SlideShare a Scribd company logo
Notification and Takedown
from an ISP standpoint
        Mariano Cunietti
      CTO, Enter Srl, Milano
        mcunietti@enter.it
          @mcunietti

        ECTA Conference
    Brussels, 26 November 2012
Enter Srl
• Enter is an ISP operating in Italy and it is a member of
  AIIP, the Italian ISP association
• Business consists in infrastructure services for
  enterprises (access, hosting, cloud, telephony)
• Investments were done in developing proprietary access
  networks (ULL, Metroethernet), datacenter, cloud
  infrastructure (OpenStack)
• Innovative products are related to connectivity
  (Metroethernet) and cloud computing (www.cloudup.it)
Agenda

•   Police Notice and Takedown requests
•   Blocking technologies
•   Collateral damages
•   Suggestions for future approach
Police Takedown Request - Reasons
  • Illegal offer of goods and services (e.g. illegal arms, fake medicines,
    unauthorized gambling services etc.).
  • Illegal promotion of goods and services.
  • Content facilitating phishing, pharming or hacking.
  • Infringements of copyright and related rights, trademarks
  • Infringement of consumer protection rules.
  • Incitement to hatred or violence (on the basis of race, religion, gender,
    sexual orientation etc.)
  • Child abuse content
  • Terrorism related content (e.g. content inciting the commitment of
    terrorist offences and training material)
  • Defamation
  • Privacy infringements (Spamming included)
Police Takedown Request - Form
• "In the scope of this criminal prosecution, please proceed
  immediately to the preventive seizure of this site by prohibiting
  access from Italy to the site [www.]domain.com[/page] with
  IP 111.222.333.444 both via DNS and IP blocking.
• Blocking shall be extended to related aliases linking to this site in
  the present and future, to IP address[es] actually bound to the
  aforementioned domain name[s] and any other additional statical
  IP address should be bound to, in the present and future.
• You are strongly invited to forward this request to any other
  provider may be part of the same company group your company
  is member of.”
DNS Blocking
IP Blocking
Collateral damages

• DNS blocking is easily worked around by users
• IP blocking can be worked around by offenders
• URL filtering has “A-B-Normal” impacts on privacy,
  costs, operations
• Taking down entire domains or IPs means shutting
  down also legal services or websites.

• Tracking down future DNS and IP aliases is a
  police task requested to ISPs
Suggested approach

• Address the takedown N&A to the source: the
  hoster. One action rules them all.
• Define standard police procedures to request
  takedown actions. Train police to use them.
• Establish a single european and international
  point of contact for police requests to hosters
Questions?

More Related Content

What's hot

2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation
MartenLinkedin
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
Shahid Jamal Tubrazy
 
Ipr
IprIpr
Ico sme-webinar-slides-090217
Ico sme-webinar-slides-090217Ico sme-webinar-slides-090217
Ico sme-webinar-slides-090217
Tony Dowling
 
POPI Update 2013
POPI Update 2013POPI Update 2013
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Servicesblogzilla
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
moldovaictsummit2016
 
Legal update
Legal updateLegal update
Legal update
Rachel Aldighieri
 
Understanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATEUnderstanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATE
Nicole Murdoch
 
legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketing
SHIVANI SINGH
 
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
AltheimPrivacy
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
Shahid Jamal Tubrazy
 
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
AltheimPrivacy
 

What's hot (17)

2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Ipr
IprIpr
Ipr
 
Ico sme-webinar-slides-090217
Ico sme-webinar-slides-090217Ico sme-webinar-slides-090217
Ico sme-webinar-slides-090217
 
POPI Update 2013
POPI Update 2013POPI Update 2013
POPI Update 2013
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Legal update
Legal updateLegal update
Legal update
 
Understanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATEUnderstanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATE
 
legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketing
 
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
 

Viewers also liked

Openstack Lovers Meetup - Roma 2012
Openstack Lovers Meetup - Roma 2012Openstack Lovers Meetup - Roma 2012
Openstack Lovers Meetup - Roma 2012
Mariano Cunietti
 
#1 Openstack Day Italy presentation
#1 Openstack Day Italy presentation#1 Openstack Day Italy presentation
#1 Openstack Day Italy presentation
Mariano Cunietti
 
Enter Cloud Suite at CEBIT Hannover
Enter Cloud Suite at CEBIT HannoverEnter Cloud Suite at CEBIT Hannover
Enter Cloud Suite at CEBIT Hannover
Mariano Cunietti
 
What's new in Grizzly
What's new in GrizzlyWhat's new in Grizzly
What's new in Grizzly
Mariano Cunietti
 
DevOps - Una rivoluzione culturale
DevOps - Una rivoluzione culturaleDevOps - Una rivoluzione culturale
DevOps - Una rivoluzione culturale
Mariano Cunietti
 
Cloud computing for publishing
Cloud computing for publishingCloud computing for publishing
Cloud computing for publishing
Mariano Cunietti
 
Sono tutti open con le infrastrutture degli altri
Sono tutti open con le infrastrutture degli altriSono tutti open con le infrastrutture degli altri
Sono tutti open con le infrastrutture degli altri
Mariano Cunietti
 

Viewers also liked (7)

Openstack Lovers Meetup - Roma 2012
Openstack Lovers Meetup - Roma 2012Openstack Lovers Meetup - Roma 2012
Openstack Lovers Meetup - Roma 2012
 
#1 Openstack Day Italy presentation
#1 Openstack Day Italy presentation#1 Openstack Day Italy presentation
#1 Openstack Day Italy presentation
 
Enter Cloud Suite at CEBIT Hannover
Enter Cloud Suite at CEBIT HannoverEnter Cloud Suite at CEBIT Hannover
Enter Cloud Suite at CEBIT Hannover
 
What's new in Grizzly
What's new in GrizzlyWhat's new in Grizzly
What's new in Grizzly
 
DevOps - Una rivoluzione culturale
DevOps - Una rivoluzione culturaleDevOps - Una rivoluzione culturale
DevOps - Una rivoluzione culturale
 
Cloud computing for publishing
Cloud computing for publishingCloud computing for publishing
Cloud computing for publishing
 
Sono tutti open con le infrastrutture degli altri
Sono tutti open con le infrastrutture degli altriSono tutti open con le infrastrutture degli altri
Sono tutti open con le infrastrutture degli altri
 

Similar to ECTA - Notification and Takedown in Italy

The enterprise of subscription tv piracy
The enterprise of subscription tv piracyThe enterprise of subscription tv piracy
The enterprise of subscription tv piracy
Sabastion Forward
 
Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Eleonora Rosati
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
Norfolk Chamber of Commerce
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
ParasSehgal12
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
biswajitghosal4
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
ssuserd26df0
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
AmandaWeaver21
 
Jcj corporate blind overview november 19 2012 1-1
Jcj corporate blind  overview november 19 2012 1-1Jcj corporate blind  overview november 19 2012 1-1
Jcj corporate blind overview november 19 2012 1-1ashk4n
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
Martyn Taylor
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
Mindaugas Kiskis
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")
Jonathan Gael
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and Issues
Dr. Prashant Vats
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
beamatinet
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
IT Governance Ltd
 
Net neutrality & it’s legal issues
Net neutrality & it’s legal issuesNet neutrality & it’s legal issues
Net neutrality & it’s legal issues
mruns_96
 
Cybercrime
CybercrimeCybercrime
Cybercrime
neelima27
 

Similar to ECTA - Notification and Takedown in Italy (20)

The enterprise of subscription tv piracy
The enterprise of subscription tv piracyThe enterprise of subscription tv piracy
The enterprise of subscription tv piracy
 
Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
Jcj corporate blind overview november 19 2012 1-1
Jcj corporate blind  overview november 19 2012 1-1Jcj corporate blind  overview november 19 2012 1-1
Jcj corporate blind overview november 19 2012 1-1
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
 
Cyber law
Cyber lawCyber law
Cyber law
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")Ether2 "The Net...fixed" (or "how to close the digital divide")
Ether2 "The Net...fixed" (or "how to close the digital divide")
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and Issues
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Net neutrality & it’s legal issues
Net neutrality & it’s legal issuesNet neutrality & it’s legal issues
Net neutrality & it’s legal issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

ECTA - Notification and Takedown in Italy

  • 1. Notification and Takedown from an ISP standpoint Mariano Cunietti CTO, Enter Srl, Milano mcunietti@enter.it @mcunietti ECTA Conference Brussels, 26 November 2012
  • 2. Enter Srl • Enter is an ISP operating in Italy and it is a member of AIIP, the Italian ISP association • Business consists in infrastructure services for enterprises (access, hosting, cloud, telephony) • Investments were done in developing proprietary access networks (ULL, Metroethernet), datacenter, cloud infrastructure (OpenStack) • Innovative products are related to connectivity (Metroethernet) and cloud computing (www.cloudup.it)
  • 3. Agenda • Police Notice and Takedown requests • Blocking technologies • Collateral damages • Suggestions for future approach
  • 4. Police Takedown Request - Reasons • Illegal offer of goods and services (e.g. illegal arms, fake medicines, unauthorized gambling services etc.). • Illegal promotion of goods and services. • Content facilitating phishing, pharming or hacking. • Infringements of copyright and related rights, trademarks • Infringement of consumer protection rules. • Incitement to hatred or violence (on the basis of race, religion, gender, sexual orientation etc.) • Child abuse content • Terrorism related content (e.g. content inciting the commitment of terrorist offences and training material) • Defamation • Privacy infringements (Spamming included)
  • 5. Police Takedown Request - Form • "In the scope of this criminal prosecution, please proceed immediately to the preventive seizure of this site by prohibiting access from Italy to the site [www.]domain.com[/page] with IP 111.222.333.444 both via DNS and IP blocking. • Blocking shall be extended to related aliases linking to this site in the present and future, to IP address[es] actually bound to the aforementioned domain name[s] and any other additional statical IP address should be bound to, in the present and future. • You are strongly invited to forward this request to any other provider may be part of the same company group your company is member of.”
  • 8. Collateral damages • DNS blocking is easily worked around by users • IP blocking can be worked around by offenders • URL filtering has “A-B-Normal” impacts on privacy, costs, operations • Taking down entire domains or IPs means shutting down also legal services or websites. • Tracking down future DNS and IP aliases is a police task requested to ISPs
  • 9. Suggested approach • Address the takedown N&A to the source: the hoster. One action rules them all. • Define standard police procedures to request takedown actions. Train police to use them. • Establish a single european and international point of contact for police requests to hosters

Editor's Notes

  1. Enter srl is an italian ISP based in Milan and estabilished in 1996. Enter provides access and datacenter services to business customers. Access services are based on xDSL (Ethernet and ATM) connectivity on copper, radio link and fiber (FTTx), delivering national and international customers internet access, geographical MPLS VPN networks, telephony services (PSTN and IP). Datacenter services cover several architectures based on physical servers (hosting and housing), virtual servers and public cloud platforms. Enter datacenter is located in Milano Caldera and directly connected to the Milan Internet Exchange (MIX). The Associazione Italiana Internet Provider (“AIIP”) is an association of Italian communications operators established on 1995, with the aim to represent its associates before any public administration, independent authority, or any other public body, domestic or supranational, such as the European Commission on any issues relating to Internet and electronic communications, as well as cybercrime, data protection, e-commerce regulation, and safe use of the Internet, etc. AIIP represents more than 50 associated companies which offer to the public electronic communications services (Internet access, housing, hosting, IP based services such as VoIP, IPTV, video communications, videoconferences,).
  2. Permanent blockings For two specific matters, the Internal Affairs Ministry has set up specific procedures: CNCPO (National Centre for Paedopornography Online Contrast) - a central list is kept up to date, ISPs and telcos have to mantain the DNS blocking filters updated AAMS (Autonomous State Monopolies Administration) - a 400+ foreign gambling site list has been blocked years ago and must be kept filtered
  3. Recipients of the requests The recipient list, which is often attached, varies from time to time, and from police office to another. This means there is no shared procedure to retrieve the list. Many active providers are always left out the list. Some large hosting providers are always included even if they do not offer access, though Recipient of the request are always access providers, registered on the Authority Register ( ROC , Communication Operators Registry) or ISPs owning a Telecommunication Ministry ISP general license. The two are not necessarily overlapping. There are no controls over the execution of the request.
  4. The suggested approach SLIDE 7 If a website blocking is needed, whether it is a single page or an entire site, the request should be addressed to the source, to obtain maximum effectiveness, therefore to: the owner of the domain (WHOIS tells you always who he/she is) (immediate takedown) the hoster (immediate takedown) the technical contacts of the domain registrar (immediate takedown plus some propagation delay) the internet breakout provider of the hoster (immediate takedown). No DNS blocking should be requested, as it is easy to work around No IP blocking should be requested, as with cloud technologies it would be much more easy to move a content from a server to another. No URL filtering should be requested, because it is unbearable both by small (costs) and large (huge data) internet providers. Privacy implications are "A-B-normal". Police offices should be trained about Internet crime issues and countermeasures. Requests should be more technically and lawfully correct. A standard request form should be defined. A single point of contact should be provided also for international issues, with shared procedures.