SlideShare a Scribd company logo
Submit Search
Upload
Login
Signup
4. florence dupre new usagesprivacy legal framework fd
Report
GlobalForum
Follow
Nov. 13, 2012
•
0 likes
•
998 views
1
of
6
4. florence dupre new usagesprivacy legal framework fd
Nov. 13, 2012
•
0 likes
•
998 views
Download Now
Download to read offline
Report
GlobalForum
Follow
Recommended
Ecommerce Chap 10
Pimsat University
552 views
•
52 slides
MindingTheCloud_NPR_Sum2014-no cover
PJStarr
100 views
•
3 slides
Cyber law - Security aspects and Intellectual Property rights
premarhea
191 views
•
19 slides
Privacy and personal information
Uc Man
1.5K views
•
27 slides
Information Privacy
primeteacher32
1K views
•
12 slides
Ss
DukeLss
362 views
•
4 slides
More Related Content
What's hot
Overview of Ethical Issues in Digital Watermarking
Dr. Michael Agbaje
101 views
•
3 slides
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
1.1K views
•
55 slides
2 7-2013-big data and e-discovery
Exterro
514 views
•
25 slides
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Nicole Black
581 views
•
35 slides
Introducing the Information Technology Act [Scriboard]
Rodney D. Ryder
1.7K views
•
36 slides
Information Explosion - Erik Moller
HPDutchWorld
3.6K views
•
34 slides
What's hot
(20)
Overview of Ethical Issues in Digital Watermarking
Dr. Michael Agbaje
•
101 views
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
•
1.1K views
2 7-2013-big data and e-discovery
Exterro
•
514 views
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Nicole Black
•
581 views
Introducing the Information Technology Act [Scriboard]
Rodney D. Ryder
•
1.7K views
Information Explosion - Erik Moller
HPDutchWorld
•
3.6K views
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Jason Haislmaier
•
374 views
Stallings ch18 privacy
salehnia
•
1.3K views
Federal Data Protection Act (FDPA)
AMIPCI
•
481 views
Introduction to Cyber Crimes
atuljaybhaye
•
6.1K views
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
•
2K views
Conference Cyber law Bali
MartenLinkedin
•
318 views
Review questions
Anura Kumara
•
15K views
Compliance & Value of Digital Signatures
Strategic Business & IT Services
•
189 views
Enlightened Privacy – by Design for a Smarter Grid
bradley_g
•
455 views
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
TEYS Lawyers
•
572 views
Privacy presentation for regional directors july 2009
brentcarey
•
680 views
Privacy by design for startups: legal and technology
Ishay Tentser
•
275 views
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
ICT Watch
•
1.5K views
Privacy and E-Commerce
Aleksandr Yampolskiy
•
11.1K views
Viewers also liked
Web annika branstrom global forum nov2012long
GlobalForum
1.3K views
•
21 slides
3. w.cellary privacy stockholm_v5
GlobalForum
903 views
•
10 slides
Ppt shark global forum session 3 2012 v4
GlobalForum
930 views
•
21 slides
Steven adler ibm big data predictions
GlobalForum
1.1K views
•
19 slides
Latif ladid gen6 overview
GlobalForum
823 views
•
9 slides
Web samia mehlem open data and wb main presentation
GlobalForum
939 views
•
30 slides
Viewers also liked
(10)
Web annika branstrom global forum nov2012long
GlobalForum
•
1.3K views
3. w.cellary privacy stockholm_v5
GlobalForum
•
903 views
Ppt shark global forum session 3 2012 v4
GlobalForum
•
930 views
Steven adler ibm big data predictions
GlobalForum
•
1.1K views
Latif ladid gen6 overview
GlobalForum
•
823 views
Web samia mehlem open data and wb main presentation
GlobalForum
•
939 views
5. global forum sg grumbach
GlobalForum
•
861 views
2 ppt final dan shoemaker dd1 stockholm presentation
GlobalForum
•
990 views
20121112 global forum_ntt_niwano_fin
GlobalForum
•
986 views
Global forum 2012 pascal poitevin v2
GlobalForum
•
914 views
Similar to 4. florence dupre new usagesprivacy legal framework fd
Presentation on Information Privacy
Perry Slack
20.5K views
•
41 slides
idigf - hukum - ui - edmon makarim
IGF Indonesia
1.3K views
•
19 slides
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
1.4K views
•
15 slides
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Alan McSweeney
376 views
•
63 slides
UNIT V.pptx
RAMESHMRA21130030110
2 views
•
12 slides
Internet Security Threat Report (ISTR) Vol. 16
Symantec APJ
622 views
•
32 slides
Similar to 4. florence dupre new usagesprivacy legal framework fd
(20)
Presentation on Information Privacy
Perry Slack
•
20.5K views
idigf - hukum - ui - edmon makarim
IGF Indonesia
•
1.3K views
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
•
1.4K views
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Alan McSweeney
•
376 views
UNIT V.pptx
RAMESHMRA21130030110
•
2 views
Internet Security Threat Report (ISTR) Vol. 16
Symantec APJ
•
622 views
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Mydex CIC
•
4.9K views
Ley protección de datos personales
Juan Carlos Carrillo
•
571 views
The Data Protection Act
burto111
•
734 views
Privacy icms (handouts)
brentcarey
•
458 views
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
•
146 views
2011 hildebrandt institute cio forum data privacy and security presentation...
David Cunningham
•
545 views
Encryption in Digital Investigation.docx
PelorusTechnologies
•
8 views
Personal Data Protection Law
Hatice Zümbül, LL.M.
•
71 views
Securing Your Digital Files from Legal Threats
Abbie Hosta
•
132 views
Cyber crime
Ranjan Som
•
1.1K views
Ethics and Politics of Big Data
robkitchin
•
1.6K views
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
Stichting ePortfolio Support
•
266 views
Privacy and data protection primer - City of Portland
Hector Dominguez
•
148 views
Cyber law and password protection
Bavijesh Thaliyil
•
1.5K views
More from GlobalForum
7. brigitte d'heygere
GlobalForum
581 views
•
7 slides
Corporate urban f presentation europe
GlobalForum
928 views
•
5 slides
7 ppt thunus global forum
GlobalForum
941 views
•
6 slides
6 ppt hoddevik short final
GlobalForum
931 views
•
9 slides
5 ppt johannes wimmer global forum session_6_bbg
GlobalForum
1.7K views
•
6 slides
4 ppt myeongki baek
GlobalForum
1.3K views
•
7 slides
More from GlobalForum
(20)
7. brigitte d'heygere
GlobalForum
•
581 views
Corporate urban f presentation europe
GlobalForum
•
928 views
7 ppt thunus global forum
GlobalForum
•
941 views
6 ppt hoddevik short final
GlobalForum
•
931 views
5 ppt johannes wimmer global forum session_6_bbg
GlobalForum
•
1.7K views
4 ppt myeongki baek
GlobalForum
•
1.3K views
3 ppt eleanor stewart global forum stockholm es
GlobalForum
•
1.2K views
Wormeli
GlobalForum
•
774 views
Wormeli global forum 2012
GlobalForum
•
323 views
12 11-11 global forum sto thomas myrup kristensen facebook
GlobalForum
•
905 views
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
GlobalForum
•
548 views
Ppt samia mehlem global forum samia m session 3
GlobalForum
•
286 views
Annika branstrom short global forum nov.2012
GlobalForum
•
396 views
1 ppt h lindskog rev
GlobalForum
•
876 views
Global Forum 2012: Francisco Garcia Moran
GlobalForum
•
2.9K views
Global forum 2012: Gaetano Santucci
GlobalForum
•
399 views
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
GlobalForum
•
2K views
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
GlobalForum
•
438 views
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
GlobalForum
•
408 views
Global Forum 2012: Christine Leurquin, ESOA
GlobalForum
•
483 views
4. florence dupre new usagesprivacy legal framework fd
1.
The legal framework Florence
DUPRE Global Forum November 2012
2.
AGENDA •
Introduction • Limits of the legal framework • What’s new? • The way forward? Perspectives? Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 2
3.
LIMITS OF THE
CURRENT LEGAL FRAMEWORK Geographic issue Concept of Lack of sovereignty & interoperability territoriality Security/privacy: Fast evolving different interests technology different approach Data protection Data breach Lack of Data & identity theft Cyber crime Applicable law harmonization Cybersecurity & Jurisdiction? => compliance issue Liability ? Investigation Legal answser is & Evidence/ difficult prosecution Data protection The Budapest & privacy convention laws & Regulations on Cybercrime? Data retention laws Title / Name & Regulations © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 3
4.
WHAT’S NEW?
• Combination of technical & legal solutions • Privacy by Design design data processing devices so as to best comply with data protection requirements • Privacy Enhancing Technologies refers to “coherent systems of information and communication technologies that strengthen the protection of privacy in information systems by preventing the unnecessary or unlawful collection, use and disclosure of personal data, or by offering tools to enhance an individual’s control over his/her data”. • Identity federation • Electronic identity ==>e-ID • Data & Identity theft Crime in which someone illegaly/fraudulently obtains and uses another person’s personal data • Digital signature • Forensics & Digital evidence • Social media (Facebook, Twitter…) • Legal Ethics & Best practices • Trust & confidence • BYOD ==> security & privacy concerns • Mobility & Cloud computing • Cybersecurity/Cybercrime/Cyberwar Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 4
5.
THE WAY FORWARD?
/ PERSPECTIVES? • Need to adapt the existing legal framework to the technology and the threats • Update of the existing cybercrime convention: most of the players agree that what is required is to further detail the existing legislation by complementing it with additional rules imposing specific technical safeguards against new risks • Need for an harmonized and interoperable legal framework at EU & International level – Use the results of Working groups/initiatives ==> International Telecommunication Union (2007) ==> Other United Nations initiatives • Extend some existing obligations to other actors ==> security breach notification • Development of best practices • A specific International criminal court for cyberspace should be established • International treaty == > Cyber attacks of the most serious global concern should be included in a substantive international criminal law International legal cooperation & harmonization is key for an efficient & global legal answer Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 5
6.
Thank you for
your attention! The reproduction, distribution and utilization of this document as well as the communication of its contents to others without express authorization is prohibited. Offenders will be held liable for the payment of damages. All rights reserved in the event of the grant of a patent, utility model or design. Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 6