SlideShare une entreprise Scribd logo
1  sur  46
Internet Security and Legal Compliance: Regulating Cyberspace – Version 2.0 Rodney D. Ryder Rodney D. Ryder  Scriboard
Internet Security and Legal Compliance: Regulating Cyberspace – Version 2.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
The need for a national strategy Internet Law and Policy: New Media Regulation and India Rodney D. Ryder  Scriboard
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The need for a strategy - to secure Cyberspace ,[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
The Rise [and fall?] of Cyberspace ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
The ‘New Medium’ and the Law ,[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Cybercrime and [the] Cyber Security Programme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Key Components of a Cyber Security Programme ,[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Structuring a Cyber Security Manual ,[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
The Information Technology Act, 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
The Information Technology Act, 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
‘ Offences’ under the Indian Information Technology Act, 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Data Privacy and the National Cyber Security Program Data Privacy and Indian Law Rodney D. Ryder  Scriboard
Privacy concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Growth of Importance of Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard BUSINESS ISSUES  HUMAN RIGHTS
Privacy and Data Protection law in India ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
The [Indian] Information Technology Act, 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Current law in India ,[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Possible approaches to Data Protection   Data Protection  Worldwide Rodney D. Ryder  Scriboard
Data Protection legislation worldwide  NONE PENDING IN PLACE  EUD or ‘ADEQUATE’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CENTRAL AFRICAN REPUBLIC CHAD CHILE CHINA CHRISTMAS ISLAND COCOS (KEELING) ISLANDS COLOMBIA COMOROS CONGO COOK ISLANDS COSTA RICA COTE D'IVOIRE CROATIA CUBA CYPRUS CZECH REPUBLIC DENMARK DJIBOUTI DOMINICA DOMINICAN REPUBLIC EAST TIMOR ECUADOR EGYPT EL SALVADOR EQUATORIAL GUINEA ERITREA ESTONIA ETHIOPIA FALKLAND ISLANDS (MALVINAS) FAROE ISLANDS FIJI FINLAND FRANCE FRENCH GUIANA FRENCH POLYNESIA FRENCH SOUTHERN TERRITORIES GABON GAMBIA GEORGIA GERMANY GHANA GIBRALTAR GREECE GREENLAND GRENADA GUADELOUPE GUAM GUATEMALA GUINEA GUINEA-BISSAU GUYANA HAITI HEARD ISLAND AND MCDONALD ISLANDS HOLY SEE (VATICAN CITY STATE) HONDURAS HONG KONG HUNGARY ICELAND INDIA INDONESIA IRAN IRAQ IRELAND ISRAEL ITALY JAMAICA JAPAN JORDAN KAZAKSTAN KENYA KIRIBATI KUWAIT KYRGYZSTAN LAO PEOPLE'S DEMOCRATIC REPUBLIC LATVIA LEBANON LESOTHO LIBERIA LIBYAN ARAB JAMAHIRIYA LIECHTENSTEIN LITHUANIA OURG LUXEMBOURG   MACAU MACEDONIA MADAGASCAR MALAWI MALAYSIA MALDIVES MALI MALTA MARSHALL ISLANDS MARTINIQUE MAURITANIA MAURITIUS MAYOTTE MEXICO MICRONESIA, FEDERATED STATES OF MOLDOVA, REPUBLIC OF MONACO MONGOLIA MONTSERRAT MOROCCO MOZAMBIQUE MYANMAR NAMIBIA NAURU NEPAL NETHERLANDS NETHERLANDS ANTILLES NEW CALEDONIA NEW ZEALAND NICARAGUA NIGER NIGERIA NIUE NORFOLK ISLAND NORTH KOREA NORTHERN MARIANA ISLANDS NORWAY OMAN PAKISTAN PALAU PALESTINIAN TERRITORY, OCCUPIED PANAMA PAPUA NEW GUINEA PARAGUAY PERU PHILIPPINES PITCAIRN POLAND PORTUGAL PUERTO RICO QATAR REUNION ROMANIA RUSSIAN FEDERATION RWANDA SAINT HELENA SAINT KITTS AND NEVIS SAINT LUCIA SAINT PIERRE AND MIQUELON SAINT VINCENT AND THE GRENADINES SAMOA SAN MARINO SAO TOME AND PRINCIPE SAUDI ARABIA SENEGAL SEYCHELLES SIERRA LEONE SINGAPORE SLOVAKIA SLOVENIA SOLOMON ISLANDS SOMALIA SOUTH AFRICA SOUTH GEORGIA SOUTH KOREA  SPAIN SRI LANKA SUDAN SURINAME SVALBARD AND JAN MAYEN SWAZILAND SWEDEN SWITZERLAND SYRIAN ARAB REPUBLIC TAIWAN TAJIKISTAN TANZANIA, UNITED REPUBLIC OF THAILAND TOGO TOKELAU TONGA TONGA TRINIDAD AND TOBAGO TUNISIA TURKEY TURKMENISTAN TURKS AND CAICOS ISLANDS TUVALU UGANDA UKRAINE UNITED ARAB EMIRATES UNITED KINGDOM UNITED STATES (safe harbor) US MINOR OUTLYING ISLANDS URUGUAY UZBEKISTAN VANUATU VENEZUELA VIET NAM VIRGIN ISLANDS, BRITISH VIRGIN ISLANDS, U.S. WALLIS AND FUTUNA WESTERN SAHARA YEMEN YUGOSLAVIA ZAMBIA ZIMBABWE Rodney D. Ryder  Scriboard
Industrialised Countries Legislation timeline Rodney D. Ryder  Scriboard South Korea eCommerce Act In force January 1999 New Zealand Privacy Act In force 1 July 1993 United States  (includes) CPP Act 1984 VPP Act 1988 COPP Act 1998 In force 21 April 2000 HIPA Act In force 14 April 2001 GLB Act In force 1 July 2001 ‘ General’ Act Under consideration Finland Personal DP Act In force 1 June 1999 Denmark Act on Processing f PD In force 1 July 2000 Luxembourg - Netherlands Law on  Protection PD  ct In force 1 Sep 2001 Greece Protection Processing   In force 10 April 1997 Ireland - Eastern Europe Estonia   (96)  Poland  (98)   Solovak  (98)   Slovenia   (99)  Hungary  (99)   Czech   (00)   Latvia   (00)  Lithuania  (00) Portugal Personal DP Act In force 27 October 1998 Spain Data Protection Act In force 13 January 2000 Canada PIP&ED Act Commenced 1 Jan 2001 United Kingdom Data Protection   Act In force 1 March 2000 France   - Australia Privacy Act In force 21 Dec 2001 Sweden Personal Data Act In force 24 October 1998 Belgium Data  Protection Act In force 1 Sep 2001 Norway Personal D Reg Act In force 14 April 2000 Italy Data Protection Act In force 8 May 1997 Austria Data Protection Act In force 1 January  2000 Germany Data Protection Act In force 23 May  2001 Switzerland Data Protection  Act In force 1 June 1999 Taiwan Computer Processed  DP In force 11 August 1995 Hong Kong Personal Data (Privacy ) In force 20 Dec 1996 Mexico eCommerce Act In force 7 June 2000
Possible approaches to Data Protection   Data Protection  in Europe Rodney D. Ryder  Scriboard
European Data Protection Directive ,[object Object],[object Object],e.g.  UK  previously - UK Data Protection Act 1984 now - UK Data Protection Act 1998 (in force March 2000) (“DPA”) Rodney D. Ryder  Scriboard
UK DPA 1998 - The Eight Principles 1. Personal data must be processed fairly and lawfully 2.  Personal data must be collected and used only for notified purposes. 3. Personal data must be adequate, relevant and not excessive. 4. Personal data must be accurate and, where necessary, kept up-to-date. 5. Personal data must only be retained for as long as is necessary to carry out the purposes for which it is collected.  6. Personal data must be processed in accordance with the rights of data subjects as set out under the 1998 Act.  Rodney D. Ryder  Scriboard
UK DPA 1998 - The Eight Principles 7. Appropriate technical and organisational measures must be in place to protect against unauthorised access, amendment or loss of personal data. There must be a contractual obligation, in writing, upon any data processor to comply with the relevant legislation and to ensure that such measures have been put in place.  8. Personal information must not be transferred out of the European Economic Area ("EEA") unless the receiving country ensures "an adequate level of protection" for the rights and freedoms of the data subjects vis-à-vis the processing of personal data. Rodney D. Ryder  Scriboard
Transfers of Personal Data  from Europe to India  The Eighth Principle Personal information must not be transferred out of the European Economic Area ("EEA") unless the receiving country ensures "an adequate level of protection" for the rights and freedoms of the data subjects vis-à-vis the processing of personal data. Rodney D. Ryder  Scriboard
Alternative Grounds: “Seventh-Principle” type contract  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Possible models for India   Data Protection  in the USA Rodney D. Ryder  Scriboard
Data Protection in the United States United States (Federal) Fair Credit Reporting Act  1970 Privacy Act  1974 Family Educational Rights and Privacy Act 1974 Cable TV Privacy Act  1974 Right to Financial Privacy Act  1978 Privacy Protection Act 1980 Cable Communications Policy Act 1984 Electronic Communications Privacy Act  1986 Video Privacy Protection Act  1988 Employee Polygraph Protection Act 1988 Telephone Consumer Protection Act 1991 Driver’s Privacy Protection Act 1994 Communications Assistance to Law Enforcement Act  1994 Health Insurance Portability and Accountability Act  1996 Children's Online Privacy Protection Act  1998 Deceptive Mail Prevention and Enforcement Act  1999 Financial Services Modernization Act  1999 ‘ General’ Act   Under consideration? Safe Harbor In effect 2001 ,[object Object],[object Object],Rodney D. Ryder  Scriboard
US Safe Harbor - self regulation ,[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Balancing Privacy & Security - terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Digital Rights Management Digital Rights Management Rodney D. Ryder  Scriboard
Copyright Law and Practice: a historical timeline Technology and the Law – the stages of copyright law The ‘monastic’ or ‘gurukul’ [oral tradition] The birth of copyright [Gutenberg and the Printing Press] The era of promiscuity: the Internet and Technology [the WIPO Copyright Treaty and the ‘DMCA’] The ‘World’s Biggest Copying Machine’ [PC Week; January 27, 1997] Rodney D. Ryder  Scriboard
Copyright and the Internet [Technological Developments and the Law] ,[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Napster – the file sharing mechanism [A & M Records, Inc. v. Napster, Inc.; 239 F. 3d 1004; 9 th  Cir. 2001] Rodney D. Ryder  Scriboard
Bit Torrent – the tracker device Rodney D. Ryder  Scriboard
Preventing Piracy [I] – Technical Measures Copy Protection [Encryption – encoding digital content to prevent it from being viewed; Copy Control Flags – digital ‘flags’ inserted as indicators; CD Copy Protection – insertion of an ‘additional’ track to prevent unauthorised recording] Copyright Protection [Digital Watermarking – digital signals embedded to detect or verify originality; Digital fingerprinting – digital signal embedded in the file containing information on the buyer] Cross-industry protection measures [Secure Digital Music Initiative [SDMI] – developed by a consortium of music companies; uses watermarking and copy protection] Rodney D. Ryder  Scriboard
Preventing Piracy [I] – Circumvention Measures ,[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Digital Rights Management, Anti-Circumvention, the DMCA and Dmitry Sklyarov ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Rodney D. Ryder  Scriboard
Electronic Mark Rodney D. Ryder  Scriboard
Electronic Mark: an illustration Rodney D. Ryder  Scriboard
Digital Rights Management Software Rodney D. Ryder  Scriboard
Digital Rights Management Software Rodney D. Ryder  Scriboard
Digital Rights Management: the law and technology partnership Rodney D. Ryder  Scriboard
Any questions? Rodney D. Ryder  Scriboard
Internet Security and Legal  Compliance Regulating Cyberspace – Version 2.0 Rodney D. Ryder [email_address] Technology, Media and Communications

Contenu connexe

Tendances

Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 

Tendances (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 

En vedette

Cyber Law and Business Report Year in Review: 2015
Cyber Law and Business Report Year in Review: 2015Cyber Law and Business Report Year in Review: 2015
Cyber Law and Business Report Year in Review: 2015Internet Law Center
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Presentation_Version 5 Attachment G - Notice of Audit_01-29-15
Presentation_Version 5 Attachment G - Notice of Audit_01-29-15Presentation_Version 5 Attachment G - Notice of Audit_01-29-15
Presentation_Version 5 Attachment G - Notice of Audit_01-29-15Bryan Carr
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyberAriel Evans
 
Lec49 50 digital rights management
Lec49 50 digital rights managementLec49 50 digital rights management
Lec49 50 digital rights managementDom Mike
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
Museum Guide to Digital Rights Management
Museum Guide to Digital Rights ManagementMuseum Guide to Digital Rights Management
Museum Guide to Digital Rights ManagementDavid Green
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...acinfotec
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11TeamOneI1MBA11
 
Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008ClubHack
 
Introduction to Legal Technology, lecture 8 (2015)
Introduction to Legal Technology, lecture 8 (2015)Introduction to Legal Technology, lecture 8 (2015)
Introduction to Legal Technology, lecture 8 (2015)Anna Ronkainen
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
Copyright and Open Content Licensing: the role of the Creative Commons licences
Copyright and Open Content Licensing: the role of the Creative Commons licencesCopyright and Open Content Licensing: the role of the Creative Commons licences
Copyright and Open Content Licensing: the role of the Creative Commons licencesccAustralia
 

En vedette (20)

Cyber Law and Business Report Year in Review: 2015
Cyber Law and Business Report Year in Review: 2015Cyber Law and Business Report Year in Review: 2015
Cyber Law and Business Report Year in Review: 2015
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Presentation_Version 5 Attachment G - Notice of Audit_01-29-15
Presentation_Version 5 Attachment G - Notice of Audit_01-29-15Presentation_Version 5 Attachment G - Notice of Audit_01-29-15
Presentation_Version 5 Attachment G - Notice of Audit_01-29-15
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
Lec49 50 digital rights management
Lec49 50 digital rights managementLec49 50 digital rights management
Lec49 50 digital rights management
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
Cyber law
Cyber lawCyber law
Cyber law
 
Museum Guide to Digital Rights Management
Museum Guide to Digital Rights ManagementMuseum Guide to Digital Rights Management
Museum Guide to Digital Rights Management
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
 
International Copyright Protection Primer
International Copyright Protection PrimerInternational Copyright Protection Primer
International Copyright Protection Primer
 
Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11Cyber Law Discussion - Team One I1MBA11
Cyber Law Discussion - Team One I1MBA11
 
Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008
 
Introduction to Legal Technology, lecture 8 (2015)
Introduction to Legal Technology, lecture 8 (2015)Introduction to Legal Technology, lecture 8 (2015)
Introduction to Legal Technology, lecture 8 (2015)
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
E transaction
E transactionE transaction
E transaction
 
E governance in india
E governance in indiaE governance in india
E governance in india
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Copyright and Open Content Licensing: the role of the Creative Commons licences
Copyright and Open Content Licensing: the role of the Creative Commons licencesCopyright and Open Content Licensing: the role of the Creative Commons licences
Copyright and Open Content Licensing: the role of the Creative Commons licences
 

Similaire à Internet Security and Legal Compliance: Cyber Law in India

Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Rodney D. Ryder
 
Scriboard® - Internet Law and Policy [India]
Scriboard® - Internet Law and Policy [India]Scriboard® - Internet Law and Policy [India]
Scriboard® - Internet Law and Policy [India]Rodney D. Ryder
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy lawsesther_sonu
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Right to Information - Law, Policy, Practice
Right to Information - Law, Policy, PracticeRight to Information - Law, Policy, Practice
Right to Information - Law, Policy, PracticeRodney D. Ryder
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Complianceijtsrd
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 

Similaire à Internet Security and Legal Compliance: Cyber Law in India (20)

Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]
 
Scriboard® - Internet Law and Policy [India]
Scriboard® - Internet Law and Policy [India]Scriboard® - Internet Law and Policy [India]
Scriboard® - Internet Law and Policy [India]
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Right to Information - Law, Policy, Practice
Right to Information - Law, Policy, PracticeRight to Information - Law, Policy, Practice
Right to Information - Law, Policy, Practice
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 

Dernier

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 

Dernier (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 

Internet Security and Legal Compliance: Cyber Law in India

  • 1. Internet Security and Legal Compliance: Regulating Cyberspace – Version 2.0 Rodney D. Ryder Rodney D. Ryder Scriboard
  • 2.
  • 3. The need for a national strategy Internet Law and Policy: New Media Regulation and India Rodney D. Ryder Scriboard
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Data Privacy and the National Cyber Security Program Data Privacy and Indian Law Rodney D. Ryder Scriboard
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Possible approaches to Data Protection Data Protection Worldwide Rodney D. Ryder Scriboard
  • 20.
  • 21. Industrialised Countries Legislation timeline Rodney D. Ryder Scriboard South Korea eCommerce Act In force January 1999 New Zealand Privacy Act In force 1 July 1993 United States (includes) CPP Act 1984 VPP Act 1988 COPP Act 1998 In force 21 April 2000 HIPA Act In force 14 April 2001 GLB Act In force 1 July 2001 ‘ General’ Act Under consideration Finland Personal DP Act In force 1 June 1999 Denmark Act on Processing f PD In force 1 July 2000 Luxembourg - Netherlands Law on Protection PD ct In force 1 Sep 2001 Greece Protection Processing In force 10 April 1997 Ireland - Eastern Europe Estonia (96) Poland (98) Solovak (98) Slovenia (99) Hungary (99) Czech (00) Latvia (00) Lithuania (00) Portugal Personal DP Act In force 27 October 1998 Spain Data Protection Act In force 13 January 2000 Canada PIP&ED Act Commenced 1 Jan 2001 United Kingdom Data Protection Act In force 1 March 2000 France - Australia Privacy Act In force 21 Dec 2001 Sweden Personal Data Act In force 24 October 1998 Belgium Data Protection Act In force 1 Sep 2001 Norway Personal D Reg Act In force 14 April 2000 Italy Data Protection Act In force 8 May 1997 Austria Data Protection Act In force 1 January 2000 Germany Data Protection Act In force 23 May 2001 Switzerland Data Protection Act In force 1 June 1999 Taiwan Computer Processed DP In force 11 August 1995 Hong Kong Personal Data (Privacy ) In force 20 Dec 1996 Mexico eCommerce Act In force 7 June 2000
  • 22. Possible approaches to Data Protection Data Protection in Europe Rodney D. Ryder Scriboard
  • 23.
  • 24. UK DPA 1998 - The Eight Principles 1. Personal data must be processed fairly and lawfully 2. Personal data must be collected and used only for notified purposes. 3. Personal data must be adequate, relevant and not excessive. 4. Personal data must be accurate and, where necessary, kept up-to-date. 5. Personal data must only be retained for as long as is necessary to carry out the purposes for which it is collected. 6. Personal data must be processed in accordance with the rights of data subjects as set out under the 1998 Act. Rodney D. Ryder Scriboard
  • 25. UK DPA 1998 - The Eight Principles 7. Appropriate technical and organisational measures must be in place to protect against unauthorised access, amendment or loss of personal data. There must be a contractual obligation, in writing, upon any data processor to comply with the relevant legislation and to ensure that such measures have been put in place. 8. Personal information must not be transferred out of the European Economic Area ("EEA") unless the receiving country ensures "an adequate level of protection" for the rights and freedoms of the data subjects vis-à-vis the processing of personal data. Rodney D. Ryder Scriboard
  • 26. Transfers of Personal Data from Europe to India The Eighth Principle Personal information must not be transferred out of the European Economic Area ("EEA") unless the receiving country ensures "an adequate level of protection" for the rights and freedoms of the data subjects vis-à-vis the processing of personal data. Rodney D. Ryder Scriboard
  • 27.
  • 28. Possible models for India Data Protection in the USA Rodney D. Ryder Scriboard
  • 29.
  • 30.
  • 31.
  • 32. Digital Rights Management Digital Rights Management Rodney D. Ryder Scriboard
  • 33. Copyright Law and Practice: a historical timeline Technology and the Law – the stages of copyright law The ‘monastic’ or ‘gurukul’ [oral tradition] The birth of copyright [Gutenberg and the Printing Press] The era of promiscuity: the Internet and Technology [the WIPO Copyright Treaty and the ‘DMCA’] The ‘World’s Biggest Copying Machine’ [PC Week; January 27, 1997] Rodney D. Ryder Scriboard
  • 34.
  • 35. Napster – the file sharing mechanism [A & M Records, Inc. v. Napster, Inc.; 239 F. 3d 1004; 9 th Cir. 2001] Rodney D. Ryder Scriboard
  • 36. Bit Torrent – the tracker device Rodney D. Ryder Scriboard
  • 37. Preventing Piracy [I] – Technical Measures Copy Protection [Encryption – encoding digital content to prevent it from being viewed; Copy Control Flags – digital ‘flags’ inserted as indicators; CD Copy Protection – insertion of an ‘additional’ track to prevent unauthorised recording] Copyright Protection [Digital Watermarking – digital signals embedded to detect or verify originality; Digital fingerprinting – digital signal embedded in the file containing information on the buyer] Cross-industry protection measures [Secure Digital Music Initiative [SDMI] – developed by a consortium of music companies; uses watermarking and copy protection] Rodney D. Ryder Scriboard
  • 38.
  • 39.
  • 40. Electronic Mark Rodney D. Ryder Scriboard
  • 41. Electronic Mark: an illustration Rodney D. Ryder Scriboard
  • 42. Digital Rights Management Software Rodney D. Ryder Scriboard
  • 43. Digital Rights Management Software Rodney D. Ryder Scriboard
  • 44. Digital Rights Management: the law and technology partnership Rodney D. Ryder Scriboard
  • 45. Any questions? Rodney D. Ryder Scriboard
  • 46. Internet Security and Legal Compliance Regulating Cyberspace – Version 2.0 Rodney D. Ryder [email_address] Technology, Media and Communications

Notes de l'éditeur

  1. © 2011. Rodney D. Ryder. All rights reserved.
  2. © 2011. Rodney D. Ryder. All rights reserved.
  3. © 2011. Rodney D. Ryder. All rights reserved.
  4. © 2011. Rodney D. Ryder. All rights reserved.
  5. © 2011. Rodney D. Ryder. All rights reserved.
  6. © 2011. Rodney D. Ryder. All rights reserved.
  7. © 2011. Rodney D. Ryder. All rights reserved.
  8. © 2011. Rodney D. Ryder. All rights reserved.
  9. © 2011. Rodney D. Ryder. All rights reserved.
  10. © 2011. Rodney D. Ryder. All rights reserved.
  11. © 2011. Rodney D. Ryder. All rights reserved.
  12. © 2011. Rodney D. Ryder. All rights reserved.
  13. © 2011. Rodney D. Ryder. All rights reserved.
  14. © 2011. Rodney D. Ryder. All rights reserved.
  15. © 2011. Rodney D. Ryder. All rights reserved.
  16. © 2011. Rodney D. Ryder. All rights reserved.
  17. © 2011. Rodney D. Ryder. All rights reserved.
  18. © 2011. Rodney D. Ryder. All rights reserved.
  19. © 2011. Rodney D. Ryder. All rights reserved.
  20. © 2011. Rodney D. Ryder. All rights reserved.
  21. © 2011. Rodney D. Ryder. All rights reserved.
  22. © 2011. Rodney D. Ryder. All rights reserved.
  23. © 2011. Rodney D. Ryder. All rights reserved.
  24. © 2011. Rodney D. Ryder. All rights reserved.
  25. © 2011. Rodney D. Ryder. All rights reserved.
  26. © 2011. Rodney D. Ryder. All rights reserved.
  27. © 2011. Rodney D. Ryder. All rights reserved.
  28. © 2011. Rodney D. Ryder. All rights reserved.
  29. © 2011. Rodney D. Ryder. All rights reserved.
  30. © 2011. Rodney D. Ryder. All rights reserved.
  31. © 2011. Rodney D. Ryder. All rights reserved.
  32. © 2011. Rodney D. Ryder. All rights reserved.
  33. © 2011. Rodney D. Ryder. All rights reserved.
  34. © 2011. Rodney D. Ryder. All rights reserved.
  35. © 2011. Rodney D. Ryder. All rights reserved.
  36. © 2011. Rodney D. Ryder. All rights reserved.
  37. © 2011. Rodney D. Ryder. All rights reserved.
  38. © 2011. Rodney D. Ryder. All rights reserved.
  39. © 2011. Rodney D. Ryder. All rights reserved.
  40. © 2011. Rodney D. Ryder. All rights reserved.
  41. © 2011. Rodney D. Ryder. All rights reserved.
  42. © 2011. Rodney D. Ryder. All rights reserved.
  43. © 2011. Rodney D. Ryder. All rights reserved.
  44. © 2011. Rodney D. Ryder. All rights reserved.
  45. © 2011. Rodney D. Ryder. All rights reserved.
  46. © 2011. Rodney D. Ryder. All rights reserved.