Thirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP)

Size: px
Start display at page:

Download "Thirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP)"

Transcription

1 Thirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP) Advance Passenger Information (API) Workshop Fabrizio Di Carlo INTERPOL 26 October 2017

2 OBJECTIVES Matching passenger data through INTERPOL databases 1. Examining how API interacts with national border security systems and various INTERPOL databases to conduct passenger matching and effectively screen airline passengers 2. Identifying best practices to ensure the best use of API as an intelligence tool and to conduct effective passenger screening and risk assessment

3 DATA TO BE CAPTURED AND TRANSMITTED* 1. Data relating to the Flight (Header Data) 2. Data relating to each individual passenger (a) Core Data Elements as may be found in the Machine Readable Zone of the Official Travel Document (b) Additional data as available in Airline systems. (c) Additional data not normally found in Airline systems and which must be collected by, or on behalf of the Airline. * GUIDELINES ON ADVANCE PASSENGER INFORMATION (API) WCO/IATA/ICAO 2014

4 DATA RELATING TO EACH INDIVIDUAL PASSENGER Core Data Elements as may be found in the Machine Readable Zone of the Official Travel Document Issuing State or Organization of the Official Travel Document Official Travel Document Number Official Travel Document Type Expiration Date of Official Travel Document Surname/Given Name(s) Nationality Date of Birth Gender

5 API INTEGRATION WITH EXISTING GOVERNMENT SYSTEMS API provides Border Control Agencies with data they could otherwise access upon the passenger s arrival and presentation at an immigration inspection desk. However, the utility of API related data can be understand only if considered into an integrated approach API-related data need to be coupled with national existing border management systems as well as INTERPOL databases

6 Types of INTERPOL Notices RED NOTICE To seek the location and arrest of wanted persons. BLUE NOTICE To obtain information/ locate/ identify a person of interest in a criminal investigation. YELLOW NOTICE To locate a missing person or to identify a person unable to identify himself/herself. GREEN NOTICE To warn about a person's criminal activities. BLACK NOTICE To identify dead bodies. INTERPOL-UN Security Council Special Notice To inform about persons or companies subject to UN Security Council Sanctions. ORANGE NOTICE - To warn of an event, a person, an object or a process representing a serious and imminent threat to public safety. PURPLE NOTICE To seek or provide information on modi operandi, objects, devices and concealment methods used by criminals.

7 175 participating countries 183 countries screening documents 155 countries triggering alerts (hits) Mandatory Field DIN (Document Identification Number)* Issuing Country (ICAO three-letter code) Type of document Type of fraud (Stolen blank or lost by bearer/stolen from bearer or revoked) +75 M records + 1,8 B consultations in ,000 alerts +32 M Passports +37 M Identity Cards +33,000 Visas + 67,7M stolen or lost 620,416 stolen blank 1,713,909 revoked

8 TDAWN APPLICATION Travel Documents Associated With Notices Application which extracts, from Notices, travel document identifiers in a separate domain to enable authorized users to search them through a query with a Document Identification Number (DIN) of a travel or identity document. Purpose To enable authorized users to detect persons subject to INTERPOL Notices by performing checks on associated travel documents. Function The following Notices can be searched with the TDAWN application: Red, Blue, Green, Yellow and INTERPOL United Nations Security Council Special Notices.

9 INTERPOL Services and Databases Secure Global Police Communication Services Gateway to INTERPOL databases Around-the-clock access to crucial data in seconds Platform for sharing criminal information among law enforcement entities All 192 INTERPOL member countries are connected Trained personnel Adapted to police needs

10 The INTERPOL Rules on the Processing of data Interpol owners databases Data remain property of the countries INTERPOL custodian of national data Interpol performs data quality check (if not compliant no actions other than put data off line is permitted) Restrictions system, to enable data owners to restrict their data to those countries they do not want to share infor,ation with. INTERPOL as DATA REPOSITORY

11 INTEROPERABLE SERVICES WISDM FIND (search) I-Batch (search) National Databases I-24/7 national node WISDM (contribution) IPSG Police information system

12 FIND Integrated solution to access INTERPOL s database Solution allow officers to submit a query simultaneously to National and Interpol databases Top-level security is ensured using of Interpol s I-24/7 communications system Response to the query is immediate System notifies member countries concerned of potential hit FRANCE Integration into existing systems No changes in the daily work of front-line officers No special training required No language barriers Easily adapted to individual countries requirements and capabilities Fully interoperable with i-api SWITZERLAND MEXICO

13 I-BATCH Interoperability with Batch Style API

14 RECOMMENDED BEST PRACTICES The utility that follows the API implementation is evident when API data is scrupulously checked against national and international watch list; Implementation of API system in parallel with the integration of INTERPOL/FIND service within existing border management systems to ensure systematic checks; In the implementation and the management of API, a strong cooperation between all national stakeholders, airlines, international organization and NCB is pivotal; For the correct use of the system, SOP has to be implemented for a clear and accurate API data processing flow and appropriate management of positive match; The use of Interactive API (i-api) should be encouraged as it enables 2-way real-time communication on a passenger-by-passenger transaction basis initiated during check-in with the benefit such as: 1) the governments Board or Do not Board response to the airline in real time 2) the fully compatibility with the INTERPOL FIND. Countries are encouraged to timely and accurately update INTERPOL databases Single window is recommended for a better cooperation among stakeholders Countries are encouraged to handle API data according to UN/EDIFACT PAXLST standard

15 CONCLUSION Advanced Passenger Information (API) are definitely essential to Border Agencies to make accurate, comprehensive decisions about which passengers require additional inspection at the port of entry based on law enforcement and other information On the same time API related data needs to be fully integrated within a national and coordinated information flow that entails both a huge border agencies cooperation and a full technical compliance. Finally, international watch lists integrated within existing national systems shall ensure both technical interoperability and data compatibility in order to guarantee full and smoothly data processing.

Thirteenth Symposium on the ICAO Traveller Identification Programme

Thirteenth Symposium on the ICAO Traveller Identification Programme Thirteenth Symposium on the ICAO Traveller Identification Programme Counter-Terrorism Committee Executive Directorate (CTED) United Nations ICAO Headquarters, Montreal, 24-26 October 2017 Briefly about

More information

The APEC Model. Global Partnership through Regional Initiatives

The APEC Model. Global Partnership through Regional Initiatives The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security

More information

Key United Nations counter-terrorism references & architecture: Impact on customs.

Key United Nations counter-terrorism references & architecture: Impact on customs. Key United Nations counter-terrorism references & architecture: Impact on customs. Counter-Terrorism Committee Executive Directorate (CTED) United Nations Brussels, 2-4 October 2018 United Nations counter-terrorism

More information

ESSA Q INTEGRITY REPORT

ESSA Q INTEGRITY REPORT ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,

More information

COUNTER-TERRORISM. Future-oriented policing projects

COUNTER-TERRORISM. Future-oriented policing projects COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol

More information

The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security

The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security Counter-Terrorism Committee Executive Directorate (CTED) United Nations Montreal, 21 May

More information

International Civil Aviation Organization. Middle East Regional Aviation Security and Facilitation Group

International Civil Aviation Organization. Middle East Regional Aviation Security and Facilitation Group International Civil Aviation Organization 11/09/2018 Middle East Regional Aviation Security and Facilitation Group First Meeting (MID-RASFG/1) (Kuwait, 24 26 September 2018) Agenda Item 4: MID Region AVSEC/FAL

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT JULY 1, 2013 COLDWELL BANKER-D ANN HARPER REALTY PROPERTY MANAGEMENT, located in SAN ANTONIO, TX 78258 developed

More information

Securing the New Perimeter:

Securing the New Perimeter: Microsoft Future Decoded Securing the New Perimeter: Identity as the Keystone with Heathrow Airport 01/11/2018 Divider Title Slide Name Here Some Facts & Figures.. Passengers Team Heathrow Flights Size

More information

Visual Compliance Screening Guidance and Procedures

Visual Compliance Screening Guidance and Procedures Visual Compliance Screening Guidance and Procedures What is Visual Compliance? Export control laws prohibit us from doing business of any kind with persons or entities on lists maintained against sanctioned

More information

Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness

Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness Airports Council International North America Public Safety & Security Conference Deborah Meyers, U.S. Department of

More information

Gemalto Border Management

Gemalto Border Management Gemalto Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

PROFILES FOR SIGNATURE SUCCESS

PROFILES FOR SIGNATURE SUCCESS Why use ClientBase and what is it? PROFILES FOR SIGNATURE SUCCESS QUICK REFERENCE GUIDE (CLIENTBASE ONLINE) Utilizing ClientBase gives you access to Signature s powerful tools including marketing, Emarketing,

More information

According to information received, the Interpol database consists of a set of applications built with different technologies and languages (PL / SQL,

According to information received, the Interpol database consists of a set of applications built with different technologies and languages (PL / SQL, 1 According to information received, the Interpol database consists of a set of applications built with different technologies and languages (PL / SQL, Pro * C, Visual Basic, etc...) that currently rely

More information

Breach Notification Form

Breach Notification Form Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has

More information

EU Passport Specification

EU Passport Specification Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the

More information

Privacy Policy. With respect to the above, please see those respective sites for the privacy policies that may apply.

Privacy Policy. With respect to the above, please see those respective sites for the privacy policies that may apply. Privacy Policy Advanced Air, LLC (Advanced Air) respects your privacy. This Policy discloses Advanced Air s privacy practices for your information collected online or offline. While Advanced Air strives

More information

Tips for Completing USCIS Form I-765 Application for Employment Authorization Document (EAD)

Tips for Completing USCIS Form I-765 Application for Employment Authorization Document (EAD) Tips for Completing USCIS Form I-765 Application for Employment Authorization Document (EAD) We encourage all SCU students and scholars to use this document when applying for OPT, STEM OPT Extension, or

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

Donor Countries Security. Date

Donor Countries Security. Date SAINT LUCIA Last updated date: 8/14/2017 OAS Pillar Sub-Regional Access Control Technique Training Civil Aviation Officials and Law Enforcement Officials United States Link to web page Date 2/13/2017 to

More information

SEVIS Name Changes and Social Security Information Fact Sheet

SEVIS Name Changes and Social Security Information Fact Sheet The Student and Exchange Visitor Program (SEVP) will modify the name standards in the Student and Exchange Visitor Information System (SEVIS), effective June 26, 2015. At this time, the format of the Forms

More information

Donor Countries Security. Date

Donor Countries Security. Date PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program

More information

Starflow Token Sale Privacy Policy

Starflow Token Sale Privacy Policy Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through

More information

1. provide and communicate with you about the Services or your account with us,

1. provide and communicate with you about the Services or your account with us, PRIVACY POLICY Your privacy is important to us. As such, we provide this privacy policy ("Privacy Policy") explaining our online information practices and the way your information is collected and used

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) BCD Travel s Response to the EU General Data Protection Regulation (GDPR) November 2017 Page 1 Response to the EU GDPR Copyright 2017 by BCD Travel N.V. All rights reserved. November 2017 Copyright 2017

More information

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators

More information

COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS

COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS February 2018 A HISTORY OF COOPERATION 1997: Cooperation agreement between INTERPOL and the UN Many decades of collaboration was formalized in an agreement

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

Privacy & Information Security Protocol: Breach Notification & Mitigation

Privacy & Information Security Protocol: Breach Notification & Mitigation The VUMC Privacy Office coordinates compliance with the required notification steps and prepares the necessary notification and reporting documents. The business unit from which the breach occurred covers

More information

Token Sale Privacy Policy

Token Sale Privacy Policy Token Sale Privacy Policy PRIVACY POLICY LAST UPDATED ON: [11 SEP 2018] A. OVERVIEW You must read the entirety of this Privacy Policy carefully before making any decision to purchase Tokens. You must also

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security DOMINICA Last updated date: 7/27/2017 OAS Pillar National Cargo Workshop Civil Aviation Officials and Law Enforcement Officials United States Link web page 6/6/2016 6/10/2016 The CICTE Aviation Program

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

The Beyond the Border Action Plan

The Beyond the Border Action Plan The Beyond the Border Action Plan 1 Beyond the Border: A Shared Vision For Perimeter Security and Economic Competitiveness Part 1: Addressing Threats Early Part 2: Trade Facilitation, Economic Growth,

More information

ONBOARDING APPLICATION

ONBOARDING APPLICATION NATE s Blue Button Plus for Providers Trust Bundle ONBOARDING APPLICATION Main Point of Contact Name: Telephone Number: Organization: Mobile: Email: Physical Address: Overview of document This document

More information

Operation Guide. Computer Log On: Cell Phone: User Name: Password:

Operation Guide. Computer Log On:   Cell Phone:   User Name: Password: Operation Guide Signing on to platform... 2 How to change my e-mail (alerts)... 2 Mapping Page Layout... 3 Change my password... 4 Change my vehicle look... 4 How to use tracks for current day... 5 How

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

CONNEXXUS TRAVELER PROFILE GETTING STARTED GUIDE FOR TRAVELERS / ARRANGERS Contents

CONNEXXUS TRAVELER PROFILE GETTING STARTED GUIDE FOR TRAVELERS / ARRANGERS Contents CONNEXXUS TRAVELER PROFILE GETTING STARTED GUIDE FOR TRAVELERS / ARRANGERS Contents Introduction... 2 Accessing a Travel Profile... 2 Navigating within the Connexxus Traveler Profile Page... 4 Required

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

INTERPOL Washington U.S. National Central Bureau U.S. Department of Justice. Domestic Focus International Reach

INTERPOL Washington U.S. National Central Bureau U.S. Department of Justice. Domestic Focus International Reach INTERPOL Washington U.S. National Central Bureau U.S. Department of Justice The Myth The Reality Worldwide police communications Criminal investigative resources International police databases Arabic,

More information

Do not place any stamps or stickers on the form, (e.g. those featuring addresses). Do not write over the edges of the boxes.

Do not place any stamps or stickers on the form, (e.g. those featuring addresses). Do not write over the edges of the boxes. Version 1.0 1 Note only individuals who are new to the PVG scheme and not currently a member of the PVG Scheme should complete this application form. Please contact Disclosure Scotland if you would like

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL. Mr Olusola Oguntunde

International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL. Mr Olusola Oguntunde International Law Enforcement Cooperation on Cybercrime investigations: the role of INTERPOL Mr Olusola Oguntunde EU OFFICE IPSG LYON RB SAN SALVADOR RB BUENOS AIRES UN OFFICE RB ABIDJAN RB YAOUNDE AU

More information

TransLink Video Surveillance & Audio Recording Privacy Statement

TransLink Video Surveillance & Audio Recording Privacy Statement TransLink Video Surveillance & Audio Recording Privacy Statement Last Update: August 4, 2015 Previous version: July 22, 2008 TransLink is committed to achieving a balance between an individual s right

More information

The International Criminal Police Organization

The International Criminal Police Organization The International Criminal Police Organization Project GEIGER Review OUTLINE INTERPOL PROJECT GEIGER NUCLEAR TERRORISM ISSUES INFORMATION AND AWARENESS INTERPOL INTERPOL, officially the International Criminal

More information

12-Month Post-Completion OPT

12-Month Post-Completion OPT 12-Month Post-Completion OPT Application Materials Reference Guide Last updated 3/25/19 This guide should not be used for Pre-Completion OPT, 24-Month STEM Extensions, J-2 Work Authorization, or any other

More information

BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF

BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal CIPF BWC: 2010 Meeting of Experts Mexico Intelligence Center Policia Federal Geneve Switzerland, August 26th 2010 1 NATION WIDE PUBLIC SAFETY NETWORK THE BACKBONE An advanced telecommunications and information

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Review of the WMO DRR Programme activities in the area of MHEWS as a contribution to the WMO DRR Priority (2005 to present)

Review of the WMO DRR Programme activities in the area of MHEWS as a contribution to the WMO DRR Priority (2005 to present) Review of the WMO DRR Programme activities in the area of MHEWS as a contribution to the WMO DRR Priority (2005 to present) Session 2: Background UI-EAG MHEWS, 19-21 April 2016, Geneva James Douris Project

More information

Screening Online User Guide

Screening Online User Guide Screening Online User Guide Contents Screening Online... 1 User Guide... 1 1. Introduction... 5 2. Log in... 6 3. Initial Screening Sanctions and Enforcements... 7 4. Match Overview Standard Interface...

More information

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW

More information

Issue I. Airport Communication Project

Issue I. Airport Communication Project Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office

More information

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350 Έκδοση 1.2-2018.02.14 TLP1: WHITE 1 TLP Sources may use TLP: WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release.

More information

Experiences of w S itz w e itz rland

Experiences of w S itz w e itz rland Joining the PKD why? Experiences of Switzerland State of Play Switzerland The first generation e passport is being issued since 4 September 2006 Name, first name Passport number Date and place of issue,

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

Special meeting of the Counter-Terrorism Committee on Terrorist Threats to Civil Aviation. Draft Agenda

Special meeting of the Counter-Terrorism Committee on Terrorist Threats to Civil Aviation. Draft Agenda Special meeting of the Counter-Terrorism Committee on Terrorist Threats to Civil Aviation Technical sessions of the Counter-Terrorism Committee Executive Directorate (CTED), in cooperation with the International

More information

FIRESOFT CONSULTING Privacy Policy

FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING abides by the Australian Privacy Principles ( APPs ), which provides relative information to businesses in relation to the collection, disclosure,

More information

(DISPONIBLE EN ANGLAIS UNIQUEMENT)

(DISPONIBLE EN ANGLAIS UNIQUEMENT) APPENDIX IIB ADVANCED PASSENGER INFORMATION GUIDELINES (DISPONIBLE EN ANGLAIS UNIQUEMENT) Pour les modifications apportées aux lignes directrices de mise en œuvre de message, s'il vous plaît voir la version

More information

EXECUTIVE ORDER Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk

EXECUTIVE ORDER Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk EXECUTIVE ORDER 13650 Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk THE DAILY www.region6gazette.com - Since 2014 Executive Order (EO) 13650 signed August 1, 2013 - Result of

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Data Preservation Checklists

Data Preservation Checklists Data Preservation Checklists At the G8 meeting of Justice and Interior Ministers in Moscow in October 1999, the Ministers recognized that law enforcement authorities conducting criminal investigations

More information

BC Taxi Camera Rule. Legislation Section 28(2)(a) of the Passenger Transportation Act states:

BC Taxi Camera Rule. Legislation Section 28(2)(a) of the Passenger Transportation Act states: Effective May 31, 2017 Purposes 1. Enable taxicab licensees in British Columbia to use taxi cameras for driver and passenger safety. 2. Establish privacy safeguards. 3. Establish standards and requirements

More information

STATUS: For NP ballot for development as a Type 2 Technical Report.

STATUS: For NP ballot for development as a Type 2 Technical Report. ISO/IEC JTC1/SC17 2002-03-27 Cards and personal identification ISO/IEC JTC1/SC17 N 2094 DOCUMENT TYPE : NP BALLOT TITLE: Ballot - Proposal for a New Work Item Personal identification - Machine-Assisted

More information

The epassport: What s Next?

The epassport: What s Next? The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security

More information

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

EU GDPR and  . The complete text of the EU GDPR can be found at  What is GDPR? EU GDPR and Email The EU General Data Protection Regulation (GDPR) is the new legal framework governing the use of the personal data of European Union (EU) citizens across all EU markets. It replaces existing

More information

Air Transport & Travel Industry. Principles, Functional and Business Requirements PNRGOV

Air Transport & Travel Industry. Principles, Functional and Business Requirements PNRGOV Air Transport & Travel Industry Principles, Functional and Business Requirements Version 15.1 Endorsed by WCO Council in July 2016 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 SCOPE... 3

More information

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

Assistant Secretary-General Michèle Coninsx Executive Director, CTED High-Level Conference of Heads of Counter-Terrorism Agencies Opportunities and challenges in strengthening international cooperation through the sharing of information, expertise and resources United Nations

More information

R Delegation of Powers and Duties to the Executive Secretary. R Application for Certification.

R Delegation of Powers and Duties to the Executive Secretary. R Application for Certification. R311. Environmental Quality, Environmental Response and Remediation. R311-500. Illegal Drug Operations Site Reporting and Decontamination Act, Decontamination Specialist Certification Program. R311-500-1.

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) (CFI-12-IGCI-02) Background INTERPOL recognizes that police worldwide

More information

THE NEW GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ENTERPRISES. Forum financier du Brabant wallon

THE NEW GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ENTERPRISES. Forum financier du Brabant wallon THE NEW GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ENTERPRISES Forum financier du Brabant wallon 14.12.2017 Data Protection should be part of every company s or organisation s DNA Do you process

More information

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Outline Introduction to CARICOM IMPACS What is Cybersecurity? CARICOM & Cybersecurity CARICOM Cyber Security and Cybercrime Action Plan (CCSCAP)

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

SEVIS Release 6.13 Final System Changes. SEVIS Batch. All Users

SEVIS Release 6.13 Final System Changes. SEVIS Batch. All Users May 23, 2013 Production Release Date: May 24, 2013 The following summarizes the final system changes to SEVIS with Release 6.13. SEVIS Batch An overview of the Student and Exchange Visitor Information

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

Provider Monitoring Process

Provider Monitoring Process Provider Monitoring Process This statewide provider monitoring process is applicable for all providers including direct vendors, Agency with Choice (AWC) Financial Management Services (FMS) providers and

More information

Privacy Statement for Use of the Certification Service of Swisscom (sales name: "All-in Signing Service")

Privacy Statement for Use of the Certification Service of Swisscom (sales name: All-in Signing Service) Swisscom (sales name: "All-in Signing Service") General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible and legally compliant manner is a top priority

More information

Blue Bird Airways PRIVACY NOTICE

Blue Bird Airways PRIVACY NOTICE Blue Bird Airways PRIVACY NOTICE Blue Bird Airways SA a company incorporated in Greece, under registration number 77700527000, whereas its registered office is at International Airport Nikos Kazantzakis

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration

More information

Oracle Utilities Smart Grid Gateway Adapter for Echelon

Oracle Utilities Smart Grid Gateway Adapter for Echelon Oracle Utilities Smart Grid Gateway Adapter for Echelon User's Guide Release 2.0.0 Service Pack 9 E23539-04 May 2013 Oracle Utilities Smart Grid Gateway Adapter for Echelon User's Guide Release 2.0.0 Service

More information

What we really mean when we talk about verification

What we really mean when we talk about verification What we really mean when we talk about verification July 2018 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Beneficial ownership does not

More information

Subscriber Data Correlation

Subscriber Data Correlation Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service

More information

When this policy mentions WanderJaunt, we, us, or our, it refers to the WanderJaunt, Inc.

When this policy mentions WanderJaunt, we, us, or our, it refers to the WanderJaunt, Inc. WanderJaunt Privacy Policy Last Updated: June 20, 2018 Thank you for using WanderJaunt! This Privacy Policy describes how we collect, use, process, and disclose your information, including personal information,

More information