SlideShare une entreprise Scribd logo
1  sur  30
Data privacy as a tool for international police cooperation MODAP Conference, “Privacy: Beginning or the End” Sabanci University, Istanbul, 20-21 June 2011  INTERPOL Caroline Goemans-Dorny, Counsel Office of Legal Affairs
1 .  General Context  2. INTERPOL’s mission and tools  3. Challenges related to data processing  4. A global legal framework  5. Effective implementation: a multilayered  controlling mechanism  Conclusion Outline
1. General context  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],2. INTERPOL’s mission (Article 2 Constitution)
[object Object],2.  INTERPOL’s tools
[object Object],2.  INTERPOL’s tools
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2.  INTERPOL’s tools
Operational support : logistical and technical support to member countries with complex ongoing investigations.  Comprehensive training programs:  on the field and at the General Secretariat  2.  INTERPOL’s tools
[object Object],[object Object],[object Object],3. Challenges relating to data processing
[object Object],[object Object],3. Challenges relating to data processing
4. A global legal framework   ,[object Object],[object Object],[object Object],[object Object],[object Object]
4. A global legal framework   ,[object Object],[object Object],[object Object]
4. A global legal framework ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],5.  A Multilayered controlling mechanism
5. A multilayered controlling mechanism ,[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanisms  at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanisms  at internal level ,[object Object],[object Object],[object Object]
5. Controlling mechanisms  at  national  level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism: requests from individuals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism: requests from individuals - procedure  ,[object Object],[object Object],[object Object],[object Object]
5. External review: advice role of CCF  Communication of the CCF findings to INTERPOL General Secretariat (conclusions on compliance, recommendations on necessary actions to be taken) Controls over the follow-up of the CCF recommendations Answers to the requesting parties (in case of requests for access and of complaints)    Controls are aimed at protecting fundamental human rights and advising INTERPOL whenever necessary
Conclusion The adoption of a comprehensive set of rules and development  of mechanisms to monitor their implementation create  a climat of  TRUST and CONFIDENCE that:  -minimize the risk of abusive use in relation to the processing of information;  -strenghten  confidence between member countries when they cooperate via INTERPOL channels.  -INTERPOL data processing rules include a redress mechanism for individuals.  observance of data privacy is a tool for effective international police co-operation
Thank you  [email_address] Interpol :  http://interpol.int CCF :  http://interpol.int/Public/ccf/default.asp

Contenu connexe

En vedette

Comparative Criminal Justice Presentation
Comparative Criminal Justice PresentationComparative Criminal Justice Presentation
Comparative Criminal Justice Presentation
Jake Mulinix
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organization
Kethgay Otanio
 
Comparative police systems_preview
Comparative police systems_previewComparative police systems_preview
Comparative police systems_preview
chapterhouseinc
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of Criminology
Jwooten2
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1
guest846943
 

En vedette (18)

Memorandum
MemorandumMemorandum
Memorandum
 
Comparative Criminal Justice Presentation
Comparative Criminal Justice PresentationComparative Criminal Justice Presentation
Comparative Criminal Justice Presentation
 
One of the 7c's of business communication - Correctness
One of the 7c's of business communication - CorrectnessOne of the 7c's of business communication - Correctness
One of the 7c's of business communication - Correctness
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organization
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organization
 
Comparative police systems_preview
Comparative police systems_previewComparative police systems_preview
Comparative police systems_preview
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of Criminology
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
10 practical writing samples - short reports
10 practical writing   samples - short reports10 practical writing   samples - short reports
10 practical writing samples - short reports
 
Technical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K ChristianTechnical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K Christian
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1
 
Technical report writing
Technical report writingTechnical report writing
Technical report writing
 
Police report writing
Police report writingPolice report writing
Police report writing
 
How to Write a Technical Report
How to Write a Technical ReportHow to Write a Technical Report
How to Write a Technical Report
 
Theories of crime (criminology)
Theories of crime (criminology)Theories of crime (criminology)
Theories of crime (criminology)
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
INTERPOL
INTERPOLINTERPOL
INTERPOL
 
Self_Esteem
Self_EsteemSelf_Esteem
Self_Esteem
 

Similaire à Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul

Indicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanIndicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights Plan
Maksym Klyuchar
 
Human Rights_Final.compressed
Human Rights_Final.compressedHuman Rights_Final.compressed
Human Rights_Final.compressed
Shankor Paul
 
CRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxCRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptx
oluobes
 
Background document nhrm report
Background document nhrm reportBackground document nhrm report
Background document nhrm report
Ghetnet Metiku
 
Handbook for Monitoring AJ
Handbook for Monitoring AJHandbook for Monitoring AJ
Handbook for Monitoring AJ
Arman Zrvandyan
 
COMPOSITE WP3 Brochure
COMPOSITE WP3 BrochureCOMPOSITE WP3 Brochure
COMPOSITE WP3 Brochure
Kamal Birdi
 
DNA evidence: International Framework
DNA evidence: International Framework DNA evidence: International Framework
DNA evidence: International Framework
afiodorova
 

Similaire à Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul (20)

Indicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanIndicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights Plan
 
role_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptxrole_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptx
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Human Rights_Final.compressed
Human Rights_Final.compressedHuman Rights_Final.compressed
Human Rights_Final.compressed
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela Piana
 
CRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxCRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptx
 
Background document nhrm report
Background document nhrm reportBackground document nhrm report
Background document nhrm report
 
Handbook for Monitoring AJ
Handbook for Monitoring AJHandbook for Monitoring AJ
Handbook for Monitoring AJ
 
COMPOSITE WP3 Brochure
COMPOSITE WP3 BrochureCOMPOSITE WP3 Brochure
COMPOSITE WP3 Brochure
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
DNA evidence: International Framework
DNA evidence: International Framework DNA evidence: International Framework
DNA evidence: International Framework
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Howard Back,Ppt
Howard Back,PptHoward Back,Ppt
Howard Back,Ppt
 
Stefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliencyStefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliency
 
Clinical Trial Registry
Clinical Trial RegistryClinical Trial Registry
Clinical Trial Registry
 

Plus de Atıf ÜNALDI

Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldı
Atıf ÜNALDI
 
Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mı
Atıf ÜNALDI
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihi
Atıf ÜNALDI
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar Yönetimi
Atıf ÜNALDI
 
Mediacat
MediacatMediacat
Mediacat
Atıf ÜNALDI
 

Plus de Atıf ÜNALDI (20)

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlar
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the future
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyız
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimi
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different Platforms
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifi
 
Iptv Derneği
Iptv DerneğiIptv Derneği
Iptv Derneği
 
Trt tv+sosyal medya
Trt tv+sosyal medyaTrt tv+sosyal medya
Trt tv+sosyal medya
 
Stratosfer VPN
Stratosfer VPNStratosfer VPN
Stratosfer VPN
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldı
 
Tv Technologies
Tv TechnologiesTv Technologies
Tv Technologies
 
New media
New mediaNew media
New media
 
Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mı
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihi
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar Yönetimi
 
Facebook
FacebookFacebook
Facebook
 
Mediacat
MediacatMediacat
Mediacat
 

Dernier

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul

  • 1. Data privacy as a tool for international police cooperation MODAP Conference, “Privacy: Beginning or the End” Sabanci University, Istanbul, 20-21 June 2011 INTERPOL Caroline Goemans-Dorny, Counsel Office of Legal Affairs
  • 2. 1 . General Context 2. INTERPOL’s mission and tools 3. Challenges related to data processing 4. A global legal framework 5. Effective implementation: a multilayered controlling mechanism Conclusion Outline
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Operational support : logistical and technical support to member countries with complex ongoing investigations. Comprehensive training programs: on the field and at the General Secretariat 2. INTERPOL’s tools
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. 5. External review: advice role of CCF Communication of the CCF findings to INTERPOL General Secretariat (conclusions on compliance, recommendations on necessary actions to be taken) Controls over the follow-up of the CCF recommendations Answers to the requesting parties (in case of requests for access and of complaints)  Controls are aimed at protecting fundamental human rights and advising INTERPOL whenever necessary
  • 29. Conclusion The adoption of a comprehensive set of rules and development of mechanisms to monitor their implementation create a climat of TRUST and CONFIDENCE that: -minimize the risk of abusive use in relation to the processing of information; -strenghten confidence between member countries when they cooperate via INTERPOL channels. -INTERPOL data processing rules include a redress mechanism for individuals. observance of data privacy is a tool for effective international police co-operation
  • 30. Thank you [email_address] Interpol : http://interpol.int CCF : http://interpol.int/Public/ccf/default.asp

Notes de l'éditeur

  1. Under international law: right to conclude treaties, to present and receive international claims - In national legal systems: right to enter into contractual relationships, to acquire goods, to bring an action in court