SlideShare uma empresa Scribd logo
1 de 28
The EU and the Netherlands


  Dr. Marten Voulon
  marten@voulon.nl

International Cyber Law Seminar
15 & 16 January 2013, Kuta, Bali




                                   Leiden University. The university to discover.
Agenda
- Data protection
- e-Authentication




                     Leiden University. The university to discover.
General overview
Issue                               Pointers

Privacy & data protection           Data Protection Act
                                    Telecommunications Act
Intellectual property rights        Copyright Act                           Benelux Treaty on IPR
                                    Neighbouring Rights Act                 (trademarks)
                                    Patent Act 1995                         “Chip Act”
                                    Database Act                            Trade Name Act
e-Contract                          Civil code

Advertising & consumer protection   Civil code

Cybercrime & evidence               Code on criminal procedure

Taxation                            Normal sales tax (VAT) applies online

E-Government & public services      Administrative code

Unfair competition                  Competition Act

Insurance                           Civil code
                                    Financial Supervision Act
e-Payment system                    EU SEPA-directive & regulations, EU e-Money Directive


Archives & corporate documents      Civil code
                                    Archive Act

                                                          Leiden University. The university to discover.
Data protection
- 1995
   - European Directive 1995/46/EC
            • Legal framework for EU Member States
- 25 January 2012
   - Proposal for a General Data Protection
     Regulation (GPDR)
   - Proposal for a Directive (criminal data)
Directive                            Regulation
Obliges Member States to implement   Directly enforceable in all Member
into national legislation            states


                                          Leiden University. The university to discover.
Helicopter view of the Directive (I)
-   Personal data
-   Controller, subject, processor
-   “Processing”
-   Processing only allowed for the “purpose”
-   Exhaustive list of reasons for processing:
    -   Consent
    -   Performance of contract
    -   Legal obligation
    -   Vital interest of the subject
    -   Public interest
    -   Legitimate interests of the controller
                                     Leiden University. The university to discover.
Helicopter view of the Directive (II)
- Sensitive data
  - Race, ethnicity, political opinion,
    religious & philosophical beliefs, trade
    union membership, health, sex life
- Rights of the subject
  - Information, access, right to object
- Data processing agreement
  - Contract between controller & processor



                           Leiden University. The university to discover.
Helicopter view of the Directive (III)
- Transfer to third countries (outside EU/EEA)
   - Only allowed if:
      • Adequate level of protection
      • Consent of the subject
      • Transfer if necessary for execution of contract between
        subject and controller
      • Necessary for vital interests of subject
      • (…)
   - And/or(?):
      • EU model clauses                         (decision 2010/87/EU)
      • Binding corporate rules (BCR)            (authorization by regulator)
      • US Safe Harbor                           (decision 2000/520/EU)



                                     Leiden University. The university to discover.
Transfer to third country




                   Leiden University. The university to discover.
Transfer under the General Data
Protection Regulation

- Transfer is allowed, if:
  - Adequacy decision
     • Country, territory, processing sector, international
       organization
  - Appropriate safeguards
     • BCR
     • Model clauses
  - Derogation applies
     • Consent, contract performance, ….

                                 Leiden University. The university to discover.
In practice
- IT administrator in Bangalore
   - Transfer to third country?
  - “(…) transfer of personal data which are undergoing
    processing or are intended for processing after transfer
    (…)”?




                                   Leiden University. The university to discover.
In practice
- Patriot Act
  - FISA order/NSL can imply illegal
    transfer to third country
    • Leaked draft of the regulation:
       – “(…) no decision of an administrative authority
         of a third country requiring a controller or
         processor to disclose personal data shall be
         recognized or be enforceable in any manner,
         without prejudice to a mutual assistance treaty
         or an international agreement in force between
         the requesting third country and the Union or a
         Member State.”
                              Leiden University. The university to discover.
Other
- “Right to be forgotten and to erasure”
- Right of data portability
- Security breach notification
  - Within 24 hours to supervisory authority
  - After that, without undue delay to subject
- Fines
  - Maximums of 0,5%, 1% and 2% of annual
    worldwide turnover



                            Leiden University. The university to discover.
e-Authentication
- Legal framework
- DigiD
- e-Identity (“eHerkenning”)




                         Leiden University. The university to discover.
Legal framework
- Directive 1999/93/EC on a Community
  framework for electronic signatures
  - New proposal: EU Regulation on electronic
    identification and trust services for electronic
    transactions (COM(2012)238)




                             Leiden University. The university to discover.
Legal framework
Type of signature                                          Abbreviation
Electronic signature                                       ES
Advanced electronic signature                              AES
Advanced electronic signature,                             AES + QC
based on a qualified certificate
Advanced electronic signature,                             AES + QC + SSCD
based on a qualified certificate,                          “qualified electronic
created with a secure-signature-creation-device            signature”

                          Public/private keys
    - Certificate               Encryption
         • Links a public key to a personProvider
                     Certificate Service
                         Certificate Policy (CP)
    -   SSCD Certificate Practice Statement (CPS)
         • Software/hardware used to create an electronic signature

                                            Leiden University. The university to discover.
Legal effect of the electronic signature

- Focus on handwritten signature

- Qualified electronic signature
  - Has equivalent legal effect of
    handwritten signature
  - Is admissible as evidence
- Non-qualified electronic signature
  - “will not be denied legal effect”


                           Leiden University. The university to discover.
Functions of the handwritten signature
vs public key encryption

Handwritten signature        Public key encryption
Identity signatory           Identification
Intention of the signatory   Authentication
                             Confidentiality
                             Integrity
                             Non-repudiation
                             (…)




                                   Leiden University. The university to discover.
Broader scope of the Regulation
- Not just e-signature, but:
  - Trust services in general
     •   Electronic signature
     •   Electronic seal
     •   Electronic time stamps
     •   Electronic documents
     •   Electronic delivery services
     •   Website authentication
     •   Electronic certificates



                                  Leiden University. The university to discover.
A generic authentication service
   User                               Service provider




           Authentication service
                 provider

                            Leiden University. The university to discover.
Authentication means
- Something you know              (knowledge)
- Something you have              (possession)
- Something you are               (inherence)



 • Single factor authentication
 • Two factor authentication
 • Multi factor authentication




                                        Leiden University. The university to discover.
DigiD
- Authentication system
  -   Provided to Dutch citizens
  -   Electronic communication with government
  -   Mandatory for tax filings
  -   Verification against Database Persons (GBA)
  -   Security levels
       • Basic
          – Single factor
       • Middle
          – Two factor
       • High
          – PKI chipcard

                            Leiden University. The university to discover.
DigiD
- Issue process
   1. Request account on website
   2. Activation code sent to address as
      registered in Database Persons
      (snailmail)
- Hereafter, DigiD can be used to log in
- National identification number (BSN)
   - Use of BSN is strictly regulated


                         Leiden University. The university to discover.
DigiD fraud
- Request DigiD account for your neighbour
- Steal the activation code from his mailbox
- Use his DigiD to apply for social security
  payment
- Fill in your own bank account for the
  payment
- … not exactly the perfect crime




                         Leiden University. The university to discover.
e-Identity (eHerkenning)
- Business to Government
- Public/private cooperation
  - Competitive/cooperative domain
  - Two-sided market
- One digital key      1. Registration phase
                          Identification procedure
- Five security levels    Issue process
                       2. Authentication phase
  - See also STORK        Type and robustness token
                             Security of authentication mechanism




                            Leiden University. The university to discover.
e-Identity (eHerkenning)
Company & User                               Service provider




                                                                   Scheme
                        Mandate
                        register




    Token        Authentication                     Broker
    issuer          service

                                   Leiden University. The university to discover.
Contractual relations
                     Governing body




                                 Participation agreement


        Service agreement        Service agreement




   Company              Participant               Service provider


                                  Leiden University. The university to discover.
e-Identity and the Regulation
- Cross-border acceptance of online
  identification
   - Within EU
   - If the scheme is notified
   - Member State has to
     • Accept liability
     • Ensure availability
        – At any time, free of charge
     What about public/private cooperation?
- Third country providers: treaty
                                    Leiden University. The university to discover.
Questions




            Leiden University. The university to discover.

Mais conteúdo relacionado

Mais procurados

Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesElectronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesCaroline B Ncube
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and CommerceEndcode_org
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawDocuSign
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fdGlobalForum
 
Electronic credentials
Electronic credentialsElectronic credentials
Electronic credentialsAmir Neziri
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content RegulationEndcode_org
 
Electronic commerce act of 2000
Electronic commerce act of 2000Electronic commerce act of 2000
Electronic commerce act of 2000Justine Casilana
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting PresentationEndcode_org
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in indiaatuljaybhaye
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)Shawn Tuma
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
Future of identity - growing demand
Future of identity - growing demandFuture of identity - growing demand
Future of identity - growing demandNewsquare
 

Mais procurados (20)

Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesElectronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principles
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and Commerce
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature Law
 
4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd
 
Electronic credentials
Electronic credentialsElectronic credentials
Electronic credentials
 
Legal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and SpainLegal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and Spain
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Cyber contract
Cyber contractCyber contract
Cyber contract
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content Regulation
 
Electronic commerce act of 2000
Electronic commerce act of 2000Electronic commerce act of 2000
Electronic commerce act of 2000
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
E contracts
E contractsE contracts
E contracts
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
Future of identity - growing demand
Future of identity - growing demandFuture of identity - growing demand
Future of identity - growing demand
 

Destaque

Return On Contribution (ROC) ECSCW 2009 Muller Et Al
Return On Contribution (ROC)   ECSCW 2009   Muller Et AlReturn On Contribution (ROC)   ECSCW 2009   Muller Et Al
Return On Contribution (ROC) ECSCW 2009 Muller Et AlMichael Muller
 
Mass Mutual Q2 Results
Mass Mutual Q2 ResultsMass Mutual Q2 Results
Mass Mutual Q2 Resultsscottusselman
 
Co proposers in crowdfunding (muller et al. 2016)
Co proposers in crowdfunding (muller et al. 2016)Co proposers in crowdfunding (muller et al. 2016)
Co proposers in crowdfunding (muller et al. 2016)Michael Muller
 
Group 2009 Bateman Muller Freyne
Group 2009 Bateman Muller FreyneGroup 2009 Bateman Muller Freyne
Group 2009 Bateman Muller FreyneMichael Muller
 
Elektronisch contracteren
Elektronisch contracterenElektronisch contracteren
Elektronisch contracterenMartenLinkedin
 
Lurking as trait or situational disposition: Lurking and contributing in ente...
Lurking as trait or situational disposition: Lurking and contributing in ente...Lurking as trait or situational disposition: Lurking and contributing in ente...
Lurking as trait or situational disposition: Lurking and contributing in ente...Michael Muller
 
Benefits of Fixed Annuities
Benefits of Fixed AnnuitiesBenefits of Fixed Annuities
Benefits of Fixed Annuitiesscottusselman
 
Muller and Chua - brainstorming for japan - chi 2012
Muller and Chua - brainstorming for japan - chi 2012Muller and Chua - brainstorming for japan - chi 2012
Muller and Chua - brainstorming for japan - chi 2012Michael Muller
 
Usage Of Enterprise File Sharing Service Muller Chi 2010
Usage Of Enterprise File Sharing Service   Muller   Chi 2010Usage Of Enterprise File Sharing Service   Muller   Chi 2010
Usage Of Enterprise File Sharing Service Muller Chi 2010Michael Muller
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Michael Muller
 
Information Curators in an Enterprise File-Sharing Service
Information Curators in an Enterprise File-Sharing ServiceInformation Curators in an Enterprise File-Sharing Service
Information Curators in an Enterprise File-Sharing ServiceMichael Muller
 
Hcic muller guha davis geyer shami 2015 06-29
Hcic muller guha davis geyer shami 2015 06-29Hcic muller guha davis geyer shami 2015 06-29
Hcic muller guha davis geyer shami 2015 06-29Michael Muller
 
2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication LegislationMartenLinkedin
 
eParticipation and Participatory Design
eParticipation and Participatory DesigneParticipation and Participatory Design
eParticipation and Participatory DesignMichael Muller
 
Grounded Theory Method - Muller
Grounded Theory Method - MullerGrounded Theory Method - Muller
Grounded Theory Method - MullerMichael Muller
 
Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Michael Muller
 

Destaque (19)

Return On Contribution (ROC) ECSCW 2009 Muller Et Al
Return On Contribution (ROC)   ECSCW 2009   Muller Et AlReturn On Contribution (ROC)   ECSCW 2009   Muller Et Al
Return On Contribution (ROC) ECSCW 2009 Muller Et Al
 
Mass Mutual Q2 Results
Mass Mutual Q2 ResultsMass Mutual Q2 Results
Mass Mutual Q2 Results
 
Quick Close
Quick CloseQuick Close
Quick Close
 
Co proposers in crowdfunding (muller et al. 2016)
Co proposers in crowdfunding (muller et al. 2016)Co proposers in crowdfunding (muller et al. 2016)
Co proposers in crowdfunding (muller et al. 2016)
 
Group 2009 Bateman Muller Freyne
Group 2009 Bateman Muller FreyneGroup 2009 Bateman Muller Freyne
Group 2009 Bateman Muller Freyne
 
Elektronisch contracteren
Elektronisch contracterenElektronisch contracteren
Elektronisch contracteren
 
Lurking as trait or situational disposition: Lurking and contributing in ente...
Lurking as trait or situational disposition: Lurking and contributing in ente...Lurking as trait or situational disposition: Lurking and contributing in ente...
Lurking as trait or situational disposition: Lurking and contributing in ente...
 
CrisisCamp Boston
CrisisCamp Boston  CrisisCamp Boston
CrisisCamp Boston
 
Benefits of Fixed Annuities
Benefits of Fixed AnnuitiesBenefits of Fixed Annuities
Benefits of Fixed Annuities
 
Muller and Chua - brainstorming for japan - chi 2012
Muller and Chua - brainstorming for japan - chi 2012Muller and Chua - brainstorming for japan - chi 2012
Muller and Chua - brainstorming for japan - chi 2012
 
Usage Of Enterprise File Sharing Service Muller Chi 2010
Usage Of Enterprise File Sharing Service   Muller   Chi 2010Usage Of Enterprise File Sharing Service   Muller   Chi 2010
Usage Of Enterprise File Sharing Service Muller Chi 2010
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
 
Information Curators in an Enterprise File-Sharing Service
Information Curators in an Enterprise File-Sharing ServiceInformation Curators in an Enterprise File-Sharing Service
Information Curators in an Enterprise File-Sharing Service
 
Hcic muller guha davis geyer shami 2015 06-29
Hcic muller guha davis geyer shami 2015 06-29Hcic muller guha davis geyer shami 2015 06-29
Hcic muller guha davis geyer shami 2015 06-29
 
2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation2014 Update EU Cyber Law & Authentication Legislation
2014 Update EU Cyber Law & Authentication Legislation
 
eParticipation and Participatory Design
eParticipation and Participatory DesigneParticipation and Participatory Design
eParticipation and Participatory Design
 
Google Wave
Google WaveGoogle Wave
Google Wave
 
Grounded Theory Method - Muller
Grounded Theory Method - MullerGrounded Theory Method - Muller
Grounded Theory Method - Muller
 
Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)Muller - Grounded Theory Method (revised 2012)
Muller - Grounded Theory Method (revised 2012)
 

Semelhante a Conference Cyber law Bali

Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Heather Vargas
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information securityDATA SECURITY SOLUTIONS
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...Kullarat Phongsathaporn
 
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environmentsStevenSegaert
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
20131009 aon security breach legislation
20131009 aon security breach legislation20131009 aon security breach legislation
20131009 aon security breach legislationJos Dumortier
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptYäsh Chaudhary
 

Semelhante a Conference Cyber law Bali (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information security
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
B11: Central IP & IT Court | FinTech: Legal and Regulatory Challenges (7 Aug ...
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
 
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDASPPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
 
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environments
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
File000166
File000166File000166
File000166
 
20131009 aon security breach legislation
20131009 aon security breach legislation20131009 aon security breach legislation
20131009 aon security breach legislation
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 

Conference Cyber law Bali

  • 1. The EU and the Netherlands Dr. Marten Voulon marten@voulon.nl International Cyber Law Seminar 15 & 16 January 2013, Kuta, Bali Leiden University. The university to discover.
  • 2. Agenda - Data protection - e-Authentication Leiden University. The university to discover.
  • 3. General overview Issue Pointers Privacy & data protection Data Protection Act Telecommunications Act Intellectual property rights Copyright Act Benelux Treaty on IPR Neighbouring Rights Act (trademarks) Patent Act 1995 “Chip Act” Database Act Trade Name Act e-Contract Civil code Advertising & consumer protection Civil code Cybercrime & evidence Code on criminal procedure Taxation Normal sales tax (VAT) applies online E-Government & public services Administrative code Unfair competition Competition Act Insurance Civil code Financial Supervision Act e-Payment system EU SEPA-directive & regulations, EU e-Money Directive Archives & corporate documents Civil code Archive Act Leiden University. The university to discover.
  • 4. Data protection - 1995 - European Directive 1995/46/EC • Legal framework for EU Member States - 25 January 2012 - Proposal for a General Data Protection Regulation (GPDR) - Proposal for a Directive (criminal data) Directive Regulation Obliges Member States to implement Directly enforceable in all Member into national legislation states Leiden University. The university to discover.
  • 5. Helicopter view of the Directive (I) - Personal data - Controller, subject, processor - “Processing” - Processing only allowed for the “purpose” - Exhaustive list of reasons for processing: - Consent - Performance of contract - Legal obligation - Vital interest of the subject - Public interest - Legitimate interests of the controller Leiden University. The university to discover.
  • 6. Helicopter view of the Directive (II) - Sensitive data - Race, ethnicity, political opinion, religious & philosophical beliefs, trade union membership, health, sex life - Rights of the subject - Information, access, right to object - Data processing agreement - Contract between controller & processor Leiden University. The university to discover.
  • 7. Helicopter view of the Directive (III) - Transfer to third countries (outside EU/EEA) - Only allowed if: • Adequate level of protection • Consent of the subject • Transfer if necessary for execution of contract between subject and controller • Necessary for vital interests of subject • (…) - And/or(?): • EU model clauses (decision 2010/87/EU) • Binding corporate rules (BCR) (authorization by regulator) • US Safe Harbor (decision 2000/520/EU) Leiden University. The university to discover.
  • 8. Transfer to third country Leiden University. The university to discover.
  • 9. Transfer under the General Data Protection Regulation - Transfer is allowed, if: - Adequacy decision • Country, territory, processing sector, international organization - Appropriate safeguards • BCR • Model clauses - Derogation applies • Consent, contract performance, …. Leiden University. The university to discover.
  • 10. In practice - IT administrator in Bangalore - Transfer to third country? - “(…) transfer of personal data which are undergoing processing or are intended for processing after transfer (…)”? Leiden University. The university to discover.
  • 11. In practice - Patriot Act - FISA order/NSL can imply illegal transfer to third country • Leaked draft of the regulation: – “(…) no decision of an administrative authority of a third country requiring a controller or processor to disclose personal data shall be recognized or be enforceable in any manner, without prejudice to a mutual assistance treaty or an international agreement in force between the requesting third country and the Union or a Member State.” Leiden University. The university to discover.
  • 12. Other - “Right to be forgotten and to erasure” - Right of data portability - Security breach notification - Within 24 hours to supervisory authority - After that, without undue delay to subject - Fines - Maximums of 0,5%, 1% and 2% of annual worldwide turnover Leiden University. The university to discover.
  • 13. e-Authentication - Legal framework - DigiD - e-Identity (“eHerkenning”) Leiden University. The university to discover.
  • 14. Legal framework - Directive 1999/93/EC on a Community framework for electronic signatures - New proposal: EU Regulation on electronic identification and trust services for electronic transactions (COM(2012)238) Leiden University. The university to discover.
  • 15. Legal framework Type of signature Abbreviation Electronic signature ES Advanced electronic signature AES Advanced electronic signature, AES + QC based on a qualified certificate Advanced electronic signature, AES + QC + SSCD based on a qualified certificate, “qualified electronic created with a secure-signature-creation-device signature” Public/private keys - Certificate Encryption • Links a public key to a personProvider Certificate Service Certificate Policy (CP) - SSCD Certificate Practice Statement (CPS) • Software/hardware used to create an electronic signature Leiden University. The university to discover.
  • 16. Legal effect of the electronic signature - Focus on handwritten signature - Qualified electronic signature - Has equivalent legal effect of handwritten signature - Is admissible as evidence - Non-qualified electronic signature - “will not be denied legal effect” Leiden University. The university to discover.
  • 17. Functions of the handwritten signature vs public key encryption Handwritten signature Public key encryption Identity signatory Identification Intention of the signatory Authentication Confidentiality Integrity Non-repudiation (…) Leiden University. The university to discover.
  • 18. Broader scope of the Regulation - Not just e-signature, but: - Trust services in general • Electronic signature • Electronic seal • Electronic time stamps • Electronic documents • Electronic delivery services • Website authentication • Electronic certificates Leiden University. The university to discover.
  • 19. A generic authentication service User Service provider Authentication service provider Leiden University. The university to discover.
  • 20. Authentication means - Something you know (knowledge) - Something you have (possession) - Something you are (inherence) • Single factor authentication • Two factor authentication • Multi factor authentication Leiden University. The university to discover.
  • 21. DigiD - Authentication system - Provided to Dutch citizens - Electronic communication with government - Mandatory for tax filings - Verification against Database Persons (GBA) - Security levels • Basic – Single factor • Middle – Two factor • High – PKI chipcard Leiden University. The university to discover.
  • 22. DigiD - Issue process 1. Request account on website 2. Activation code sent to address as registered in Database Persons (snailmail) - Hereafter, DigiD can be used to log in - National identification number (BSN) - Use of BSN is strictly regulated Leiden University. The university to discover.
  • 23. DigiD fraud - Request DigiD account for your neighbour - Steal the activation code from his mailbox - Use his DigiD to apply for social security payment - Fill in your own bank account for the payment - … not exactly the perfect crime Leiden University. The university to discover.
  • 24. e-Identity (eHerkenning) - Business to Government - Public/private cooperation - Competitive/cooperative domain - Two-sided market - One digital key 1. Registration phase Identification procedure - Five security levels Issue process 2. Authentication phase - See also STORK Type and robustness token Security of authentication mechanism Leiden University. The university to discover.
  • 25. e-Identity (eHerkenning) Company & User Service provider Scheme Mandate register Token Authentication Broker issuer service Leiden University. The university to discover.
  • 26. Contractual relations Governing body Participation agreement Service agreement Service agreement Company Participant Service provider Leiden University. The university to discover.
  • 27. e-Identity and the Regulation - Cross-border acceptance of online identification - Within EU - If the scheme is notified - Member State has to • Accept liability • Ensure availability – At any time, free of charge What about public/private cooperation? - Third country providers: treaty Leiden University. The university to discover.
  • 28. Questions Leiden University. The university to discover.