SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Data Protection in Electronic Communications Sector




               Özgür Fatih AKPINAR
       Head of Consumer Rights Department
                  20, June, 2011
Content of the Presentation
 A few words

 Role of the NRA

 Legislation in Turkey
     By-Law on Personal Data Processing and Protection of Privacy in The
      Telecommunications Sector
     By-Law on Security of Electronic Communications


 Regulatory Experiences of the ICT Authority
     Breach of personal data: Unauthorized access to itemised bills
     Preventing unlawful processing of personal data : Anonymous SMS
     Exceptions for personal data processing: Emergency Calls


 Conclusion
A few words:


 One of the firms says that we have 1/3 of world populations
  personal data ranging from their bank accounts to GSM
  numbers.
A few words:


 Personal Information/Data: Any information related with natural
  and/or legal persons which can be defined directly or indirectly by
  using one or more elements of identity card number or physical,
  psychological, intellectual, economic, cultural and social identities
  or health related, genetic, ethnic, religious, family related and
  political information.

 Modification of the Constitution (2010) Article 20: Everybody can
  request protection of their personal data …..
Role of the NRA



 Since protection of personal data is a fundamental right, it is
  necessary for ICT Authority to regulate processing and protection
  of personal data.

 Why is it necessary?
Role of the NRA




 Is it the beginning or to the end?
Legislation


 Legislation in Turkey

     By-Law on Personal Data Processing and Protection of Privacy in the
      Telecommunications Sector enacted in 2004.


     By-Law on Security of Electronic Communications enacted in 2008.
Regulatory Experiences


   Regulatory Experiences of the ICT Authority show us if NRAs have
    provisions to protect consumers from processing of their personal data
     Communication with confidently,
     Either people or firms can benefit from processing of personal data,
     Restriction of calling and connected line identification
   If NRAs do not care processing of personal data
     What you are talking,
     Which parties you are communicating,
     Unsolicited communications,
     Somebody can communicate on behalf of you.
Current case in Turkey
Unauthorized access to itemised
               bills-1

 Newspaper named “Taraf”- It is argued that “Personal data of
  subscribers of one of the operators can be accessed by third
  parties.”

 A thouroughful investigation had been carried out, and



 1.250.000 TL (almost $800.000) penalty was charged.
Unauthorized access to
             itemised bills-2


 An argument about unauthorized access of former soccer
  player Rıdvan DİLMEN to call detailed record (CDR) of his
  former girl friend.

 A detailed investigation had been carried out,

 During the investigation, NRA also benefits from indictment of
  high courts,

 Police statements and written records.

 13.000.000 TL (almost $9.000.000) penalty was charged.
Anonymous SMS

 Argument regarding presence of a security risk in one of the
  mobile operators’ network which makes it possible to send an
  SMS in the name of another subscriber,

 Precautions:

     Preventing SMS messages coming from abroad for the subscribers who are
      not using international roaming and

     Preventing SMS messages from international locations which are sent using
      an alfa-numeric identity.
Preventing presentation of Calling Line
  Identification (CLI) and right of blocking
             the call without CLI

 With the By-Law on Personal Data Processing and Protection of Privacy in The
  Telecommunications Sector

      Preventing the presentation of the calling line identification is a consumer right,
       however

      In such cases, called subscribers must be able to reject incoming calls where
       the presentation of the calling line identification has been prevented.
Processing of Location Data for
          Urgent call

 Location data can be processed for emergency call purposes
  without prior consent of the subscriber.
Conclusion


  Ensuring privacy of the personal data is crucial for;

 Subscribers,
 Creating secure communications environment and
 Achieving maximum benefit from electronic communications
  services.

  Hence it is necessary for NRAs and operators to cooperate
  with ensuring data privacy so as to describe the period as a
  beginning.
 You can decide which one is correct.

 It is clear that it depends on NRAs performance.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformShamseena Zubair
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]angika89
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsJanette Toral
 
Legal awareness
Legal awarenessLegal awareness
Legal awarenesslkantwani
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009ClubHack
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 

Was ist angesagt? (20)

IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
It act,2000
It act,2000It act,2000
It act,2000
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]Right to privacy with special reference to marriage [ppt]
Right to privacy with special reference to marriage [ppt]
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Protect Your Phone Records
Protect Your Phone RecordsProtect Your Phone Records
Protect Your Phone Records
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
Legal awareness
Legal awarenessLegal awareness
Legal awareness
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
2 g spectrum scam
2 g spectrum scam2 g spectrum scam
2 g spectrum scam
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
PG in Cyber Law
PG in Cyber LawPG in Cyber Law
PG in Cyber Law
 

Andere mochten auch

Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıAtıf ÜNALDI
 
Antalya itibar yonetimi
Antalya itibar yonetimiAntalya itibar yonetimi
Antalya itibar yonetimiAtıf ÜNALDI
 
Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?Atıf ÜNALDI
 
E i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yollarıE i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yollarıAtıf ÜNALDI
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...Atıf ÜNALDI
 

Andere mochten auch (8)

Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mı
 
Antalya itibar yonetimi
Antalya itibar yonetimiAntalya itibar yonetimi
Antalya itibar yonetimi
 
Privacy
PrivacyPrivacy
Privacy
 
Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?Gelecek on yılın sosyal ağı nasıl planlanır?
Gelecek on yılın sosyal ağı nasıl planlanır?
 
E i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yollarıE i̇ş ve e-ticaret'te başarının yolları
E i̇ş ve e-ticaret'te başarının yolları
 
Tene istanbul
Tene istanbulTene istanbul
Tene istanbul
 
Tv Technologies
Tv TechnologiesTv Technologies
Tv Technologies
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...
 

Ähnlich wie Data Protection in Electronic Communications

California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protectionsipspat
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxAryamanSinghvi
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Ben Allen
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...DeNatrisConsult
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-lawMd Aktar
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 

Ähnlich wie Data Protection in Electronic Communications (20)

California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptx
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
Presentation Nairobi 9 September 2013. Joint workshop on spam(law) of African...
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
PC213.L3.pdf
PC213.L3.pdfPC213.L3.pdf
PC213.L3.pdf
 
Data protection act
Data protection act Data protection act
Data protection act
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 

Mehr von Atıf ÜNALDI

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Atıf ÜNALDI
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuAtıf ÜNALDI
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlarAtıf ÜNALDI
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the futureAtıf ÜNALDI
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızAtıf ÜNALDI
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimiAtıf ÜNALDI
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsAtıf ÜNALDI
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiAtıf ÜNALDI
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldıAtıf ÜNALDI
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihiAtıf ÜNALDI
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar YönetimiAtıf ÜNALDI
 
Bilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimiBilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimiAtıf ÜNALDI
 
Bulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temizBulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temizAtıf ÜNALDI
 

Mehr von Atıf ÜNALDI (20)

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlar
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the future
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyız
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimi
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different Platforms
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifi
 
Iptv Derneği
Iptv DerneğiIptv Derneği
Iptv Derneği
 
Trt tv+sosyal medya
Trt tv+sosyal medyaTrt tv+sosyal medya
Trt tv+sosyal medya
 
Stratosfer VPN
Stratosfer VPNStratosfer VPN
Stratosfer VPN
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldı
 
New media
New mediaNew media
New media
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihi
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar Yönetimi
 
Facebook
FacebookFacebook
Facebook
 
Mediacat
MediacatMediacat
Mediacat
 
Bilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimiBilisim kurultayı - IPTV'nin gelişimi
Bilisim kurultayı - IPTV'nin gelişimi
 
Miad
MiadMiad
Miad
 
Bulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temizBulutunuz ne-kadar-temiz
Bulutunuz ne-kadar-temiz
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Data Protection in Electronic Communications

  • 1. Data Protection in Electronic Communications Sector Özgür Fatih AKPINAR Head of Consumer Rights Department 20, June, 2011
  • 2. Content of the Presentation  A few words  Role of the NRA  Legislation in Turkey  By-Law on Personal Data Processing and Protection of Privacy in The Telecommunications Sector  By-Law on Security of Electronic Communications  Regulatory Experiences of the ICT Authority  Breach of personal data: Unauthorized access to itemised bills  Preventing unlawful processing of personal data : Anonymous SMS  Exceptions for personal data processing: Emergency Calls  Conclusion
  • 3. A few words:  One of the firms says that we have 1/3 of world populations personal data ranging from their bank accounts to GSM numbers.
  • 4. A few words:  Personal Information/Data: Any information related with natural and/or legal persons which can be defined directly or indirectly by using one or more elements of identity card number or physical, psychological, intellectual, economic, cultural and social identities or health related, genetic, ethnic, religious, family related and political information.  Modification of the Constitution (2010) Article 20: Everybody can request protection of their personal data …..
  • 5. Role of the NRA  Since protection of personal data is a fundamental right, it is necessary for ICT Authority to regulate processing and protection of personal data.  Why is it necessary?
  • 6. Role of the NRA  Is it the beginning or to the end?
  • 7. Legislation  Legislation in Turkey  By-Law on Personal Data Processing and Protection of Privacy in the Telecommunications Sector enacted in 2004.  By-Law on Security of Electronic Communications enacted in 2008.
  • 8. Regulatory Experiences  Regulatory Experiences of the ICT Authority show us if NRAs have provisions to protect consumers from processing of their personal data  Communication with confidently,  Either people or firms can benefit from processing of personal data,  Restriction of calling and connected line identification  If NRAs do not care processing of personal data  What you are talking,  Which parties you are communicating,  Unsolicited communications,  Somebody can communicate on behalf of you.
  • 10. Unauthorized access to itemised bills-1  Newspaper named “Taraf”- It is argued that “Personal data of subscribers of one of the operators can be accessed by third parties.”  A thouroughful investigation had been carried out, and  1.250.000 TL (almost $800.000) penalty was charged.
  • 11. Unauthorized access to itemised bills-2  An argument about unauthorized access of former soccer player Rıdvan DİLMEN to call detailed record (CDR) of his former girl friend.  A detailed investigation had been carried out,  During the investigation, NRA also benefits from indictment of high courts,  Police statements and written records.  13.000.000 TL (almost $9.000.000) penalty was charged.
  • 12. Anonymous SMS  Argument regarding presence of a security risk in one of the mobile operators’ network which makes it possible to send an SMS in the name of another subscriber,  Precautions:  Preventing SMS messages coming from abroad for the subscribers who are not using international roaming and  Preventing SMS messages from international locations which are sent using an alfa-numeric identity.
  • 13. Preventing presentation of Calling Line Identification (CLI) and right of blocking the call without CLI  With the By-Law on Personal Data Processing and Protection of Privacy in The Telecommunications Sector  Preventing the presentation of the calling line identification is a consumer right, however  In such cases, called subscribers must be able to reject incoming calls where the presentation of the calling line identification has been prevented.
  • 14. Processing of Location Data for Urgent call  Location data can be processed for emergency call purposes without prior consent of the subscriber.
  • 15. Conclusion Ensuring privacy of the personal data is crucial for;  Subscribers,  Creating secure communications environment and  Achieving maximum benefit from electronic communications services. Hence it is necessary for NRAs and operators to cooperate with ensuring data privacy so as to describe the period as a beginning.
  • 16.  You can decide which one is correct.  It is clear that it depends on NRAs performance.