SlideShare a Scribd company logo
PROCEDURAL POWERS UNDER THE
CYBERCRIME CONVENTION FROM
THE (EUROPEAN) HUMAN RIGHTS
PERSPECTIVE
Marko Jurić
University of Zagreb
marko.juric@pravo.hr
Convention on Cybercrime
Budapest, 2001
Signed by Moldova in 2001, entered into force
in 2009
Scope of Cybercrime Convention
Substantive criminal law (criminal offences
to be established under domestic law)
Procedural law (six procedural powers to
be established under domestic law)
Rules on international co-operation
Convention on Cybercrime: Section 2
Art. 16: Expedited
preservation of
stored computer
data
Art. 17: Expedited
preservation and
partial disclosure
of traffic data
Art. 18:
Production order
Art. 19: Search
and seizure of
stored computer
data
Art. 20: Real-time
collection of traffic
data
Art. 21:
Interception of
content data
PROCEDURAL POWERS NECESSARY TO
DETECT, INVESTIGATE AND PROSECUTE
CYBERCRIME
Art. 15:
Conditions
and
safeguards
NECESSARY TO
SAFEGUARD HUMAN
RIGHTS & FREEDOMS
Procedural powers restrict fundamental
human rights and freedoms
1. Right to respect for private and family life, home and
correspondence [ECHR Article 8]
2. Right to freedom of expression [ECHR Article 10]
3. Right to freedom of assembly / association [ECHR Article 11]
4. ...
Procedural powers defined in Section 2 of the
CC are subject to conditions and safeguards
A. Relevant international human rights treaties, Art. 15(1)
B. Conditions and safeguards specified in the Cybercrime
Convention, Art. 15(2)
International human rights treaties
■ International law
– European Convention on Human Rights (ECHR)
– International Covenant on Civil and Political Rights
(ICCPR)
■ European Union law
– Charter of Fundamental Rights of the EU
Requirements under the ECHR and ICCPR
Restriction is prescribed by law (in
accordance with the rule of law)
Restriction pursues legitimate aim
Restriction is necessary in a democratic
society
Restriction pursues legitimate aim(s)
Prevention of crime
Protection of national security / public
safety
Protection of economic well-being of the
country
Restriction must be prescribed by law
There is a legal basis for a restriction in national law
National legal rules are accessible
National legal rules are precise and foreseeable
There are adequate safeguards against arbitrary
application of national law
Restriction must be necessary in a democratic
society
There is a pressing social
need for a restriction
Restriction is proportionate
to the aims pursued
Requirements under the Cybercrime
Convention, Art. 15(2)
(1) application of the principle of proportionality
(2) judicial or other independent supervision
(3) grounds justifying application
(4) limitation of the scope and the duration of such power or
procedure
Surveillance of communications –
ECtHR’s case-law
1. Klass and others v Germany
2. Weber and Saravia v Germany
3. Liberty and others v UK
4. Association for European Integration and Human Rights and Ekimdzhiev v
Bulgaria
5. Iordachi and Others v Moldova
6. Kennedy v UK
7. Zakharov v Russia
8. ...
Minimum safeguards according to the
ECtHR
■ nature of offences which may give rise to surveillacne
■ definition of the categories of people liable to have their communication
intercepted
■ limit on the duration of surveillance
■ procedure to be followed for examining, using and storing the data obtained
■ precautions to be taken when communicating the data to other parties
■ circumstances in which recordings may or must be erased or destroyed
Offences which may give rise to
interception order
Cybercrime convention: interception is applicable „in relation to a
range of serious offences to be determined by domestic law”
National law: measure to be used in relation to serious, very
serious or exceptionally serious offences, as defined in Criminal
Code
ECtHR: “more than one half of the offences provided for in the
Criminal Code fall within [these categories]”
Persons who are liable to have their
communications intercepted
National law: suspect, defendant or other
person involved in a criminal offence
ECtHR: “who exactly falls within the category
of “other person involved in a criminal
offence”?
Persons who are liable to have their
communications intercepted
National law: suspect, defendant or person „who
may have information about an offence, or other
information relevant to the case”
ECtHR: there are no clarifications in national
legislation or case-law as to how these terms are
to be applied in practice
Duration of a measure
Not necessary to provide strict statutory limitation of overall
duration of a measure
But, national legislation should prescribe:
- initial duration of a measure
- conditions under which an order can be renewed
- Obligation to discontinue measure when it is no longer
necessary
Obligation to destroy data
- in a reasonable time after the investigation, if person concerned was not charged
- if person was charged, state has wider margin of appreciation
- but, data which are not relevant for the purpose for which they have been
collected should be deleted immediately
Authorisation of a measure
■ Competent authority
– Court
– non-judicial authority, if it is sufficiently independent
■ Scope of review
– Verify the existence of factual basis necessary to authorize the measure
– Verify that necessity / proportionality requirement is satisfied
■ Content of the authorisation order must identify
– Specific person, or
– Single set of premises
Direct access to communications
System which enables authorities to intercept
communications directly... without requiring them to show
an interception authorization to service provider, or anyone
else, is particularly prone to abuse...
Supervision
1. Supervisory body must be independent of authorities carrying out the measure
2. Must have sufficient powers and competences to exercise effective and
continuous control
Thank you!
marko.juric@pravo.hr

More Related Content

What's hot

Kelson pure theory
Kelson pure theoryKelson pure theory
Kelson pure theory
Rohitshrivastava59
 
Electronic contracts
Electronic contractsElectronic contracts
Electronic contracts
kailash choudhary
 
INTERPRETATION OF STATUTE
INTERPRETATION OF STATUTEINTERPRETATION OF STATUTE
INTERPRETATION OF STATUTE
cpjcollege
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
atuljaybhaye
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
Vijay Dalmia
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
Cyber law
Cyber lawCyber law
Rights of accused persons criminal law
Rights of accused persons criminal law Rights of accused persons criminal law
Rights of accused persons criminal law
gagan deep
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Penology
PenologyPenology
Penology
Avinash Rai
 
E contract
E  contractE  contract
E contract
Benita Ezeigbo
 
Criminal law.power point....
Criminal law.power point....Criminal law.power point....
Criminal law.power point....
VIT LAW SCHOOL,CHENNAI
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
OFFENCES AGAINST PROPERTY
OFFENCES AGAINST PROPERTYOFFENCES AGAINST PROPERTY
OFFENCES AGAINST PROPERTY
YogeshDesai32
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
Tushar Rajput
 
Administrative Contracts.pptx
Administrative Contracts.pptxAdministrative Contracts.pptx
Administrative Contracts.pptx
JohnAhmed10
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
gagan deep
 

What's hot (20)

Kelson pure theory
Kelson pure theoryKelson pure theory
Kelson pure theory
 
Electronic contracts
Electronic contractsElectronic contracts
Electronic contracts
 
INTERPRETATION OF STATUTE
INTERPRETATION OF STATUTEINTERPRETATION OF STATUTE
INTERPRETATION OF STATUTE
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
E contracts
E contractsE contracts
E contracts
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Rights of accused persons criminal law
Rights of accused persons criminal law Rights of accused persons criminal law
Rights of accused persons criminal law
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Penology
PenologyPenology
Penology
 
E contract
E  contractE  contract
E contract
 
Criminal law.power point....
Criminal law.power point....Criminal law.power point....
Criminal law.power point....
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
OFFENCES AGAINST PROPERTY
OFFENCES AGAINST PROPERTYOFFENCES AGAINST PROPERTY
OFFENCES AGAINST PROPERTY
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Administrative Contracts.pptx
Administrative Contracts.pptxAdministrative Contracts.pptx
Administrative Contracts.pptx
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 

Viewers also liked

Violenta sociala si familiala 2
Violenta sociala si familiala 2Violenta sociala si familiala 2
Violenta sociala si familiala 2
Biblioteci Bihorene
 
cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
moldovaictsummit2016
 
Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informatice
moldovaictsummit2016
 
Genericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovaGenericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldova
moldovaictsummit2016
 
Criminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiCriminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legii
S.E. CTS CERT-GOV-MD
 
Cross border terrorism
Cross border terrorismCross border terrorism
Cross border terrorismSurbhi Rathi
 
Introduction about international arbitration its benefits
Introduction about international arbitration its benefitsIntroduction about international arbitration its benefits
Introduction about international arbitration its benefits
Duguekirtley
 
ICSID
ICSIDICSID
About UNCITRAL
About UNCITRALAbout UNCITRAL
About UNCITRAL
Slidary
 
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
garypierson
 
Presentation On Int.Com.Arbitration
Presentation On Int.Com.ArbitrationPresentation On Int.Com.Arbitration
Presentation On Int.Com.Arbitration
girilaw
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Copyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in CyberspaceCopyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in Cyberspace
MacMillan, Sobanski and Todd, LLC.
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
Ristya Anditha
 

Viewers also liked (16)

Violenta sociala si familiala 2
Violenta sociala si familiala 2Violenta sociala si familiala 2
Violenta sociala si familiala 2
 
Retele sociale
Retele socialeRetele sociale
Retele sociale
 
cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
 
Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informatice
 
Genericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovaGenericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldova
 
Criminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiCriminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legii
 
Cross border terrorism
Cross border terrorismCross border terrorism
Cross border terrorism
 
Introduction about international arbitration its benefits
Introduction about international arbitration its benefitsIntroduction about international arbitration its benefits
Introduction about international arbitration its benefits
 
ICSID
ICSIDICSID
ICSID
 
About UNCITRAL
About UNCITRALAbout UNCITRAL
About UNCITRAL
 
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
 
Presentation On Int.Com.Arbitration
Presentation On Int.Com.ArbitrationPresentation On Int.Com.Arbitration
Presentation On Int.Com.Arbitration
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Copyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in CyberspaceCopyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in Cyberspace
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 

Similar to Cybercrime convention

Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
blogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
blogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
blogzilla
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
Graham Smith
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
Vishni Ganepola
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalGraham Smith
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
blogzilla
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
Klamberg
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
Klamberg
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
MohsinMughal28
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
blogzilla
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
GrittyCC
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
blogzilla
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov case
Sarkis Darbinyan
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
- Mark - Fullbright
 

Similar to Cybercrime convention (20)

Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov case
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 

More from moldovaictsummit2016

ghidul parintelui responsabil
ghidul parintelui responsabilghidul parintelui responsabil
ghidul parintelui responsabil
moldovaictsummit2016
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
moldovaictsummit2016
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
moldovaictsummit2016
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
moldovaictsummit2016
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare online
moldovaictsummit2016
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
moldovaictsummit2016
 
Xenia Siminciuc
Xenia Siminciuc Xenia Siminciuc
Xenia Siminciuc
moldovaictsummit2016
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativa
moldovaictsummit2016
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RM
moldovaictsummit2016
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniation
moldovaictsummit2016
 
Greating from ICANN
Greating from ICANNGreating from ICANN
Greating from ICANN
moldovaictsummit2016
 
EMC avalability
EMC avalability EMC avalability
EMC avalability
moldovaictsummit2016
 
Cisco safe
Cisco safeCisco safe
EMC
EMCEMC
Cisco byod
Cisco byodCisco byod
emc hyper converged
emc hyper convergedemc hyper converged
emc hyper converged
moldovaictsummit2016
 
cisco collaboration
cisco collaborationcisco collaboration
cisco collaboration
moldovaictsummit2016
 
Large company as another startup alexei gutaga
Large company as another startup alexei gutagaLarge company as another startup alexei gutaga
Large company as another startup alexei gutaga
moldovaictsummit2016
 
How to improve customer satisfaction while cutting on operational costs
How to improve customer satisfaction while cutting on operational costsHow to improve customer satisfaction while cutting on operational costs
How to improve customer satisfaction while cutting on operational costs
moldovaictsummit2016
 
Digitalization-Important trend for a qualitative Education
Digitalization-Important trend for a qualitative EducationDigitalization-Important trend for a qualitative Education
Digitalization-Important trend for a qualitative Education
moldovaictsummit2016
 

More from moldovaictsummit2016 (20)

ghidul parintelui responsabil
ghidul parintelui responsabilghidul parintelui responsabil
ghidul parintelui responsabil
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare online
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Xenia Siminciuc
Xenia Siminciuc Xenia Siminciuc
Xenia Siminciuc
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativa
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RM
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniation
 
Greating from ICANN
Greating from ICANNGreating from ICANN
Greating from ICANN
 
EMC avalability
EMC avalability EMC avalability
EMC avalability
 
Cisco safe
Cisco safeCisco safe
Cisco safe
 
EMC
EMCEMC
EMC
 
Cisco byod
Cisco byodCisco byod
Cisco byod
 
emc hyper converged
emc hyper convergedemc hyper converged
emc hyper converged
 
cisco collaboration
cisco collaborationcisco collaboration
cisco collaboration
 
Large company as another startup alexei gutaga
Large company as another startup alexei gutagaLarge company as another startup alexei gutaga
Large company as another startup alexei gutaga
 
How to improve customer satisfaction while cutting on operational costs
How to improve customer satisfaction while cutting on operational costsHow to improve customer satisfaction while cutting on operational costs
How to improve customer satisfaction while cutting on operational costs
 
Digitalization-Important trend for a qualitative Education
Digitalization-Important trend for a qualitative EducationDigitalization-Important trend for a qualitative Education
Digitalization-Important trend for a qualitative Education
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Cybercrime convention

  • 1. PROCEDURAL POWERS UNDER THE CYBERCRIME CONVENTION FROM THE (EUROPEAN) HUMAN RIGHTS PERSPECTIVE Marko Jurić University of Zagreb marko.juric@pravo.hr
  • 2. Convention on Cybercrime Budapest, 2001 Signed by Moldova in 2001, entered into force in 2009
  • 3. Scope of Cybercrime Convention Substantive criminal law (criminal offences to be established under domestic law) Procedural law (six procedural powers to be established under domestic law) Rules on international co-operation
  • 4. Convention on Cybercrime: Section 2 Art. 16: Expedited preservation of stored computer data Art. 17: Expedited preservation and partial disclosure of traffic data Art. 18: Production order Art. 19: Search and seizure of stored computer data Art. 20: Real-time collection of traffic data Art. 21: Interception of content data PROCEDURAL POWERS NECESSARY TO DETECT, INVESTIGATE AND PROSECUTE CYBERCRIME Art. 15: Conditions and safeguards NECESSARY TO SAFEGUARD HUMAN RIGHTS & FREEDOMS
  • 5. Procedural powers restrict fundamental human rights and freedoms 1. Right to respect for private and family life, home and correspondence [ECHR Article 8] 2. Right to freedom of expression [ECHR Article 10] 3. Right to freedom of assembly / association [ECHR Article 11] 4. ...
  • 6. Procedural powers defined in Section 2 of the CC are subject to conditions and safeguards A. Relevant international human rights treaties, Art. 15(1) B. Conditions and safeguards specified in the Cybercrime Convention, Art. 15(2)
  • 7. International human rights treaties ■ International law – European Convention on Human Rights (ECHR) – International Covenant on Civil and Political Rights (ICCPR) ■ European Union law – Charter of Fundamental Rights of the EU
  • 8. Requirements under the ECHR and ICCPR Restriction is prescribed by law (in accordance with the rule of law) Restriction pursues legitimate aim Restriction is necessary in a democratic society
  • 9. Restriction pursues legitimate aim(s) Prevention of crime Protection of national security / public safety Protection of economic well-being of the country
  • 10. Restriction must be prescribed by law There is a legal basis for a restriction in national law National legal rules are accessible National legal rules are precise and foreseeable There are adequate safeguards against arbitrary application of national law
  • 11. Restriction must be necessary in a democratic society There is a pressing social need for a restriction Restriction is proportionate to the aims pursued
  • 12. Requirements under the Cybercrime Convention, Art. 15(2) (1) application of the principle of proportionality (2) judicial or other independent supervision (3) grounds justifying application (4) limitation of the scope and the duration of such power or procedure
  • 13. Surveillance of communications – ECtHR’s case-law 1. Klass and others v Germany 2. Weber and Saravia v Germany 3. Liberty and others v UK 4. Association for European Integration and Human Rights and Ekimdzhiev v Bulgaria 5. Iordachi and Others v Moldova 6. Kennedy v UK 7. Zakharov v Russia 8. ...
  • 14. Minimum safeguards according to the ECtHR ■ nature of offences which may give rise to surveillacne ■ definition of the categories of people liable to have their communication intercepted ■ limit on the duration of surveillance ■ procedure to be followed for examining, using and storing the data obtained ■ precautions to be taken when communicating the data to other parties ■ circumstances in which recordings may or must be erased or destroyed
  • 15. Offences which may give rise to interception order Cybercrime convention: interception is applicable „in relation to a range of serious offences to be determined by domestic law” National law: measure to be used in relation to serious, very serious or exceptionally serious offences, as defined in Criminal Code ECtHR: “more than one half of the offences provided for in the Criminal Code fall within [these categories]”
  • 16. Persons who are liable to have their communications intercepted National law: suspect, defendant or other person involved in a criminal offence ECtHR: “who exactly falls within the category of “other person involved in a criminal offence”?
  • 17. Persons who are liable to have their communications intercepted National law: suspect, defendant or person „who may have information about an offence, or other information relevant to the case” ECtHR: there are no clarifications in national legislation or case-law as to how these terms are to be applied in practice
  • 18. Duration of a measure Not necessary to provide strict statutory limitation of overall duration of a measure But, national legislation should prescribe: - initial duration of a measure - conditions under which an order can be renewed - Obligation to discontinue measure when it is no longer necessary
  • 19. Obligation to destroy data - in a reasonable time after the investigation, if person concerned was not charged - if person was charged, state has wider margin of appreciation - but, data which are not relevant for the purpose for which they have been collected should be deleted immediately
  • 20. Authorisation of a measure ■ Competent authority – Court – non-judicial authority, if it is sufficiently independent ■ Scope of review – Verify the existence of factual basis necessary to authorize the measure – Verify that necessity / proportionality requirement is satisfied ■ Content of the authorisation order must identify – Specific person, or – Single set of premises
  • 21. Direct access to communications System which enables authorities to intercept communications directly... without requiring them to show an interception authorization to service provider, or anyone else, is particularly prone to abuse...
  • 22. Supervision 1. Supervisory body must be independent of authorities carrying out the measure 2. Must have sufficient powers and competences to exercise effective and continuous control