Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace

45 views

Published on

See https://i4ada.org for additional information and videorecordings of the presentations held at the Hague Summit for Accountability in the Digital Age

  • Be the first to comment

  • Be the first to like this

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace

  1. 1. ACCOUNTABILITY , CYBER SECURITY AND CYBER PEACE
  2. 2. A PRESENTATION BY DR. PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA CHAIRMAN, INTERNATIONAL COMMISSION ON CYBER SECURITY LAW PRESIDENT, CYBERLAWS.NET CHIEF EXECUTIVE, ARTIFICIAL INTELLIGENCE LAW HUB
  3. 3. CYBER ATTACK IN UTAH © of images belongs to the respective copyright holders
  4. 4. WHATSAPP SNOOPING © of images belongs to the respective copyright holders
  5. 5. PAYMENT CARD BREACH © of images belongs to the respective copyright holders
  6. 6. CYBER SECURITY AND ACCOUNTABILITY • Breaches of cyber security lead to big questions on accountability. • How can state and non-state actors be made accountable for cyber security breaches? © of images belongs to the respective copyright holders
  7. 7. CYBER SECURITY AND ACCOUNTABILITY • This accountability issue is directly linked to the protection and preservation of cyber security and peace in cyberspace. © of images belongs to the respective copyright holders
  8. 8. CYBER SECURITY AND ACCOUNTABILITY • Attribution is one of the basic problems, given the fact that most of the cyber security breachers are using the darknet. • Increasing trends amongst countries to come up with distinct national legislations on cyber security. © of images belongs to the respective copyright holders
  9. 9. CYBER SECURITY AND ACCOUNTABILITY • These legislations tend to try to address international issues using national approaches. • It might be a good initial step but may not be a long term sustainable step. © of images belongs to the respective copyright holders
  10. 10. CYBER SECURITY AND ACCOUNTABILITY • The absence of a global Cyberlaw effectively means that norms pertaining to acceptance standards are still not developed. • Even the debate pertaining to norms of behavior in cyberspace have not been adequately concluded. © of images belongs to the respective copyright holders
  11. 11. CYBER SECURITY AND ACCOUNTABILITY • The recent two ongoing processes in the United Nations being the UNGGE and UN Open Ended Working Group could further contribute in this direction. These two new groups are continuing on their deliberations on how to evolve norms in cyberspace. © of images belongs to the respective copyright holders
  12. 12. CYBER SECURITY AND ACCOUNTABILITY • Cyber security and accountability are two intrinsically paradoxical terms. • Today various states and non- states actors want to do large number of covert and over activities for the purposes of fulfillment of their own objectives. © of images belongs to the respective copyright holders
  13. 13. CYBER SECURITY AND ACCOUNTABILITY • Number of countries are today increasingly having in place cyber armies not just to protect their sovereignty but also for the purposes of ensuring that they do other activities which could have an impact upon sovereignty of other countries. © of images belongs to the respective copyright holders
  14. 14. CYBER SECURITY AND ACCOUNTABILITY • The advent of darknet has further complicated the issue of accountability on cyber security. • Today cyber peace is a constantly evolving concept. © of images belongs to the respective copyright holders
  15. 15. CYBER SECURITY AND ACCOUNTABILITY • Large number of cyber attacks are happening targeted at breaching cyber security of various critical information infrastructure. © of images belongs to the respective copyright holders
  16. 16. NUCELAR POWER CYBER MALWARE ATTACK © of images belongs to the respective copyright holders
  17. 17. CYBER ATTACK IN SOUTH AFRICA © of images belongs to the respective copyright holders
  18. 18. CYBER SECURITY AND ACCOUNTABILITY • New legislative approaches required to be adopted in this regard. • Further, for ensuring cyber peace, it is important that appropriate legal protections need to be provided to the private sector. © of images belongs to the respective copyright holders
  19. 19. CHINESE NEW LAW ON CYBER SECURITY New Chinese law lays emphasis on cyber security aspects. China has adopted a distinctive approach of mingling cyber security within the broader ambit of national security.
  20. 20. CHINESE APPROACHES ON CYBER SECURITY LAW The way the provisions of the said law has been drafted are so wide to include within their ambit all kinds of cyber security breaches as any cyber security breach is going to influence national security, social stability as also prejudicial impact the preservation of public safety and societal tranquility. © of images belongs to the respective copyright holders
  21. 21. GLOBAL AND NATIONAL APPROACHES ON CYBER SECURITY LAW Russia recently passed a law which actually mandated service providers to ensure that all data pertaining to Russians must be physically located within the territorial boundaries of Russia. Consequently, we have begun to see a trend where various national governments are now increasingly looking in the direction of coming up with appropriate national approaches to deal with the international issue of cyber security.
  22. 22. GLOBAL AND NATIONAL APPROACHES ON CYBER SECURITY LAW © of images belongs to the respective copyright holders
  23. 23. RUSSIAN RUNET LAW © of images belongs to the respective copyright holders
  24. 24. THAILAND CYBER SECURITY LAW © of images belongs to the respective copyright holders
  25. 25. AUSTRALIA’S ANTI-ENCRYPTION LAW © of images belongs to the respective copyright holders
  26. 26. INTERNATIONAL CYBERSECURITY LAW - TAIWAN © of images belongs to the respective copyright holders
  27. 27. DEVELOPMENTS AT INTERNATIONAL LEVEL SINGAPORE CYBER SECURITY LAW EGYPT CYBER SECURITY LAW © of images belongs to the respective copyright holders
  28. 28. DEVELOPMENTS AT INTERNATIONAL LEVEL In addition, there are also various cyber security strategies that different countries have come up in place. © of images belongs to the respective copyright holders
  29. 29. CYBER SECURITY AND ACCOUNTABILITY • Cyber security safe harbor in Ohio has now led the example where companies are now exempt from potential exposure to legal liability in case if they do comply with the minimum requirements of cyber security. © of images belongs to the respective copyright holders
  30. 30. CYBER SECURITY AND ACCOUNTABILITY • The misuse of Artificial Intelligence on the darknet for breaching cyber security of networks has begun to start emerging as another big problem. • The principles of accountability must be established for the purposes of cyber security compliances.
  31. 31. CALIFORNIA LAW ON IOT © of images belongs to the respective copyright holders
  32. 32. CYBER SECURITY AND ACCOUNTABILITY • Companies must be mandated to follow minimum security levels of practices and procedures. • California has passed a law which comes into effect from 1st January, 2020 which mandates the installation of reasonable security features in all IoT devices from 1st January, 2020. © of images belongs to the respective copyright holders
  33. 33. CYBER SECURITY AND ACCOUNTABILITY • The work done by the International Commission on Cyber Security Law in terms of collating common legal principles to govern and regulating cyber security at a global level. © of images belongs to the respective copyright holders
  34. 34. CYBER SECURITY AND ACCOUNTABILITY • There is a need to come up with common minimum denominators for regulating cyber security so that there can be more accountability and hence contribute to cyber peace. The sacrosanct nature of cyberspace as a common heritage of human mankind needs to be reemphasized. There needs to be more work done. © of images belongs to the respective copyright holders
  35. 35. INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBER SECURITY,NEW DELHI, INDIA (20TH TO 22ND NOVEMBER, 2019)  The International Conference on Cyberlaw, Cybercrime & Cyber Security (www.cyberlawcybercrime.com) has provided the platform to discuss about emerging Cyberlaw, Cybercrime and Cybersecurity trends. © of images belongs to the respective copyright holders
  36. 36. A PRESENTATION BY DR. PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA CHAIRMAN, INTERNATIONAL COMMISSION ON CYBER SECURITY LAW PRESIDENT, CYBERLAWS.NET CHIEF EXECUTIVE, ARTIFICIAL INTELLIGENCE LAW HUB pavan@pavanduggal.com pavanduggal@yahoo.com

×