REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Similar documents
BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

Promoting Global Cybersecurity

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Virtual Currencies and The Commonwealth. 1 June 2016

Global cybersecurity and international standards

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

OAS Cybersecurity Capacity Building Efforts

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Cybersecurity for ALL

Post Disaster Needs Assessment Guide and

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

RESOLUTION 130 (Rev. Antalya, 2006)

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Cybersecurity Strategy of the Republic of Cyprus

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Cybersecurity, Trade, and Economic Development

UNODC/CCPCJ/EG.4/2017/CRP.1

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Child Online Protection

Legal Foundation and Enforcement: Promoting Cybersecurity

Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

H2020 & THE FRENCH SECURITY RESEARCH

Proposed Regional ehealth Strategy ( )

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

The commission communication "towards a general policy on the fight against cyber crime"

G8 Lyon-Roma Group High Tech Crime Subgroup

RESOLUTION 130 (REV. BUSAN, 2014)

10025/16 MP/mj 1 DG D 2B

Commonwealth Cyber Declaration

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

Itu regional workshop

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

Cybersecurity & Spam after WSIS: How MAAWG can help

ITU Model Cybercrime Law: Project Overview

Legal, Ethical, and Professional Issues in Information Security

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Comprehensive Study on Cybercrime

ISDR National Platforms for DRR - Guidelines

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Garry Mukelabai Communications Authority Zambia

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

15412/16 RR/dk 1 DGD 1C

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY

Caribbean Cyber Security: Not Only Government s Responsibility

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017

DIGITAL AGENDA FOR EUROPE

RESOLUTION 45 (Rev. Hyderabad, 2010)

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Cyber Security Development. Ghana in Perspective

Cyber Security Roadmap

Global Cybersecurity Agenda

Data Preservation Checklists

BHConsulting. Your trusted cybersecurity partner

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e

Donor Countries Security. Date

Cyber Security Strategy

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Pilot Study on Big Data: Philippines. World Telecommunications/ICT Indicators Symposium (WTIS) November 2017 Hammamet, Tunisia

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Data Leak Protection legal framework and managing the challenges of a security breach

State Planning Organization Information Society Department

INNOVATIONS CENTER. Fariz T. JAFAROV Director. e-gov Development Center of Azerbaijan

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Cyber Security in Europe

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Overview on the Project achievements

INTERPOL For official use only. Fighting with friends

National Policy and Guiding Principles

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT

UNODC tackling cybercrime in support of a safe and secure AP-IS

RESOLUTION 47 (Rev. Buenos Aires, 2017)

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

M a d. Take control of your digital security. Advisory & Audit Security Testing Certification Services Training & Awareness

Donor Countries Security. Date

Package of initiatives on Cybersecurity

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues

WRI BUILDING EFFICIENCY INITIATIVE BUILDING EFFICIENCY INITIATIVE, WRI ROSS CENTER FOR SUSTAINABLE CITIES

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

International Cooperation in Cybercrime Investigations

Cyber Security and Cyber Fraud

Securing Europe's Information Society

National Cyber Security Strategy (NCS) Toolkit

Caribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

DATA PROTECTION LAWS OF THE WORLD. Bahrain

Transcription:

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola

Why combatting cybercrime matters to the World Bank Risk of doing nothing Fiduciary Obligation - financier of essential communications and other critical infrastructure, services and applications in economic development projects; to ensure that our clients appropriately address cyber risks Convening power Status as an honest broker The Bank provides millions of dollars in financing on projects across sectors (ICT/telecom infrastructure, transport, urban, energy, health, education, social protection, financial & markets) to ensure that critical infrastructure and systems and the data of government, business and citizen users that flow over those systems are protected. 1

Project Introduction Donor Republic of Korea Timing Effective Date 1 July 2014 / Two Years Mission To build capacity among policy-makers, legislators, public prosecutors & investigators, and civil society in developing countries in the policy, legal and criminal justice aspects of the enabling environment to combat cybercrime ; through synthesizing international best practice in these areas in a published tool that enables assessment of and best practice guidance with respect to the legal issues associated with combatting cybercrime; and field testing the tool in selected pilot countries. It is expected that the tool will be made available as a global public good. 2

Project Partners ITU UN ODC UN ICRI UNCTAD Council of Europe Korea Supreme Prosecutor s Office International Association of Penal Law Oxford Cyber Security Capacity Building Centre 3

Toolkit Structure 4

Project Ethos Focus on legal (mix of policy, legal, criminal justice) No duplication Synthesize Introduce new, cutting-edge issues Validate through field-testing 5

Project Progress Phase 1 (FY 15) Phase 2 (FY 16) Develop Country Selection Criteria Select Pilot Countries Conduct Assessments Country Feedback Develop List of Candidate Countries Due Diligence on Best Practices Due diligence on Capacity Building Programs Agree Tool & methodology, content Draft Content Tool Final Tool / Content Final Content, On-Line Launch Select Consultant for on-line content Beta Version for on-line frames Project Planning Meeting; Confirm Roles of GFLJD Partners in specific activities Partner Consultation Partner Consultation 1 Jan 15 1 July 15 Partner Consultation Partner Consultation 6

New Emphasis on Substantive Issues Features Safeguards with Privacy & Data Protection Intermediary Liability Informal Collaboration Financial Sector New crimes Multistakeholder Approach Case Study orientation Role of the Private Sector Future Proofing Maturity model / Self Assessment 7

Current Status of Project Virtual library Established and growing Completed mapping of countries with cybercrime laws Conducted comparative analysis of existing assessment tools Draft synthetic tool Conducting Case Analysis Conducting Pilot Countries selection Toolkit drafting ongoing 8

Case Analysis Purpose Find out Regional & Industrial Vulnerability, Trends of cybercrime based on stages of countries level of development Provide Practical Map for policy making, int l cooperation Methods Based on Publicly Available Sources In depth analysis of selected cases Current Status & Expectation Cases Search - 70 cases (growing) Initial Analysis on types, origins & victim jurisdiction, damage estimate Challenges Limited data Govs cooperation will be critical for in depth analysis 9

Thank you David Satola dsatola@worldbank.org