SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Internet in Ukraine

Actual Stats                   Critical Issues


       Olena Boltushkina for 4th Euro-SSIG
               Meissen, Germany
                  July 27, 2010
One of the lowest levels of Internet penetration
             among European countries — 25%




► Approx. 46 million people

► Over 12 million Internet users

► Over 500 000 domain names
registered in ccTLD .UA since 1992
.UA needs redelegation


       ► Company that is stated in IANA Delegation
       Record (Communication Systems Ltd.) doesn’t exist.

       ► People stated in the Record have established another
       private company (Hostmaster Ltd.) in 2001 to support
       ccTLD administration. It runs the domain today.

       ► There is another organization having a claim to run
       ccTLD — UANIC. It was created in 2002 by
       telecommunications providers and operators together
       with state telecommunications and security bodies. Its
       actions are mostly not concerted and non-transparent,
       but presented as a full-fledged Multistakeholder
       Approach.

       ► Ukrainian Telecommunications Law demands the
       organization running ccTLD to be non-governmental.
‘Tough IG’ happens,
               and they call it ‘common European practice’


► State law-enforcement authorities attack
hosting providers in a rude way
to confiscate servers with or without court
decision.

► Sometimes they mix up addresses, and
threaten people who have nothing to do
with the ‘criminal’ servers. My former
employer experienced that.

► These attacks are not frequent, but quite
regular. Ministry of Internal Affairs
presents them as a ‘common European
practice’ of fighting cybercrime.

► The method is also used in censorship
issues and business wars.
Parliament doesn’t care




                ► When you hear that Ukraine adopted a
                new law, you have to understand what the
                word ‘adopted’ means. You never know
                how many real and conscious votes were
                made.

                ► After voting on the last serious changes
                to national telecommunications law
                journalists asked Parliament members
                what they’ve just voted for. The common
                answer was ‘Oh, I don’t know!’.
The 404 Law:
         Fight against child porn or for total control?


► In October 2009 Parliament gave a new important telecommunications bill aimed
at fighting child pornography its first reading.

► The bill arouse indignation
among bloggers, ISPs, IT and law
experts together with human rights
organizations as technically
illiterate and too dangerous for
common Internet users.

► The bill received name
'The 404 Law' after the number of
votes for it and after the HTTP 404
Error as an illustration of impact
the bill could have on Ukrainian
Internet users' experience.
The 404 Law:
         Fight against child porn or for total control?




If The 404 Law was adopted in whole, ISPs could become obliged:


► to limit the access of their clients to certain websites indicated by law-
enforcement authorities — without any court decision and precise conditions.

► to store and present to Government upon their request information about all
their clients' connections to Internet — without any conditions of storing or type
of data defined.

► to monitor the whole Internet activity of their clients and report every
suspicious case to Government, though the core law doesn't give ISPs a right to
conduct such investigations.
The 404 Law:
         Fight against child porn or for total control?


If The 404 Law was adopted in whole:


► The new term 'Illegal Content' could emerge with no definition and huge
opportunities of abusive interpretation by the Government.

► Internet users could become obliged to report illegal content to Government.

► Uncertain excessive definition of child pornography could emerge (though
Ukraine ratified European Convention on Cybercrime wich already contains
one), so even a picture of naked little baby from a family album could be
interpreted and prosecuted as child porn.

► Any pictures or other information in spam messages or temporary files stored
on user's computer hard drive without his awareness could make the user guilty
of storing illegal content, and cause criminal liability.
The 404 Law:
         Fight against child porn or for total control?



Due to the common efforts of Ukrainian Internet users, experts and journalists
The 404 Law was adopted with significant changes on January 2010, but still
remains dangerous:


         ► ISPs are obliged to store and present to Government upon
         their request information about heir clients' connections to
         Internet, but it's stated that certain procedure must be defined
         and adopted as a law. There's a big chance they will never
         adopt that law and use the judicial system to use this norm the
         way they need.

         ► The final law contains non-executable norms conflicting with
         the rest of national legislation.
Thank you!
Please, feel free to contact me for questions
    or more information on the subject:
           olena.bo@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
Geritt Contillo
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 

Was ist angesagt? (20)

Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Loveneet presentation
Loveneet presentationLoveneet presentation
Loveneet presentation
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov case
 
Why the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UIDWhy the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UID
 
Right to information act 2005
Right to information act 2005Right to information act 2005
Right to information act 2005
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Anti Trafficking - The Rules
Anti Trafficking - The RulesAnti Trafficking - The Rules
Anti Trafficking - The Rules
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Net neutrality & it’s legal issues
Net neutrality & it’s legal issuesNet neutrality & it’s legal issues
Net neutrality & it’s legal issues
 
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentUSA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...
Letter to ice_and_eoir_regarding_remote_legal_access_and_representation_durin...
 

Andere mochten auch

Andere mochten auch (13)

Vancouver Airport Taser Killing
Vancouver Airport Taser KillingVancouver Airport Taser Killing
Vancouver Airport Taser Killing
 
How high heels and fishnet have driven internet innovation final
How high heels and fishnet have driven internet innovation   finalHow high heels and fishnet have driven internet innovation   final
How high heels and fishnet have driven internet innovation final
 
taser
tasertaser
taser
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
 
Sexual/porn quotient quiz
Sexual/porn quotient quiz Sexual/porn quotient quiz
Sexual/porn quotient quiz
 
Thoughts on Revenge Porn
Thoughts on Revenge PornThoughts on Revenge Porn
Thoughts on Revenge Porn
 
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex LifeReality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
 
A journey of porn, piracy and digital art
A journey of porn, piracy and digital artA journey of porn, piracy and digital art
A journey of porn, piracy and digital art
 
R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)
 
6 pornography
6 pornography6 pornography
6 pornography
 
Porn, the leading influencer of Technology
Porn, the leading influencer of Technology Porn, the leading influencer of Technology
Porn, the leading influencer of Technology
 
'The Future Of Porn' SXSW 2013
'The Future Of Porn' SXSW 2013'The Future Of Porn' SXSW 2013
'The Future Of Porn' SXSW 2013
 
Code of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the PhilippinesCode of Ethics for Professional Teachers of the Philippines
Code of Ethics for Professional Teachers of the Philippines
 

Ähnlich wie Internet in Ukraine

Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement_disclosure_report_june 2014Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement_disclosure_report_june 2014
ngocjos
 
Vodafone law enforcement disclosure report
Vodafone law enforcement disclosure reportVodafone law enforcement disclosure report
Vodafone law enforcement disclosure report
Lupacz
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
segughana
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 

Ähnlich wie Internet in Ukraine (20)

12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
 
Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement_disclosure_report_june 2014Vodafone law enforcement_disclosure_report_june 2014
Vodafone law enforcement_disclosure_report_june 2014
 
Vodafone law enforcement disclosure report
Vodafone law enforcement disclosure reportVodafone law enforcement disclosure report
Vodafone law enforcement disclosure report
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
Net neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationNet neutrality, citizenship and discrimination
Net neutrality, citizenship and discrimination
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
 
Internet governance
Internet governanceInternet governance
Internet governance
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 

Internet in Ukraine

  • 1. Internet in Ukraine Actual Stats Critical Issues Olena Boltushkina for 4th Euro-SSIG Meissen, Germany July 27, 2010
  • 2. One of the lowest levels of Internet penetration among European countries — 25% ► Approx. 46 million people ► Over 12 million Internet users ► Over 500 000 domain names registered in ccTLD .UA since 1992
  • 3. .UA needs redelegation ► Company that is stated in IANA Delegation Record (Communication Systems Ltd.) doesn’t exist. ► People stated in the Record have established another private company (Hostmaster Ltd.) in 2001 to support ccTLD administration. It runs the domain today. ► There is another organization having a claim to run ccTLD — UANIC. It was created in 2002 by telecommunications providers and operators together with state telecommunications and security bodies. Its actions are mostly not concerted and non-transparent, but presented as a full-fledged Multistakeholder Approach. ► Ukrainian Telecommunications Law demands the organization running ccTLD to be non-governmental.
  • 4. ‘Tough IG’ happens, and they call it ‘common European practice’ ► State law-enforcement authorities attack hosting providers in a rude way to confiscate servers with or without court decision. ► Sometimes they mix up addresses, and threaten people who have nothing to do with the ‘criminal’ servers. My former employer experienced that. ► These attacks are not frequent, but quite regular. Ministry of Internal Affairs presents them as a ‘common European practice’ of fighting cybercrime. ► The method is also used in censorship issues and business wars.
  • 5. Parliament doesn’t care ► When you hear that Ukraine adopted a new law, you have to understand what the word ‘adopted’ means. You never know how many real and conscious votes were made. ► After voting on the last serious changes to national telecommunications law journalists asked Parliament members what they’ve just voted for. The common answer was ‘Oh, I don’t know!’.
  • 6. The 404 Law: Fight against child porn or for total control? ► In October 2009 Parliament gave a new important telecommunications bill aimed at fighting child pornography its first reading. ► The bill arouse indignation among bloggers, ISPs, IT and law experts together with human rights organizations as technically illiterate and too dangerous for common Internet users. ► The bill received name 'The 404 Law' after the number of votes for it and after the HTTP 404 Error as an illustration of impact the bill could have on Ukrainian Internet users' experience.
  • 7. The 404 Law: Fight against child porn or for total control? If The 404 Law was adopted in whole, ISPs could become obliged: ► to limit the access of their clients to certain websites indicated by law- enforcement authorities — without any court decision and precise conditions. ► to store and present to Government upon their request information about all their clients' connections to Internet — without any conditions of storing or type of data defined. ► to monitor the whole Internet activity of their clients and report every suspicious case to Government, though the core law doesn't give ISPs a right to conduct such investigations.
  • 8. The 404 Law: Fight against child porn or for total control? If The 404 Law was adopted in whole: ► The new term 'Illegal Content' could emerge with no definition and huge opportunities of abusive interpretation by the Government. ► Internet users could become obliged to report illegal content to Government. ► Uncertain excessive definition of child pornography could emerge (though Ukraine ratified European Convention on Cybercrime wich already contains one), so even a picture of naked little baby from a family album could be interpreted and prosecuted as child porn. ► Any pictures or other information in spam messages or temporary files stored on user's computer hard drive without his awareness could make the user guilty of storing illegal content, and cause criminal liability.
  • 9. The 404 Law: Fight against child porn or for total control? Due to the common efforts of Ukrainian Internet users, experts and journalists The 404 Law was adopted with significant changes on January 2010, but still remains dangerous: ► ISPs are obliged to store and present to Government upon their request information about heir clients' connections to Internet, but it's stated that certain procedure must be defined and adopted as a law. There's a big chance they will never adopt that law and use the judicial system to use this norm the way they need. ► The final law contains non-executable norms conflicting with the rest of national legislation.
  • 10. Thank you! Please, feel free to contact me for questions or more information on the subject: olena.bo@gmail.com