SlideShare a Scribd company logo
Right to privacy and
cybercrime investigation




Dima Gadomsky
criminal attorney, counsel

Tykhin Alekseienko,
junior associate
About Ukraine
             Arzinger - Offices
                                                         Biggest country in Eastern Europe

                                                         Very good IT school

                                                         #11 in the World by IT outsourcing and hi-tech
                                                         services

12
                                                         According to OECD, technology is #1 sector to
                                                         invest




     2   Right to privacy and cybercrime investigation
About Ukraine




3   Right to privacy and cybercrime investigation
Data protection in Ukraine

    The Law On Information, 1992

    Constitution, 1996 (right to privacy)

    The Civil Code, 2004

    Personal Data Protection Act, 2010

    Cybercrimes Investigation Division within Investigation Office, 2012




4       Right to privacy and cybercrime investigation
Geo-targeting of cybercrimes in the World
                                7. Great Britain
                                                                                              2. Russia
                                                             3. Netherlands



                                                                                       15%
                                                                   10%
                                                        5%
                                                                          5%
              25%
                                                              9%
                                                                                       5%

                                  4. Germany
                                                                                                          6. China
    1. USA


                                                                               5. Ukraine
                                                                         48 million attacks


5       Right to privacy and cybercrime investigation
Why Ukraine is 5th?


    Weak legislation

    Good technical education

    Very good corruption




6       Right to privacy and cybercrime investigation
Cybercrimes statistics in Ukraine


    No 5 most popular crime in Ukraine

    Each 5th company faced cyber attack in 2011

    25 % of companies do not have any internal instructions how to deal
    with cybercrimes

    Key businesses facing cybercrimes: finance,          retail, services




7        Right to privacy and cybercrime investigation
About Arzinger
                                               Arzinger - Offices




    12
8        Right to privacy and cybercrime investigation
About Arzinger




9   Right to privacy and cybercrime investigation
About Arzinger – expertise in IT


     Copyright in the Internet (www.ex.ua)

     Certification of cryptographic software

     Personal data issues in cross-border IT outsourcing

     Cybercrimes investigations (legal assistance of the victims, forensic)

     Data security

     Licensing of telecommunication services

     etc.




10          Right to privacy and cybercrime investigation
Case 1

                1        Infection
                                                     TargetCo


                                                         Bank

                                                                      ShellCo2
                                       ShellCo1
                                                     2     Wire
                                                         transfer

                                                                       Bank2
                                         Bank1
                                                               3
                                                            Cash
                                                         withdrawal



            4        Cash
                transferring to
                the beneficiary


11   Right to privacy and cybercrime investigation
Features of cybercrimes


     easy to learn how to commit

     require few resources relative to the potential damage caused

     can be committed in a jurisdiction without being physically present in it

     often not clearly illegal




12        Right to privacy and cybercrime investigation
Case 2
                                                                      Daughter company of
                                                                      leading global provider of
                                                                      digital map data


                                                         UaCo




                                         Unidentified person stolen
                                           the database containing
                                                     location data
13   Right to privacy and cybercrime investigation
Balance




14   Right to privacy and cybercrime investigation
IP address




                          Case 1                                         Case 2

     Infected the target with more then 30                Stealing of the database is only a
     viruses                                              copyright infringement (no criminal
                                                          liability, only civil)
     Used anonymous proxy servers
                                                          IP number and personal mail-box are
     Was using free WiFi in the cafe                      personal data, which cannot be disclosed
                                                          beyond the criminal investigation

     Knowing IP address makes no                sense     Impossible to get the data
15        Right to privacy and cybercrime investigation
Google – User data requests




16   Right to privacy and cybercrime investigation
Balance




17   Right to privacy and cybercrime investigation
Conclusions


     Private data is more or less protected in Ukraine

     Data protection mechanisms make impossible effective legal defence of
     rights (cybercrimes, copyright infringements, etc.)

     Tighten rights to privacy (e.g. obligation for the ISP to disclose data about
     Internet users)?




18        Right to privacy and cybercrime investigation

More Related Content

What's hot

Cyber law
Cyber law Cyber law
Cyber law
Arshad_A
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Shilpa
ShilpaShilpa
Shilpa
Shilpa Nayak
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
Bhagya Bgk
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
Mohammed Mahfouz Alhassan
 
Anil final
Anil finalAnil final
Anil final
Rakshith Shetty
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Dw communication
Dw communicationDw communication
Dw communication
Arjun Chetry
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
ppd1961
 
Computer crime
Computer crimeComputer crime
Computer crime
Uc Man
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
Dr. Arun Verma
 

What's hot (20)

Cyber law
Cyber law Cyber law
Cyber law
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Shilpa
ShilpaShilpa
Shilpa
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Anil final
Anil finalAnil final
Anil final
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Dw communication
Dw communicationDw communication
Dw communication
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 

Viewers also liked

Хмарні обчислення + персональні дані = Цивільний Кодекс України
Хмарні обчислення + персональні дані = Цивільний Кодекс УкраїниХмарні обчислення + персональні дані = Цивільний Кодекс України
Хмарні обчислення + персональні дані = Цивільний Кодекс УкраїниAlex Kharchenko
 
CC presentation KNEU
CC presentation KNEUCC presentation KNEU
CC presentation KNEU
Andriy Bichuk
 
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Lviv Startup Club
 
LegalCamp 2.0 Ліцензування, важкі випадки
LegalCamp 2.0 Ліцензування, важкі випадкиLegalCamp 2.0 Ліцензування, важкі випадки
LegalCamp 2.0 Ліцензування, важкі випадки
Gennadiy Kornev
 
Використання безпаперових інформаційних технологій в процесах набуття та охор...
Використання безпаперових інформаційних технологій в процесах набуття та охор...Використання безпаперових інформаційних технологій в процесах набуття та охор...
Використання безпаперових інформаційних технологій в процесах набуття та охор...
nadeh
 
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Iryna Kuchma
 
"Блоґерство у правовому полі"
"Блоґерство у правовому полі""Блоґерство у правовому полі"
"Блоґерство у правовому полі"
Alex Kharchenko
 
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Lviv Startup Club
 

Viewers also liked (9)

Хмарні обчислення + персональні дані = Цивільний Кодекс України
Хмарні обчислення + персональні дані = Цивільний Кодекс УкраїниХмарні обчислення + персональні дані = Цивільний Кодекс України
Хмарні обчислення + персональні дані = Цивільний Кодекс України
 
CC presentation KNEU
CC presentation KNEUCC presentation KNEU
CC presentation KNEU
 
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
 
Awtor_prawo w neti
Awtor_prawo w netiAwtor_prawo w neti
Awtor_prawo w neti
 
LegalCamp 2.0 Ліцензування, важкі випадки
LegalCamp 2.0 Ліцензування, важкі випадкиLegalCamp 2.0 Ліцензування, важкі випадки
LegalCamp 2.0 Ліцензування, важкі випадки
 
Використання безпаперових інформаційних технологій в процесах набуття та охор...
Використання безпаперових інформаційних технологій в процесах набуття та охор...Використання безпаперових інформаційних технологій в процесах набуття та охор...
Використання безпаперових інформаційних технологій в процесах набуття та охор...
 
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
 
"Блоґерство у правовому полі"
"Блоґерство у правовому полі""Блоґерство у правовому полі"
"Блоґерство у правовому полі"
 
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
 

Similar to Ukraine: Cybercrmes and Privacy

Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market PlaceWojciech Filipkowski
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
Olusegun Mosugu
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Andrea Rossetti
 
Computer crime.pptx
Computer crime.pptxComputer crime.pptx
Computer crime.pptx
NabinUpreti2
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
MohsinMughal28
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
Prof. (Dr.) Tabrez Ahmad
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
Emily Smith
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
GeoBellas
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
GrittyCC
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
Ikuo Takahashi
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
SunilSaklani6
 

Similar to Ukraine: Cybercrmes and Privacy (20)

Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market Place
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Computer crime.pptx
Computer crime.pptxComputer crime.pptx
Computer crime.pptx
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 

More from Axon.Partners

Digitalization of law (by Andriy Kostenko)
Digitalization of law (by Andriy Kostenko)Digitalization of law (by Andriy Kostenko)
Digitalization of law (by Andriy Kostenko)
Axon.Partners
 
Як журналісту не продебати суд
Як журналісту не продебати судЯк журналісту не продебати суд
Як журналісту не продебати суд
Axon.Partners
 
Немає нічого особливого в нашому SMM
Немає нічого особливого в нашому SMMНемає нічого особливого в нашому SMM
Немає нічого особливого в нашому SMM
Axon.Partners
 
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліціїCryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
Axon.Partners
 
Юридичне підприємництво проти нео-луддизму
Юридичне підприємництво проти нео-луддизмуЮридичне підприємництво проти нео-луддизму
Юридичне підприємництво проти нео-луддизму
Axon.Partners
 
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Axon.Partners
 
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Axon.Partners
 
My personal questions to privacy
My personal questions to privacyMy personal questions to privacy
My personal questions to privacy
Axon.Partners
 
20180325 legal contracts what_if_1991 lecture
20180325 legal contracts what_if_1991 lecture20180325 legal contracts what_if_1991 lecture
20180325 legal contracts what_if_1991 lecture
Axon.Partners
 
Куди рухається світ
Куди рухається світКуди рухається світ
Куди рухається світ
Axon.Partners
 
Юристы и другие неприятности в стартапе
Юристы и другие неприятности в стартапеЮристы и другие неприятности в стартапе
Юристы и другие неприятности в стартапе
Axon.Partners
 
овдз 2013 лекція 2
овдз 2013 лекція 2овдз 2013 лекція 2
овдз 2013 лекція 2Axon.Partners
 
овдз 2013 лекція 1
овдз 2013 лекція 1овдз 2013 лекція 1
овдз 2013 лекція 1Axon.Partners
 
Cyber security, cloud computing: legal issues (UKR)
Cyber security, cloud computing: legal issues (UKR)Cyber security, cloud computing: legal issues (UKR)
Cyber security, cloud computing: legal issues (UKR)Axon.Partners
 
20130928 ironclad contract 01
20130928 ironclad contract 0120130928 ironclad contract 01
20130928 ironclad contract 01Axon.Partners
 
2013 construction, finance, ip
2013 construction, finance, ip2013 construction, finance, ip
2013 construction, finance, ipAxon.Partners
 
20130905 say no2 criminal liability for copyright infringement
20130905 say no2 criminal liability for copyright infringement20130905 say no2 criminal liability for copyright infringement
20130905 say no2 criminal liability for copyright infringementAxon.Partners
 
LegalJam: copyright in Ukraine
LegalJam: copyright in UkraineLegalJam: copyright in Ukraine
LegalJam: copyright in Ukraine
Axon.Partners
 
20130712 wana biz seminar
20130712 wana biz seminar20130712 wana biz seminar
20130712 wana biz seminarAxon.Partners
 
20130528 millhouse b_dedition
20130528 millhouse b_dedition20130528 millhouse b_dedition
20130528 millhouse b_deditionAxon.Partners
 

More from Axon.Partners (20)

Digitalization of law (by Andriy Kostenko)
Digitalization of law (by Andriy Kostenko)Digitalization of law (by Andriy Kostenko)
Digitalization of law (by Andriy Kostenko)
 
Як журналісту не продебати суд
Як журналісту не продебати судЯк журналісту не продебати суд
Як журналісту не продебати суд
 
Немає нічого особливого в нашому SMM
Немає нічого особливого в нашому SMMНемає нічого особливого в нашому SMM
Немає нічого особливого в нашому SMM
 
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліціїCryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
 
Юридичне підприємництво проти нео-луддизму
Юридичне підприємництво проти нео-луддизмуЮридичне підприємництво проти нео-луддизму
Юридичне підприємництво проти нео-луддизму
 
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
 
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
 
My personal questions to privacy
My personal questions to privacyMy personal questions to privacy
My personal questions to privacy
 
20180325 legal contracts what_if_1991 lecture
20180325 legal contracts what_if_1991 lecture20180325 legal contracts what_if_1991 lecture
20180325 legal contracts what_if_1991 lecture
 
Куди рухається світ
Куди рухається світКуди рухається світ
Куди рухається світ
 
Юристы и другие неприятности в стартапе
Юристы и другие неприятности в стартапеЮристы и другие неприятности в стартапе
Юристы и другие неприятности в стартапе
 
овдз 2013 лекція 2
овдз 2013 лекція 2овдз 2013 лекція 2
овдз 2013 лекція 2
 
овдз 2013 лекція 1
овдз 2013 лекція 1овдз 2013 лекція 1
овдз 2013 лекція 1
 
Cyber security, cloud computing: legal issues (UKR)
Cyber security, cloud computing: legal issues (UKR)Cyber security, cloud computing: legal issues (UKR)
Cyber security, cloud computing: legal issues (UKR)
 
20130928 ironclad contract 01
20130928 ironclad contract 0120130928 ironclad contract 01
20130928 ironclad contract 01
 
2013 construction, finance, ip
2013 construction, finance, ip2013 construction, finance, ip
2013 construction, finance, ip
 
20130905 say no2 criminal liability for copyright infringement
20130905 say no2 criminal liability for copyright infringement20130905 say no2 criminal liability for copyright infringement
20130905 say no2 criminal liability for copyright infringement
 
LegalJam: copyright in Ukraine
LegalJam: copyright in UkraineLegalJam: copyright in Ukraine
LegalJam: copyright in Ukraine
 
20130712 wana biz seminar
20130712 wana biz seminar20130712 wana biz seminar
20130712 wana biz seminar
 
20130528 millhouse b_dedition
20130528 millhouse b_dedition20130528 millhouse b_dedition
20130528 millhouse b_dedition
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Ukraine: Cybercrmes and Privacy

  • 1. Right to privacy and cybercrime investigation Dima Gadomsky criminal attorney, counsel Tykhin Alekseienko, junior associate
  • 2. About Ukraine Arzinger - Offices Biggest country in Eastern Europe Very good IT school #11 in the World by IT outsourcing and hi-tech services 12 According to OECD, technology is #1 sector to invest 2 Right to privacy and cybercrime investigation
  • 3. About Ukraine 3 Right to privacy and cybercrime investigation
  • 4. Data protection in Ukraine The Law On Information, 1992 Constitution, 1996 (right to privacy) The Civil Code, 2004 Personal Data Protection Act, 2010 Cybercrimes Investigation Division within Investigation Office, 2012 4 Right to privacy and cybercrime investigation
  • 5. Geo-targeting of cybercrimes in the World 7. Great Britain 2. Russia 3. Netherlands 15% 10% 5% 5% 25% 9% 5% 4. Germany 6. China 1. USA 5. Ukraine 48 million attacks 5 Right to privacy and cybercrime investigation
  • 6. Why Ukraine is 5th? Weak legislation Good technical education Very good corruption 6 Right to privacy and cybercrime investigation
  • 7. Cybercrimes statistics in Ukraine No 5 most popular crime in Ukraine Each 5th company faced cyber attack in 2011 25 % of companies do not have any internal instructions how to deal with cybercrimes Key businesses facing cybercrimes: finance, retail, services 7 Right to privacy and cybercrime investigation
  • 8. About Arzinger Arzinger - Offices 12 8 Right to privacy and cybercrime investigation
  • 9. About Arzinger 9 Right to privacy and cybercrime investigation
  • 10. About Arzinger – expertise in IT Copyright in the Internet (www.ex.ua) Certification of cryptographic software Personal data issues in cross-border IT outsourcing Cybercrimes investigations (legal assistance of the victims, forensic) Data security Licensing of telecommunication services etc. 10 Right to privacy and cybercrime investigation
  • 11. Case 1 1 Infection TargetCo Bank ShellCo2 ShellCo1 2 Wire transfer Bank2 Bank1 3 Cash withdrawal 4 Cash transferring to the beneficiary 11 Right to privacy and cybercrime investigation
  • 12. Features of cybercrimes easy to learn how to commit require few resources relative to the potential damage caused can be committed in a jurisdiction without being physically present in it often not clearly illegal 12 Right to privacy and cybercrime investigation
  • 13. Case 2 Daughter company of leading global provider of digital map data UaCo Unidentified person stolen the database containing location data 13 Right to privacy and cybercrime investigation
  • 14. Balance 14 Right to privacy and cybercrime investigation
  • 15. IP address Case 1 Case 2 Infected the target with more then 30 Stealing of the database is only a viruses copyright infringement (no criminal liability, only civil) Used anonymous proxy servers IP number and personal mail-box are Was using free WiFi in the cafe personal data, which cannot be disclosed beyond the criminal investigation Knowing IP address makes no sense Impossible to get the data 15 Right to privacy and cybercrime investigation
  • 16. Google – User data requests 16 Right to privacy and cybercrime investigation
  • 17. Balance 17 Right to privacy and cybercrime investigation
  • 18. Conclusions Private data is more or less protected in Ukraine Data protection mechanisms make impossible effective legal defence of rights (cybercrimes, copyright infringements, etc.) Tighten rights to privacy (e.g. obligation for the ISP to disclose data about Internet users)? 18 Right to privacy and cybercrime investigation