SlideShare une entreprise Scribd logo
1  sur  18
Legislation on Cyber Security
in
the European Union,
the Eastern Partnership
and the United States
Kostiantyn Iakovliev (Ukraine)
MA in Human Rights and Democratization
Yerevan State University, 2013
New type of warfare
“Cyber warfare
has become an
unavoidable element in
any discussion of
international security”
- 2011 report on Cyber security
and Cyber warfare by the United
Nations Institute for Disarmament
Research (UNIDIR)
2 definitions
As a means to usual
crimes
• Transfer of pornography
• Promoting violence
• Harassing others

As a tool for computerspecific crimes
• Obtaining of banking
passwords
• Disruption of information
flow

Note: some laws regulating both spheres
may infringe freedom of speech
Aims of Cyber Attacks
• Accessing military secrets
• Extracting commercial secrets (for further
re-selling at the black market)

• Stealing banking data and private
information
• Interrupting information flow
• Exercising propaganda
• Terrorist acts (for example, targeting vital
infrastructure)
Legal Challenges
• Uncertainty (Who did it? – anonimizers &
proxies)
– China & US accusing each other
– South Korea usually targeted by North Korea and
China but not always

• Unpredictability (When they will do it? –
hard to predict although cyber units exist)
– Cyber units in China and North Korea
Legislation - UN
• International Telecommunication Union
- an UN agency for information and
communication technologies

• 2012 treaty not supported by US and
EU due to infringing freedom of speech
Signed: Azerbaijan and Ukraine
http://www.itu.int/cybersecurity/
Legislation - US
• Individual state bills
• National law scraped due to infringing
freedom of speech
• Executive orders of the President
Legislation - EU
• Communication on
Cyber security strategy
• 2013 - Directive on attacks
against information
systems
– Requires public
– institutions to report
security breaches in their
networks (issue of respect
vs national policy)
Legislation – CoE
(Belarus not member)
• Council of Europe
Convention on
Cybercrime
– national contact
point on cyber
security
(Azerbaijan and Ukraine
with reservations)
Legislation - CIS
• Agreement on cooperation with the
Commonwealth of Independent States
Legislation - Armenia
 Often a target of attacks by Azerbaijani and
Turkish hackers (propaganda)
 International conferences and trainings (OSCE,
NATO)
 State Cyber Security Committee - planned
Legislation - Azerbaijan
 Often a target by hackers (counter propaganda
attacks)
 International conferences and trainings (OSCE,
NATO)
 Criminal Code articles
 Center of coordination structure of electronic
security - planned
Legislation - Belarus
 Army cyber units
established
 International
conferences and
trainings (OSCE, NATO)
 Issues of freedom of
speech under totalitarian
rule
Legislation - Georgia
 International conferences and trainings (OSCE,
NATO)
Legislation - Moldova
 International
conferences
and trainings
(OSCE,
NATO)
Legislation - Ukraine
 A bill of amendments to the Law of Ukraine "On
the Bases of the National Security of Ukraine"
concerning cyber security issues
 International conferences and trainings (OSCE,
NATO)
 Ukraine’s Strategic Defence Bulletin Draft
Conclusions
• More specific legislation needed but it
should not infringe freedom of speech
• International collaboration matters
Kostiantyn Iakovliev
(Ukraine)

https://plus.google.com/u/0/+K

https://www.linkedin.com/in/ia
See more on this topic within
context of cyber warfare in my
presentation at Yerevan
International Conference on IHL at
RAU in, 2012

Contenu connexe

Tendances

Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetVincy
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacyYasmin AbdelAziz
 
Communications Surveillance: Justification and Efficacy
Communications Surveillance: Justification and EfficacyCommunications Surveillance: Justification and Efficacy
Communications Surveillance: Justification and Efficacyblogzilla
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Metamorphosis
 
Anti Trafficking - The Rules
Anti Trafficking - The RulesAnti Trafficking - The Rules
Anti Trafficking - The RulesJohn Weeks
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaAPNIC
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internetblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandArthit Suriyawongkul
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsArthit Suriyawongkul
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...MIS Quarterly
 
Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...
Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...
Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...Burton Lee
 

Tendances (20)

Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Communications Surveillance: Justification and Efficacy
Communications Surveillance: Justification and EfficacyCommunications Surveillance: Justification and Efficacy
Communications Surveillance: Justification and Efficacy
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
 
Anti Trafficking - The Rules
Anti Trafficking - The RulesAnti Trafficking - The Rules
Anti Trafficking - The Rules
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internet
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil Rights
 
Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...
 
Is the algorithm reliable? The collaboration between technology and humans in...
Is the algorithm reliable? The collaboration between technology and humans in...Is the algorithm reliable? The collaboration between technology and humans in...
Is the algorithm reliable? The collaboration between technology and humans in...
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
 
Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...
Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...
Peter Fatelnig - EU Delegation to USA - Content Matters & EU Leadership - Sta...
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 

Similaire à Cyber Security Laws

Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 
LSE Conference on Human Rights in Ethiopia
LSE  Conference on Human Rights in EthiopiaLSE  Conference on Human Rights in Ethiopia
LSE Conference on Human Rights in EthiopiaKinfe Micheal Yilma
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessmentblogzilla
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong CountriesArthit Suriyawongkul
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Anna Gomez
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE-Journal ICT4D
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesArthit Suriyawongkul
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Cristian Driga
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Brian Honan
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.pptJiaJunWang17
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internetblogzilla
 

Similaire à Cyber Security Laws (20)

Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
LSE Conference on Human Rights in Ethiopia
LSE  Conference on Human Rights in EthiopiaLSE  Conference on Human Rights in Ethiopia
LSE Conference on Human Rights in Ethiopia
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internet
 
OTI Cyber warefare
OTI Cyber warefareOTI Cyber warefare
OTI Cyber warefare
 

Plus de Konstantin Yakovlev

International Protection of Children left without Parental Custody
International Protection of Children left without Parental CustodyInternational Protection of Children left without Parental Custody
International Protection of Children left without Parental CustodyKonstantin Yakovlev
 
Coursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign PolicyCoursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign PolicyKonstantin Yakovlev
 
EU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000sEU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000sKonstantin Yakovlev
 
Совет министров обороны СНГ
Совет министров обороны СНГСовет министров обороны СНГ
Совет министров обороны СНГKonstantin Yakovlev
 
Application of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksApplication of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksKonstantin Yakovlev
 
Linguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countriesLinguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countriesKonstantin Yakovlev
 

Plus de Konstantin Yakovlev (7)

Political Instability Index
Political Instability IndexPolitical Instability Index
Political Instability Index
 
International Protection of Children left without Parental Custody
International Protection of Children left without Parental CustodyInternational Protection of Children left without Parental Custody
International Protection of Children left without Parental Custody
 
Coursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign PolicyCoursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign Policy
 
EU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000sEU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000s
 
Совет министров обороны СНГ
Совет министров обороны СНГСовет министров обороны СНГ
Совет министров обороны СНГ
 
Application of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksApplication of IHL to Computer Network Attacks
Application of IHL to Computer Network Attacks
 
Linguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countriesLinguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countries
 

Dernier

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Dernier (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Cyber Security Laws

  • 1. Legislation on Cyber Security in the European Union, the Eastern Partnership and the United States Kostiantyn Iakovliev (Ukraine) MA in Human Rights and Democratization Yerevan State University, 2013
  • 2. New type of warfare “Cyber warfare has become an unavoidable element in any discussion of international security” - 2011 report on Cyber security and Cyber warfare by the United Nations Institute for Disarmament Research (UNIDIR)
  • 3. 2 definitions As a means to usual crimes • Transfer of pornography • Promoting violence • Harassing others As a tool for computerspecific crimes • Obtaining of banking passwords • Disruption of information flow Note: some laws regulating both spheres may infringe freedom of speech
  • 4. Aims of Cyber Attacks • Accessing military secrets • Extracting commercial secrets (for further re-selling at the black market) • Stealing banking data and private information • Interrupting information flow • Exercising propaganda • Terrorist acts (for example, targeting vital infrastructure)
  • 5. Legal Challenges • Uncertainty (Who did it? – anonimizers & proxies) – China & US accusing each other – South Korea usually targeted by North Korea and China but not always • Unpredictability (When they will do it? – hard to predict although cyber units exist) – Cyber units in China and North Korea
  • 6. Legislation - UN • International Telecommunication Union - an UN agency for information and communication technologies • 2012 treaty not supported by US and EU due to infringing freedom of speech Signed: Azerbaijan and Ukraine http://www.itu.int/cybersecurity/
  • 7. Legislation - US • Individual state bills • National law scraped due to infringing freedom of speech • Executive orders of the President
  • 8. Legislation - EU • Communication on Cyber security strategy • 2013 - Directive on attacks against information systems – Requires public – institutions to report security breaches in their networks (issue of respect vs national policy)
  • 9. Legislation – CoE (Belarus not member) • Council of Europe Convention on Cybercrime – national contact point on cyber security (Azerbaijan and Ukraine with reservations)
  • 10. Legislation - CIS • Agreement on cooperation with the Commonwealth of Independent States
  • 11. Legislation - Armenia  Often a target of attacks by Azerbaijani and Turkish hackers (propaganda)  International conferences and trainings (OSCE, NATO)  State Cyber Security Committee - planned
  • 12. Legislation - Azerbaijan  Often a target by hackers (counter propaganda attacks)  International conferences and trainings (OSCE, NATO)  Criminal Code articles  Center of coordination structure of electronic security - planned
  • 13. Legislation - Belarus  Army cyber units established  International conferences and trainings (OSCE, NATO)  Issues of freedom of speech under totalitarian rule
  • 14. Legislation - Georgia  International conferences and trainings (OSCE, NATO)
  • 15. Legislation - Moldova  International conferences and trainings (OSCE, NATO)
  • 16. Legislation - Ukraine  A bill of amendments to the Law of Ukraine "On the Bases of the National Security of Ukraine" concerning cyber security issues  International conferences and trainings (OSCE, NATO)  Ukraine’s Strategic Defence Bulletin Draft
  • 17. Conclusions • More specific legislation needed but it should not infringe freedom of speech • International collaboration matters
  • 18. Kostiantyn Iakovliev (Ukraine) https://plus.google.com/u/0/+K https://www.linkedin.com/in/ia See more on this topic within context of cyber warfare in my presentation at Yerevan International Conference on IHL at RAU in, 2012