SlideShare a Scribd company logo
1 of 39
Download to read offline
New Developments in Cyber Law
Benjamin Ang
Senior Fellow / Head Cyber Programme, Centre of
Excellence for National Security (CENS)
Education Chair, Internet Society Singapore Chapter
Twitter @benjaminang and @ISOCSingapore
www.isoc.sg
TRANSITION FROM IPV4TO IPV6
IS IN PROGRESS
Risks during transition
• "Tunnel-based IPv6
transition mechanisms
could allow the setup of
egress communication
channels over an IPv4-
only or dual-stack
network while evading
detection by a network
intrusion detection
system,"
• Hedgehog in the Fog: Creating and
Detecting IPv6Transition Mechanism-
Based Information Exfiltration Covert
Channels, NATO defence alliance's
Cooperative Cyber Defence Centre of
Excellence and Tallinn University of
Technology, Estonia
Risks during operation
• Atomic fragments can be used as
fragmentation attack vector against routers
in large-scale core networks
– https://www.theregister.co.uk/2017/01/18/net_boffin_ipv6
_needs_hardening_against_fragmentation_attacks/
• Some security tools and DDOS mitigation
tools are not IPV6 ready
– http://searchsecurity.techtarget.com/feature/Address-
IPv6-security-before-your-time-runs-out
WHAT DOES IT MEAN FORYOU?
Unauthorised access
to computer
material
3.—(1) …
knowingly causes a
computer to
perform any
function for the
purpose of
securing access
without authority
to any program or
data
Aha, I’ve found
Betty’s credit
card info in her
documents
Unauthorised
modification of
computer material
4.—(1) … knowingly
causes a computer
to perform any
function for the
purpose of securing
access to any
program or data
held in any
computer with
intent to commit an
offence
I can use the info
to buy stuff using
Betty’s account
Access with intent to
commit or facilitate
commission of offence
5.—(1) … does any
act which he
knows will cause
an unauthorised
modification of the
contents of any
computer
I will change the
data to make Betty
look dishonest
Unauthorised use or
interception of
computer service
6.—(1) any person
who
(a) secures access
without authority
to any computer
for the purpose of
obtaining, directly
or indirectly, any
computer service;
Hey look, I’m using
Betty’s wi-fi without
her knowledge
Unauthorised
obstruction of use of
computer
7.—(1) Any person
who, knowingly
and without
authority or lawful
excuse —
(a) interferes with,
or interrupts or
obstructs the
lawful use of, a
computer; or
Betty, if you don’t
pay the ransom, you
will never see your
files again
Unauthorised
obstruction of use of
computer
7.—(1) (b) impedes
or prevents access
to, or impairs the
usefulness or
effectiveness of,
any program or
data stored in a
computer
I hate Betty, I
shall launch a
DDOS on her
server
8A. Obtaining
personal information
(1)(a) Obtaining or
retaining personal
information a
person knew or had
reason to believe
came from s3, 4, 5,
or 6,
(2)(a) to commit an
offence, or
(2)(b) to supply it for
committing an
offence
I found Betty’s credit
card info on
freecreditcards.com – I
can use it to buy stuff
Not my fault … I
didn’t hack Betty,
but someone else
surely did
8A. Supplying
personal information
(1)(b) Supplying or
transmitting
personal
information a
person knew or
had reason to
believe came from
s3, 4, 5, or 6,
(2)(b) to facilitate
committing an
offence
I’ll send Betty’s credit
card info over to
Charles, he can use it to
buy stuff too
What is Personal Information?
• “any information, whether true or not, about an
individual … alone or in combination … to identify an
individual, including (but not limited to)
– biometric data,
– name,
– address,
– date of birth,
– national registration identity card number,
– passport number,
– a written, electronic or digital signature, user
– authentication code,
– credit card or debit card number, and password.”
8B Items used for
offences
(1)(a) Obtaining or
retaining any item
(i) Intending to
commit or
facilitate an
offence under
s3, 4, 5, 6, 7 This tool is useful; I can
use it to gain entry to
Betty’s documents and
take her credit card info
8B Items used for
offences
(1)(b) Making,
supplying, offering
to supply or
making available,
an item,
Intending it to be
used to commit
and offence under
s3, 4, 5, 6, 7
I can send the same tool
to Bob, I’m sure he’ll
want to get into Betty’s
documents too
What are these illegal ‘items’?
• s8B(2)(a)Any device /
program that is
– Designed
– Adapted, or
– Capable of being used,
• to commit an offence
under s3 – 7
• (b) Password or access
code, which can be used
to commit an offence
under s3-7
Extra-territorial jurisdiction
Offence to commit a
criminal act
• while overseas,
• against a computer
located overseas
• if there is significant
risk of “serious harm” in
Singapore.
• “serious harm” includes
• (i) illness, injury or death of
individuals in Singapore;
• (ii) disruption of, or a
serious diminution of,
essential services;
• (iii) disruption of / serious
diminution of public
confidence in … govt
function; or
• (iv) damage to the national
security, defence or foreign
relations of Singapore
What happens if you commit
an offence under CMCA
Prison up to 20 years
Fines up to $100,000
What is Negligence?
• Duty of care – you owe a duty to people who
would be foreseeably be affected by your
actions
• Reasonable standard – your duty is to take
reasonable care, based on the industry’s
practice
• Liability for damage – you would be liable if
you failed to meet your duty and there was
damage
What happens if you’re sued for
Negligence
• Yahoo – sued for ‘gross negligence’ in not
securing user accounts (link)
• Home Depot – paid settlements of US$25m to
banks and US$19.5 m to consumers for 2014
breach (link)
• Neiman Marcus – paid settlement of US$1.6m
to shoppers for 2013 breach (link)
• Target – offers US$10m settlement for breach
Personal Data Protection
Commission fines under PDPA
• S$10,000 fine on Propnex Realty for failing to
make reasonable security arrangements to
prevent unauthorised access of customers’
personal data
• S$10,000 fine on JP Pepperdine
• S$10,000 fine onTech Mahindra for failing to
make reasonable security arrangement to
prevent unauthorised access / modification of
mybill.singtel.com, myaccount.singtel.com
• S$3,000 fine on Smiling Orchid
Overseas regulators who might
penalize you
• FTC
• SEC
• USTreasury Department
• European Union, under
General Data Privacy
Directive (GDPR)
– fines of up to 4%
worldwide annual turnover
– or €20 million (whichever
is higher).
NEXT: CYBERSECURITY ACT
Drafting
We are
here
1st + 2nd
Reading
It will be
introduced in
Parliament as a
Bill in late 2017
Select
Comm
3rd Reading
This will contain
input and
amendments
from the
consultation
Signing
After PCMR
passes it, the
President will
sign it, and it
will be Gazetted
From Bill to Act
Public
Consultation
Management / response to cyber
threats – existing CMCA
• 15A.—(1) Where the Minister is satisfied that it is necessary
• for the purposes of preventing, detecting or countering any
threat to the national security, essential services or defence
of Singapore or foreign relations of Singapore,
• the Minister may, ..., authorise or direct any person or
organisation ...
• to take such measures or comply with such requirements as
may be necessary to prevent, detect or counter any threat
to a computer or computer service or any class of
computers or computer services.
Some of the concerns
Concerns
• Threats to both IT
systems and Industrial
Control Systems (ICS)
• Threats to availability
and integrity
Responses
• Proactive approach for
protection of critical
information
infrastructure
• Risk-based mitigation,
early detection and
robust response
Parts of the Bill
Sharing of
cybersecurity
information
with and by
CSA
Management
of and
response to
cyber threats
Protection of
Critical
Information
Infrastructure
Get involved in the discussion
Contact us
@benjaminang
@ISOCSingapore
www.isoc.sg
Internet Society (Singapore Chapter)
• Mission:To promote the open development,
evolution, and use of the Internet for the
benefit of all people throughout the world.
Internet Society Singapore Chapter
Provides
leadership in
policy issues
Advocates
open Internet
Standards
Promotes
Internet
technologies
that matter
Develops
Internet
infrastructure
Undertakes
outreach that
changes lives
Recognizes
industry
leaders
Current Priorities for ISOC.SG
▪ Internet
Governance
▪ Open Internet
Standards
▪ Online Identity
▪ IPv6
▪ Blockchain
▪ Domain Name
System Security
(DNSSEC)
▪ Internet and
Human Rights
▪ Intellectual
Property and
Digital Content
▪ Internet of Things
What ISOC.SG
does
Public consultation
with MDA on
changes to
Licensing of
Websites
Photo: © Stonehouse Photographic
www.internetsociety.org/wcit
What ISOC.SG
does
Lodging complaint
against law firm
representing
Dallas Buyers Club
in threatening
users
Photo: © Stonehouse Photographic
www.internetsociety.org/wcit
What ISOC.SG
does
Seminars on
Charlie Hebdo,
Cybersecurity
Skills Building,
Election Blogging,
IOT, and more
www.internetsociety.org/wcit
What ISOC.SG
does
Roundtable on the
upcoming
Cybersecurity Act
www.internetsociety.org/wcit
World IPv6 Launch
www.WorldIPv6Launch.org
Centre of Excellence for National
Security (CENS)
• Multinational team of research specialists in
national security
• Working with National Security Coordination
Secretariat (NSCS) and Cyber Security Agency
(CSA)
• Part of the S Rajaratnam School of
International Studies (RSIS) at NTU
What we do at CENS
• Publish Commentaries and Policy Papers on
National Security issues
• Educate and advise National Security Officials
• Organize workshops and seminars for to
create a community of practice in public and
private sectors

More Related Content

What's hot

Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportBenjamin Ang
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Benjamin Ang
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013M P Keshava
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificAPNIC
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCAFrancis Amaning
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureFrancis Amaning
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT UpdatesAPNIC
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsFrancis Amaning
 

What's hot (20)

Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated Environments
 

Similar to New Developments in Cyber Law

2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...Benjamin Ang
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBIBenjamin Ang
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy clubGet up to Speed
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Benjamin Ang
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 

Similar to New Developments in Cyber Law (20)

2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
Are you the I in CII? Cybersecurity Bill public consultation by Internet Soci...
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 

More from Benjamin Ang

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfBenjamin Ang
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfBenjamin Ang
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfBenjamin Ang
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Benjamin Ang
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesBenjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Benjamin Ang
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic viewBenjamin Ang
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...Benjamin Ang
 
Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Benjamin Ang
 
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Benjamin Ang
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveBenjamin Ang
 

More from Benjamin Ang (20)

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
 
Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness)
 
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
 

Recently uploaded

如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 

Recently uploaded (20)

如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 

New Developments in Cyber Law

  • 1. New Developments in Cyber Law Benjamin Ang Senior Fellow / Head Cyber Programme, Centre of Excellence for National Security (CENS) Education Chair, Internet Society Singapore Chapter Twitter @benjaminang and @ISOCSingapore www.isoc.sg
  • 2. TRANSITION FROM IPV4TO IPV6 IS IN PROGRESS
  • 3. Risks during transition • "Tunnel-based IPv6 transition mechanisms could allow the setup of egress communication channels over an IPv4- only or dual-stack network while evading detection by a network intrusion detection system," • Hedgehog in the Fog: Creating and Detecting IPv6Transition Mechanism- Based Information Exfiltration Covert Channels, NATO defence alliance's Cooperative Cyber Defence Centre of Excellence and Tallinn University of Technology, Estonia
  • 4. Risks during operation • Atomic fragments can be used as fragmentation attack vector against routers in large-scale core networks – https://www.theregister.co.uk/2017/01/18/net_boffin_ipv6 _needs_hardening_against_fragmentation_attacks/ • Some security tools and DDOS mitigation tools are not IPV6 ready – http://searchsecurity.techtarget.com/feature/Address- IPv6-security-before-your-time-runs-out
  • 5. WHAT DOES IT MEAN FORYOU?
  • 6. Unauthorised access to computer material 3.—(1) … knowingly causes a computer to perform any function for the purpose of securing access without authority to any program or data Aha, I’ve found Betty’s credit card info in her documents
  • 7. Unauthorised modification of computer material 4.—(1) … knowingly causes a computer to perform any function for the purpose of securing access to any program or data held in any computer with intent to commit an offence I can use the info to buy stuff using Betty’s account
  • 8. Access with intent to commit or facilitate commission of offence 5.—(1) … does any act which he knows will cause an unauthorised modification of the contents of any computer I will change the data to make Betty look dishonest
  • 9. Unauthorised use or interception of computer service 6.—(1) any person who (a) secures access without authority to any computer for the purpose of obtaining, directly or indirectly, any computer service; Hey look, I’m using Betty’s wi-fi without her knowledge
  • 10. Unauthorised obstruction of use of computer 7.—(1) Any person who, knowingly and without authority or lawful excuse — (a) interferes with, or interrupts or obstructs the lawful use of, a computer; or Betty, if you don’t pay the ransom, you will never see your files again
  • 11. Unauthorised obstruction of use of computer 7.—(1) (b) impedes or prevents access to, or impairs the usefulness or effectiveness of, any program or data stored in a computer I hate Betty, I shall launch a DDOS on her server
  • 12. 8A. Obtaining personal information (1)(a) Obtaining or retaining personal information a person knew or had reason to believe came from s3, 4, 5, or 6, (2)(a) to commit an offence, or (2)(b) to supply it for committing an offence I found Betty’s credit card info on freecreditcards.com – I can use it to buy stuff Not my fault … I didn’t hack Betty, but someone else surely did
  • 13. 8A. Supplying personal information (1)(b) Supplying or transmitting personal information a person knew or had reason to believe came from s3, 4, 5, or 6, (2)(b) to facilitate committing an offence I’ll send Betty’s credit card info over to Charles, he can use it to buy stuff too
  • 14. What is Personal Information? • “any information, whether true or not, about an individual … alone or in combination … to identify an individual, including (but not limited to) – biometric data, – name, – address, – date of birth, – national registration identity card number, – passport number, – a written, electronic or digital signature, user – authentication code, – credit card or debit card number, and password.”
  • 15. 8B Items used for offences (1)(a) Obtaining or retaining any item (i) Intending to commit or facilitate an offence under s3, 4, 5, 6, 7 This tool is useful; I can use it to gain entry to Betty’s documents and take her credit card info
  • 16. 8B Items used for offences (1)(b) Making, supplying, offering to supply or making available, an item, Intending it to be used to commit and offence under s3, 4, 5, 6, 7 I can send the same tool to Bob, I’m sure he’ll want to get into Betty’s documents too
  • 17. What are these illegal ‘items’? • s8B(2)(a)Any device / program that is – Designed – Adapted, or – Capable of being used, • to commit an offence under s3 – 7 • (b) Password or access code, which can be used to commit an offence under s3-7
  • 18. Extra-territorial jurisdiction Offence to commit a criminal act • while overseas, • against a computer located overseas • if there is significant risk of “serious harm” in Singapore. • “serious harm” includes • (i) illness, injury or death of individuals in Singapore; • (ii) disruption of, or a serious diminution of, essential services; • (iii) disruption of / serious diminution of public confidence in … govt function; or • (iv) damage to the national security, defence or foreign relations of Singapore
  • 19. What happens if you commit an offence under CMCA Prison up to 20 years Fines up to $100,000
  • 20. What is Negligence? • Duty of care – you owe a duty to people who would be foreseeably be affected by your actions • Reasonable standard – your duty is to take reasonable care, based on the industry’s practice • Liability for damage – you would be liable if you failed to meet your duty and there was damage
  • 21. What happens if you’re sued for Negligence • Yahoo – sued for ‘gross negligence’ in not securing user accounts (link) • Home Depot – paid settlements of US$25m to banks and US$19.5 m to consumers for 2014 breach (link) • Neiman Marcus – paid settlement of US$1.6m to shoppers for 2013 breach (link) • Target – offers US$10m settlement for breach
  • 22. Personal Data Protection Commission fines under PDPA • S$10,000 fine on Propnex Realty for failing to make reasonable security arrangements to prevent unauthorised access of customers’ personal data • S$10,000 fine on JP Pepperdine • S$10,000 fine onTech Mahindra for failing to make reasonable security arrangement to prevent unauthorised access / modification of mybill.singtel.com, myaccount.singtel.com • S$3,000 fine on Smiling Orchid
  • 23. Overseas regulators who might penalize you • FTC • SEC • USTreasury Department • European Union, under General Data Privacy Directive (GDPR) – fines of up to 4% worldwide annual turnover – or €20 million (whichever is higher).
  • 25. Drafting We are here 1st + 2nd Reading It will be introduced in Parliament as a Bill in late 2017 Select Comm 3rd Reading This will contain input and amendments from the consultation Signing After PCMR passes it, the President will sign it, and it will be Gazetted From Bill to Act Public Consultation
  • 26. Management / response to cyber threats – existing CMCA • 15A.—(1) Where the Minister is satisfied that it is necessary • for the purposes of preventing, detecting or countering any threat to the national security, essential services or defence of Singapore or foreign relations of Singapore, • the Minister may, ..., authorise or direct any person or organisation ... • to take such measures or comply with such requirements as may be necessary to prevent, detect or counter any threat to a computer or computer service or any class of computers or computer services.
  • 27. Some of the concerns Concerns • Threats to both IT systems and Industrial Control Systems (ICS) • Threats to availability and integrity Responses • Proactive approach for protection of critical information infrastructure • Risk-based mitigation, early detection and robust response
  • 28. Parts of the Bill Sharing of cybersecurity information with and by CSA Management of and response to cyber threats Protection of Critical Information Infrastructure
  • 29. Get involved in the discussion Contact us @benjaminang @ISOCSingapore www.isoc.sg
  • 30. Internet Society (Singapore Chapter) • Mission:To promote the open development, evolution, and use of the Internet for the benefit of all people throughout the world.
  • 31. Internet Society Singapore Chapter Provides leadership in policy issues Advocates open Internet Standards Promotes Internet technologies that matter Develops Internet infrastructure Undertakes outreach that changes lives Recognizes industry leaders
  • 32. Current Priorities for ISOC.SG ▪ Internet Governance ▪ Open Internet Standards ▪ Online Identity ▪ IPv6 ▪ Blockchain ▪ Domain Name System Security (DNSSEC) ▪ Internet and Human Rights ▪ Intellectual Property and Digital Content ▪ Internet of Things
  • 33. What ISOC.SG does Public consultation with MDA on changes to Licensing of Websites Photo: © Stonehouse Photographic www.internetsociety.org/wcit
  • 34. What ISOC.SG does Lodging complaint against law firm representing Dallas Buyers Club in threatening users Photo: © Stonehouse Photographic www.internetsociety.org/wcit
  • 35. What ISOC.SG does Seminars on Charlie Hebdo, Cybersecurity Skills Building, Election Blogging, IOT, and more www.internetsociety.org/wcit
  • 36. What ISOC.SG does Roundtable on the upcoming Cybersecurity Act www.internetsociety.org/wcit
  • 38. Centre of Excellence for National Security (CENS) • Multinational team of research specialists in national security • Working with National Security Coordination Secretariat (NSCS) and Cyber Security Agency (CSA) • Part of the S Rajaratnam School of International Studies (RSIS) at NTU
  • 39. What we do at CENS • Publish Commentaries and Policy Papers on National Security issues • Educate and advise National Security Officials • Organize workshops and seminars for to create a community of practice in public and private sectors