SlideShare uma empresa Scribd logo
1 de 40
Computer Crime Act B.E. 2550 (2007) & Ministry of ICT Notification A Presentation to the AMCHAM ICT Committee & Internet Service Providers Tim Bass   CISSP, (ISC)2   Executive Vice President ACIS Professional Center Co . , Ltd . Email :  [email_address] Mobile: +6683-297-5101
Our Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Note:  Due to our 30 minute time constraint today we will not read each section of the CCA in detail.
Disclaimer The information contained in this presentation is based on two UNOFFICAL English translations of the Thai language Computer Crime Act B.E. 2550 (2007) and one UNOFFICIAL English translation of the Thai language  Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550. ACIS Professional Center Co. Ltd. advises all concerned to refer to the OFFICIAL Thai language version of these documents. ACIS Professional Center Co. Ltd. nor their employees are responsible for errors or omissions in the UNOFFICIAL English translations of these Thai language documents.
Computer Crime Act  B.E. 2550 (2007) –  Unofficial English Versions ,[object Object],Computer Crime Act B.E. 2550 (2007) High Quality , Unofficial Translation CCA Criteria concerning archiving Computer Traffic Data of Service Provider B.E. 2005 (with Annex A & B) Unofficial Translation (MICT Notification) MICT Computer-Related Crime Act B.E. 2550 (2007) Unofficial Translation  CRCA Name, Version Document
Computer Crime Act  B.E. 2550 (2007) –  Foreign Influences ,[object Object],[object Object],Virginia CCA http://www.scstatehouse.net/code/t16c016.htm US South Caroline CCA http://www.scstatehouse.net/code/t16c016.htm US Sri Lanka CCA http://www.icta.lk/InsidePages/downloadDocs/Computer_Crimes_Act_No_24_of_2007(E).pdf LK Computer Crime Act 1997 (Act 563) http://www.ktak.gov.my/system/uploaded/files/Computer%20Crimes%201997%20-%20Act%20563.pdf MY Law (Act) Country
Our Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Crime Act  B.E. 2550 (2007) –  A Road Map ,[object Object],[object Object],Gives the Ministry of ICT charge, control and regulatory power over the act. 4 Name, Date, Definitions 1-3 Roadmap Summary of CCA Section(s)
Computer-Crime Act  B.E. 2550 (2007) –  A Road Map ,[object Object],60K Baht 3 years Unauthorized interception of data 8 40K Baht 2 years Unauthorized access of data (Bypassing controls) 7 20K Baht 1 year Unauthorized disclosure of controls 6 100K Baht 5 years Unauthorized damage, destruction, obstruction interference, etc. to data 9 6 months Jail Unauthorized system access Summary  10K Baht 5 Fine Section
Computer Crime Act B.E. 2550 (2007) –  A Road Map ,[object Object],300K Baht 3-15 years If death: 10-20 years System or data damage (Sec. 9/10) that damages national security, public safety, economical stability, critical infrastructure.  12 (2) 200K Baht 10 years System or data damage (Sec. 9/10) that injures the general public 12 (1) 100K Baht n/a Impersonation, faking source of disruptive behaviour 11 5 years Jail Unauthorized delay, disruption, suspension, obstruction, interference, etc. to systems Summary 100K Baht 10 Fine Section
Computer-Related Crime Act  B.E. 2550 (2007) – A Road Map ,[object Object],100K Baht 5 year Inserts fake or false data that violates national security or anti-terrorism laws 14 (3) 100K Baht 5 year Inserts fake or false data that could undermine national security or public safety 14 (2) 100K Baht 5 year Inserts fake or false data that can damage another person or the public 14 (1) 1 year Jail Selling or disseminating malicious code (Sections 5-11)  Summary 20K Baht 13 Fine Section
Computer-Related Crime Act  B.E. 2550 (2007) – A Road Map ,[object Object],100K Baht 5 years Intentional support by service provider to Section 14 Crimes 15 60K Baht 3 years Inputs, to a public computer, altered photos that impair or damage another, cause hate, contempt, humiliation, etc. with malicious intent 16 100K Baht 5 years Forwards or publishes data with full knowledge of subsections 1-4  14 (5) 100K Baht 5 years Inputs pornographic data into publicly accessible systems 14 (4) Jail Summary Fine Section
Computer-Related Crime Act  B.E. 2550 (2007) – A Road Map ,[object Object],Non-Thai citizens outside of the Kingdom subject to extradition and punishment if the injured person is Thai. 17 (2) Thai citizens outside of the Kingdom subject to extradition and punishment  17 (1) Summary Section
Computer-Related Crime Act  B.E. 2550 (2007) – A Road Map ,[object Object],Copy computer and traffic data from service provider when there is probable cause  18 (4) Require submission of Section 26 and other stored information  18 (3) Require computer traffic data from service provider  18 (2) Receive computer and traffic data, or computers, from service provider 18 (5) Notify or summon potential violations in writing to give statements, forward explanations, documents, data  18 (1) Summary – Competent Officials Powers Section
Computer-Related Crime Act  B.E. 2550 (2007) – A Road Map ,[object Object],Details legal and court procedures for Section 18 (4-8) powers  (not the subject of this briefing) 19 Seize computer systems from service provider 18 (8) Decrypt computer data when required  18 (7) Power to suspend or block data dissemination 20 Access and receive computer systems, traffic and computer data  18 (6) Summary – Competent Officials Powers Section
Computer-Related Crime Act  B.E. 2550 (2007) – A Road Map ,[object Object],Archival specifics for service provider including 90 day requirement.  Authority to MICT to further regulate. Specifies fine up to 500,000 Baht  (See MICT document) 26 Data seized by illegal means not admissible in court 25 Specifies various penalties for disclosure of data to third parties by competent officials 22-24 Specifies failure-to-comply penalties for Section 18, 20, 21  as up to 200,000 Baht plus 5,000  Baht per day 27 Power to prevent sale, stop use of, or destroy undesirable computer programs and data 21 Summary – Competent Officials Powers Section
Computer-Related Crime Act  B.E. 2550 (2007) – A Road Map ,[object Object],Specifies that the competent official must present official ID card in the course of their actions 30 Specifies that competent officials are deemed to be a senior administrative or police officer with relevant authority to receive complain, investigate, and interrogate.  Power to coordinate arrest, confine, search, and seizure with appropriate investigative officials.  Specifies Prime Minister with a Minister will control and supervise the Royal Thai Police regarding criminal procedures 29 Specifies MICT shall appoint officials who have computer expertise, as determined by MICT 28 Summary – Competent Officials Powers Section
Our Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Crime Act  B.E. 2550 (2007) –  A Road Map – MICT Notification ,[object Object],[object Object],Service and content provider types and examples of each Annex A Date and log types and examples of each Annex B Name, Date, general definitions, data archiving requirements,  1-10 MICT Notification Roadmap Summary Section(s)
Computer-Crime Act  B.E. 2550 (2007) –  A Road Map to the MICT Notification ,[object Object],Specifies Annex B Section 5(1) (a-d) and 5(2) service provider responsibilities 7 Specifies Annex B for examples of data archiving requirements 6 Further defines service provider and context provider per Annex A examples, authorized by CCA Section 26 5 Discusses data integrity, confidentiality, availability,  authentication and identity responsibilities 8 Name, Date, Authority, Definitions Summary  1-4 Section
Computer-Crime Act  B.E. 2550 (2007) –  A Road Map to the MICT Notification ,[object Object],Specifies archival periods and effective date: Specifies Annex B for examples of when CCA archiving  requirements are effective: 1.  Section 5(1)(a)  30  days  (Passed Sep. 2007) 2.  Section 5(1)(b)  180 days  (Passed Feb. 2008) 3.  Everyone else  1 year  (Coming Aug. 24, 2008) 10 Specifies time synchronization of network services Summary  9 Section
Our Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Annex A  Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550  ,[object Object]
Annex A  Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 1. Fixed line Service provider  2. Mobile Service Provider  3. Leased Circuit Service Provider included  Fiber optic, ADSL (Asymmetric Digital Subscriber Line), Frame Relay Provider, ATM (Asynchronous Transfer Mode) excluded Physical media provider or Cable (Dark Fiber provider that does not contain Internet or IP traffic)  4. Satellite Services Provider.  a. Telecommunication and Broadcast Carrier  Example of Type  Type
Annex A  Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 1. Internet Service Provider both wire or wireless  2. Operators who provide Internet access in office/room, rental room, hotel or restaurant   3. Computer network access Service Provider for organizations such as governmental department, company or academic institution.  b. Access Service Provider
Annex A  Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 1. Web hosting or rental web hosting  2. File Server or file share  3. Mail Server service provider.  4. Internet Data Center.  c. Hosting Service Provider
Annex A  Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 1. Internet Café. 2. Game online.  d. Internet Café
Annex A  Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 ,[object Object],[object Object],[object Object],[object Object],[object Object],Content And Application Service provider  Example of Type  Type
Annex B 5(1)  Archival Requirements Date and time of the initial activation of the service and the location label (Cell ID)  Name, Address of subscriber or registered User  - Telephone number or circuit ID including optional services such as line transfer services and the transferred number including telephone number which is called from the transferred line.  - Fixed Network Telephony and Mobile Telephony.  A. Data that could be identifiable and traceable to the source of origin, source address, destination address and route traversal of computer system communication.  List of Data Traffic  Type
Annex B 5(1)  Archival Requirements 2. Mobile phone physical location that connect to Cell ID during communication.  C. Data which can be specified the location of the use of mobile phone or mobile communication equipment.  3. To provide caller tracking system  1. Original Cell ID of the communication.  Fixed Network Telephony and Mobile Telephony, the Date and time of the start and end of the communication)  B. Data that can be specified date, time and usage time of computer system communication.
Annex B 5(1)(B & C)  Logging Requirements 2) Date and Time of the connection of client to Server 1) Access logs specific to Authentication and Authorization servers such as: TACACS (Terminal Access controller Access Control System) or RADIUS (Remote Authentication Dial-in User Service) or DIAMETER ( Used to Control to Access to IP Router or Network Access Servers)  A. Internet logging  List of Data Traffic  Type
Annex B 5(1)(B & C)  Logging Requirements 2) IP Address of  Client Connected to Server  B. E-mail  1) Simple Mail Transfer Protocol : SMTP log - Messages ID  - Sender E-mail Address  - Receiver E-mail Address  - Status Indicator.  5) Calling Line Identification.  4) Assigned IP Address  3) User ID
Annex B 5(1)(B & C)  Logging Requirements 6) POP3 (Post Office Protocol version 3) log or IMAP4 ( Internet Messages Access Protocol version 4) log  5) User ID  4) IP Address of Sending Computer  3) Date and Time of Connection of the Client Connected to Server.  B. E-mail  (continued)
Annex B 5(1)(B & C)  Logging Requirements 5) Path and Filename of Data Object Uploaded or Downloaded.  4) User ID  3) IP source Address  2) Date and Time of Connection of Client  1) Access log  C. FTP log
Annex B 5(1)(B & C)  Logging Requirements 5) URI ( Uniform Resource Identifier )  4) Instruction.  3) Source IP Address  2) Date and time of connection of client  1) Access log  D. Web Traffic log
Annex B 5(1)(B & C)  Logging Requirements F. Internet Relay Chat (IRC) or Instance Messaging (IM)  Date and Time of Connection of Client to Server and Hostname and IP address.  5) Posted Message ID  4) Host Name  3) Protocol Process ID  2) Date and time of Connection of Clients to Server  1) NNTP Network News Transfer Protocol log  E. Usenet
Annex B 5(1)(D)  Logging Requirements ,[object Object],[object Object],[object Object],[object Object],Internet Cafe List of Data Traffic  Type
Annex B 5(3)  Logging Requirements ,[object Object],If provider is Web Blog or Web Board the posted message must be kept.  Log in Time  Seller User ID and Buyer User ID and E-mail Content Service Provider.  List of Data Traffic  Type
CCA Solutions and Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AMCHAM Discussion and Issues ,[object Object],[object Object],[object Object],[object Object]
Computer Crime Act B.E. 2550 (2007) & Ministry of ICT Notification A Presentation to the AMCHAM ICT Committee & Internet Service Providers Revision 1.1 Tim Bass   CISSP, (ISC)2   Executive Vice President   ACIS Professional Center Co . , Ltd . Email :  [email_address] Mobile: +6683-297-5101

Mais conteúdo relacionado

Semelhante a Computer Crime Act B.E. 2550 (2007) & Ministry of ICT Notification

IPTV IN INDIA SOME LEGAL PERSPECTIVES
IPTV IN INDIA SOME LEGAL PERSPECTIVESIPTV IN INDIA SOME LEGAL PERSPECTIVES
IPTV IN INDIA SOME LEGAL PERSPECTIVESpattok
 
Massive_MTC_An_Overview and Perspectives Towards 5G.pdf
Massive_MTC_An_Overview and Perspectives Towards 5G.pdfMassive_MTC_An_Overview and Perspectives Towards 5G.pdf
Massive_MTC_An_Overview and Perspectives Towards 5G.pdfYAAKOVSOLOMON1
 
download presentation
download presentationdownload presentation
download presentationwebhostingguy
 
download presentation
download presentationdownload presentation
download presentationwebhostingguy
 
Marsden Kingston: Net Neutrality: Past, Evidence, Present, Future
Marsden Kingston: Net Neutrality: Past, Evidence, Present, FutureMarsden Kingston: Net Neutrality: Past, Evidence, Present, Future
Marsden Kingston: Net Neutrality: Past, Evidence, Present, FutureChris Marsden
 
Hispamar-sspi-novembro-2016
Hispamar-sspi-novembro-2016Hispamar-sspi-novembro-2016
Hispamar-sspi-novembro-2016SSPI Brasil
 
1 ITNE2003 Install, Configure, Operate and T.docx
1  ITNE2003  Install, Configure, Operate and T.docx1  ITNE2003  Install, Configure, Operate and T.docx
1 ITNE2003 Install, Configure, Operate and T.docxpoulterbarbara
 
What's under the cover 20111019
What's under the cover   20111019What's under the cover   20111019
What's under the cover 20111019NebraskaBroadband
 
Shihab Uddin 062483056
Shihab Uddin  062483056Shihab Uddin  062483056
Shihab Uddin 062483056mashiur
 
Massive MTC An Overview and Perspectives Towards 5G (2).pdf
Massive MTC An Overview and Perspectives Towards 5G (2).pdfMassive MTC An Overview and Perspectives Towards 5G (2).pdf
Massive MTC An Overview and Perspectives Towards 5G (2).pdfYAAKOVSOLOMON1
 
Computer Crimes Act B.E. 2550 Eng
Computer Crimes Act B.E. 2550 EngComputer Crimes Act B.E. 2550 Eng
Computer Crimes Act B.E. 2550 EngDanai Thongsin
 
Empowering Citizens in Public Service Design and Delivery: A reference model ...
Empowering Citizens in Public Service Design and Delivery: A reference model ...Empowering Citizens in Public Service Design and Delivery: A reference model ...
Empowering Citizens in Public Service Design and Delivery: A reference model ...ServiceWave 2010
 
Download PowerPoint File
Download PowerPoint File Download PowerPoint File
Download PowerPoint File Videoguy
 
The Effects of Broadband Deployment on Output and Employment: A Cross-section...
The Effects of Broadband Deployment on Output and Employment: A Cross-section...The Effects of Broadband Deployment on Output and Employment: A Cross-section...
The Effects of Broadband Deployment on Output and Employment: A Cross-section...Smart Chicago Collaborative
 
Galaxy Backbone
Galaxy BackboneGalaxy Backbone
Galaxy Backbonebudzeg
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 

Semelhante a Computer Crime Act B.E. 2550 (2007) & Ministry of ICT Notification (20)

IPTV IN INDIA SOME LEGAL PERSPECTIVES
IPTV IN INDIA SOME LEGAL PERSPECTIVESIPTV IN INDIA SOME LEGAL PERSPECTIVES
IPTV IN INDIA SOME LEGAL PERSPECTIVES
 
CCTNS
CCTNS CCTNS
CCTNS
 
Massive_MTC_An_Overview and Perspectives Towards 5G.pdf
Massive_MTC_An_Overview and Perspectives Towards 5G.pdfMassive_MTC_An_Overview and Perspectives Towards 5G.pdf
Massive_MTC_An_Overview and Perspectives Towards 5G.pdf
 
download presentation
download presentationdownload presentation
download presentation
 
download presentation
download presentationdownload presentation
download presentation
 
Marsden Kingston: Net Neutrality: Past, Evidence, Present, Future
Marsden Kingston: Net Neutrality: Past, Evidence, Present, FutureMarsden Kingston: Net Neutrality: Past, Evidence, Present, Future
Marsden Kingston: Net Neutrality: Past, Evidence, Present, Future
 
Hispamar-sspi-novembro-2016
Hispamar-sspi-novembro-2016Hispamar-sspi-novembro-2016
Hispamar-sspi-novembro-2016
 
1 ITNE2003 Install, Configure, Operate and T.docx
1  ITNE2003  Install, Configure, Operate and T.docx1  ITNE2003  Install, Configure, Operate and T.docx
1 ITNE2003 Install, Configure, Operate and T.docx
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
What's under the cover 20111019
What's under the cover   20111019What's under the cover   20111019
What's under the cover 20111019
 
Shihab Uddin 062483056
Shihab Uddin  062483056Shihab Uddin  062483056
Shihab Uddin 062483056
 
Massive MTC An Overview and Perspectives Towards 5G (2).pdf
Massive MTC An Overview and Perspectives Towards 5G (2).pdfMassive MTC An Overview and Perspectives Towards 5G (2).pdf
Massive MTC An Overview and Perspectives Towards 5G (2).pdf
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
Computer Crimes Act B.E. 2550 Eng
Computer Crimes Act B.E. 2550 EngComputer Crimes Act B.E. 2550 Eng
Computer Crimes Act B.E. 2550 Eng
 
Empowering Citizens in Public Service Design and Delivery: A reference model ...
Empowering Citizens in Public Service Design and Delivery: A reference model ...Empowering Citizens in Public Service Design and Delivery: A reference model ...
Empowering Citizens in Public Service Design and Delivery: A reference model ...
 
Download PowerPoint File
Download PowerPoint File Download PowerPoint File
Download PowerPoint File
 
The Effects of Broadband Deployment on Output and Employment: A Cross-section...
The Effects of Broadband Deployment on Output and Employment: A Cross-section...The Effects of Broadband Deployment on Output and Employment: A Cross-section...
The Effects of Broadband Deployment on Output and Employment: A Cross-section...
 
Galaxy Backbone
Galaxy BackboneGalaxy Backbone
Galaxy Backbone
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Information technology act
Information technology actInformation technology act
Information technology act
 

Último

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Computer Crime Act B.E. 2550 (2007) & Ministry of ICT Notification

  • 1. Computer Crime Act B.E. 2550 (2007) & Ministry of ICT Notification A Presentation to the AMCHAM ICT Committee & Internet Service Providers Tim Bass CISSP, (ISC)2 Executive Vice President ACIS Professional Center Co . , Ltd . Email : [email_address] Mobile: +6683-297-5101
  • 2.
  • 3. Disclaimer The information contained in this presentation is based on two UNOFFICAL English translations of the Thai language Computer Crime Act B.E. 2550 (2007) and one UNOFFICIAL English translation of the Thai language Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550. ACIS Professional Center Co. Ltd. advises all concerned to refer to the OFFICIAL Thai language version of these documents. ACIS Professional Center Co. Ltd. nor their employees are responsible for errors or omissions in the UNOFFICIAL English translations of these Thai language documents.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Annex A Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 1. Fixed line Service provider 2. Mobile Service Provider 3. Leased Circuit Service Provider included Fiber optic, ADSL (Asymmetric Digital Subscriber Line), Frame Relay Provider, ATM (Asynchronous Transfer Mode) excluded Physical media provider or Cable (Dark Fiber provider that does not contain Internet or IP traffic) 4. Satellite Services Provider. a. Telecommunication and Broadcast Carrier Example of Type Type
  • 24. Annex A Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 1. Internet Service Provider both wire or wireless 2. Operators who provide Internet access in office/room, rental room, hotel or restaurant 3. Computer network access Service Provider for organizations such as governmental department, company or academic institution. b. Access Service Provider
  • 25. Annex A Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 1. Web hosting or rental web hosting 2. File Server or file share 3. Mail Server service provider. 4. Internet Data Center. c. Hosting Service Provider
  • 26. Annex A Annex Notification of the Ministry of Information and Communication Technology Re: Criteria concerning Archiving of Computer Traffic Data of Service Provider B.E. 2550 1. Internet Café. 2. Game online. d. Internet Café
  • 27.
  • 28. Annex B 5(1) Archival Requirements Date and time of the initial activation of the service and the location label (Cell ID) Name, Address of subscriber or registered User - Telephone number or circuit ID including optional services such as line transfer services and the transferred number including telephone number which is called from the transferred line. - Fixed Network Telephony and Mobile Telephony. A. Data that could be identifiable and traceable to the source of origin, source address, destination address and route traversal of computer system communication. List of Data Traffic Type
  • 29. Annex B 5(1) Archival Requirements 2. Mobile phone physical location that connect to Cell ID during communication. C. Data which can be specified the location of the use of mobile phone or mobile communication equipment. 3. To provide caller tracking system 1. Original Cell ID of the communication. Fixed Network Telephony and Mobile Telephony, the Date and time of the start and end of the communication) B. Data that can be specified date, time and usage time of computer system communication.
  • 30. Annex B 5(1)(B & C) Logging Requirements 2) Date and Time of the connection of client to Server 1) Access logs specific to Authentication and Authorization servers such as: TACACS (Terminal Access controller Access Control System) or RADIUS (Remote Authentication Dial-in User Service) or DIAMETER ( Used to Control to Access to IP Router or Network Access Servers) A. Internet logging List of Data Traffic Type
  • 31. Annex B 5(1)(B & C) Logging Requirements 2) IP Address of Client Connected to Server B. E-mail 1) Simple Mail Transfer Protocol : SMTP log - Messages ID - Sender E-mail Address - Receiver E-mail Address - Status Indicator. 5) Calling Line Identification. 4) Assigned IP Address 3) User ID
  • 32. Annex B 5(1)(B & C) Logging Requirements 6) POP3 (Post Office Protocol version 3) log or IMAP4 ( Internet Messages Access Protocol version 4) log 5) User ID 4) IP Address of Sending Computer 3) Date and Time of Connection of the Client Connected to Server. B. E-mail (continued)
  • 33. Annex B 5(1)(B & C) Logging Requirements 5) Path and Filename of Data Object Uploaded or Downloaded. 4) User ID 3) IP source Address 2) Date and Time of Connection of Client 1) Access log C. FTP log
  • 34. Annex B 5(1)(B & C) Logging Requirements 5) URI ( Uniform Resource Identifier ) 4) Instruction. 3) Source IP Address 2) Date and time of connection of client 1) Access log D. Web Traffic log
  • 35. Annex B 5(1)(B & C) Logging Requirements F. Internet Relay Chat (IRC) or Instance Messaging (IM) Date and Time of Connection of Client to Server and Hostname and IP address. 5) Posted Message ID 4) Host Name 3) Protocol Process ID 2) Date and time of Connection of Clients to Server 1) NNTP Network News Transfer Protocol log E. Usenet
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Computer Crime Act B.E. 2550 (2007) & Ministry of ICT Notification A Presentation to the AMCHAM ICT Committee & Internet Service Providers Revision 1.1 Tim Bass CISSP, (ISC)2 Executive Vice President ACIS Professional Center Co . , Ltd . Email : [email_address] Mobile: +6683-297-5101