SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Data privacy as a tool for international police cooperation MODAP Conference, “Privacy: Beginning or the End” Sabanci University, Istanbul, 20-21 June 2011  INTERPOL Caroline Goemans-Dorny, Counsel Office of Legal Affairs
1 .  General Context  2. INTERPOL’s mission and tools  3. Challenges related to data processing  4. A global legal framework  5. Effective implementation: a multilayered  controlling mechanism  Conclusion Outline
1. General context  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],2. INTERPOL’s mission (Article 2 Constitution)
[object Object],2.  INTERPOL’s tools
[object Object],2.  INTERPOL’s tools
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2.  INTERPOL’s tools
Operational support : logistical and technical support to member countries with complex ongoing investigations.  Comprehensive training programs:  on the field and at the General Secretariat  2.  INTERPOL’s tools
[object Object],[object Object],[object Object],3. Challenges relating to data processing
[object Object],[object Object],3. Challenges relating to data processing
4. A global legal framework   ,[object Object],[object Object],[object Object],[object Object],[object Object]
4. A global legal framework   ,[object Object],[object Object],[object Object]
4. A global legal framework ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],5.  A Multilayered controlling mechanism
5. A multilayered controlling mechanism ,[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanisms  at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanism at internal level ,[object Object],[object Object],[object Object],[object Object],[object Object]
5. Controlling mechanisms  at internal level ,[object Object],[object Object],[object Object]
5. Controlling mechanisms  at  national  level ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External  controlling mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism: requests from individuals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. External controlling mechanism: requests from individuals - procedure  ,[object Object],[object Object],[object Object],[object Object]
5. External review: advice role of CCF  Communication of the CCF findings to INTERPOL General Secretariat (conclusions on compliance, recommendations on necessary actions to be taken) Controls over the follow-up of the CCF recommendations Answers to the requesting parties (in case of requests for access and of complaints)    Controls are aimed at protecting fundamental human rights and advising INTERPOL whenever necessary
Conclusion The adoption of a comprehensive set of rules and development  of mechanisms to monitor their implementation create  a climat of  TRUST and CONFIDENCE that:  -minimize the risk of abusive use in relation to the processing of information;  -strenghten  confidence between member countries when they cooperate via INTERPOL channels.  -INTERPOL data processing rules include a redress mechanism for individuals.  observance of data privacy is a tool for effective international police co-operation
Thank you  [email_address] Interpol :  http://interpol.int CCF :  http://interpol.int/Public/ccf/default.asp

Weitere ähnliche Inhalte

Andere mochten auch

Comparative Criminal Justice Presentation
Comparative Criminal Justice PresentationComparative Criminal Justice Presentation
Comparative Criminal Justice PresentationJake Mulinix
 
One of the 7c's of business communication - Correctness
One of the 7c's of business communication - CorrectnessOne of the 7c's of business communication - Correctness
One of the 7c's of business communication - CorrectnessVaibhav Duggal
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organizationKethgay Otanio
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organizationKethgay Otanio
 
Comparative police systems_preview
Comparative police systems_previewComparative police systems_preview
Comparative police systems_previewchapterhouseinc
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of CriminologyJwooten2
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015monde24836
 
10 practical writing samples - short reports
10 practical writing   samples - short reports10 practical writing   samples - short reports
10 practical writing samples - short reportsMuhammad Ovais
 
Technical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K ChristianTechnical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K ChristianKerrieAnne Christian
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1guest846943
 
Police report writing
Police report writingPolice report writing
Police report writingkapitanpinoy
 
How to Write a Technical Report
How to Write a Technical ReportHow to Write a Technical Report
How to Write a Technical ReportChris Jobling
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewFrancis Postrado
 

Andere mochten auch (18)

Memorandum
MemorandumMemorandum
Memorandum
 
Comparative Criminal Justice Presentation
Comparative Criminal Justice PresentationComparative Criminal Justice Presentation
Comparative Criminal Justice Presentation
 
One of the 7c's of business communication - Correctness
One of the 7c's of business communication - CorrectnessOne of the 7c's of business communication - Correctness
One of the 7c's of business communication - Correctness
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organization
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organization
 
Comparative police systems_preview
Comparative police systems_previewComparative police systems_preview
Comparative police systems_preview
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of Criminology
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
10 practical writing samples - short reports
10 practical writing   samples - short reports10 practical writing   samples - short reports
10 practical writing samples - short reports
 
Technical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K ChristianTechnical Report Writing - Chocolate Cake K Christian
Technical Report Writing - Chocolate Cake K Christian
 
Criminology Power Point 1
Criminology Power Point 1Criminology Power Point 1
Criminology Power Point 1
 
Technical report writing
Technical report writingTechnical report writing
Technical report writing
 
Police report writing
Police report writingPolice report writing
Police report writing
 
How to Write a Technical Report
How to Write a Technical ReportHow to Write a Technical Report
How to Write a Technical Report
 
Theories of crime (criminology)
Theories of crime (criminology)Theories of crime (criminology)
Theories of crime (criminology)
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
INTERPOL
INTERPOLINTERPOL
INTERPOL
 
Self_Esteem
Self_EsteemSelf_Esteem
Self_Esteem
 

Ähnlich wie Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul

Indicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanIndicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanMaksym Klyuchar
 
role_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptxrole_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptxMhmmdCbraylzad
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Human Rights_Final.compressed
Human Rights_Final.compressedHuman Rights_Final.compressed
Human Rights_Final.compressedShankor Paul
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaOECD Governance
 
CRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxCRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxoluobes
 
Background document nhrm report
Background document nhrm reportBackground document nhrm report
Background document nhrm reportGhetnet Metiku
 
Handbook for Monitoring AJ
Handbook for Monitoring AJHandbook for Monitoring AJ
Handbook for Monitoring AJArman Zrvandyan
 
COMPOSITE WP3 Brochure
COMPOSITE WP3 BrochureCOMPOSITE WP3 Brochure
COMPOSITE WP3 BrochureKamal Birdi
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados PessoaisIBE_USP
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
DNA evidence: International Framework
DNA evidence: International Framework DNA evidence: International Framework
DNA evidence: International Framework afiodorova
 
Stefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliencyStefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliencyGlobal Risk Forum GRFDavos
 
Clinical Trial Registry
Clinical Trial RegistryClinical Trial Registry
Clinical Trial RegistryAshok Pandey
 

Ähnlich wie Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul (20)

Indicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights PlanIndicators for Monitoring Implementation of a National Human Rights Plan
Indicators for Monitoring Implementation of a National Human Rights Plan
 
role_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptxrole_of_interpol_in_ar_ankara.pptx
role_of_interpol_in_ar_ankara.pptx
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Human Rights_Final.compressed
Human Rights_Final.compressedHuman Rights_Final.compressed
Human Rights_Final.compressed
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela Piana
 
CRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptxCRIME-INVEST-PPP.pptx
CRIME-INVEST-PPP.pptx
 
Background document nhrm report
Background document nhrm reportBackground document nhrm report
Background document nhrm report
 
Handbook for Monitoring AJ
Handbook for Monitoring AJHandbook for Monitoring AJ
Handbook for Monitoring AJ
 
COMPOSITE WP3 Brochure
COMPOSITE WP3 BrochureCOMPOSITE WP3 Brochure
COMPOSITE WP3 Brochure
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
DNA evidence: International Framework
DNA evidence: International Framework DNA evidence: International Framework
DNA evidence: International Framework
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Howard Back,Ppt
Howard Back,PptHoward Back,Ppt
Howard Back,Ppt
 
Stefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliencyStefan Brem - Critical infrastructure protection and resiliency
Stefan Brem - Critical infrastructure protection and resiliency
 
Clinical Trial Registry
Clinical Trial RegistryClinical Trial Registry
Clinical Trial Registry
 

Mehr von Atıf ÜNALDI

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Atıf ÜNALDI
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuAtıf ÜNALDI
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlarAtıf ÜNALDI
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the futureAtıf ÜNALDI
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızAtıf ÜNALDI
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...Atıf ÜNALDI
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimiAtıf ÜNALDI
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsAtıf ÜNALDI
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiAtıf ÜNALDI
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldıAtıf ÜNALDI
 
Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıAtıf ÜNALDI
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihiAtıf ÜNALDI
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar YönetimiAtıf ÜNALDI
 

Mehr von Atıf ÜNALDI (20)

Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0Nesnelerin İnterneti Barometresi 4.0
Nesnelerin İnterneti Barometresi 4.0
 
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma RaporuMastercard Finansal ve Dijital Tabana Yayılma Raporu
Mastercard Finansal ve Dijital Tabana Yayılma Raporu
 
e-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlare-ticaret ve yenilikçi yaklaşımlar
e-ticaret ve yenilikçi yaklaşımlar
 
Internet of things and the future
Internet of things and the futureInternet of things and the future
Internet of things and the future
 
İnternette nasıl davranmalıyız
İnternette nasıl davranmalıyızİnternette nasıl davranmalıyız
İnternette nasıl davranmalıyız
 
Dünyada eticaret...
Dünyada eticaret...Dünyada eticaret...
Dünyada eticaret...
 
eTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimieTicaretSEM itibar yönetimi eğitimi
eTicaretSEM itibar yönetimi eğitimi
 
Driving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different PlatformsDriving the Consumer to Access Content Through Different Platforms
Driving the Consumer to Access Content Through Different Platforms
 
Siber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifiSiber Güvenlik İnisiyatifi
Siber Güvenlik İnisiyatifi
 
Iptv Derneği
Iptv DerneğiIptv Derneği
Iptv Derneği
 
Trt tv+sosyal medya
Trt tv+sosyal medyaTrt tv+sosyal medya
Trt tv+sosyal medya
 
Stratosfer VPN
Stratosfer VPNStratosfer VPN
Stratosfer VPN
 
Mobil medya atıf ünaldı
Mobil medya   atıf ünaldıMobil medya   atıf ünaldı
Mobil medya atıf ünaldı
 
Tv Technologies
Tv TechnologiesTv Technologies
Tv Technologies
 
New media
New mediaNew media
New media
 
Türk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mıTürk bankaları Facebook'da başarılı mı
Türk bankaları Facebook'da başarılı mı
 
Turk internetinin kısa tarihi
Turk internetinin kısa tarihiTurk internetinin kısa tarihi
Turk internetinin kısa tarihi
 
Online İtibar Yönetimi
Online İtibar YönetimiOnline İtibar Yönetimi
Online İtibar Yönetimi
 
Facebook
FacebookFacebook
Facebook
 
Mediacat
MediacatMediacat
Mediacat
 

Kürzlich hochgeladen

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Data protection as_a_tool_for_international_police_cooperation.modap.20110620.istanbul

  • 1. Data privacy as a tool for international police cooperation MODAP Conference, “Privacy: Beginning or the End” Sabanci University, Istanbul, 20-21 June 2011 INTERPOL Caroline Goemans-Dorny, Counsel Office of Legal Affairs
  • 2. 1 . General Context 2. INTERPOL’s mission and tools 3. Challenges related to data processing 4. A global legal framework 5. Effective implementation: a multilayered controlling mechanism Conclusion Outline
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Operational support : logistical and technical support to member countries with complex ongoing investigations. Comprehensive training programs: on the field and at the General Secretariat 2. INTERPOL’s tools
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. 5. External review: advice role of CCF Communication of the CCF findings to INTERPOL General Secretariat (conclusions on compliance, recommendations on necessary actions to be taken) Controls over the follow-up of the CCF recommendations Answers to the requesting parties (in case of requests for access and of complaints)  Controls are aimed at protecting fundamental human rights and advising INTERPOL whenever necessary
  • 29. Conclusion The adoption of a comprehensive set of rules and development of mechanisms to monitor their implementation create a climat of TRUST and CONFIDENCE that: -minimize the risk of abusive use in relation to the processing of information; -strenghten confidence between member countries when they cooperate via INTERPOL channels. -INTERPOL data processing rules include a redress mechanism for individuals. observance of data privacy is a tool for effective international police co-operation
  • 30. Thank you [email_address] Interpol : http://interpol.int CCF : http://interpol.int/Public/ccf/default.asp

Hinweis der Redaktion

  1. Under international law: right to conclude treaties, to present and receive international claims - In national legal systems: right to enter into contractual relationships, to acquire goods, to bring an action in court