SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Co-ope at g t a
                       Co-operating with Law
                           Enforcement

                                       Professor Ian Walden
                            Institute of Computer and Communications Law
                            I i        fC           dC      i i      L
                Centre for Commercial Law Studies, Queen Mary, University of London
                                     Of Counsel, Baker & McKenzie




                              Introductory remarks
          edu




                     Law enforcement access
                      – Covert & coercive investigative techniques
  cl@ccls.e




                     Request recipients
                      – Cloud users
                      – Cloud Service providers
                             Contracted parties & infrastructure providers
                             Communication providers
                                              p
icc




                     Questions of vires and regulatory boundaries
                      – Jurisdictional reach
                      – Obligations to assist
                      – Evidential impact




                                                                                      1
Forensic challenges in the Cloud
          edu

                        Multiplicity
  cl@ccls.e

                         – e.g. Data replication for performance, availability,
                           back-up & redundancy
                        Distributed storage
                         – e.g. ‘sharding’ and ‘partitioning’
                        Protected data
icc




                         – e.g. cryptography
                        Identity
                         – Establishing links




                         LEA investigative powers
          edu




                    ‘Exercising a power’
  cl@ccls.e




                     –P
                      Permissible & impermissible conduct
                          i ibl     i     i ibl      d
                             e.g. entrapment
                    Expedited preservation, retention & delivery-up
                     – Differential authorisation procedures
                             Judicial, executive or administrative
                    Issues of legality & enforceability
icc




                     – Obtaining authorisation
                     – Executing the authorisation




                                                                                  2
edu               Jurisdictional reach
                   Within & beyond the territory
  cl@ccls.e

                     – e.g. Rackspace (2004)
                   Service provider & requested data
                     – ‘loss of location’
                           Reassembly as a proxy?
                   Cybercrime Convention (2001)
icc




                     – Art. 19: ‘Possession or control’ (art.19)
                     – Art. 32: open source or lawful and voluntary consent
                       of the person who has lawful authority to disclose
                           Contractual provisions




                     International co-operation
                                   co-
          edu




                   Mutual legal assistance
  cl@ccls.e




                    – Harmonisation
                    – Or mutual recognition
                           EU: EEW and the EIO
                   Informal co-operation with foreign LEA
                    – Proactive disclosure & 24/7 networks
icc




                   Direct liaison with foreign service providers
                    – Council of Europe Guidelines (2008)
                           e.g. Google Transparency Report
                   Engage directly with the material sought




                                                                              3
edu       Regulating service providers

                       Regulatory boundaries
  cl@ccls.e

                         – ‘electronic communication services’ & ‘information
                           society services’
                                  Google, Skype, Facetime.....?
                                  From SaaS to CaaS
                       Regulatory consequences
                         – Directive 02/58/EC art. 5(1) & art 15(1)
                                     02/58/EC, art        art.
icc




                                  Existing capability or build obligation?
                         – Directive 06/24/EC
                                  Providers of ‘electronic communication services’




                          Cloud-
                          Cloud-derived evidence
          edu




                   Admissibility
                        – Statutory rules & judicial discretion
  cl@ccls.e




                              e.g. Fair trial considerations (ECHR, art. 6)
                              Impact of lawfulness of obtaining?
                              Evidence gathered under MLA
                   Evidential weight
                        – Provenance issues with remote data retrieval
icc




                              authenticity, integrity & accountability




                                                                                      4
edu           Concluding remarks

                   Exceeding powers in application or reach
  cl@ccls.e


                    – Surrendering sovereignty
                    – Regulatory uncertainties
                   From formality to informality
                    – Issues of accountability
                    – Building a ‘culture of co-operation’!
icc




                          e.g. Amazon & WikiLeaks
                   Evidential consequences




                                                               5

Weitere ähnliche Inhalte

Was ist angesagt?

Administrative and semantic cooperation: The role of intelligent document
Administrative and semantic cooperation: The role of intelligent documentAdministrative and semantic cooperation: The role of intelligent document
Administrative and semantic cooperation: The role of intelligent documentRomeo Pruno
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
Document Exchange Methodology for Collaborative Work in eGovernment
Document Exchange Methodologyfor Collaborative Work ineGovernmentDocument Exchange Methodologyfor Collaborative Work ineGovernment
Document Exchange Methodology for Collaborative Work in eGovernmentRomeo Pruno
 
Ian walden - data protection in cloud computing
Ian walden - data protection in cloud computingIan walden - data protection in cloud computing
Ian walden - data protection in cloud computingoiisdp
 
meetup 11102018 - Data, Blockchain en de rol van de overheid
meetup 11102018 - Data, Blockchain en de rol van de overheidmeetup 11102018 - Data, Blockchain en de rol van de overheid
meetup 11102018 - Data, Blockchain en de rol van de overheidVNG Realisatie
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Servicesubtitle
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 

Was ist angesagt? (8)

E lawyer - 2004
E lawyer - 2004E lawyer - 2004
E lawyer - 2004
 
Administrative and semantic cooperation: The role of intelligent document
Administrative and semantic cooperation: The role of intelligent documentAdministrative and semantic cooperation: The role of intelligent document
Administrative and semantic cooperation: The role of intelligent document
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Document Exchange Methodology for Collaborative Work in eGovernment
Document Exchange Methodologyfor Collaborative Work ineGovernmentDocument Exchange Methodologyfor Collaborative Work ineGovernment
Document Exchange Methodology for Collaborative Work in eGovernment
 
Ian walden - data protection in cloud computing
Ian walden - data protection in cloud computingIan walden - data protection in cloud computing
Ian walden - data protection in cloud computing
 
meetup 11102018 - Data, Blockchain en de rol van de overheid
meetup 11102018 - Data, Blockchain en de rol van de overheidmeetup 11102018 - Data, Blockchain en de rol van de overheid
meetup 11102018 - Data, Blockchain en de rol van de overheid
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Service
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 

Andere mochten auch

Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloudCloud Legal Project
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...Cloud Legal Project
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud Legal Project
 
Cloud computing - competition law issues
Cloud computing  - competition law issuesCloud computing  - competition law issues
Cloud computing - competition law issuesCloud Legal Project
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 

Andere mochten auch (7)

Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risks
 
Cloud computing - competition law issues
Cloud computing  - competition law issuesCloud computing  - competition law issues
Cloud computing - competition law issues
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 

Ähnlich wie Cloud computing - cooperating with law enforcement

Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryDan Michaluk
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Tom Kulik
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfBilal Ahmad
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Tyrone Grandison
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final PresentationKartik Uppal
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesKaitlin Thaney
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigmpparam02
 
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...Vytautas Čyras
 
ReinventLaw Silicon Valley 2013
ReinventLaw Silicon Valley 2013ReinventLaw Silicon Valley 2013
ReinventLaw Silicon Valley 2013Sean McGrath
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 
Positive intellectual rights and information exchange
Positive intellectual rights and information exchangePositive intellectual rights and information exchange
Positive intellectual rights and information exchangehuizheng8821
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
 
Audit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of SecurityAudit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of SecurityNbukhari
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 

Ähnlich wie Cloud computing - cooperating with law enforcement (20)

Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
Forensic data investigations in China
Forensic data investigations in ChinaForensic data investigations in China
Forensic data investigations in China
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social Issues
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
 
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
 
ReinventLaw Silicon Valley 2013
ReinventLaw Silicon Valley 2013ReinventLaw Silicon Valley 2013
ReinventLaw Silicon Valley 2013
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Positive intellectual rights and information exchange
Positive intellectual rights and information exchangePositive intellectual rights and information exchange
Positive intellectual rights and information exchange
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
 
Audit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of SecurityAudit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of Security
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
Mod1_cyber-law.ppt
Mod1_cyber-law.pptMod1_cyber-law.ppt
Mod1_cyber-law.ppt
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Cloud computing - cooperating with law enforcement

  • 1. Co-ope at g t a Co-operating with Law Enforcement Professor Ian Walden Institute of Computer and Communications Law I i fC dC i i L Centre for Commercial Law Studies, Queen Mary, University of London Of Counsel, Baker & McKenzie Introductory remarks edu  Law enforcement access – Covert & coercive investigative techniques cl@ccls.e  Request recipients – Cloud users – Cloud Service providers  Contracted parties & infrastructure providers  Communication providers p icc  Questions of vires and regulatory boundaries – Jurisdictional reach – Obligations to assist – Evidential impact 1
  • 2. Forensic challenges in the Cloud edu  Multiplicity cl@ccls.e – e.g. Data replication for performance, availability, back-up & redundancy  Distributed storage – e.g. ‘sharding’ and ‘partitioning’  Protected data icc – e.g. cryptography  Identity – Establishing links LEA investigative powers edu  ‘Exercising a power’ cl@ccls.e –P Permissible & impermissible conduct i ibl i i ibl d  e.g. entrapment  Expedited preservation, retention & delivery-up – Differential authorisation procedures  Judicial, executive or administrative  Issues of legality & enforceability icc – Obtaining authorisation – Executing the authorisation 2
  • 3. edu Jurisdictional reach  Within & beyond the territory cl@ccls.e – e.g. Rackspace (2004)  Service provider & requested data – ‘loss of location’  Reassembly as a proxy?  Cybercrime Convention (2001) icc – Art. 19: ‘Possession or control’ (art.19) – Art. 32: open source or lawful and voluntary consent of the person who has lawful authority to disclose  Contractual provisions International co-operation co- edu  Mutual legal assistance cl@ccls.e – Harmonisation – Or mutual recognition  EU: EEW and the EIO  Informal co-operation with foreign LEA – Proactive disclosure & 24/7 networks icc  Direct liaison with foreign service providers – Council of Europe Guidelines (2008)  e.g. Google Transparency Report  Engage directly with the material sought 3
  • 4. edu Regulating service providers  Regulatory boundaries cl@ccls.e – ‘electronic communication services’ & ‘information society services’  Google, Skype, Facetime.....?  From SaaS to CaaS  Regulatory consequences – Directive 02/58/EC art. 5(1) & art 15(1) 02/58/EC, art art. icc  Existing capability or build obligation? – Directive 06/24/EC  Providers of ‘electronic communication services’ Cloud- Cloud-derived evidence edu  Admissibility – Statutory rules & judicial discretion cl@ccls.e  e.g. Fair trial considerations (ECHR, art. 6)  Impact of lawfulness of obtaining?  Evidence gathered under MLA  Evidential weight – Provenance issues with remote data retrieval icc  authenticity, integrity & accountability 4
  • 5. edu Concluding remarks  Exceeding powers in application or reach cl@ccls.e – Surrendering sovereignty – Regulatory uncertainties  From formality to informality – Issues of accountability – Building a ‘culture of co-operation’! icc  e.g. Amazon & WikiLeaks  Evidential consequences 5