10.08.2013 Views

Civil-Military Relations and Democratic Control of the Security Sector

Civil-Military Relations and Democratic Control of the Security Sector

Civil-Military Relations and Democratic Control of the Security Sector

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

78<br />

<strong>Democratic</strong> <strong>Control</strong> in Special Cases<br />

for <strong>the</strong> Protection <strong>of</strong> Human Rights <strong>and</strong> Fundamental Freedoms, <strong>the</strong> 1966 United Nations International<br />

Covenant on <strong>Civil</strong> <strong>and</strong> Political Rights, <strong>and</strong> o<strong>the</strong>r applicable international human rights<br />

instruments.” 18<br />

In December 2000, <strong>the</strong> General Assembly <strong>of</strong> <strong>the</strong> United Nations issued a Resolution on<br />

“Combating <strong>the</strong> Criminal Misuse <strong>of</strong> Information Technologies.” 19 One particular emphasis <strong>of</strong> this<br />

Resolution is on <strong>the</strong> role <strong>of</strong> <strong>the</strong> Commission on Crime Prevention <strong>and</strong> Criminal Justice to make<br />

law enforcement more effective. In addition to <strong>the</strong> importance <strong>of</strong> <strong>the</strong> international cooperation in<br />

combating cybercrime, <strong>the</strong> Resolution also underlines <strong>the</strong> importance <strong>of</strong> <strong>the</strong> cooperation between<br />

<strong>the</strong> public <strong>and</strong> <strong>the</strong> private sectors.<br />

Romania provides one example <strong>of</strong> national legislation on cybercrime that follows definitions<br />

adopted by <strong>the</strong> Council <strong>of</strong> Europe. In this particular case <strong>the</strong> legislation on preventing <strong>and</strong> fighting<br />

cybercrime is part <strong>of</strong> Romania’s Anti-corruption Law. 20<br />

<strong>Security</strong> <strong>of</strong> information systems <strong>and</strong> infrastructure<br />

While <strong>the</strong> proper application <strong>of</strong> advanced information technologies provides competitive advantages<br />

<strong>and</strong> accelerates economic growth, <strong>the</strong> increasing dependence <strong>of</strong> businesses <strong>and</strong> public<br />

services on complex information <strong>and</strong> communications systems brings concerns—in business<br />

communities, governments, <strong>and</strong> international organizations—in regard to related risks. For<br />

example, in November 1992 <strong>the</strong> Council <strong>of</strong> <strong>the</strong> Organization for Economic Cooperation <strong>and</strong><br />

Development (OECD) issued detailed guidelines on security <strong>of</strong> information systems 21 that “Aim<br />

to:<br />

Promote a culture <strong>of</strong> security among all participants as a means <strong>of</strong> protecting information<br />

systems <strong>and</strong> networks.<br />

Raise awareness about <strong>the</strong> risk to information systems <strong>and</strong> networks; <strong>the</strong> policies, practices,<br />

measures <strong>and</strong> procedures available to address those risks; <strong>and</strong> <strong>the</strong> need for <strong>the</strong>ir adoption<br />

<strong>and</strong> implementation.<br />

Foster greater confidence among all participants in information systems <strong>and</strong> networks <strong>and</strong><br />

<strong>the</strong> way in which <strong>the</strong>y are provided <strong>and</strong> used.<br />

Create a general frame <strong>of</strong> reference that will help participants underst<strong>and</strong> security issues<br />

<strong>and</strong> respect ethical values in <strong>the</strong> development <strong>and</strong> implementation <strong>of</strong> coherent policies,<br />

practices, measures <strong>and</strong> procedures for <strong>the</strong> security <strong>of</strong> information systems <strong>and</strong> networks.<br />

18 CoE Convention on Cybercrime, Article 15, Conditions <strong>and</strong> safeguards.<br />

19 UN General Assembly Resolution 55/63 (22 January 2001), (12 October<br />

2004).<br />

20 Anti-corruption law, Title III on preventing <strong>and</strong> fighting cyber-crime. Un<strong>of</strong>ficial translation <strong>of</strong> this title is<br />

available at http://www.legi-internet.ro/en/cybercrime.htm (12 October 2004).<br />

21 OECD Guidelines for <strong>the</strong> <strong>Security</strong> <strong>of</strong> Information Systems <strong>and</strong> Networks: Towards a Culture <strong>of</strong> <strong>Security</strong>,<br />

Directorate for Science, Technology <strong>and</strong> Industry, Organisation for Economic Co-operation <strong>and</strong> Development,<br />

Adopted as Recommendation <strong>of</strong> <strong>the</strong> OECD Council, 25 July 2002 (13 October 2004).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!