SlideShare une entreprise Scribd logo
1  sur  36
ACCOUNTABILITY , CYBER
SECURITY AND CYBER PEACE
A PRESENTATION
BY
DR. PAVAN DUGGAL
ADVOCATE, SUPREME COURT OF
INDIA
CHAIRMAN, INTERNATIONAL
COMMISSION ON CYBER SECURITY
LAW
PRESIDENT, CYBERLAWS.NET
CHIEF EXECUTIVE, ARTIFICIAL
INTELLIGENCE LAW HUB
CYBER ATTACK IN UTAH
© of images belongs to the respective
copyright holders
WHATSAPP SNOOPING
© of images belongs to the respective
copyright holders
PAYMENT CARD BREACH
© of images belongs to the respective
copyright holders
CYBER SECURITY AND
ACCOUNTABILITY
• Breaches of cyber security lead to big
questions on accountability.
• How can state and non-state actors
be made accountable for cyber security
breaches?
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• This accountability issue is directly
linked to the protection and preservation
of cyber security and peace in cyberspace.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• Attribution is one of the basic
problems, given the fact that most of the
cyber security breachers are using the
darknet.
• Increasing trends amongst countries
to come up with distinct national
legislations on cyber security.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• These legislations tend to try to address
international issues using national approaches.
• It might be a good initial step but may not be a long
term sustainable step.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• The absence of a global Cyberlaw
effectively means that norms pertaining to
acceptance standards are still not
developed.
• Even the debate pertaining to norms
of behavior in cyberspace have not been
adequately concluded.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• The recent two ongoing processes
in the United Nations being the
UNGGE and UN Open Ended
Working Group could further
contribute in this direction.
These two new groups are continuing
on their deliberations on how to
evolve norms in cyberspace.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• Cyber security and accountability
are two intrinsically paradoxical
terms.
• Today various states and non-
states actors want to do large
number of covert and over activities
for the purposes of fulfillment of
their own objectives.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• Number of countries are today increasingly having
in place cyber armies not just to protect their
sovereignty but also for the purposes of ensuring that
they do other activities which could have an impact
upon sovereignty of other countries.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• The advent of darknet has further
complicated the issue of accountability
on cyber security.
• Today cyber peace is a constantly
evolving concept.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• Large number of cyber attacks are happening
targeted at breaching cyber security of various critical
information infrastructure.
© of images belongs to the respective copyright
holders
NUCELAR POWER CYBER
MALWARE ATTACK
© of images belongs to the respective
copyright holders
CYBER ATTACK IN SOUTH AFRICA
© of images belongs to the respective
copyright holders
CYBER SECURITY AND
ACCOUNTABILITY
• New legislative approaches required to be adopted
in this regard.
• Further, for ensuring cyber peace, it is important
that appropriate legal protections need to be provided
to the private sector.
© of images belongs to the respective copyright
holders
CHINESE NEW LAW ON CYBER
SECURITY
New Chinese law lays emphasis
on cyber security aspects.
China has adopted a distinctive
approach of mingling cyber security
within the broader ambit of national
security.
CHINESE APPROACHES ON CYBER
SECURITY LAW
The way the provisions of the
said law has been drafted are so
wide to include within their ambit
all kinds of cyber security
breaches as any cyber security
breach is going to influence
national security, social stability as
also prejudicial impact the
preservation of public safety and
societal tranquility.
© of images belongs to the respective copyright
holders
GLOBAL AND NATIONAL APPROACHES
ON CYBER SECURITY LAW
Russia recently passed a law which actually
mandated service providers to ensure that all
data pertaining to Russians must be
physically located within the territorial
boundaries of Russia.
Consequently, we have begun to see a trend
where various national governments are now
increasingly looking in the direction of
coming up with appropriate national
approaches to deal with the international
issue of cyber security.
GLOBAL AND NATIONAL APPROACHES
ON CYBER SECURITY LAW
© of images belongs to the respective
copyright holders
RUSSIAN RUNET LAW
© of images belongs to the respective
copyright holders
THAILAND CYBER SECURITY LAW
© of images belongs to the respective
copyright holders
AUSTRALIA’S ANTI-ENCRYPTION LAW
© of images belongs to the respective
copyright holders
INTERNATIONAL CYBERSECURITY
LAW - TAIWAN
© of images belongs to the respective
copyright holders
DEVELOPMENTS AT
INTERNATIONAL LEVEL
SINGAPORE
CYBER SECURITY
LAW
EGYPT CYBER
SECURITY LAW
© of images belongs to the respective copyright
holders
DEVELOPMENTS AT
INTERNATIONAL LEVEL
In addition, there are also various cyber
security strategies that different countries
have come up in place.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• Cyber security safe harbor in Ohio has now led the
example where companies are now exempt from
potential exposure to legal liability in case if they do
comply with the minimum requirements of cyber
security.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• The misuse of Artificial
Intelligence on the darknet for
breaching cyber security of
networks has begun to start
emerging as another big
problem.
• The principles of
accountability must be
established for the purposes of
cyber security compliances.
CALIFORNIA LAW ON IOT
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• Companies must be mandated to
follow minimum security levels of
practices and procedures.
• California has passed a law which
comes into effect from 1st January, 2020
which mandates the installation of
reasonable security features in all IoT
devices from 1st January, 2020.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• The work done by the International Commission on
Cyber Security Law in terms of collating common legal
principles to govern and regulating cyber security at a
global level.
© of images belongs to the respective copyright
holders
CYBER SECURITY AND
ACCOUNTABILITY
• There is a need to come up with common
minimum denominators for regulating cyber security
so that there can be more accountability and hence
contribute to cyber peace.
The sacrosanct nature of cyberspace as a common
heritage of human mankind needs to be
reemphasized.
There needs to be more work done.
© of images belongs to the respective copyright
holders
INTERNATIONAL CONFERENCE ON
CYBERLAW, CYBERCRIME & CYBER
SECURITY,NEW DELHI, INDIA
(20TH TO 22ND NOVEMBER, 2019)
 The International Conference on Cyberlaw, Cybercrime & Cyber Security
(www.cyberlawcybercrime.com) has provided the platform to discuss about
emerging Cyberlaw, Cybercrime and Cybersecurity trends.
© of images belongs to the respective
copyright holders
A PRESENTATION
BY
DR. PAVAN DUGGAL
ADVOCATE, SUPREME COURT OF
INDIA
CHAIRMAN, INTERNATIONAL
COMMISSION ON CYBER SECURITY
LAW
PRESIDENT, CYBERLAWS.NET
CHIEF EXECUTIVE, ARTIFICIAL
INTELLIGENCE LAW HUB
pavan@pavanduggal.com
pavanduggal@yahoo.com

Contenu connexe

Tendances

The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographicAtkins
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Wardsegughana
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013M P Keshava
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and techMomokoImamura
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceCollege Development Network
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...XeniT Solutions nv
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck Brooks
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks
 

Tendances (20)

The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 

Similaire à I4ADA 2019 - Presentation Accountability & cyber security & cyber peace

Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 

Similaire à I4ADA 2019 - Presentation Accountability & cyber security & cyber peace (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 

Plus de Paul van Heel

I4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzI4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzPaul van Heel
 
I4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen BrownI4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen BrownPaul van Heel
 
I4ADA 2019 - Presentation Jeff Bullwinkel
I4ADA 2019  - Presentation Jeff BullwinkelI4ADA 2019  - Presentation Jeff Bullwinkel
I4ADA 2019 - Presentation Jeff BullwinkelPaul van Heel
 
I4ADA the hague summitCAHAI
I4ADA the hague summitCAHAII4ADA the hague summitCAHAI
I4ADA the hague summitCAHAIPaul van Heel
 
I4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkoshI4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkoshPaul van Heel
 
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...Paul van Heel
 
I4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungI4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungPaul van Heel
 

Plus de Paul van Heel (7)

I4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzI4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric Wachholz
 
I4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen BrownI4ADA 2019 - Presentation Helen Brown
I4ADA 2019 - Presentation Helen Brown
 
I4ADA 2019 - Presentation Jeff Bullwinkel
I4ADA 2019  - Presentation Jeff BullwinkelI4ADA 2019  - Presentation Jeff Bullwinkel
I4ADA 2019 - Presentation Jeff Bullwinkel
 
I4ADA the hague summitCAHAI
I4ADA the hague summitCAHAII4ADA the hague summitCAHAI
I4ADA the hague summitCAHAI
 
I4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkoshI4ADA 2019 - presentatiob oleg volkosh
I4ADA 2019 - presentatiob oleg volkosh
 
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
I4ADA 2019 - Presentation Prof Mike Hinchey, President International Federati...
 
I4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungI4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge Chung
 

Dernier

Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 

Dernier (20)

Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace

  • 2. A PRESENTATION BY DR. PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA CHAIRMAN, INTERNATIONAL COMMISSION ON CYBER SECURITY LAW PRESIDENT, CYBERLAWS.NET CHIEF EXECUTIVE, ARTIFICIAL INTELLIGENCE LAW HUB
  • 3. CYBER ATTACK IN UTAH © of images belongs to the respective copyright holders
  • 4. WHATSAPP SNOOPING © of images belongs to the respective copyright holders
  • 5. PAYMENT CARD BREACH © of images belongs to the respective copyright holders
  • 6. CYBER SECURITY AND ACCOUNTABILITY • Breaches of cyber security lead to big questions on accountability. • How can state and non-state actors be made accountable for cyber security breaches? © of images belongs to the respective copyright holders
  • 7. CYBER SECURITY AND ACCOUNTABILITY • This accountability issue is directly linked to the protection and preservation of cyber security and peace in cyberspace. © of images belongs to the respective copyright holders
  • 8. CYBER SECURITY AND ACCOUNTABILITY • Attribution is one of the basic problems, given the fact that most of the cyber security breachers are using the darknet. • Increasing trends amongst countries to come up with distinct national legislations on cyber security. © of images belongs to the respective copyright holders
  • 9. CYBER SECURITY AND ACCOUNTABILITY • These legislations tend to try to address international issues using national approaches. • It might be a good initial step but may not be a long term sustainable step. © of images belongs to the respective copyright holders
  • 10. CYBER SECURITY AND ACCOUNTABILITY • The absence of a global Cyberlaw effectively means that norms pertaining to acceptance standards are still not developed. • Even the debate pertaining to norms of behavior in cyberspace have not been adequately concluded. © of images belongs to the respective copyright holders
  • 11. CYBER SECURITY AND ACCOUNTABILITY • The recent two ongoing processes in the United Nations being the UNGGE and UN Open Ended Working Group could further contribute in this direction. These two new groups are continuing on their deliberations on how to evolve norms in cyberspace. © of images belongs to the respective copyright holders
  • 12. CYBER SECURITY AND ACCOUNTABILITY • Cyber security and accountability are two intrinsically paradoxical terms. • Today various states and non- states actors want to do large number of covert and over activities for the purposes of fulfillment of their own objectives. © of images belongs to the respective copyright holders
  • 13. CYBER SECURITY AND ACCOUNTABILITY • Number of countries are today increasingly having in place cyber armies not just to protect their sovereignty but also for the purposes of ensuring that they do other activities which could have an impact upon sovereignty of other countries. © of images belongs to the respective copyright holders
  • 14. CYBER SECURITY AND ACCOUNTABILITY • The advent of darknet has further complicated the issue of accountability on cyber security. • Today cyber peace is a constantly evolving concept. © of images belongs to the respective copyright holders
  • 15. CYBER SECURITY AND ACCOUNTABILITY • Large number of cyber attacks are happening targeted at breaching cyber security of various critical information infrastructure. © of images belongs to the respective copyright holders
  • 16. NUCELAR POWER CYBER MALWARE ATTACK © of images belongs to the respective copyright holders
  • 17. CYBER ATTACK IN SOUTH AFRICA © of images belongs to the respective copyright holders
  • 18. CYBER SECURITY AND ACCOUNTABILITY • New legislative approaches required to be adopted in this regard. • Further, for ensuring cyber peace, it is important that appropriate legal protections need to be provided to the private sector. © of images belongs to the respective copyright holders
  • 19. CHINESE NEW LAW ON CYBER SECURITY New Chinese law lays emphasis on cyber security aspects. China has adopted a distinctive approach of mingling cyber security within the broader ambit of national security.
  • 20. CHINESE APPROACHES ON CYBER SECURITY LAW The way the provisions of the said law has been drafted are so wide to include within their ambit all kinds of cyber security breaches as any cyber security breach is going to influence national security, social stability as also prejudicial impact the preservation of public safety and societal tranquility. © of images belongs to the respective copyright holders
  • 21. GLOBAL AND NATIONAL APPROACHES ON CYBER SECURITY LAW Russia recently passed a law which actually mandated service providers to ensure that all data pertaining to Russians must be physically located within the territorial boundaries of Russia. Consequently, we have begun to see a trend where various national governments are now increasingly looking in the direction of coming up with appropriate national approaches to deal with the international issue of cyber security.
  • 22. GLOBAL AND NATIONAL APPROACHES ON CYBER SECURITY LAW © of images belongs to the respective copyright holders
  • 23. RUSSIAN RUNET LAW © of images belongs to the respective copyright holders
  • 24. THAILAND CYBER SECURITY LAW © of images belongs to the respective copyright holders
  • 25. AUSTRALIA’S ANTI-ENCRYPTION LAW © of images belongs to the respective copyright holders
  • 26. INTERNATIONAL CYBERSECURITY LAW - TAIWAN © of images belongs to the respective copyright holders
  • 27. DEVELOPMENTS AT INTERNATIONAL LEVEL SINGAPORE CYBER SECURITY LAW EGYPT CYBER SECURITY LAW © of images belongs to the respective copyright holders
  • 28. DEVELOPMENTS AT INTERNATIONAL LEVEL In addition, there are also various cyber security strategies that different countries have come up in place. © of images belongs to the respective copyright holders
  • 29. CYBER SECURITY AND ACCOUNTABILITY • Cyber security safe harbor in Ohio has now led the example where companies are now exempt from potential exposure to legal liability in case if they do comply with the minimum requirements of cyber security. © of images belongs to the respective copyright holders
  • 30. CYBER SECURITY AND ACCOUNTABILITY • The misuse of Artificial Intelligence on the darknet for breaching cyber security of networks has begun to start emerging as another big problem. • The principles of accountability must be established for the purposes of cyber security compliances.
  • 31. CALIFORNIA LAW ON IOT © of images belongs to the respective copyright holders
  • 32. CYBER SECURITY AND ACCOUNTABILITY • Companies must be mandated to follow minimum security levels of practices and procedures. • California has passed a law which comes into effect from 1st January, 2020 which mandates the installation of reasonable security features in all IoT devices from 1st January, 2020. © of images belongs to the respective copyright holders
  • 33. CYBER SECURITY AND ACCOUNTABILITY • The work done by the International Commission on Cyber Security Law in terms of collating common legal principles to govern and regulating cyber security at a global level. © of images belongs to the respective copyright holders
  • 34. CYBER SECURITY AND ACCOUNTABILITY • There is a need to come up with common minimum denominators for regulating cyber security so that there can be more accountability and hence contribute to cyber peace. The sacrosanct nature of cyberspace as a common heritage of human mankind needs to be reemphasized. There needs to be more work done. © of images belongs to the respective copyright holders
  • 35. INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBER SECURITY,NEW DELHI, INDIA (20TH TO 22ND NOVEMBER, 2019)  The International Conference on Cyberlaw, Cybercrime & Cyber Security (www.cyberlawcybercrime.com) has provided the platform to discuss about emerging Cyberlaw, Cybercrime and Cybersecurity trends. © of images belongs to the respective copyright holders
  • 36. A PRESENTATION BY DR. PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA CHAIRMAN, INTERNATIONAL COMMISSION ON CYBER SECURITY LAW PRESIDENT, CYBERLAWS.NET CHIEF EXECUTIVE, ARTIFICIAL INTELLIGENCE LAW HUB pavan@pavanduggal.com pavanduggal@yahoo.com