SlideShare uma empresa Scribd logo
1 de 17
Data Protection in Electronic Communications Sector




               Özgür Fatih AKPINAR
       Head of Consumer Rights Department
                  20, June, 2011
Content of the Presentation
 A few words

 Role of the NRA

 Legislation in Turkey
     By-Law on Personal Data Processing and Protection of Privacy in The
      Telecommunications Sector
     By-Law on Security of Electronic Communications


 Regulatory Experiences of the ICT Authority
     Breach of personal data: Unauthorized access to itemised bills
     Preventing unlawful processing of personal data : Anonymous SMS
     Exceptions for personal data processing: Emergency Calls


 Conclusion
A few words:


 One of the firms says that we have 1/3 of world populations
  personal data ranging from their bank accounts to GSM
  numbers.
A few words:


 Personal Information/Data: Any information related with natural
  and/or legal persons which can be defined directly or indirectly by
  using one or more elements of identity card number or physical,
  psychological, intellectual, economic, cultural and social identities
  or health related, genetic, ethnic, religious, family related and
  political information.

 Modification of the Constitution (2010) Article 20: Everybody can
  request protection of their personal data …..
Role of the NRA



 Since protection of personal data is a fundamental right, it is
  necessary for ICT Authority to regulate processing and protection
  of personal data.

 Why is it necessary?
Role of the NRA




 Is it the beginning or to the end?
Legislation


 Legislation in Turkey

     By-Law on Personal Data Processing and Protection of Privacy in the
      Telecommunications Sector enacted in 2004.


     By-Law on Security of Electronic Communications enacted in 2008.
Regulatory Experiences


   Regulatory Experiences of the ICT Authority show us if NRAs have
    provisions to protect consumers from processing of their personal data
     Communication with confidently,
     Either people or firms can benefit from processing of personal data,
     Restriction of calling and connected line identification
   If NRAs do not care processing of personal data
     What you are talking,
     Which parties you are communicating,
     Unsolicited communications,
     Somebody can communicate on behalf of you.
Current case in Turkey
Unauthorized access to itemised
               bills-1

 Newspaper named “Taraf”- It is argued that “Personal data of
  subscribers of one of the operators can be accessed by third
  parties.”

 A thouroughful investigation had been carried out, and



 1.250.000 TL (almost $800.000) penalty was charged.
Unauthorized access to
             itemised bills-2


 An argument about unauthorized access of former soccer
  player Rıdvan DİLMEN to call detailed record (CDR) of his
  former girl friend.

 A detailed investigation had been carried out,

 During the investigation, NRA also benefits from indictment of
  high courts,

 Police statements and written records.

 13.000.000 TL (almost $9.000.000) penalty was charged.
Anonymous SMS

 Argument regarding presence of a security risk in one of the
  mobile operators’ network which makes it possible to send an
  SMS in the name of another subscriber,

 Precautions:

     Preventing SMS messages coming from abroad for the subscribers who are
      not using international roaming and

     Preventing SMS messages from international locations which are sent using
      an alfa-numeric identity.
Preventing presentation of Calling Line
  Identification (CLI) and right of blocking
             the call without CLI

 With the By-Law on Personal Data Processing and Protection of Privacy in The
  Telecommunications Sector

      Preventing the presentation of the calling line identification is a consumer right,
       however

      In such cases, called subscribers must be able to reject incoming calls where
       the presentation of the calling line identification has been prevented.
Processing of Location Data for
          Urgent call

 Location data can be processed for emergency call purposes
  without prior consent of the subscriber.
Conclusion


  Ensuring privacy of the personal data is crucial for;

 Subscribers,
 Creating secure communications environment and
 Achieving maximum benefit from electronic communications
  services.

  Hence it is necessary for NRAs and operators to cooperate
  with ensuring data privacy so as to describe the period as a
  beginning.
 You can decide which one is correct.

 It is clear that it depends on NRAs performance.
Thank You

Mais conteúdo relacionado

Mais procurados

Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformShamseena Zubair
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]angika89
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsJanette Toral
 
Legal awareness
Legal awarenessLegal awareness
Legal awarenesslkantwani
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009ClubHack
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 

Mais procurados (20)

IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
It act,2000
It act,2000It act,2000
It act,2000
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Protect Your Phone Records
Protect Your Phone RecordsProtect Your Phone Records
Protect Your Phone Records
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
Legal awareness
Legal awarenessLegal awareness
Legal awareness
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
2 g spectrum scam
2 g spectrum scam2 g spectrum scam
2 g spectrum scam
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
PG in Cyber Law
PG in Cyber LawPG in Cyber Law
PG in Cyber Law
 

Destaque

Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıAtıf ÜNALDI
 
Antalya itibar yonetimi
Antalya itibar yonetimiAntalya itibar yonetimi
Antalya itibar yonetimiAtıf ÜNALDI
 
Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?Atıf ÜNALDI
 
E i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yollarıE i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yollarıAtıf ÜNALDI
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...Atıf ÜNALDI
 

Destaque (8)

Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mı
 
Antalya itibar yonetimi
Antalya itibar yonetimiAntalya itibar yonetimi
Antalya itibar yonetimi
 
Privacy
PrivacyPrivacy
Privacy
 
Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?
 
E i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yollarıE i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yolları
 
Tene istanbul
Tene istanbulTene istanbul
Tene istanbul
 
Tv Technologies
Tv TechnologiesTv Technologies
Tv Technologies
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...
 

Semelhante a Data Protection in Electronic Communications

California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protectionsipspat
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxAryamanSinghvi
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Ben Allen
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...DeNatrisConsult
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-lawMd Aktar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 

Semelhante a Data Protection in Electronic Communications (20)

California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptx
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
PC213.L3.pdf
PC213.L3.pdfPC213.L3.pdf
PC213.L3.pdf
 
Data protection act
Data protection act Data protection act
Data protection act
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 

Mais de Atıf ÜNALDI

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Atıf ÜNALDI
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuAtıf ÜNALDI
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlarAtıf ÜNALDI
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the futureAtıf ÜNALDI
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızAtıf ÜNALDI
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimiAtıf ÜNALDI
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsAtıf ÜNALDI
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiAtıf ÜNALDI
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldıAtıf ÜNALDI
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihiAtıf ÜNALDI
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar YönetimiAtıf ÜNALDI
 
Bilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimiBilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimiAtıf ÜNALDI
 
Bulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temizBulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temizAtıf ÜNALDI
 

Mais de Atıf ÜNALDI (20)

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlar
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the future
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyız
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimi
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different Platforms
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifi
 
Iptv Derneği
Iptv DerneğiIptv Derneği
Iptv Derneği
 
Trt tv+sosyal medya
Trt tv+sosyal medyaTrt tv+sosyal medya
Trt tv+sosyal medya
 
Stratosfer VPN
Stratosfer VPNStratosfer VPN
Stratosfer VPN
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldı
 
New media
New mediaNew media
New media
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihi
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar Yönetimi
 
Facebook
FacebookFacebook
Facebook
 
Mediacat
MediacatMediacat
Mediacat
 
Bilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimiBilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimi
 
Miad
MiadMiad
Miad
 
Bulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temizBulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temiz
 

Último

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Data Protection in Electronic Communications

  • 1. Data Protection in Electronic Communications Sector Özgür Fatih AKPINAR Head of Consumer Rights Department 20, June, 2011
  • 2. Content of the Presentation  A few words  Role of the NRA  Legislation in Turkey  By-Law on Personal Data Processing and Protection of Privacy in The Telecommunications Sector  By-Law on Security of Electronic Communications  Regulatory Experiences of the ICT Authority  Breach of personal data: Unauthorized access to itemised bills  Preventing unlawful processing of personal data : Anonymous SMS  Exceptions for personal data processing: Emergency Calls  Conclusion
  • 3. A few words:  One of the firms says that we have 1/3 of world populations personal data ranging from their bank accounts to GSM numbers.
  • 4. A few words:  Personal Information/Data: Any information related with natural and/or legal persons which can be defined directly or indirectly by using one or more elements of identity card number or physical, psychological, intellectual, economic, cultural and social identities or health related, genetic, ethnic, religious, family related and political information.  Modification of the Constitution (2010) Article 20: Everybody can request protection of their personal data …..
  • 5. Role of the NRA  Since protection of personal data is a fundamental right, it is necessary for ICT Authority to regulate processing and protection of personal data.  Why is it necessary?
  • 6. Role of the NRA  Is it the beginning or to the end?
  • 7. Legislation  Legislation in Turkey  By-Law on Personal Data Processing and Protection of Privacy in the Telecommunications Sector enacted in 2004.  By-Law on Security of Electronic Communications enacted in 2008.
  • 8. Regulatory Experiences  Regulatory Experiences of the ICT Authority show us if NRAs have provisions to protect consumers from processing of their personal data  Communication with confidently,  Either people or firms can benefit from processing of personal data,  Restriction of calling and connected line identification  If NRAs do not care processing of personal data  What you are talking,  Which parties you are communicating,  Unsolicited communications,  Somebody can communicate on behalf of you.
  • 10. Unauthorized access to itemised bills-1  Newspaper named “Taraf”- It is argued that “Personal data of subscribers of one of the operators can be accessed by third parties.”  A thouroughful investigation had been carried out, and  1.250.000 TL (almost $800.000) penalty was charged.
  • 11. Unauthorized access to itemised bills-2  An argument about unauthorized access of former soccer player Rıdvan DİLMEN to call detailed record (CDR) of his former girl friend.  A detailed investigation had been carried out,  During the investigation, NRA also benefits from indictment of high courts,  Police statements and written records.  13.000.000 TL (almost $9.000.000) penalty was charged.
  • 12. Anonymous SMS  Argument regarding presence of a security risk in one of the mobile operators’ network which makes it possible to send an SMS in the name of another subscriber,  Precautions:  Preventing SMS messages coming from abroad for the subscribers who are not using international roaming and  Preventing SMS messages from international locations which are sent using an alfa-numeric identity.
  • 13. Preventing presentation of Calling Line Identification (CLI) and right of blocking the call without CLI  With the By-Law on Personal Data Processing and Protection of Privacy in The Telecommunications Sector  Preventing the presentation of the calling line identification is a consumer right, however  In such cases, called subscribers must be able to reject incoming calls where the presentation of the calling line identification has been prevented.
  • 14. Processing of Location Data for Urgent call  Location data can be processed for emergency call purposes without prior consent of the subscriber.
  • 15. Conclusion Ensuring privacy of the personal data is crucial for;  Subscribers,  Creating secure communications environment and  Achieving maximum benefit from electronic communications services. Hence it is necessary for NRAs and operators to cooperate with ensuring data privacy so as to describe the period as a beginning.
  • 16.  You can decide which one is correct.  It is clear that it depends on NRAs performance.