Category Archives: ICT Regulation
Reference sources for privacy laws
There are at least 3 freely available books that provide information about privacy laws in different countries. These are good references in pdf format. Baker & McKenzie’s Global Privacy Handbook (800p) (online version) see also related online tool Global Privacy … Continue reading
Is IP address personal data? (from criminal law point of view)
CoE (Council of Europe) Cybercrime has pubslihed a report called “Rules on obtaining subscriber information“, where questionnaire responses from different countries has been published. Some of the questions are: Question 1: Is the term “IP address” defined for criminal law … Continue reading
Guidelines for “Assessing Cyber Security Export Risks”, by TechUK
TechUK has published document “Assessing Cyber Security Export Risks“, which is great effort addressing the business ethics aspects. Institute for Human Rights and Business (IHRB) has been involved as well. The coverage is good, content is straight to the point, … Continue reading
Cyber essentials
Cyber Essentials scheme is one of the actions under the UK Government policy “Keeping the UK safe in cyber space“. The Cyber Essentials scheme has been developed by Government and industry to fulfil two functions. It provides a clear statement … Continue reading
Data Protection Laws of the World, by DLA Piper
DLA Piper has published a valuable information source on data protection laws. The handbook is available online (see figure below), or directly as downloadable pdf (almost 400 pages). Other links blog article “Privacy and Data Protection by Country”
Privacy Impact Assessment
For Good Information Sources for Privacy Impact Assessment (PIA), please have a look at ico.org.uk’s PIA page and Guide Conducting privacy impact assessments code of practice. Steps Identify the need for a PIA Describe the information flows Identify the privacy … Continue reading
EU Directive 2013/40/EU on attacks against information systems
There is a new EU Directive 2013/40/EU, which defines following as offences: Illegal access to information systems Illegal system interference Illegal data interference Illegal interception Tools used for committing offences Transposition: Member States shall bring into force the laws, regulations … Continue reading