02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Appendix D: Cyber Crime Law Resources<br />

International Cyber Crime Laws<br />

Council <strong>of</strong> Europe – http://www.coe.int/<br />

Council <strong>of</strong> Europe – Legal Affairs – Treaty Office – http://conventions.coe.int/<br />

Data Protection/Privacy<br />

Convention for <strong>the</strong> Protection <strong>of</strong> Individuals with regard to Automatic Processing <strong>of</strong><br />

Personal Data (ETS 154 no. 108)<br />

http://conventions.coe.int/treaty/en/whatyouwant.asp?nt=108<br />

[Entry into force 1985-10-01]<br />

Additional Protocol to <strong>the</strong> Convention for <strong>the</strong> Protection <strong>of</strong> Individuals with regard to<br />

Automatic Processing <strong>of</strong> Personal Data, regarding supervisory authorities and transborder<br />

data flows (ETS no. 181)<br />

http://conventions.coe.int/treaty/en/whatyouwant.asp?nt=181<br />

Cyber Crime<br />

http://www.coe.int/t/e/legal_affairs/legal_co-operation/combating_economic_crime<br />

/cybercrime/<br />

Convention on Cybercrime (ETS no. 185)<br />

http://conventions.coe.int/treaty/en/whatyouwant.asp?nt=185<br />

This Convention defines nine <strong>of</strong>fenses in four categories:<br />

Title 1 – Offences against <strong>the</strong> confidentiality, integrity, and availability <strong>of</strong> computer<br />

data and systems<br />

Article 2 – Illegal access<br />

Article 3 – Illegal interception<br />

Article 4 – Data interference<br />

Article 5 – System interference<br />

Article 6 – Misuse <strong>of</strong> devices<br />

Title 2 – <strong>Computer</strong>-related <strong>of</strong>fences<br />

Article 7 – <strong>Computer</strong>-related forgery<br />

Article 8 – <strong>Computer</strong>-related fraud<br />

Title 3 – Content-related <strong>of</strong>fences<br />

Article 9 – Offences related to child pornography<br />

Title 4 – Offences related to infringements <strong>of</strong> copyright and related rights<br />

154<br />

European Treaty Series<br />

CMU/SEI-2003-TR-001 165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!