Policy recommendations. Technology fraud and online exploitation

Similar documents
Child Online Protection

The Global Fund to Prevent Violence against Children

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

The UK s National Cyber Security Strategy

Child Online Protection in Child Pornography Namibia

Commonwealth Cyber Declaration

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

RESOLUTION 67 (Rev. Buenos Aires, 2017)

Guiding principles on the Global Alliance against child sexual abuse online

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

The commission communication "towards a general policy on the fight against cyber crime"

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Robert Holleyman, President and CEO, BSA The Software Alliance

UNODC/CCPCJ/EG.4/2017/CRP.1

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Media Kit. California Cybersecurity Institute

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

G8 Lyon-Roma Group High Tech Crime Subgroup

Cyber Security Strategy

How do you decide what s best for you?

Legal, Ethical, and Professional Issues in Information Security

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

15412/16 RR/dk 1 DGD 1C

NYSVMS WEBSITE PRIVACY POLICY

International Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface

Cyber Security and Cyber Fraud

The role of municipal government in preventing crime and building community safety

China and International Governance of Cybercrime

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Unit 3 Cyber security

RESOLUTION 45 (Rev. Hyderabad, 2010)

Provisional Translation

Last Updated: January 31, 2017

Legal Foundation and Enforcement: Promoting Cybersecurity

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

The Challenge of Spam An Internet Society Public Policy Briefing

Social Security Number Protection Policy.

The Table Privacy Policy Last revised on August 22, 2012

Angela McKay Director, Government Security Policy and Strategy Microsoft

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Tracy Hackshaw, Chair, Internet Society Trinidad & Tobago Chapter 2 October 2018 Commonwealth ICT Forum 2018 Port of Spain, Trinidad & Tobago

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

Second International Barometer of Security in SMBs

Global Wildlife Cybercrime Action Plan1

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Leading the Digital Transformation from the Centre of Government

Legal and Regulatory Developments for Privacy and Security

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Sussex Police Business Crime Strategy

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Scope of the Member State mechanism

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

ACCEPTABLE USE POLICY

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY

UNODC tackling cybercrime in support of a safe and secure AP-IS

Department of Justice Policing and Victim Services BUSINESS PLAN

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

SWIFT Response to the Committee on Payments and Market Infrastructures discussion note:

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction

Privacy Policy. Information we collect about you

Hunsley Primary and Electronic Communications Policy

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Mobile Application Privacy Policy

Hate crime: abuse, hate and extremism online

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Presented by: Njei Check Head, Audit Security Division, ANTIC

The cost of cybercrime the benefits of cooperation

EnviroIssues Privacy Policy Effective Date:

EUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER

Guelph Police Service

Critical Information Infrastructure Protection Law

PRIVACY POLICY OUR SERVICES. Last modified: November 29, 2015

Panda Security 2010 Page 1

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

Privacy Policy. Last Updated: August 2017

School of Engineering & Built Environment

CYBER SECURITY TRAINING

The Promise and Peril of Active Cyber Defense

Personal Information You Provide When Visiting Danaher Sites

Position Title: IT Security Specialist

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat

New Data: Sources, Governance, Infrastructure, Analysis. Tim Holt UK Data Forum

Request for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator

Transcription:

Policy recommendations Technology fraud and online

The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based services connects students to an entire world of information and resources, while providing teachers with new ways to teach. Fraud and Social networks are another example, as people of all ages use a vast array of online services to form communities and connect with friends and colleagues. In addition, cloud services have become important vehicles through which people and governments advance fundamental values including freedom of expression, civic engagement, privacy, and free access to information. The challenge At the same time, online services have given rise to new risks and new potential for harm, especially for vulnerable populations such as children and the elderly. Predators use cloud-based services to create and distribute images of child sexual abuse and to solicit minors for sexual. Scammers trick people into believing that they have nonexistent malware or viruses on their computer and into paying for unnecessary tech support services. Unfortunately, the methods that criminals deploy are becoming more sophisticated and harder to detect. Policy recommendations The unique challenges of protecting children, the elderly, and other vulnerable populations require a coordinated and comprehensive response. In many cases, existing laws need

Fraud and to be updated to address current technologies and threats, balanced against the need to protect freedom of expression, individual privacy, and vibrant innovation. These updated legal frameworks should promote industry best practices and the development of technology tools that consumers can use to help protect themselves. Some of these areas include: Strengthen and enforce laws to deter creation of online and fraud. Many existing laws that are intended to fight fraud and the of minors were not written to address online crimes and, as a result, are not vigorously enforced. According to the International Centre for Missing and Exploited Children, 35 countries still do not have legislation that deals specifically with child sexual abuse images. Of the 79 countries that do, 26 do not address computer-based offenses. In addition, many laws criminalizing the creation and distribution of images of child sexual abuse fail to cover the online world and are ill-suited to the new tactics of tech-savvy child predators. As governments update their laws to tackle these new threats, they should work closely with child rights, advocacy, and support groups, as well as technology suppliers all of which play a role in protecting children and families in the digital age. Support public-private partnerships. Public-private partnerships are essential to address the increasing variety and complexity of online threats. Governments, technology companies, and online service providers should work together to develop and share technology tools and expertise, conduct awareness campaigns, and educate the public about online risks. To address child protection, governments should consider joining the WePROTECT Global Alliance to End Child Sexual Exploitation Online, a coalition that includes 70 countries along with technology companies and civil society organizations dedicated to eradicating child sexual and abuse online.

Promote international cooperation. Increasingly, online crimes involve perpetrators in one country and victims in another, which can hamper effective prosecution. New international agreements and modernized mutual legal assistance treaties are needed to strengthen cross-border cooperation, information-sharing, and enforcement. Fraud and Promote consumer education. Many online crimes can be avoided if people are better informed about how to identify threats and protect themselves. According to a Microsoft-supported survey, one in five customers have experienced a fraudulent interaction online. Millennials are particularly vulnerable to fraudulent email and intrusive pop-up advertisements. Governments should focus on consumer online safety education to help people identify threats and protect themselves, with a special emphasis on schools so that young people learn to defend against online predators and enter adulthood with strong online safety habits. Governments should also consider joining and promoting awareness campaigns such as STOP. THINK. CONNECT. a global public-private partnership that offers basic guidance to citizens about safe online habits and practices. Support industry self-regulation. Even as governments work to address the risks associated with online services, they can promote an environment of technological innovation and industry self-regulation that provides the flexibility to respond to the rapidly changing nature of online threats, which can be difficult to achieve solely through legislation. Governments and industry should work together to establish safety principles and service providers should be given the opportunity and the responsibility to determine the means of implementation.

Fraud and Evidence and further reading: WePROTECT Global Alliance to End Child Sexual Exploitation Online: http://www.weprotect.org/ STOP. THINK. CONNECT.: https://www.stopthinkconnect.org/ For links to these and other resources, please visit: http://www.microsoft.com/cloudforgood 74