INTERNATIONAL CONFERENCE ON SECURING CYBER SPACE RECALIBRATING LEGAL & TECHNOLOGICAL DIMENSIONS Date: 13 TH MAY Venue

Size: px
Start display at page:

Download "INTERNATIONAL CONFERENCE ON SECURING CYBER SPACE RECALIBRATING LEGAL & TECHNOLOGICAL DIMENSIONS Date: 13 TH MAY Venue"

Transcription

1 BISHOP COTTON WOMEN S CHRISTIAN LAW COLLEGE, BENGALURU IN COLLABORATION WITH ADVANCED CENTRE ON RESEARCH, DEVELOPMENT & TRAINING IN CYBER LAWS & FORENSICS [ACRDTCLF], NATIONAL LAW SCHOOL OF INDIA UNIVERSITY, BENGALURU. INTERNATIONAL CONFERENCE ON SECURING CYBER SPACE RECALIBRATING LEGAL & TECHNOLOGICAL DIMENSIONS Date: 13 TH MAY 2018 Venue BISHOP COTTON WOMEN S CHRISTAIN LAW COLLEGE, BENGALURU. Empowering Women - Empowering India ORGANISING COMMITTEE Patron - in - Chief: Prof. (Dr.) R. Venkata Rao Vice-Chancellor National Law School of India University, Bengaluru. Advisor: Dr. Nagarathna. A. Associate Professor of Law NLSIU, Bengaluru. Tel. No.: /33/35 (extn.240) nagarathna@nls.ac.in Conference Director: Smt. Shiny Harsha Principal Bengaluru. Tel: , bcwclcintconf2018@gmail.com Conference Coordinator: Smt. Jyothi. K.M Assistant Professor of Law Bengaluru. Mobile Tel: Student Members: Ms. Khushboo George Mobile: Ms. Kshitija Kanchan Mobile: Ms. Blessy Sudarsan Mobile: Ms. Sharanya Vijayan Mobile:

2 BISHOP COTTON WOMEN S CHRISTIAN LAW COLLEGE Bishop Cotton Women s Christian Law College is one of the prestigious law institutions in India offering five year undergraduate B.B.A., LL.B (5 years) and LL.B (3 years) degree programmes in Law and has grown enormously in the past 16 years. Bishop Cotton Women s Christian Law College is the only Law College in Bengaluru imparting legal education exclusively for women. To instill awareness of the cause of women in the minds of young girls and to empower them with values, this exclusive institution for legal education was inaugurated on 14th July The college is recognized by the Government of Karnataka approved by the Bar Council of India and is affiliated to the Karnataka State Law University, Hubballi. The college is managed by the Board of Management of Karnataka Central Diocese, Church of South India. In keeping with the cultural heritage, students in this college are instilled with human values through various programmes conducted in Bishop Cotton Women s Christian Law College. Students are trained to work hard, stick to discipline, urged to achieve the highest accolades and march on to conquer the world as inspiring leaders. Bishop Cotton Women s Christian Law College is the right place for those who aspire to have versatile experiences, wide knowledge and good scholarship. NATIONAL LAW SCHOOL OF INDIA UNIVERSITY The National Law School of India University, Bangalore, established under the National Law School of India Act (Karnataka Act 22 of 1986) in 1987 with the Chief Justice of India as its Chancellor, is the first and the only law university fully supported by the Bar Council of India and the Bench. One of the main objectives of NLSIU is to 'bring legal education on par with other professional courses like medicine and engineering, where a student fresh out of highschool can make an immediate career choice'. It has made strides in teaching law courses with both interdisciplinary and multidisciplinary dimensions and facilitating research and publication on these lines since its establishment. The University has many research centres to help the legal fraternity and one among them is the Advanced Centre for Research, Development and Training in Cyber Laws and Forensics [ACRDTCLF] which was established at NLSIU, Bengaluru on 25th October 2010 under the initial financial support of the Department of Electronics and Information Technology (DeitY), Ministry of Communications & Information Technology, Government of India. The Centre aims to spread awareness and provide training to judicial officers, public prosecutors, judges, investigative agencies, cyber security personnel, Law Teachers, students and general public, about cyber law with primary emphasis on the technical issues so that there would be better ways of prevention of the misuse of technology as well as stricter enforcement of related laws. In this regard the Centre has already conducted training programmes for advocates and law professors all over India. CONCEPT NOTE Due to technological advancement in society, many issues have emerged in relation to the integrity and security of cyber space, information, privacy, intellectual property rights, electronic transactions, etc. The Information Technology Act, 2000, being the primary source of cyber law is currently dealing with various issues relating to cyber technology s use and abuse. Research and development in the area of cyber security is also of immense importance today and is the need of the day. Such research must contribute and lead to further development of cyber laws and regulatory mechanisms in our country. The conference will provide a platform for scholars and researchers from the area of cyber security laws and technology so as to facilitate deliberation and exchange of ideas amongst them about this crucial issue.

3 CALL FOR PAPERS Well researched papers on the theme of SECURING CYBER SPACE RECALIBRATING LEGAL & TECHNOLOGICAL DIMENSIONS are called for to be presented in the technical sessions of the conference. The sub-themes of the conference include but are not limited to: Cyber Laws of India and Other Countries Ensuring Cyber Security through Legal Measures Ensuring Cyber Security through Technical Solutions Using Technology in Preventing Cyber Crimes Encryption and Legal Concerns Using Artificial Intelligence in Regulation of Cyber Crimes Cloud Computing and Legal Aspects IOT Based Devices and Cyber Security Concerns Crimes on Social Media Using Social Media in Combatting Cyber Crimes Cybercrimes against Women Cybercrimes against Children Data Protection on Cyber Space Privacy Concerns in Cyber Space Investigation of Cybercrimes Cyber Forensic Technical cum Legal Perspective Evidentiary Issues on Cyber Space The Judiciary on Cyber Security Laws and Concerns in Relation to any Forms of Cyber-Crimes [such as Hacking, Cyber Pornography, Identity Theft, Spoofing, Cyber Stalking, Software Piracy, etc.] E-Security in the Banking System E-Commerce and Cyber Security Concerns E-Governance and Cyber Security Concerns Providing/Developing an Alternative Law/Policy framework to Secure Cyber Space etc Concerns of Deep Web Cyber Criminal s Profiling Addressing the Concerns of Victims of Cyber Crime Using Technology in Preventing Cyber Crimes Institutional Approach in Regulating Cyber Crimes Ethical Hackers Role in Regulation of Cyber Crimes Designing Techno-Legal measures to Combat Cybercrimes ABSTRACT SUBMISSION: GUIDELINES An abstract of the research paper, not exceeding 350 words, accompanied with a covering letter containing: Title of the Paper, Full Name of the Author/Authors (Limited to 2 Authors), complete address with contact number and Address must be submitted as an attachment and mailed to bcwclcintconf2018@gmail.com. Abstracts must be accompanied with key words (Limited to 5). The last date for the submission of the abstract is 5th April Notification of the accepted abstracts will be done on/ before 7th April Selected abstracts of papers will be published in the Conference Proceedings. The text of the abstract must be in MS WORD FORMAT WITH TIMES NEW ROMAN, FONT SIZE 12 and WITH 1.5 LINE SPACING. FINAL PAPER SUBMISSION: GUIDELINES Following the selection of the abstract, a final paper must be sent on or before 2 nd May 2018 and must be presented in person in the conference. The paper must be accompanied with a covering letter containing: Title of the Paper, Full Name of the Author/Authors, Complete Address with Contact Number and Address which must be submitted as an attachment

4 and mailed to The submissions received shall be reviewed by respective law experts on the selection committee. The decision of the selection committee shall be final. Papers must be original work of the Author/ Authors. The text must be in MS WORD FORMAT WITH TIMES NEW ROMAN, FONT SIZE 12 WITH 1.5 LINE SPACING. The footnotes [no end notes] must be - TIMES NEW ROMAN WITH FONT SIZE 10 WITH LINE SPACING OF 1.0. Length of the paper should be between words. The final paper must be accompanied with the abstract and key words. All references should be properly cited and bibliography should be provided. IMPORTANT DATES Submission of Abstract 5 th April 2018 Notification of acceptance of abstract 7 th April 2018 Last date for registration 10 th April 2018 Final paper submission 2 nd May 2018 Confirmation for accommodation 16 th April 2018 This conference is open to academicians, practitioners, research scholars and students from the fields of Law, Technology and Criminology. Prior registration for the conference is compulsory. The identity card is to be furnished at the time of registration. REGISTRATION DETAILS Registration fee details are as follows [Registration fee excludes accommodation, TA & DA]: Academicians and Practitioners INR 1500/- Research Scholars INR 1200/- Students INR 1000/- Delegates INR 1000/- Foreign Nationals INR 3000/- TRAVELLING AND ACCOMMODATION Participants and delegates for the conference must make their own arrangements for travel. However accommodation facilities are provided for outstation participants. Initial requests for accommodation is mandatory for prior booking, before 16 th April 2018, failing which the participants need to make their own arrangements. Accommodation will be on a twin sharing basis for a day only: INR 600/- per day per head. FOR REGISTRATION AND REQUEST FOR ACCOMMODATION Duly filled in registration forms [enclosed herewith] with a request for accommodation should reach the organizing committee, along with the participant/delegate fee and accommodation charges (full payment) in the form of a Demand Draft (DD) drawn in favour of Bishop Cotton Women s Christian Law College, Bengaluru. The scanned copy of the registration form and the DD is to be mailed to bcwclcintconf2018@gmail.com. A duly filled in form along with DD shall be sent to: Smt. Jyothi. K.M Conference Coordinator, No. 19, 3rd Cross, C.S.I Compound, Mission Road, Bengaluru , Karnataka, India. Tel: , , bcwclcintconf2018@gmail.com

5 BISHOP COTTON WOMEN S CHRISTIAN LAW COLLEGE, BENGALURU REGISTRATION FORM 1. NAME OF THE PARTICIPANT: 2. NATIONALITY: 3. DESIGNATION: 4. NAME OF THE INSTITUTION: 5. POSTAL ADDRESS: MOBILE / CONTACT NO.: 8. PRESENTING PAPER/DELEGATE: 9. TITLE OF THE PAPER: 10. ACCOMODATION REQUIRED: YES/ NO 11. IF ACCOMODATION IS REQUIRED SPECIFY FROM WHEN TO WHEN [BY GIVING THE DATES OF YOUR REQUEST FOR ACCOMMODATION] 12. PAYMENT DETAILS: DD DETAILS [WITH DD NO., DATE, AMOUNT, ETC] PLACE: DATE: SIGNATURE OF THE APPLICANT

CYBER SECURITY & CYBER LAWS

CYBER SECURITY & CYBER LAWS NATIONAL LAW SCHOOL OF INDIA UNIVERSITY, BANGALORE ADVANCED CENTRE FOR RESEARCH, DEVELOPMENT AND TRAINING IN CYBER LAWS AND FORENSICS [ACRDTCLF] NATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES &

More information

DEPARTMENT OF LAW NORTH EASTERN HILL UNIVERSITY

DEPARTMENT OF LAW NORTH EASTERN HILL UNIVERSITY NATIONAL SEMINAR ON APRIL 29, 2016 Jointly Organized By DEPARTMENT OF LAW NORTH EASTERN HILL UNIVERSITY and North Eastern Council Ministry of Development of North Eastern Region Government of India BACKGROUND

More information

Sh. Alok Mittal, Commissioner of Police, Gurgaon addressed the delegates in the session on Finalization of Recommendations for Policy Initiatives

Sh. Alok Mittal, Commissioner of Police, Gurgaon addressed the delegates in the session on Finalization of Recommendations for Policy Initiatives Recommendations of the Consultation on Ways and Means to safeguard women from Cyber Crimes in India organized by National Commission for women on 23 rd July, 2014 at India Habitat Centre New Delhi 1. Recommendations

More information

Cyber Security Development. Ghana in Perspective

Cyber Security Development. Ghana in Perspective Cyber Security Development Ghana in Perspective GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review

More information

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014 NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014 OUR MANDATE O The EFCC is the agency charged with the responsibility for the enforcement

More information

Chief Patron Prof. R. C. Sobti, Vice Chancellor BBA University, Lucknow

Chief Patron Prof. R. C. Sobti, Vice Chancellor BBA University, Lucknow Chief Patron Prof. R. C. Sobti, Vice Chancellor BBA University, Lucknow Director Prof. R. A. Khan Head, DIT BBA University Conveners Dr. Rajshree Mr. Pawan Kumar Chaurasia Dr. Alka About University Babasaheb

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

L- 02 (ADVANCED) Learn the technical and procedural aspects for a Cybercrime Scene Investigation

L- 02 (ADVANCED) Learn the technical and procedural aspects for a Cybercrime Scene Investigation L- 02 (ADVANCED) Learn the technical and procedural aspects for a Cybercrime Scene Investigation 1 2 TABLE OF CONTENT About the Programme Overview Objectives Pre-requisite Program Suitable For Curriculum

More information

10025/16 MP/mj 1 DG D 2B

10025/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10025/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

PROGRAMME CODE QHA5101. This Programme helps to understand various types of crime in digital world and the related legislations in India.

PROGRAMME CODE QHA5101. This Programme helps to understand various types of crime in digital world and the related legislations in India. PROGRAMME CODE QHA5101 This Programme helps to understand various types of crime in digital world and the related legislations in India. TABLE OF CONTENT About the Programme Overview Benefits Objectives

More information

Registration Form. Name of Attendee Designation Institution/Hospital Telephone No id Address. Before 31 st October 2018

Registration Form. Name of Attendee Designation Institution/Hospital Telephone No  id Address. Before 31 st October 2018 Annual Conference of Haryana Association of Gynae Endoscopy Learning from Basic to Advanced Gyne Endoscopy Live Workshop on 8th December at Hospital QRG, Faridabad Conference on 9th December at Hotel Radisson

More information

Garry Mukelabai Communications Authority Zambia

Garry Mukelabai Communications Authority Zambia Garry Mukelabai Communications Authority Zambia ICT in Zambia. Current and Future Legislations. Way Forward? Pop 12 million. Zambia pioneers of internet in region. Over 10 Internet Service Providers Internet

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

ITU Model Cybercrime Law: Project Overview

ITU Model Cybercrime Law: Project Overview ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International

More information

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV OTHER MINISTERS OR ATTORNEYS GENERAL CIBER-VIII/doc.1/11 OF THE AMERICAS 6 November 2013 Original: English Eighth Meeting of the Working Group on Cyber-crime

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

One day National Seminar On Cyber Crimes: - Issues and Challenges

One day National Seminar On Cyber Crimes: - Issues and Challenges One day National Seminar On Cyber Crimes: - Issues and Challenges On March 9, 2018 Organized by FACULTY OF LAW JAMIA MILIA ISLAMIA NEW DELHI-110025 National Seminar on Cyber Crimes: - Issues and Challenges

More information

CYBERCRIME RESPONDERS TRAININGS

CYBERCRIME RESPONDERS TRAININGS CYBERCRIME RESPONDERS TRAININGS PHILIPPINE DELEGATION International Workshop on Integrating the issues of Cybercrime and Electronic Evidence into Judicial Training Curricula 11-13 April 2016 Johannesburg,

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Overview on the Project achievements

Overview on the Project achievements Overview on the Project achievements Closing Conference, Tbilisi, Georgia 14 May 2010 Cristina Schulman Council of Europe Strasbourg, France Tel +33-3-8841-2103 cristina.schulman@coe.int www.coe.int/cybercrime-georgia

More information

Financial Planning Institute of Southern Africa SETTING THE STANDARD. Continuous Professional Development (Cpd) Policy

Financial Planning Institute of Southern Africa SETTING THE STANDARD. Continuous Professional Development (Cpd) Policy FPI FPI Financial Planning Institute of Southern Africa SETTING THE STANDARD Continuous Professional Development (Cpd) Policy Table of Contents Definitions 3-4 Introduction 4 Primary Responsibility 5 Mandatory

More information

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012 CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE Octopus Conference, Strasbourg 06 June, 2012 T.GEORGE-MARIA TYENDEZWA Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, Abuja,

More information

University. EC-Council ADMISSION APPLICATION.

University. EC-Council ADMISSION APPLICATION. EC-Council ADMISSION APPLICATION http://www.eccuni.us EC-Council Admission Application for the Master of Security Science Degree Program Please complete the enclosed application for the Master of Security

More information

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting

More information

New CEPIS Mission

New CEPIS Mission New CEPIS Mission 2016-2020 Contents: 1 Introduction... 3 2 CEPIS Today... 3 3 CEPIS Tomorrow... 3 1.1 Mission Statement... 3 1.2 Target Audiences... 3 1.3 Strategy... 4 1.3.1 Promoting High Standards

More information

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY

More information

ACCAB. Accreditation Commission For Conformity Assessment Bodies

ACCAB. Accreditation Commission For Conformity Assessment Bodies ACCAB Accreditation Commission For Conformity Assessment Bodies ACCAB Platinum Plus Accreditation For Certification Bodies, Inspection Bodies, Testing & Calibration Laboratories and Medical Laboratories

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08

More information

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime

More information

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post Introduction Telecommunication and Post The n legislation in the field of telecommunication and post is almost in full incompliance with that of the EU, except for certain legal rules on general legal

More information

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT. SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

State Planning Organization Information Society Department

State Planning Organization Information Society Department Information Society Department - October TR. Information Society Department Information Society Strategy Duration / Pro- Post- 1 Formulating the Information Society Strategy All Public Institutions Universities

More information

EC-Council GOVERNMENT OF KARNATAKA DEPARTMENT OF INDUSTRIES AND COMMERCE

EC-Council GOVERNMENT OF KARNATAKA DEPARTMENT OF INDUSTRIES AND COMMERCE National Conference on Cyber Space Security (NCCSS) 2013 Research Challenges and Trends December 6-7, 2013 Venue: Hotel Atria, Palace Road, Bangalore Theme: Securing National Critical Infrastructure SUPPORTED

More information

Developing and Implementing Data Protection Law: Malaysia and Beyond

Developing and Implementing Data Protection Law: Malaysia and Beyond Developing and Implementing Data Protection Law: Malaysia and Beyond Professor Abu Bakar Munir Faculty of Law, University of Malaya Malaysia K&K Advocates - Expert Panel Discussion on Data Protection Jakarta,

More information

Guidelines for Author(s)

Guidelines for Author(s) IISRR-International Journal of Research An International Journal for Research Activities & an Initiative of the [Registered under the West Bengal Society Reg. ACT XXVI of 1961, Vide Registration No- S/2L/

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 67 (Rev. Buenos Aires, 2017) 524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Syllabus for P.G. Diploma in Cyber Law and Information Technology

Syllabus for P.G. Diploma in Cyber Law and Information Technology Syllabus for P.G. Diploma in Cyber Law and Information Technology Paper I: Basic of computer and Cyber Security Paper II: Information Technology Law (Cyber Law) Paper III: Cyber crime and investigation

More information

Objective: Education:

Objective: Education: Christopher L. Copeland 1008 Westminster Ln., Mansfield TX 76063 817.791.6728 chris@chriscopeland.com ccopeland@tarleton.edu Objective: I am an education professional with significant technical and process

More information

G8 Lyon-Roma Group High Tech Crime Subgroup

G8 Lyon-Roma Group High Tech Crime Subgroup G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies

More information

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Geneva 18 April 2016 David Satola Why combatting cybercrime matters to the World Bank Demand for a single source of access

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

DIGITAL AGENDA FOR EUROPE

DIGITAL AGENDA FOR EUROPE DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background

More information

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September

More information

10/12/17 VISION MISSION

10/12/17 VISION MISSION Update on CPA Alberta & the CPA Profession in Alberta 34 th Annual CPA Small Practitioners Forum October 19 th, 2017 Banff, Alberta Larry Brownoff, CPA, CA Director, Professional & Career Services Topics

More information

TABLE OF CONTENTS ... 8

TABLE OF CONTENTS ... 8 TABLE OF CONTENTS Certification in Forensic Accounting... 3 Overview of CFAP... 3 Academic Requirements for The CFAP... 3 CFAP Syllabus... 4 CPE Compliance... 4 Intake for the program... 4 Registration

More information

PIONEER TRAINING INSTITUTE

PIONEER TRAINING INSTITUTE PIONEER TRAINING INSTITUTE CENTRE FOR DISTANCE & ONLINE LEARNING DIPLOMA IN SECURITY MANAGEMENT OUTLINE SECURITY MANAGEMENT STUDIES Pioneer Training Institute has specifically identified security management

More information

NC Project Learning Tree Guidelines

NC Project Learning Tree Guidelines NC Project Learning Tree Guidelines PREFACE Project Learning Tree (PLT) is an environmental education program for educators and youth leaders working with students from pre-kindergarten through grade 12.

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

UNIVERSITY OF CALICUT

UNIVERSITY OF CALICUT UNIVERSITY OF CALICUT (Abstract) B A programme in Islamic History under Choice based Credit Semester System syllabus of Informatics III Semester Revised approved implemented with effect from 2009 admission

More information

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona 2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference

More information

August 18-19, 2018 (Saturday-Sunday)

August 18-19, 2018 (Saturday-Sunday) August 18-19, 2018 (Saturday-Sunday) ORGANIZED BY: HUMAN RESOURCE DEVELOPMENT CENTER & SCHOOL OF COMPUTER & SCIENCE ENGINEERING LOVELY PROFESSIONAL UNIVERSITY PHAGWARA, PUNJAB. BACK DROP AND RATIONALE

More information

A Comparative Study of Teaching Forensics at a University Degree Level

A Comparative Study of Teaching Forensics at a University Degree Level A Comparative Study of Teaching Forensics at a University Degree Level Martin Mink University of Mannheim, Germany IMF 2006, Stuttgart October 19 Joint Work Laboratory for Dependable Distributed Systems

More information

GAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007

GAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007 GAC PRINCIPLES REGARDING gtld WHOIS SERVICES Presented by the Governmental Advisory Committee March 28, 2007 1.1 The purpose of this document is to identify a set of general public policy issues and to

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

Cyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security

Cyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security Cyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks

More information

Child Online Protection in Child Pornography Namibia

Child Online Protection in Child Pornography Namibia Child Online Protection in Child Pornography Namibia Regulation in Namibia UNICEF Namibia Presented by: Jolanda van Westering Outline Introduction Typology of online abuse and exploitation Scale and response

More information

ACCREDITED HEALTH & SAFETY SHORT COURSES

ACCREDITED HEALTH & SAFETY SHORT COURSES ACCREDITED HEALTH & SAFETY 2018 ACCREDITED HEALTH & SAFETY INTRODUCTION Our services benefit any organization dedicated to the development and enhancement of skills and knowledge through training. Frontline

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

Cyber Crime Prosecution & Defence

Cyber Crime Prosecution & Defence Cyber Crime Prosecution & Defence www.asianlaws.org DID YOU KNOW? 5,035 cyber crime FIRs were registered in Bengaluru in 2018. Mumbai saw almost 3,000 cyber crime FIRs. Almost 16,000 Indian websites were

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

Telecommunication Development Bureau (BDT)

Telecommunication Development Bureau (BDT) Telecommunication Development Bureau (BDT) Ref.: BDT/IEE/RME/DM/006 Geneva, 18 December 2017 To: -ITU-D Sector Members -Administrations of ITU Member States -National Regulatory Authorities -Regional and

More information

Lux et Veritas National Law Fest 2014

Lux et Veritas National Law Fest 2014 FACULTY OF LAW THE MAHARAJA SAYAJIRAO UNIVERSITY OF BARODA Maharaja Pratapsinhrao Gaekwad Parisar (Donors Plaza), Opp. University Head Office Fatehgunj, Vadodara Lux et Veritas National Law Fest 2014 NATIONAL

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise 1 Eleventh Edition 2 Chapter Objectives C h a p t e r 11 Eleventh Edition James A. O Brien Identify several ethical

More information

DIPLOMA COURSE IN INTERNAL AUDIT

DIPLOMA COURSE IN INTERNAL AUDIT DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at

More information

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT) ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

More information

Way to new challenges

Way to new challenges Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law

More information

LOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE. Loughborough University (LU) Research Office SOP 1027 LU

LOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE. Loughborough University (LU) Research Office SOP 1027 LU LOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE Loughborough University (LU) Research Office SOP 1027 LU Process for Writing Study Protocols for NHS Research Sponsored by Loughborough

More information

Caribbean Cyber Security: Not Only Government s Responsibility

Caribbean Cyber Security: Not Only Government s Responsibility Caribbean Cyber Security: Not Only Government s Responsibility AWARENESS AND VIGILANCE IS EVERYBODY S RESPONSIBILITY Preseted at: ICT Symposium Antigua and Barbuda March 2017 Caribbean Cyber Security Events

More information

Tunku Abdul Rahman University College is conducting CIMA Certificate in Business Accounting (Cert BA).

Tunku Abdul Rahman University College is conducting CIMA Certificate in Business Accounting (Cert BA). PUBLIC COURSE Tunku Abdul Rahman University College is conducting CIMA Certificate in Business Accounting (Cert BA). The CIMA Cert BA elevates people and businesses to success by developing skills and

More information

CFE Exam Review Course

CFE Exam Review Course CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our

More information

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA Umejiaku Nneka Obiamaka, Department of Commercial and Property Law Faculty of Law, Nnamdi Azikiwe University, Awka, Nigeria

More information

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 The inaugural meeting of the Elder Justice Coordinating Council took place in October 2012 Fall meeting agenda determined with

More information

National Crime Prevention Specialist

National Crime Prevention Specialist National Crime Prevention Specialist Recertification Guidelines and Renewal Application National Crime Prevention Council 2614 Chapel Lake Drive, Suite B Gambrills, MD 21054 Tel: 443-292-4565 www.ncpc.org

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

A1. Actions which have been undertaken by Governments

A1. Actions which have been undertaken by Governments Subject: Response to the ITU invitation for Member States to provide their input on actions that have been undertaken or to be governments in relation to various international Internet-related public policy

More information

CERTIFICATE COURSE C++ PROGRAMMING

CERTIFICATE COURSE C++ PROGRAMMING RAMANUJAN COMPUTING CENTRE (RCC) CEG Campus, Anna University, Chennai 600 025. CERTIFICATE COURSE On C++ PROGRAMMING (FROM 02 nd MAY 30 th MAY 2017) Organized and Conducted by RAMANUJAN COMPUTING CENTRE

More information

Reference Framework for the FERMA Certification Programme

Reference Framework for the FERMA Certification Programme Brussels, 23/07/2015 Dear Sir/Madam, Subject: Invitation to Tender Reference Framework for the FERMA Certification Programme Background The Federation of European Risk Management Associations (FERMA) brings

More information

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group The role of COP/ITU on international level Dr Ibrahim Al dabal chair of child on line council working group I nformation & I nternational C ommunication T elecommunication T echnologies U nion WHO WE

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

QBPC s Mission and Objectives

QBPC s Mission and Objectives QBPC s Mission and Objectives Mission To make contributions to facilitate and promote continuous improvements in administrative and judicial protection for intellectual property in China; to enable the

More information

UNODC tackling cybercrime in support of a safe and secure AP-IS

UNODC tackling cybercrime in support of a safe and secure AP-IS UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway

More information

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt Implementation of the recommendations adopted by the Fifty-first session of the Subcommission on Illicit Drug Traffic and Related Matters in the Near and Middle East, held in Riyadh from 20 to 24 November

More information

CALIFORNIA CAREER DEVELOPMENT ASSOCIATION 2016 SOUTHERN CA REGIONAL CONFERENCE

CALIFORNIA CAREER DEVELOPMENT ASSOCIATION 2016 SOUTHERN CA REGIONAL CONFERENCE CALIFORNIA CAREER DEVELOPMENT ASSOCIATION 2016 SOUTHERN CA REGIONAL CONFERENCE Social Justice In Career Counseling May 13, 2016, Glendale, CA 2016 CCDA Conference Information Social Justice In Career Counseling

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

WELLSBORO AREA SCHOOL DISTRICT

WELLSBORO AREA SCHOOL DISTRICT No. 815.2 SECTION: OPERATIONS WELLSBORO AREA SCHOOL DISTRICT TITLE: DISTRICT-ISSUED LAPTOPS: STUDENT USE, RIGHTS, AND RESPONSIBILITIES ADOPTED: April 14, 2015 REVISED: October 7, 2015 815.2. DISTRICT-ISSUED

More information

ASCPA Road to the CPA Toolkit

ASCPA Road to the CPA Toolkit ASCPA Road to the CPA Toolkit Start Your Journey to Become a CPA The Arizona Society of Certified Public Accountants www.ascpa.com Arizona Society of Certified Public Accountants 4801 E. Washington St.,

More information

ASEAN s Cyber Confidence Building Measures

ASEAN s Cyber Confidence Building Measures ASEAN s Cyber Confidence Building Measures Presentation by the ASEAN Secretariat UNIDIR Cyber Stability Seminar: Preventing Cyber Conflict 10 February 2014, Geneva, Switzerland Outline ASEAN Mechanisms

More information

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY THE JOURNEY OF Sri Lanka TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY Presented by Dr. Ajith Madurapperuma on behalf of the ICTA Email: ajitolanka@gmail.com A PRESENTATION BY The Information Communication

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

International Cooperation in Cybercrime Investigations

International Cooperation in Cybercrime Investigations International Cooperation in Cybercrime Investigations Joel Schwarz Computer Crime & Intellectual Property Section Criminal Division, US Department of Justice Joel.schwarz@usdoj.gov Criminal Investigations

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information