SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
„between a rock and a hard place“

Maximilian Schubert
21.08.2012, EFA 2012 - Alpbach
Overview




    About ISPA
    Implementation Data Retention Directive
    Official Requests for Information by LEA
    Outlook & Future Challenges
About ISPA


   • Founded 1997
   • Approximately 200 members from the fields of
     access, hosting, content, services etc.
    – 75 % purely Austrian companies
    – 25 % are part of international organizations
    – Two thirds of members have up to 25 employees
    – 50% more than € 1 Mio. annual turnover
    – Customer structure
      60% mainly business customers
      10% mainly private customers
      30% both
ISPA’s mission statement



„ISPA is the Austrian association of Internet
Service Providers, representing approximately
200 ISPs. ISPA is the major voice of the Austrian
Internet industry. Our goal is to shape the
economic and legal framework supporting optimal
growth of the Internet and Internet services. We
regard the use of the Internet as an important
cultural skill and acknowledge the resulting socio-
political responsibilities.”
Stopline.at
- an International Success Story -

 ISPA founded Stopline.at, the Austrian internet hotline for

 • Child Pornography
    – § 207 a StGB (Austrian Penalty Act)
 • National Socialist (‘Nazi’) Offences
    – VerbotsG, Abzeichengesetz

 Reports are handled anonymously, no feedback is provided.

                 “Deletion instead of
                  blocking & filtering”
Stopline - workflow
Number of illegal content found remains
relatively stable



                                                                                                  6000


                                                                                                  5000


                                                                                                  4000


                                                                                                  3000


                                                                                                  2000


                                                                                                  1000


                                                                                                  0
                                                                             2009   2010   2011
                                                        2006   2007   2008
                                   2003   2004   2005
         2000    2001     2002
  1999


          Potentially illegal reports              Incoming reports
Some numbers



 More than 21.000 reports since 1998; continuous increase,
 most likely due to increased awareness.

 ● Approx. 16% of all reports refer to obviously illegal content
 ● Approx. 95% of valid reports refer to child pornography
 ● Approx. 5% of valid reports refer to national socialist offences




             In 2011 in only one case illegal content
            was found to be hosted by an Austrian ISP.
Overview




    About ISPA
    Implementation Data Retention Directive
    Official Requests for Information by LEA
    Outlook & Future Challenges
Timeframe for the implementation


  2006    2007      2008        2009        2010           2011                 2012
                                                                                                   t


   2006                         Feb 2009                                  Dec 2011
Enactment of                 Assignment of a                             Publication of
DR-Directive               Human Rights Institute                      first tech. spec.

         2007                       Nov 2009                 May 2011                 1st April 2012
   Failure of the 1st            Draft of revised           Enactment of             commencement
   implementation              Telecommunications           national acts            of retention duty
                                    Act (TKG)
                                                   July 2010                      30th of March 2012
                                               ECJ: Infringement                 Enactment of decree for
                                                   of EU law                     reimbursement of costs

                                                                                   late March 2012
                                                                                 planned go-live of the
                                                                                data exchange interface
                                                                                (“Durchlaufstelle”; DLS)
Data Retention in Austria - Factsheet



• Retention of traffic data, no content data
  (Access-IP, mobile communication, Email)

• Retention for a maximum period of six month
• Access to retained data only for criminal offences
• Exceptions for small ISPs and certain technologies
  (approx. EUR 300.000 yearly turnover, public ISPs, NAT/PAT)

• Data remains with the IPS, exchange interface (DLS)
  and use of CSV-Files to prevent data mining
• No “ex ante” safeguards for lawyers, doctors, etc.
ISPA actively participated in the
implementation

   ISPA helped to scope an interface (DLS) which
   facilitates the secure and transparent exchange of
   information (CSV-File), while providing a high level of
   security and transparency.




                                       DLS could provide information on the
                                       total number of requests for
                                       information!
Data Retention in Austria
- Summary -

 The Good
      • Legal definition of “dynamic”-IP-Adr
      • High degree of security through DLS

 The Bad
      • Very incoherent legal framework & numerous delays

 The Ugly
      • No requirements for judicial decree & no minimum
        sentence required for most important cases (e.g. IP-Adr.)
      • Incomplete statistics
Overview




    About ISPA
    Implementation Data Retention Directive
    Official Requests for Information by LEA
    Outlook & Future Challenges
Cooperation with LEA:
continuous improvement

 • Numerous and lengthy legal disputes concerning “dynamic
   IP-addresses” within last couple of years.

 • Reference by the Austrian Supreme Court (OGH) to the
   European Court of Justice on this matter

 • Clarification through adaption of the Austrian
   Telecommunications Act §92 Par 3 Z 16 TKG

     ISPA position paper and sample answers provide
      guidance for ISPs and LEAs.
ISPA supports members and LEAs
 •   formal requirements (e.g. request in writing)
 •   substantial requirements (within 48hrs, continuing danger)
Requests for information under
Austrian Law – legal environment

 • Requests for information can be
   based on different legal grounds
   -   Telecommunications Act 2003              (TKG)
   -   Security Police Act                      (SPG)
   -   Criminal Procedure Act                   (StPO)
   -   eCommerce Act                            (eCommG)
   -   Federal Act Against Unfair Competition   (UWG)
Overview




    About ISPA
    Implementation Data Retention Directive
    Official Requests for Information by LEA
    Outlook & Future Challenges
Future challenges for ISPs
- Intermediary Liability -

 Directive 2000/31/EC 'Directive on electronic commerce'

 Article 14
 Hosting
 1. Where an information society service is provided that consists of the storage of
     information provided by a recipient of the service, Member States shall ensure
     that the service provider is not liable for the information stored at the
     request of a recipient of the service, on condition that:
 (a) the provider does not have actual knowledge of illegal activity or information and,
     as regards claims for damages, is not aware of facts or circumstances from
     which the illegal activity or information is apparent; or
 (b) the provider, upon obtaining such knowledge or awareness, acts expeditiously
     to remove or to disable access to the information.
Future challenges for ISPs
- ACTA et al -

 Anti-Counterfeiting Trade Agreement - ACTA [3.12.2011]

 Art 27
 ENFORCEMENT IN THE DIGITAL ENVIRONMENT
 2. Further to paragraph 1, each Party’s enforcement procedures shall apply to
     infringement of copyright or related rights over digital networks, which may
     include the unlawful use of means of widespread distribution for infringing
     purposes. These procedures shall be implemented in a manner that avoids the
     creation of barriers to legitimate activity, including electronic commerce, and,
     consistent with that Party’s law, preserves fundamental principles such as
     freedom of expression, fair process, and privacy.1

    1Forinstance, without prejudice to a Party’s law, adopting or maintaining a
    regime providing for limitations on the liability of, or on the remedies available
    against, online service providers while preserving the legitimate interests of right
    holder.
Future challenges for ISPs
- Net Neutrality -




             Net Neutrality
                   vs.
         Network Management
Future challenges for ISPs
- Net Neutrality -




             Net Neutrality
                   vs.
         Network Management
Future challenges for ISPs
- Privacy -
Future challenges for ISPs



 ● Continuous improvement of awareness
   about the safe use of the Internet
   (e.g. Stopline.at, saferinternet.at)
 ● Efforts to reduce legal uncertainty as to the
   liability of ISPs for illegal conduct by their
   customers
 ● Contribution to the discussion on copyright and
   its enforcement
Contact details:

Email:     maximilian.schubert@ispa.at
Phone:     +43 1 409 55 76
Web:       www.ispa.at
BACKUP




    BACK UP
BACKUP




   NAT/PAT
Explanation: NAT/PAT


                                                                                                    internal IP: 10.xxx.xx1




                                                                                                                                 internal IP: 10.xxx.xx2

                                     Ports           Öffentliche POOLADRESSEN
                                                                                      10.xxx.xx7
                                     Port_a          IP_a_194.xxx.xxx.xxa             10.xxx.xx1
                                     Port_b           IP_b_194.xxx.xxx.xxb            10.xxx.xx2
                                     Port_c            IP_c_194.xxx.xxx.xxc           10.xxx.xx3
                                     Port_xy            IP_xy_194.xxx.xxx.xxd         10.xxx.xx4
                                               PAT                              NAT                                                      internal IP: 10.xxx.xx3




  Public IP 194.xxx.xxx.xxb Port a
                                                                                                                         Internal IP: 10.xxx.xx5

  Public IP 194.xxx.xxx.xxb Port b           Ports differ
  Public IP 194.xxx.xxx.xxb Port c                                                                 internal IP: 10.xxx.xx1




                 IP-Adr. identical
Explanation: NAT/PAT

 Even after the implementation of the data retention Directive in
 Austria ISPs are not under the obligation to store internal IP: 10.xxx.xx1
                                                    NAT (internal
 IP addresses) and PAT (Port) information, as such information
 also had not been stored before the implementation.
                                                                                                                               internal IP: 10.xxx.xx2

                                       Ports           Öffentliche POOLADRESSEN
                                                                                        10.xxx.xx7
                                       Port_a          IP_a_194.xxx.xxx.xxa             10.xxx.xx1
                                       Port_b           IP_b_194.xxx.xxx.xxb            10.xxx.xx2
                                       Port_c            IP_c_194.xxx.xxx.xxc           10.xxx.xx3
                                       Port_xy            IP_xy_194.xxx.xxx.xxd         10.xxx.xx4
                                                 PAT                              NAT                                                 internal IP: 10.xxx.xx3




Requests must not be answered by the ISP, if the information
    Public IP 194.xxx.xxx.xxb Port a
provided would identify a “larger number” of subscribers Internal IP: 10.xxx.xx5
                                     Ports differ
(“größere Anzahl” von TeilnehmerInnen).
    Public IP 194.xxx.xxx.xxb Port b

    Public IP 194.xxx.xxx.xxb Port c                                                                 internal IP: 10.xxx.xx1




                   IP-Adr. identical

Contenu connexe

Similaire à 20120822 schubert alpbach_final

Sydney 22 March: EU neutrality
Sydney 22 March: EU neutralitySydney 22 March: EU neutrality
Sydney 22 March: EU neutralityChris Marsden
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesMartyn Taylor
 
Net neutrality 9/11 2016 LSE
Net neutrality 9/11 2016 LSENet neutrality 9/11 2016 LSE
Net neutrality 9/11 2016 LSEChris Marsden
 
(Pre-) history of European Network Neutrality and Human Rights
(Pre-) history of European Network Neutrality and Human Rights(Pre-) history of European Network Neutrality and Human Rights
(Pre-) history of European Network Neutrality and Human RightsChris Marsden
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissieEuropadialoog
 
Marsden Kingston: Net Neutrality: Past, Evidence, Present, Future
Marsden Kingston: Net Neutrality: Past, Evidence, Present, FutureMarsden Kingston: Net Neutrality: Past, Evidence, Present, Future
Marsden Kingston: Net Neutrality: Past, Evidence, Present, FutureChris Marsden
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johansonsegughana
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012Chris Marsden
 
New appraoch in mobile telecom operators analysis rg - presentation
New appraoch in mobile telecom operators analysis   rg - presentationNew appraoch in mobile telecom operators analysis   rg - presentation
New appraoch in mobile telecom operators analysis rg - presentationIgor Jurčić
 
SPOCS Presentation EEMA Conference London June 2010
SPOCS Presentation EEMA Conference London June 2010SPOCS Presentation EEMA Conference London June 2010
SPOCS Presentation EEMA Conference London June 2010Dinand Tinholt
 
Using eID for business startup in Europe
Using eID for business startup in EuropeUsing eID for business startup in Europe
Using eID for business startup in EuropeDinand Tinholt
 
The National Security Framework of Spain
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of SpainMiguel A. Amutio
 
Net Neutrality at United Nations Internet Governance Forum 2013
Net Neutrality at United Nations Internet Governance Forum 2013Net Neutrality at United Nations Internet Governance Forum 2013
Net Neutrality at United Nations Internet Governance Forum 2013Chris Marsden
 
European Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMAEuropean Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMARachel Aldighieri
 
Wireless Network Optimization (2010)
Wireless Network Optimization (2010)Wireless Network Optimization (2010)
Wireless Network Optimization (2010)Marc Jadoul
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentationITU
 

Similaire à 20120822 schubert alpbach_final (20)

Sydney 22 March: EU neutrality
Sydney 22 March: EU neutralitySydney 22 March: EU neutrality
Sydney 22 March: EU neutrality
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
 
Net neutrality 9/11 2016 LSE
Net neutrality 9/11 2016 LSENet neutrality 9/11 2016 LSE
Net neutrality 9/11 2016 LSE
 
(Pre-) history of European Network Neutrality and Human Rights
(Pre-) history of European Network Neutrality and Human Rights(Pre-) history of European Network Neutrality and Human Rights
(Pre-) history of European Network Neutrality and Human Rights
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
 
EU Data Protection Regulation Skyhigh Networks
EU Data Protection Regulation Skyhigh NetworksEU Data Protection Regulation Skyhigh Networks
EU Data Protection Regulation Skyhigh Networks
 
Marsden Kingston: Net Neutrality: Past, Evidence, Present, Future
Marsden Kingston: Net Neutrality: Past, Evidence, Present, FutureMarsden Kingston: Net Neutrality: Past, Evidence, Present, Future
Marsden Kingston: Net Neutrality: Past, Evidence, Present, Future
 
Net neutrality 2021
Net neutrality 2021Net neutrality 2021
Net neutrality 2021
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
Challenges on OTT´s regulation
Challenges on OTT´s regulationChallenges on OTT´s regulation
Challenges on OTT´s regulation
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012
 
New appraoch in mobile telecom operators analysis rg - presentation
New appraoch in mobile telecom operators analysis   rg - presentationNew appraoch in mobile telecom operators analysis   rg - presentation
New appraoch in mobile telecom operators analysis rg - presentation
 
SPOCS Presentation EEMA Conference London June 2010
SPOCS Presentation EEMA Conference London June 2010SPOCS Presentation EEMA Conference London June 2010
SPOCS Presentation EEMA Conference London June 2010
 
Using eID for business startup in Europe
Using eID for business startup in EuropeUsing eID for business startup in Europe
Using eID for business startup in Europe
 
The National Security Framework of Spain
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of Spain
 
Net Neutrality at United Nations Internet Governance Forum 2013
Net Neutrality at United Nations Internet Governance Forum 2013Net Neutrality at United Nations Internet Governance Forum 2013
Net Neutrality at United Nations Internet Governance Forum 2013
 
European Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMAEuropean Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMA
 
Wireless Network Optimization (2010)
Wireless Network Optimization (2010)Wireless Network Optimization (2010)
Wireless Network Optimization (2010)
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentation
 

Dernier

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Dernier (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

20120822 schubert alpbach_final

  • 1. „between a rock and a hard place“ Maximilian Schubert 21.08.2012, EFA 2012 - Alpbach
  • 2. Overview About ISPA Implementation Data Retention Directive Official Requests for Information by LEA Outlook & Future Challenges
  • 3. About ISPA • Founded 1997 • Approximately 200 members from the fields of access, hosting, content, services etc. – 75 % purely Austrian companies – 25 % are part of international organizations – Two thirds of members have up to 25 employees – 50% more than € 1 Mio. annual turnover – Customer structure 60% mainly business customers 10% mainly private customers 30% both
  • 4. ISPA’s mission statement „ISPA is the Austrian association of Internet Service Providers, representing approximately 200 ISPs. ISPA is the major voice of the Austrian Internet industry. Our goal is to shape the economic and legal framework supporting optimal growth of the Internet and Internet services. We regard the use of the Internet as an important cultural skill and acknowledge the resulting socio- political responsibilities.”
  • 5. Stopline.at - an International Success Story - ISPA founded Stopline.at, the Austrian internet hotline for • Child Pornography – § 207 a StGB (Austrian Penalty Act) • National Socialist (‘Nazi’) Offences – VerbotsG, Abzeichengesetz Reports are handled anonymously, no feedback is provided. “Deletion instead of blocking & filtering”
  • 7. Number of illegal content found remains relatively stable 6000 5000 4000 3000 2000 1000 0 2009 2010 2011 2006 2007 2008 2003 2004 2005 2000 2001 2002 1999 Potentially illegal reports Incoming reports
  • 8. Some numbers More than 21.000 reports since 1998; continuous increase, most likely due to increased awareness. ● Approx. 16% of all reports refer to obviously illegal content ● Approx. 95% of valid reports refer to child pornography ● Approx. 5% of valid reports refer to national socialist offences In 2011 in only one case illegal content was found to be hosted by an Austrian ISP.
  • 9. Overview About ISPA Implementation Data Retention Directive Official Requests for Information by LEA Outlook & Future Challenges
  • 10. Timeframe for the implementation 2006 2007 2008 2009 2010 2011 2012 t 2006 Feb 2009 Dec 2011 Enactment of Assignment of a Publication of DR-Directive Human Rights Institute first tech. spec. 2007 Nov 2009 May 2011 1st April 2012 Failure of the 1st Draft of revised Enactment of commencement implementation Telecommunications national acts of retention duty Act (TKG) July 2010 30th of March 2012 ECJ: Infringement Enactment of decree for of EU law reimbursement of costs late March 2012 planned go-live of the data exchange interface (“Durchlaufstelle”; DLS)
  • 11. Data Retention in Austria - Factsheet • Retention of traffic data, no content data (Access-IP, mobile communication, Email) • Retention for a maximum period of six month • Access to retained data only for criminal offences • Exceptions for small ISPs and certain technologies (approx. EUR 300.000 yearly turnover, public ISPs, NAT/PAT) • Data remains with the IPS, exchange interface (DLS) and use of CSV-Files to prevent data mining • No “ex ante” safeguards for lawyers, doctors, etc.
  • 12. ISPA actively participated in the implementation ISPA helped to scope an interface (DLS) which facilitates the secure and transparent exchange of information (CSV-File), while providing a high level of security and transparency. DLS could provide information on the total number of requests for information!
  • 13. Data Retention in Austria - Summary - The Good • Legal definition of “dynamic”-IP-Adr • High degree of security through DLS The Bad • Very incoherent legal framework & numerous delays The Ugly • No requirements for judicial decree & no minimum sentence required for most important cases (e.g. IP-Adr.) • Incomplete statistics
  • 14. Overview About ISPA Implementation Data Retention Directive Official Requests for Information by LEA Outlook & Future Challenges
  • 15. Cooperation with LEA: continuous improvement • Numerous and lengthy legal disputes concerning “dynamic IP-addresses” within last couple of years. • Reference by the Austrian Supreme Court (OGH) to the European Court of Justice on this matter • Clarification through adaption of the Austrian Telecommunications Act §92 Par 3 Z 16 TKG  ISPA position paper and sample answers provide guidance for ISPs and LEAs.
  • 16. ISPA supports members and LEAs • formal requirements (e.g. request in writing) • substantial requirements (within 48hrs, continuing danger)
  • 17. Requests for information under Austrian Law – legal environment • Requests for information can be based on different legal grounds - Telecommunications Act 2003 (TKG) - Security Police Act (SPG) - Criminal Procedure Act (StPO) - eCommerce Act (eCommG) - Federal Act Against Unfair Competition (UWG)
  • 18. Overview About ISPA Implementation Data Retention Directive Official Requests for Information by LEA Outlook & Future Challenges
  • 19. Future challenges for ISPs - Intermediary Liability - Directive 2000/31/EC 'Directive on electronic commerce' Article 14 Hosting 1. Where an information society service is provided that consists of the storage of information provided by a recipient of the service, Member States shall ensure that the service provider is not liable for the information stored at the request of a recipient of the service, on condition that: (a) the provider does not have actual knowledge of illegal activity or information and, as regards claims for damages, is not aware of facts or circumstances from which the illegal activity or information is apparent; or (b) the provider, upon obtaining such knowledge or awareness, acts expeditiously to remove or to disable access to the information.
  • 20. Future challenges for ISPs - ACTA et al - Anti-Counterfeiting Trade Agreement - ACTA [3.12.2011] Art 27 ENFORCEMENT IN THE DIGITAL ENVIRONMENT 2. Further to paragraph 1, each Party’s enforcement procedures shall apply to infringement of copyright or related rights over digital networks, which may include the unlawful use of means of widespread distribution for infringing purposes. These procedures shall be implemented in a manner that avoids the creation of barriers to legitimate activity, including electronic commerce, and, consistent with that Party’s law, preserves fundamental principles such as freedom of expression, fair process, and privacy.1 1Forinstance, without prejudice to a Party’s law, adopting or maintaining a regime providing for limitations on the liability of, or on the remedies available against, online service providers while preserving the legitimate interests of right holder.
  • 21. Future challenges for ISPs - Net Neutrality - Net Neutrality vs. Network Management
  • 22. Future challenges for ISPs - Net Neutrality - Net Neutrality vs. Network Management
  • 23. Future challenges for ISPs - Privacy -
  • 24. Future challenges for ISPs ● Continuous improvement of awareness about the safe use of the Internet (e.g. Stopline.at, saferinternet.at) ● Efforts to reduce legal uncertainty as to the liability of ISPs for illegal conduct by their customers ● Contribution to the discussion on copyright and its enforcement
  • 25. Contact details: Email: maximilian.schubert@ispa.at Phone: +43 1 409 55 76 Web: www.ispa.at
  • 26. BACKUP BACK UP
  • 27. BACKUP NAT/PAT
  • 28. Explanation: NAT/PAT internal IP: 10.xxx.xx1 internal IP: 10.xxx.xx2 Ports Öffentliche POOLADRESSEN 10.xxx.xx7 Port_a IP_a_194.xxx.xxx.xxa 10.xxx.xx1 Port_b IP_b_194.xxx.xxx.xxb 10.xxx.xx2 Port_c IP_c_194.xxx.xxx.xxc 10.xxx.xx3 Port_xy IP_xy_194.xxx.xxx.xxd 10.xxx.xx4 PAT NAT internal IP: 10.xxx.xx3 Public IP 194.xxx.xxx.xxb Port a Internal IP: 10.xxx.xx5 Public IP 194.xxx.xxx.xxb Port b Ports differ Public IP 194.xxx.xxx.xxb Port c internal IP: 10.xxx.xx1 IP-Adr. identical
  • 29. Explanation: NAT/PAT Even after the implementation of the data retention Directive in Austria ISPs are not under the obligation to store internal IP: 10.xxx.xx1 NAT (internal IP addresses) and PAT (Port) information, as such information also had not been stored before the implementation. internal IP: 10.xxx.xx2 Ports Öffentliche POOLADRESSEN 10.xxx.xx7 Port_a IP_a_194.xxx.xxx.xxa 10.xxx.xx1 Port_b IP_b_194.xxx.xxx.xxb 10.xxx.xx2 Port_c IP_c_194.xxx.xxx.xxc 10.xxx.xx3 Port_xy IP_xy_194.xxx.xxx.xxd 10.xxx.xx4 PAT NAT internal IP: 10.xxx.xx3 Requests must not be answered by the ISP, if the information Public IP 194.xxx.xxx.xxb Port a provided would identify a “larger number” of subscribers Internal IP: 10.xxx.xx5 Ports differ (“größere Anzahl” von TeilnehmerInnen). Public IP 194.xxx.xxx.xxb Port b Public IP 194.xxx.xxx.xxb Port c internal IP: 10.xxx.xx1 IP-Adr. identical