microsoft and other tech giants have invested billions in developing VR hardware and platforms.
    [Show full text]
  • STATE of the DIGITAL NATION: the Digital Rights Report 2020
    STATE OF THE DIGITAL NATION: THE DIGITAL RIGHTS REPORT 2020 FOUNDATION FOR MEDIA ALTERNATIVES TABLE OF CONTENTS 1 | ABOUT THIS REPORT 3 | OVERVIEW OF 2020: THE PHILIPPINES’ DIGITAL ENVIRONMENT 11 | KEY THEMATIC AREAS 11 | INTERNET ACCESS 19 | GENDER AND INFORMATION AND COMMUNICATIONS TECHNOLOGIES (ICTS) 31 | PRIVACY AND DATA PROTECTION 76 | FREEDOM OF EXPRESSION 91 | WHAT'S NEXT? 93 | ABOUT THE FOUNDATION FOR MEDIA ALTERNATIVES 95 | ABOUT THE INITIATIVE FOR MEDIA FREEDOM 97 | BIBLIOGRAPHY ABOUT THIS REPORT THIS REPORT IS A DOCUMENTATION OF WHAT TRANSPIRED IN 2020, SPECIFICALLY HOW HUMAN RIGHTS WERE IMPACTED BY TECHNOLOGY AND DIGITAL INNOVATIONS IN THE PHILIPPINES. THE YEAR 2020 WAS DEFINITELY UNIQUE GIVEN THE COVID-19 PANDEMIC, WHICH BROUGHT ABOUT TREMENDOUS CHANGE THROUGHOUT THE GLOBE. EFFECTS FROM THE PANDEMIC AS WELL AS OTHER EVENTS, BE IT A NATURAL DISASTER LIKE THE TAAL ERUPTION TO THE DESTRUCTIVE TYPHOON ULYSSES OR MAN-MADE CRISIS SUCH AS THE ABS-CBN SHUTDOWN AND THE INFODEMIC, REALLY MADE THE YEAR THAT WAS A PARTICULARLY CHALLENGING YEAR FOR MANY. AND THIS IS WHY IT IS CRUCIAL THAT FILIPINOS, WHO HAVE COME TO RELY ON THE INTERNET AND TECHNOLOGY FOR WORK, SCHOOL, CONNECTING WITH LOVED ONES, GETTING LIFE-SAVING INFORMATION THIS PANDEMIC, WILL NEED TO BE AWARE OF THEIR RIGHTS AS DIGITAL CITIZENS. WHILE THIS REPORT DOES NOT AIM TO BE THE END-ALL AND BE-ALL OF DIGITAL RIGHTS, WE HOPE TO MAKE THIS A WAY TO RAISE AWARENESS OF THE PHILIPPINES’ DIGITAL ENVIRONMENT AND THE ISSUES AND INNOVATIONS THAT IMPACT US NOT ONLY ONLINE, BUT ALSO OFFLINE. IT MAY SEEM SIMPLISTIC TO SAY THAT “DIGITAL RIGHTS ARE HUMAN RIGHTS” BUT THIS IS THE MESSAGE WE WANT MANY FILIPINOS TO UNDERSTAND.
    [Show full text]
  • View Book [Pdf]
    ENVISIONING ROBOTS IN SOCIETY – POWER, POLITICS, AND PUBLIC SPACE Frontiers in Artificial Intelligence and Applications The book series Frontiers in Artificial Intelligence and Applications (FAIA) covers all aspects of theoretical and applied Artificial Intelligence research in the form of monographs, selected doctoral dissertations, handbooks and proceedings volumes. The FAIA series contains several sub-series, including ‘Information Modelling and Knowledge Bases’ and ‘Knowledge-Based Intelligent Engineering Systems’. It also includes the biennial European Conference on Artificial Intelligence (ECAI) proceedings volumes, and other EurAI (European Association for Artificial Intelligence, formerly ECCAI) sponsored publications. The series has become a highly visible platform for the publication and dissemination of original research in this field. Volumes are selected for inclusion by an international editorial board of well-known scholars in the field of AI. All contributions to the volumes in the series have been peer reviewed. The FAIA series is indexed in ACM Digital Library; DBLP; EI Compendex; Google Scholar; Scopus; Web of Science: Conference Proceedings Citation Index – Science (CPCI-S) and Book Citation Index – Science (BKCI-S); Zentralblatt MATH. Series Editors: J. Breuker, N. Guarino, J.N. Kok, J. Liu, R. López de Mántaras, R. Mizoguchi, M. Musen, S.K. Pal and N. Zhong Volume 311 Recently published in this series Vol. 310. N. Petkov, N. Strisciuglio and C. Travieso-González (Eds.), Applications of Intelligent Systems – Proceedings of the 1st International APPIS Conference 2018 Vol. 309. A.J. Tallón-Ballesteros and K. Li (Eds.), Fuzzy Systems and Data Mining IV – Proceedings of FSDM 2018 Vol. 308. Z. Falomir, K. Gibert and E. Plaza (Eds.), Artificial Intelligence Research and Development – Current Challenges, New Trends and Applications Vol.
    [Show full text]
  • Converging Technologies for Improving Human Performance NANOTECHNOLOGY, BIOTECHNOLOGY, INFORMATION TECHNOLOGY and COGNITIVE SCIENCE
    Converging Technologies for Improving Human Performance NANOTECHNOLOGY, BIOTECHNOLOGY, INFORMATION TECHNOLOGY AND COGNITIVE SCIENCE NSF/DOC-sponsored report Edited by Mihail C. Roco and William Sims Bainbridge, National Science Foundation June 2002 Arlington, Virginia Any opinions, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the United States Government. Copyrights reserved by individual authors or their assignees except as noted herein. Reproduced by permission. The U.S. Government retains a nonexclusive and nontransferable license to all exclusive rights provided by copyright. This work relates to NSF Grant CTS-0128860, awarded to the World Technology Evaluation Center (WTEC), Inc. iii CONVERGING TECHNOLOGIES FOR IMPROVING HUMAN PERFORMANCE: NANOTECHNOLOGY, BIOTECHNOLOGY, INFORMATION TECHNOLOGY AND COGNITIVE SCIENCE Table of Contents EXECUTIVE SUMMARY ....................................................................................ix OVERVIEW.............................................................................................................1 1. Background ..................................................................................................1 2. Timely and Broad Opportunity ....................................................................2 3. Vision for Enhancing Human Abilities and Societal Performance ..............4 4. Strategies for Transformation.......................................................................7 5.
    [Show full text]