SlideShare a Scribd company logo
Data privacy as a tool for international police cooperation MODAP Conference, “Privacy: Beginning or the End” Sabanci University, Istanbul, 20-21 June 2011  INTERPOL Caroline Goemans-Dorny, Counsel Office of Legal Affairs
1 .  General Context  2. INTERPOL’s mission and tools  3. Challenges related to data processing  4. A global legal framework  5. Effective implementation: a multilayered  controlling mechanism  Conclusion Outline
1. General context  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],2. INTERPOL’s mission (Article 2 Constitution)
[object Object],2.  INTERPOL’s tools
[object Object],2.  INTERPOL’s tools
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2.  INTERPOL’s tools
Operational support : logistical and technical support to member countries with complex ongoing investigations.  Comprehensive training programs:  on the field and at the General Secretariat  2.  INTERPOL’s tools
[object Object],[object Object],[object Object],3. Challenges relating to data processing
[object Object],[object Object],3. Challenges relating to data processing
4. A global legal framework   ,[object Object],[object Object],[object Object],[object Object],[object Object]
4. A global legal framework   ,[object Object],[object Object],[object Object]
4. A global legal framework ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],5.  A Multilayered controlling mechanism
5. A multilayered controlling mechanism ,[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanisms  at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanisms  at internal level ,[object Object],[object Object],[object Object]
5. Controlling mechanisms  at  national  level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism: requests from individuals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism: requests from individuals - procedure  ,[object Object],[object Object],[object Object],[object Object]
5. External review: advice role of CCF  Communication of the CCF findings to INTERPOL General Secretariat (conclusions on compliance, recommendations on necessary actions to be taken) Controls over the follow-up of the CCF recommendations Answers to the requesting parties (in case of requests for access and of complaints)    Controls are aimed at protecting fundamental human rights and advising INTERPOL whenever necessary
Conclusion The adoption of a comprehensive set of rules and development  of mechanisms to monitor their implementation create  a climat of  TRUST and CONFIDENCE that:  -minimize the risk of abusive use in relation to the processing of information;  -strenghten  confidence between member countries when they cooperate via INTERPOL channels.  -INTERPOL data processing rules include a redress mechanism for individuals.  observance of data privacy is a tool for effective international police co-operation
Thank you  [email_address] Interpol :  http://interpol.int CCF :  http://interpol.int/Public/ccf/default.asp

More Related Content

Viewers also liked

Comparative Criminal Justice Presentation
Comparative Criminal Justice PresentationComparative Criminal Justice Presentation
Comparative Criminal Justice PresentationJake Mulinix
 
One of the 7c's of business communication - Correctness
One of the 7c's of business communication - CorrectnessOne of the 7c's of business communication - Correctness
One of the 7c's of business communication - CorrectnessVaibhav Duggal
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organizationKethgay Otanio
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organizationKethgay Otanio
 
Comparative police systems_preview
Comparative police systems_previewComparative police systems_preview
Comparative police systems_previewchapterhouseinc
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of CriminologyJwooten2
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015monde24836
 
10 practical writing samples - short reports
10 practical writing   samples - short reports10 practical writing   samples - short reports
10 practical writing samples - short reportsMuhammad Ovais
 
Technical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K ChristianTechnical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K ChristianKerrieAnne Christian
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1guest846943
 
Police report writing
Police report writingPolice report writing
Police report writingkapitanpinoy
 
How to Write a Technical Report
How to Write a Technical ReportHow to Write a Technical Report
How to Write a Technical ReportChris Jobling
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewFrancis Postrado
 

Viewers also liked (18)

Memorandum
MemorandumMemorandum
Memorandum
 
Comparative Criminal Justice Presentation
Comparative Criminal Justice PresentationComparative Criminal Justice Presentation
Comparative Criminal Justice Presentation
 
One of the 7c's of business communication - Correctness
One of the 7c's of business communication - CorrectnessOne of the 7c's of business communication - Correctness
One of the 7c's of business communication - Correctness
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organization
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organization
 
Comparative police systems_preview
Comparative police systems_previewComparative police systems_preview
Comparative police systems_preview
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of Criminology
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
10 practical writing samples - short reports
10 practical writing   samples - short reports10 practical writing   samples - short reports
10 practical writing samples - short reports
 
Technical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K ChristianTechnical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K Christian
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1
 
Technical report writing
Technical report writingTechnical report writing
Technical report writing
 
Police report writing
Police report writingPolice report writing
Police report writing
 
How to Write a Technical Report
How to Write a Technical ReportHow to Write a Technical Report
How to Write a Technical Report
 
Theories of crime (criminology)
Theories of crime (criminology)Theories of crime (criminology)
Theories of crime (criminology)
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
INTERPOL
INTERPOLINTERPOL
INTERPOL
 
Self_Esteem
Self_EsteemSelf_Esteem
Self_Esteem
 

Similar to Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul

Indicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanIndicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanMaksym Klyuchar
 
role_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptxrole_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptxMhmmdCbraylzad
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Human Rights_Final.compressed
Human Rights_Final.compressedHuman Rights_Final.compressed
Human Rights_Final.compressedShankor Paul
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaOECD Governance
 
CRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxCRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxoluobes
 
Background document nhrm report
Background document nhrm reportBackground document nhrm report
Background document nhrm reportGhetnet Metiku
 
Handbook for Monitoring AJ
Handbook for Monitoring AJHandbook for Monitoring AJ
Handbook for Monitoring AJArman Zrvandyan
 
COMPOSITE WP3 Brochure
COMPOSITE WP3 BrochureCOMPOSITE WP3 Brochure
COMPOSITE WP3 BrochureKamal Birdi
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados PessoaisIBE_USP
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
DNA evidence: International Framework
DNA evidence: International Framework DNA evidence: International Framework
DNA evidence: International Framework afiodorova
 
Stefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliencyStefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliencyGlobal Risk Forum GRFDavos
 
Clinical Trial Registry
Clinical Trial RegistryClinical Trial Registry
Clinical Trial RegistryAshok Pandey
 

Similar to Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul (20)

Indicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanIndicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights Plan
 
role_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptxrole_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptx
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Human Rights_Final.compressed
Human Rights_Final.compressedHuman Rights_Final.compressed
Human Rights_Final.compressed
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela Piana
 
CRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxCRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptx
 
Background document nhrm report
Background document nhrm reportBackground document nhrm report
Background document nhrm report
 
Handbook for Monitoring AJ
Handbook for Monitoring AJHandbook for Monitoring AJ
Handbook for Monitoring AJ
 
COMPOSITE WP3 Brochure
COMPOSITE WP3 BrochureCOMPOSITE WP3 Brochure
COMPOSITE WP3 Brochure
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
DNA evidence: International Framework
DNA evidence: International Framework DNA evidence: International Framework
DNA evidence: International Framework
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Howard Back,Ppt
Howard Back,PptHoward Back,Ppt
Howard Back,Ppt
 
Stefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliencyStefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliency
 
Clinical Trial Registry
Clinical Trial RegistryClinical Trial Registry
Clinical Trial Registry
 

More from Atıf ÜNALDI

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Atıf ÜNALDI
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuAtıf ÜNALDI
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlarAtıf ÜNALDI
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the futureAtıf ÜNALDI
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızAtıf ÜNALDI
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...Atıf ÜNALDI
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimiAtıf ÜNALDI
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsAtıf ÜNALDI
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiAtıf ÜNALDI
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldıAtıf ÜNALDI
 
Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıAtıf ÜNALDI
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihiAtıf ÜNALDI
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar YönetimiAtıf ÜNALDI
 

More from Atıf ÜNALDI (20)

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlar
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the future
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyız
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimi
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different Platforms
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifi
 
Iptv Derneği
Iptv DerneğiIptv Derneği
Iptv Derneği
 
Trt tv+sosyal medya
Trt tv+sosyal medyaTrt tv+sosyal medya
Trt tv+sosyal medya
 
Stratosfer VPN
Stratosfer VPNStratosfer VPN
Stratosfer VPN
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldı
 
Tv Technologies
Tv TechnologiesTv Technologies
Tv Technologies
 
New media
New mediaNew media
New media
 
Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mı
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihi
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar Yönetimi
 
Facebook
FacebookFacebook
Facebook
 
Mediacat
MediacatMediacat
Mediacat
 

Recently uploaded

In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 

Recently uploaded (20)

In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul

  • 1. Data privacy as a tool for international police cooperation MODAP Conference, “Privacy: Beginning or the End” Sabanci University, Istanbul, 20-21 June 2011 INTERPOL Caroline Goemans-Dorny, Counsel Office of Legal Affairs
  • 2. 1 . General Context 2. INTERPOL’s mission and tools 3. Challenges related to data processing 4. A global legal framework 5. Effective implementation: a multilayered controlling mechanism Conclusion Outline
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Operational support : logistical and technical support to member countries with complex ongoing investigations. Comprehensive training programs: on the field and at the General Secretariat 2. INTERPOL’s tools
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. 5. External review: advice role of CCF Communication of the CCF findings to INTERPOL General Secretariat (conclusions on compliance, recommendations on necessary actions to be taken) Controls over the follow-up of the CCF recommendations Answers to the requesting parties (in case of requests for access and of complaints)  Controls are aimed at protecting fundamental human rights and advising INTERPOL whenever necessary
  • 29. Conclusion The adoption of a comprehensive set of rules and development of mechanisms to monitor their implementation create a climat of TRUST and CONFIDENCE that: -minimize the risk of abusive use in relation to the processing of information; -strenghten confidence between member countries when they cooperate via INTERPOL channels. -INTERPOL data processing rules include a redress mechanism for individuals. observance of data privacy is a tool for effective international police co-operation
  • 30. Thank you [email_address] Interpol : http://interpol.int CCF : http://interpol.int/Public/ccf/default.asp

Editor's Notes

  1. Under international law: right to conclude treaties, to present and receive international claims - In national legal systems: right to enter into contractual relationships, to acquire goods, to bring an action in court