Intelligence and Investigations
|
|
- Gilbert McBride
- 6 years ago
- Views:
Transcription
1 Intelligence and Investigations International conference on Doping and Public Health Mathieu Holz, Manager, Intelligence and Investigations Department 8 June 2017, OSLO From Organized Crime to Anti-Doping Activities Major of French Gendarmerie Nationale (active) Deputy Head of Regional Criminal Investigations Department INTERPOL Criminal Intelligence Officer, Anti-Doping Project Manager (MoU WADA / INTERPOL signed in February 2009) / 2 1
2 Anti-Doping Investigations Experience prior to WADA Gendarmerie Tour de France (investigations, supporting OCLAESP) Traffic of anabolic steroids between Belgium and Eastern France INTERPOL Support investigations from INTERPOL member countries EUBAM: Joint task force (EU law enforcement / US DEA / INTERPOL / EUBAM analysts) on PEDs traffic Lance Armstrong: support US law enforcement + USADA / 3 International trafficking of PEDs Process chart / 4 2
3 International case coordination NADO and Law enforcement agencies LA Case: bilateral meetings between US delegation + 5 European LEA delegations (Police and Public Prosecutors) + USADA + AFLD. / 5 Lessons Learned Cooperation with law enforcement is key to effectively dismantle doping networks with international connections The importance of intelligence gathering Testing alone is not always sufficient to identify top-level cheaters. They took advantage of scientific progress and dedicated medical support to stay one step ahead of the Anti- Doping Organizations (ADOs) Necessity to have a transverse approach and feed testing unit with accurate and timely intelligence / 6 3
4 Consequences 2015 World Anti-Doping Code and 2015 International Standard for Testing and Investigations allows ADOs to lead investigations in order to identify cheater(s) and initiate Anti- Doping Rule Violation (ADRV) proceedings These documents strengthen the concept of non-analytical ADRVs that already existed in the Code pre-2015 Identification of these non-analytical ADRVs can be done through the gathering of information from various sources / 7 Consequences WADA used its investigative powers and launched two independent investigations (Pound and McLaren) WADA enhanced his own investigative capacities and created a dedicated Intelligence and Investigations department (from 2 to 6 staff) WADA Intelligence and Investigations department is based in Montreal (1 investigation team with OSINT analyst) and Lausanne (1 investigation team with ABP data analyst) / 8 4
5 WADA s Intelligence and Investigations Department 5 staff with law enforcement background + 1 coordinator WADA I & I department operates independently from the rest of the agency and runs investigations without seeking approval from WADA EC, WADA FB or Director General Upon completion of an investigation, the department informs the Director General of the conclusion of the investigation and provides him with a report that includes recommendations and references / 9 WADA s Intelligence and Investigations Department Data Storage: Operational data are encrypted and stored within WADA general IT architecture but separated from other departments and databases Database: i2 ibase + Notebook analyst (link analysis software) Data analysis tool: Tableau, Matlab, OSINT search tools Deep internet researches: Tor software (Dark net) / 10 5
6 WADA s Intelligence and Investigations Department Independent Supervisor: in order to ensure that all the work performed by the I&I department is conducted in accordance with WADA s investigation policy, an Independent Supervisor (lawyer with relevant experience in field of law enforcement and operational criminal prosecution) will be appointed to audit the investigation work The supervisor will lead an annual audit and will submit a written report to WADA s Director General and Executive Committee Conclusion will be made public on the WADA website / 11 WADA s Intelligence and Investigations Department Our sources of information: - Allegation(s) of ADRV(s) from NADOs or IFs - ABP analysis on trends and patterns - Informant and Whistleblower allegations - Testing (including target testing based on our intelligence report) and result management - Open-source intelligence / 12 6
7 WADA s Intelligence and Investigations Department Daily work: investigative process in 5 stages - 1/ Collection of information + case decision matrix (3 levels of importance determining WADA involvement) - 2/ Analysis - 3/ Investigate - 4/ Conclude - 5/ Follow up / 13 WADA s Whistleblower Program: Speak up! Both the Pound and McLaren Investigations served to highlight the importance of whistleblowing WADA s new Whistleblower Program Speak Up! has now been launched. It aims to: Encourage and incentivize speaking up Offer confidentiality, protection and assurance Be supported by the required legal framework / 14 7
8 WADA s Whistleblower Program: Speak up! Whistleblowers (WB) are one of the most efficient sources of information WBs help break omerta by providing insight into doping networks Risk of retaliation (psychological and physical) is extremely high for a WB if his/her identity is disclosed WB = A delicate double-edged sword to handle / 15 WADA s Whistleblower Program: Speak up! WADA s Whistleblowing policy implemented mid-january 2017 Key elements: - Distinction between Informant and WB - WB is a specific status an informant is granted with (agreement) - WB has rights: protection measures, rewards, advice from dedicated investigator, updates regarding the investigations, and is notified of the findings - WB has responsibilities, particularly to maintain strict confidentiality at all time during investigations as well after A breach of confidentiality will terminate the agreement / 16 8
9 WADA s Whistleblower Program: Speak up! Speak Up! app: Got Ethics WB case management software (used by Norwegian and Danish NADO as well as several Scandinavian companies) Got Ethics provide a secure platform to exchange with Informant and WB via PC or smartphone app Dedicated encrypted servers based in North America Each WB is registered with a code number Case officer receives summary of WB s statement only with code number We are victims of Speak Up! s success / 17 WADA s I & I Day-to-Day Tasks Within investigation policy: assess allegation(s) gathered from various sources and decide on possible follow-up Investigate WADA s main cases and projects + use WADA s target testing capacities if needed Provide ADOs support upon request (mainly substantial assistance cases) Follow up with network of ADO investigators Liaise with INTERPOL on specific projects (Energia / Barium), coordinate with law enforcement agencies in charge of doping cases / 18 9
10 WADA and INTERPOL Joint Action During its investigations, WADA may identify possible criminal offenses. An intelligence report will then be forwarded to INTERPOL which will assess it and may contact the relevant National Central Bureau to request criminal investigations One example: operation AUGEAS where INTERPOL coordinated international investigations related to criminal offenses identified by WADA Independent Commission (Pound) / 19 WADA and INTERPOL Joint Action INTERPOL also facilitated the IC coordination with French National Anti-Corruption Prosecutor and French Central Directorate of Judicial Police At the request of French authorities, INTERPOL issued an international wanted person notice ( Red Notice ) for Papa Massata Diack Investigations are still on-going regarding awarding of several IAAF world championships French authorities and WADA are working with US Department of Justice / 20 10
11 OPERATIO N AUGEAS International Coordination of a global probe Doping-related Corruption & Money Laundering in International Athletics WADA and INTERPOL Joint Action / 22 11
12 Some thoughts regarding implementation of I & I Department This implementation will not represent a complete shift from testing to investigations - not mutually exclusive Intelligence-led testing is a key to better target cheaters - helps focus more on quality rather than quantity Testing helps guide our investigations and confirms or contradicts some hypotheses Constant exchanges with the Athlete Biological Passport (ABP) team and WADA-accredited laboratories A transverse approach to gathering information from testing, ABP, Whistleblowers and laboratories is a path to clean sport / 23 Thank you! Takk for oppmerksomheten! 12
15412/16 RR/dk 1 DGD 1C
Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations
More informationGuiding principles on the Global Alliance against child sexual abuse online
Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationPostal Inspection Service Mail Covers Program
Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.
More informationIssue I. Airport Communication Project
Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office
More informationINFORMATION TO BE GIVEN 2
(To be filled out in the EDPS' office) REGISTER NUMBER: 1423 (To be filled out in the EDPS' office) NOTIFICATION FOR PRIOR CHECKING DATE OF SUBMISSION: 03/01/2017 CASE NUMBER: 2017-0015 INSTITUTION: ESMA
More informationPROJECT RESULTS Summary
Project funded by the European Union Operational Programme Technical Assistance for Institutional Building - TAIB 2012 www.fighting-occ.mk Strengthening the National Capacities for the Fight Against Organised
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More informationCyber Intel within European Cybercrime Center Ops
@EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3
More informationTHE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)
ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)
More informationShaping the Future of Clean Sport
Shaping the Future of Clean Sport WADA Annual Symposium 2123 March 2018 SwissTech Convention Center (STCC) Lausanne, Switzerland Day 1 Wednesday 21 March 09:00 Welcome and Overview of the Symposium Benjamin
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More informationUNODC. International Cooperation and Assistance in Cybercrime Matters
UNODC International Cooperation and Assistance in Cybercrime Matters UNODC Approach To integrate cybercrime and electronic evidence related issues in broader UNODC mandates of Supporting Member States
More informationReport on the activities of the Independent Integrity Unit, November 2016 to September 2017
Meeting of the Board 30 September 2 October 2017 Cairo, Arab Republic of Egypt Provisional agenda item 8 GCF/B.18/Inf.12 29 September 2017 Report on the activities of the Independent Integrity Unit, November
More informationStrategic and operational threat analysis at Europol's EC3
Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified
More informationCouncil of the European Union Brussels, 23 November 2016 (OR. en)
Conseil UE Council of the European Union Brussels, 23 November 2016 (OR. en) 13323/1/16 REV 1 LIMITE PUBLIC DAPIX 173 ENFOPOL 349 ENFOCUSTOM 163 COSI 156 GENVAL 107 AVIATION 210 NOTE From: To: Subject:
More information10007/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationBHBIA New Data Protection Rules. Pharma Company Perspective. Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD
BHBIA New Data Protection Rules Pharma Company Perspective Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD Pharma Company Perspective Data Controllers Responsibilities
More informationOverview on the Project achievements
Overview on the Project achievements Closing Conference, Tbilisi, Georgia 14 May 2010 Cristina Schulman Council of Europe Strasbourg, France Tel +33-3-8841-2103 cristina.schulman@coe.int www.coe.int/cybercrime-georgia
More informationESSA Q INTEGRITY REPORT
ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationSLAWOMIR PICHOR. Deputy Head of EUBAM
SLAWOMIR PICHOR Deputy Head of EUBAM Guangzhou, China, 24-25 November 2011 European Union Border Assistance Mission to Moldova and Ukraine BACKGROUND OF EUBAM EUBAM is the flagship EU border assistance
More informationLaw Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version
Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations
More informationMINISTRY OF INTERNAL AFFAIRS OF GEORGIA INTELLIGENCE-LED POLICING IN GEORGIA
MINISTRY OF INTERNAL AFFAIRS OF GEORGIA INTELLIGENCE-LED POLICING IN GEORGIA GEORGIA Location: South Caucasus Area: 69 700 km 2 Population: 3 729 500 (2015 census) GDP per capita: 3676 USD Prevailing religion:
More informationVistra International Expansion Limited PRIVACY NOTICE
Effective Date: from 25 May 2018 Vistra International Expansion Limited PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal
More informationVISTRA NETHERLANDS PRIVACY NOTICE
Effective Date: from 25 May 2018 VISTRA NETHERLANDS PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationIn the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the
The Organized and Serious Crime Programme (GPTOC) focuses on assisting states with the implementation of the core elements of the Organized Crime convention. This includes judicial and law enforcement
More informationGlobal Wildlife Cybercrime Action Plan1
Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.
More informationCYBERCRIME RESPONDERS TRAININGS
CYBERCRIME RESPONDERS TRAININGS PHILIPPINE DELEGATION International Workshop on Integrating the issues of Cybercrime and Electronic Evidence into Judicial Training Curricula 11-13 April 2016 Johannesburg,
More informationUSER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.
These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection
More informationVISTRA (CYPRUS) LTD. PRIVACY NOTICE
Effective Date: from 25 May 2018 VISTRA (CYPRUS) LTD. PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights
More informationIDENTITY THEFT PREVENTION Policy Statement
Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy
More informationLIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150
COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08
More information25th of October EuroMedRail project National Safety Authority Belgium
25th of October 2017 - EuroMedRail project National Safety Authority Belgium 2 Content 1. Legal basis and history 2. The Belgian rail system 3. Railway safety in Belgium 2016 4. The Belgian NSA : DRSI
More informationINCIDENT-BASED CRIME REPORTING
INCIDENT-BASED CRIME REPORTING NCS-X and NIBRS Program Planning Bureau of Justice Statistics Federal Bureau of Investigation IACP/SEARCH/RTI/IJIS/PERF 1 AGENDA Overview of the NCS-X Program Overview of
More informationVISTRA ZURICH AG - PRIVACY NOTICE
Effective Date: from 25 May 2018 VISTRA ZURICH AG - PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form CROATIA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationCOMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2
COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles
More informationSpectrum Wellness Privacy Statement
Spectrum Wellness Privacy Statement This policy sets out the basis on which any personal data we collect from you, or that you provide to us, will be processed by us. Please read the following carefully
More information10025/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10025/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationVISTRA MONACO PRIVACY NOTICE
Effective Date: from 25 May 2018 VISTRA MONACO PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights in
More informationNATIONAL COMMISSION ON FORENSIC SCIENCE
NATIONAL COMMISSION ON FORENSIC SCIENCE Recommendation for the Accreditation of Digital and Multimedia Forensic Science Service Providers 1 Subcommittee Date of Current Version 25/02/16 Accreditation and
More informationData Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle
More informationHIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice
More informationHow we use your personal and business information
How we use your personal and business information Correct as at 13 January 2018 IMPORTANT INFORMATION If we prov ide you w ith an account or other banking serv ices then you agree that we can use your
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationGroup means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies.
PRIVACY DECLARATION In this Privacy Declaration, unless the context otherwise requires: We, us, our means STB Leasing Limited, and/or RentSmart Limited trading as ThinkSmart ( ThinkSmart / we / us ), and
More informationISO Certification. How we got there and why it s worth it! Worried that your compliance program isn t good enough?
ISO 37001 Certification How we got there and why it s worth it! Diana Trevley Chief of Global Services Spark Compliance Consulting Mark Speck Managing Partner Specktrum Inc. Worried that your compliance
More informationShaping the Future of Clean Sport
Shaping the Future of Clean Sport WADA Annual Symposium 2123 March 2018 SwissTech Convention Center (STCC) Lausanne, Switzerland Day 1 Wednesday 21 March 08:00 Welcome Coffee/Tea & Networking 09:00 Welcome
More informationΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES
ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES Under which conditions is an investigation authorised/permitted? Which are the legal boundaries and the applicable operational rules? Is the Data Protection
More informationetning_2015_web.pdf
DPA: Datatilsynet (Denmark) TITLE: Datatilsynets årsberetning 2015 DATE: July 2016 KEY WORDS: annual report, international cooperation WEBSITE LINK: https://www.datatilsynet.dk/fileadmin/user_upload/dokumenter/aarsberetninger/datatilsynets_arsber
More informationGDPR Compliance. Clauses
1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The
More informationCouncil of the European Union Brussels, 14 July 2017 (OR. en)
Conseil UE Council of the European Union Brussels, 14 July 2017 (OR. en) 11220/17 NOTE From: To: Eurojust and Europol Delegations No. prev. doc.: 10472/15 Subject: LIMITE PUBLIC ENFOPOL 358 COPEN 236 EUROJUST
More informationDepending on the Services or information you request from us, we may ask you to provide the following personal information:
LINK HUNGARY PRIVACY POLICY PROTECTING YOUR DATA 1. Who are Link Asset Services and Link Hungary? Link Asset Services ( Link ) is a trading name of companies which offer a range of services, principally
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects
ILLICIT GOODS AND GLOBAL HEALTH Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through
More informationData Privacy Breach Policy and Procedure
Data Privacy Breach Policy and Procedure Document Information Last revision date: April 16, 2018 Adopted date: Next review: January 1 Annually Overview A privacy breach is an action that results in an
More informationDo you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?
European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability
More informationThe Role of the Data Protection Officer
The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationIJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E- BANKING IN SUDAN Inshirah M. O. Elmaghrabi*, Hoida A. Abdelgadir,
More informationUCD Centre for Cybersecurity & Cybercrime Investigation
UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder
More informationGo West! Political, legal and operational aspects of cooperation between Europol and the United States
Go West! Political, legal and operational aspects of cooperation between Europol and the United States Alexandra De Moor IRCP - Ghent University, Belgium 1 Introduction PhD in Law Europol, quo vadis? Critical
More informationCOOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS
COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS February 2018 A HISTORY OF COOPERATION 1997: Cooperation agreement between INTERPOL and the UN Many decades of collaboration was formalized in an agreement
More informationInformation Security Incident Response and Reporting
Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security
More informationHow do you decide what s best for you?
How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility
More informationPathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke
Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationData Systems for Policing in the 21 st Century:
Data Systems for Policing in the 21 st Century: Two Projects to Facilitate Local Law Enforcement Implementation and Use of Incident-Based Data Systems Compatible with the FBI s Reporting Requirements Project
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationCellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More informationThirteenth Symposium on the ICAO Traveller Identification Programme
Thirteenth Symposium on the ICAO Traveller Identification Programme Counter-Terrorism Committee Executive Directorate (CTED) United Nations ICAO Headquarters, Montreal, 24-26 October 2017 Briefly about
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More information13268/16 EB/dk 1 DGD 1C
Council of the European Union Brussels, 17 October 2016 (OR. en) 13268/16 OUTCOME OF PROCEEDINGS From: On: 13 October 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 12583/16 Subject:
More informationGina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program
Gina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program Manager New York State Forensic Overview Office of Forensic
More informationForensic Information Data Exchange (FIDEX) Implementation Guide
Forensic Information Data Exchange () Implementation Guide 2008 IJ CX K405 May 5, 2010 The NFSTC is pleased to submit this Implementation Guide to the United States Department of Justice, Office of Justice
More informationUWC International Data Protection Policy
UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationThis qualification has been reviewed. The last date to meet the requirements is 31 December 2019.
NZQF NQ Ref 0999 Version 3 Page 1 of 5 National Certificate in Intelligence Analysis (Level 4) Level 4 Credits 40 This qualification has been reviewed. The last date to meet the requirements is 31 December
More informationThe UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC
The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime
More informationGDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10
GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data
More informationFinancial Planning Standards Council 2016 ENFORCEMENT AND DISCIPLINARY REVIEW REPORT
Financial Planning Standards Council 2016 ENFORCEMENT AND DISCIPLINARY REVIEW REPORT Table of Contents Financial Planning Standards Council... 1 Profile of the Profession... 2 Maintaining High Standards
More informationITU Model Cybercrime Law: Project Overview
ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International
More informationPrivacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016
Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016 Pēteris Zilgalvis, J.D., Head of Unit for Health and Well-Being, DG CONNECT Table of Contents 1. Context
More informationNORTH CAROLINA STATE CRIME LABORATORY FY2015/2016 Annual Report
NORTH CAROLINA STATE CRIME LABORATORY FY2015/2016 Annual Report Justice and Public Safety Appropriations Committees Thursday, March 23, 2017 Raleigh, NC 1 Agenda Quality & Transparency Case Submissions
More informationGeneral Data Protection Regulation (GDPR)
BCD Travel s Response to the EU General Data Protection Regulation (GDPR) November 2017 Page 1 Response to the EU GDPR Copyright 2017 by BCD Travel N.V. All rights reserved. November 2017 Copyright 2017
More informationRequest for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator
Request for Expression of Interest Consultant - Project Coordinator Project: I-CARE Global Imperative Indicator Unidentified Victims Portrayed on Child Abuse Images Organisational Background ECPAT International
More informationPrivacy Policy. England Athletics Limited commitment to Privacy. Introduction. The information we collect about you. The information provided to us
Privacy Policy England Athletics Limited commitment to Privacy Introduction The information we collect about you The information provided to us How we use your information Our legal bases for processing
More informationQBPC s Mission and Objectives
QBPC s Mission and Objectives Mission To make contributions to facilitate and promote continuous improvements in administrative and judicial protection for intellectual property in China; to enable the
More informationInside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.
Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization
More informationSteffanie Hall, RHIA HIM Director/Privacy Officer 1201 West 12 th Emporia, Kansas ext
JOINT NOTICE OF PRIVACY PRACTICES NEWMAN REGIONAL HEALTH, NEWMAN REGIONAL HEALTH MEDICAL PARTNERS, HOSPICE, NEWMAN PHYSICAL THERAPY, COMMUNITY WELLNESS AND MEMBERS OF THE NEWMAN REGIONAL HEALTH ORGANIZED
More informationDonor Countries Security. Date
PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information
More informationPrivacy Policy Statement Last update 25 th May 2018.
Privacy Policy Statement Last update 25 th May 2018. Introduction We want our customers to receive a prompt, efficient and courteous service that is delivered in a positive and transparent manner. The
More informationThis procedure sets out the usage of mobile CCTV units within Arhag.
CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards
More informationADMA Briefing Summary March
ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From
More informationINFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ
INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More information