SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Right to privacy and
cybercrime investigation




Dima Gadomsky
criminal attorney, counsel

Tykhin Alekseienko,
junior associate
About Ukraine
             Arzinger - Offices
                                                         Biggest country in Eastern Europe

                                                         Very good IT school

                                                         #11 in the World by IT outsourcing and hi-tech
                                                         services

12
                                                         According to OECD, technology is #1 sector to
                                                         invest




     2   Right to privacy and cybercrime investigation
About Ukraine




3   Right to privacy and cybercrime investigation
Data protection in Ukraine

    The Law On Information, 1992

    Constitution, 1996 (right to privacy)

    The Civil Code, 2004

    Personal Data Protection Act, 2010

    Cybercrimes Investigation Division within Investigation Office, 2012




4       Right to privacy and cybercrime investigation
Geo-targeting of cybercrimes in the World
                                7. Great Britain
                                                                                              2. Russia
                                                             3. Netherlands



                                                                                       15%
                                                                   10%
                                                        5%
                                                                          5%
              25%
                                                              9%
                                                                                       5%

                                  4. Germany
                                                                                                          6. China
    1. USA


                                                                               5. Ukraine
                                                                         48 million attacks


5       Right to privacy and cybercrime investigation
Why Ukraine is 5th?


    Weak legislation

    Good technical education

    Very good corruption




6       Right to privacy and cybercrime investigation
Cybercrimes statistics in Ukraine


    No 5 most popular crime in Ukraine

    Each 5th company faced cyber attack in 2011

    25 % of companies do not have any internal instructions how to deal
    with cybercrimes

    Key businesses facing cybercrimes: finance,          retail, services




7        Right to privacy and cybercrime investigation
About Arzinger
                                               Arzinger - Offices




    12
8        Right to privacy and cybercrime investigation
About Arzinger




9   Right to privacy and cybercrime investigation
About Arzinger – expertise in IT


     Copyright in the Internet (www.ex.ua)

     Certification of cryptographic software

     Personal data issues in cross-border IT outsourcing

     Cybercrimes investigations (legal assistance of the victims, forensic)

     Data security

     Licensing of telecommunication services

     etc.




10          Right to privacy and cybercrime investigation
Case 1

                1        Infection
                                                     TargetCo


                                                         Bank

                                                                      ShellCo2
                                       ShellCo1
                                                     2     Wire
                                                         transfer

                                                                       Bank2
                                         Bank1
                                                               3
                                                            Cash
                                                         withdrawal



            4        Cash
                transferring to
                the beneficiary


11   Right to privacy and cybercrime investigation
Features of cybercrimes


     easy to learn how to commit

     require few resources relative to the potential damage caused

     can be committed in a jurisdiction without being physically present in it

     often not clearly illegal




12        Right to privacy and cybercrime investigation
Case 2
                                                                      Daughter company of
                                                                      leading global provider of
                                                                      digital map data


                                                         UaCo




                                         Unidentified person stolen
                                           the database containing
                                                     location data
13   Right to privacy and cybercrime investigation
Balance




14   Right to privacy and cybercrime investigation
IP address




                          Case 1                                         Case 2

     Infected the target with more then 30                Stealing of the database is only a
     viruses                                              copyright infringement (no criminal
                                                          liability, only civil)
     Used anonymous proxy servers
                                                          IP number and personal mail-box are
     Was using free WiFi in the cafe                      personal data, which cannot be disclosed
                                                          beyond the criminal investigation

     Knowing IP address makes no                sense     Impossible to get the data
15        Right to privacy and cybercrime investigation
Google – User data requests




16   Right to privacy and cybercrime investigation
Balance




17   Right to privacy and cybercrime investigation
Conclusions


     Private data is more or less protected in Ukraine

     Data protection mechanisms make impossible effective legal defence of
     rights (cybercrimes, copyright infringements, etc.)

     Tighten rights to privacy (e.g. obligation for the ISP to disclose data about
     Internet users)?




18        Right to privacy and cybercrime investigation

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaMohammed Mahfouz Alhassan
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerceSudeshna07
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 

Was ist angesagt? (20)

Cyber law
Cyber law Cyber law
Cyber law
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Shilpa
ShilpaShilpa
Shilpa
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Anil final
Anil finalAnil final
Anil final
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Dw communication
Dw communicationDw communication
Dw communication
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 

Andere mochten auch

Хмарні обчислення + персональні дані = Цивільний Кодекс України
Хмарні обчислення + персональні дані = Цивільний Кодекс УкраїниХмарні обчислення + персональні дані = Цивільний Кодекс України
Хмарні обчислення + персональні дані = Цивільний Кодекс УкраїниAlex Kharchenko
 
CC presentation KNEU
CC presentation KNEUCC presentation KNEU
CC presentation KNEUAndriy Bichuk
 
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...Lviv Startup Club
 
LegalCamp 2.0 Ліцензування, важкі випадки
LegalCamp 2.0 Ліцензування, важкі випадкиLegalCamp 2.0 Ліцензування, важкі випадки
LegalCamp 2.0 Ліцензування, важкі випадкиGennadiy Kornev
 
Використання безпаперових інформаційних технологій в процесах набуття та охор...
Використання безпаперових інформаційних технологій в процесах набуття та охор...Використання безпаперових інформаційних технологій в процесах набуття та охор...
Використання безпаперових інформаційних технологій в процесах набуття та охор...nadeh
 
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...Iryna Kuchma
 
"Блоґерство у правовому полі"
"Блоґерство у правовому полі""Блоґерство у правовому полі"
"Блоґерство у правовому полі"Alex Kharchenko
 
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...Lviv Startup Club
 

Andere mochten auch (9)

Хмарні обчислення + персональні дані = Цивільний Кодекс України
Хмарні обчислення + персональні дані = Цивільний Кодекс УкраїниХмарні обчислення + персональні дані = Цивільний Кодекс України
Хмарні обчислення + персональні дані = Цивільний Кодекс України
 
CC presentation KNEU
CC presentation KNEUCC presentation KNEU
CC presentation KNEU
 
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
Назар Поливка ''Найпопулярніші схеми роботи аутсорсингових компаній'' Lviv Fr...
 
Awtor_prawo w neti
Awtor_prawo w netiAwtor_prawo w neti
Awtor_prawo w neti
 
LegalCamp 2.0 Ліцензування, важкі випадки
LegalCamp 2.0 Ліцензування, важкі випадкиLegalCamp 2.0 Ліцензування, важкі випадки
LegalCamp 2.0 Ліцензування, важкі випадки
 
Використання безпаперових інформаційних технологій в процесах набуття та охор...
Використання безпаперових інформаційних технологій в процесах набуття та охор...Використання безпаперових інформаційних технологій в процесах набуття та охор...
Використання безпаперових інформаційних технологій в процесах набуття та охор...
 
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
Максим Наумко, Ірина Кучма. Адаптація ліцензій Creative Commons до українсько...
 
"Блоґерство у правовому полі"
"Блоґерство у правовому полі""Блоґерство у правовому полі"
"Блоґерство у правовому полі"
 
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
Назар Поливка “Фрілансер – договори; як скласти, як уникнути спірних питань, ...
 

Ähnlich wie Ukraine: Cybercrmes and Privacy

Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market PlaceWojciech Filipkowski
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptOlusegun Mosugu
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Computer crime.pptx
Computer crime.pptxComputer crime.pptx
Computer crime.pptxNabinUpreti2
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011Prof. (Dr.) Tabrez Ahmad
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellasGeoBellas
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 

Ähnlich wie Ukraine: Cybercrmes and Privacy (20)

Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market Place
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Computer crime.pptx
Computer crime.pptxComputer crime.pptx
Computer crime.pptx
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 

Mehr von Axon.Partners

Digitalization of law (by Andriy Kostenko)
Digitalization of law (by Andriy Kostenko)Digitalization of law (by Andriy Kostenko)
Digitalization of law (by Andriy Kostenko)Axon.Partners
 
Як журналісту не продебати суд
Як журналісту не продебати судЯк журналісту не продебати суд
Як журналісту не продебати судAxon.Partners
 
Немає нічого особливого в нашому SMM
Немає нічого особливого в нашому SMMНемає нічого особливого в нашому SMM
Немає нічого особливого в нашому SMMAxon.Partners
 
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліціїCryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліціїAxon.Partners
 
Юридичне підприємництво проти нео-луддизму
Юридичне підприємництво проти нео-луддизмуЮридичне підприємництво проти нео-луддизму
Юридичне підприємництво проти нео-луддизмуAxon.Partners
 
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)Axon.Partners
 
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)Axon.Partners
 
My personal questions to privacy
My personal questions to privacyMy personal questions to privacy
My personal questions to privacyAxon.Partners
 
20180325 legal contracts what_if_1991 lecture
20180325 legal contracts what_if_1991 lecture20180325 legal contracts what_if_1991 lecture
20180325 legal contracts what_if_1991 lectureAxon.Partners
 
Куди рухається світ
Куди рухається світКуди рухається світ
Куди рухається світAxon.Partners
 
Юристы и другие неприятности в стартапе
Юристы и другие неприятности в стартапеЮристы и другие неприятности в стартапе
Юристы и другие неприятности в стартапеAxon.Partners
 
овдз 2013 лекція 2
овдз 2013 лекція 2овдз 2013 лекція 2
овдз 2013 лекція 2Axon.Partners
 
овдз 2013 лекція 1
овдз 2013 лекція 1овдз 2013 лекція 1
овдз 2013 лекція 1Axon.Partners
 
Cyber security, cloud computing: legal issues (UKR)
Cyber security, cloud computing: legal issues (UKR)Cyber security, cloud computing: legal issues (UKR)
Cyber security, cloud computing: legal issues (UKR)Axon.Partners
 
20130928 ironclad contract 01
20130928 ironclad contract 0120130928 ironclad contract 01
20130928 ironclad contract 01Axon.Partners
 
2013 construction, finance, ip
2013 construction, finance, ip2013 construction, finance, ip
2013 construction, finance, ipAxon.Partners
 
20130905 say no2 criminal liability for copyright infringement
20130905 say no2 criminal liability for copyright infringement20130905 say no2 criminal liability for copyright infringement
20130905 say no2 criminal liability for copyright infringementAxon.Partners
 
LegalJam: copyright in Ukraine
LegalJam: copyright in UkraineLegalJam: copyright in Ukraine
LegalJam: copyright in UkraineAxon.Partners
 
20130712 wana biz seminar
20130712 wana biz seminar20130712 wana biz seminar
20130712 wana biz seminarAxon.Partners
 
20130528 millhouse b_dedition
20130528 millhouse b_dedition20130528 millhouse b_dedition
20130528 millhouse b_deditionAxon.Partners
 

Mehr von Axon.Partners (20)

Digitalization of law (by Andriy Kostenko)
Digitalization of law (by Andriy Kostenko)Digitalization of law (by Andriy Kostenko)
Digitalization of law (by Andriy Kostenko)
 
Як журналісту не продебати суд
Як журналісту не продебати судЯк журналісту не продебати суд
Як журналісту не продебати суд
 
Немає нічого особливого в нашому SMM
Немає нічого особливого в нашому SMMНемає нічого особливого в нашому SMM
Немає нічого особливого в нашому SMM
 
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліціїCryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
CryptoLegal #2: розплата за ІСО в суді, в арбітражі, в поліції
 
Юридичне підприємництво проти нео-луддизму
Юридичне підприємництво проти нео-луддизмуЮридичне підприємництво проти нео-луддизму
Юридичне підприємництво проти нео-луддизму
 
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
Lawyerpreneurship_Lecture 1_Legal Market (@UCU)
 
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
Агілє, холократія і граблі (a.k.a. agile, holacracy and fuckups)
 
My personal questions to privacy
My personal questions to privacyMy personal questions to privacy
My personal questions to privacy
 
20180325 legal contracts what_if_1991 lecture
20180325 legal contracts what_if_1991 lecture20180325 legal contracts what_if_1991 lecture
20180325 legal contracts what_if_1991 lecture
 
Куди рухається світ
Куди рухається світКуди рухається світ
Куди рухається світ
 
Юристы и другие неприятности в стартапе
Юристы и другие неприятности в стартапеЮристы и другие неприятности в стартапе
Юристы и другие неприятности в стартапе
 
овдз 2013 лекція 2
овдз 2013 лекція 2овдз 2013 лекція 2
овдз 2013 лекція 2
 
овдз 2013 лекція 1
овдз 2013 лекція 1овдз 2013 лекція 1
овдз 2013 лекція 1
 
Cyber security, cloud computing: legal issues (UKR)
Cyber security, cloud computing: legal issues (UKR)Cyber security, cloud computing: legal issues (UKR)
Cyber security, cloud computing: legal issues (UKR)
 
20130928 ironclad contract 01
20130928 ironclad contract 0120130928 ironclad contract 01
20130928 ironclad contract 01
 
2013 construction, finance, ip
2013 construction, finance, ip2013 construction, finance, ip
2013 construction, finance, ip
 
20130905 say no2 criminal liability for copyright infringement
20130905 say no2 criminal liability for copyright infringement20130905 say no2 criminal liability for copyright infringement
20130905 say no2 criminal liability for copyright infringement
 
LegalJam: copyright in Ukraine
LegalJam: copyright in UkraineLegalJam: copyright in Ukraine
LegalJam: copyright in Ukraine
 
20130712 wana biz seminar
20130712 wana biz seminar20130712 wana biz seminar
20130712 wana biz seminar
 
20130528 millhouse b_dedition
20130528 millhouse b_dedition20130528 millhouse b_dedition
20130528 millhouse b_dedition
 

Kürzlich hochgeladen

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Kürzlich hochgeladen (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Ukraine: Cybercrmes and Privacy

  • 1. Right to privacy and cybercrime investigation Dima Gadomsky criminal attorney, counsel Tykhin Alekseienko, junior associate
  • 2. About Ukraine Arzinger - Offices Biggest country in Eastern Europe Very good IT school #11 in the World by IT outsourcing and hi-tech services 12 According to OECD, technology is #1 sector to invest 2 Right to privacy and cybercrime investigation
  • 3. About Ukraine 3 Right to privacy and cybercrime investigation
  • 4. Data protection in Ukraine The Law On Information, 1992 Constitution, 1996 (right to privacy) The Civil Code, 2004 Personal Data Protection Act, 2010 Cybercrimes Investigation Division within Investigation Office, 2012 4 Right to privacy and cybercrime investigation
  • 5. Geo-targeting of cybercrimes in the World 7. Great Britain 2. Russia 3. Netherlands 15% 10% 5% 5% 25% 9% 5% 4. Germany 6. China 1. USA 5. Ukraine 48 million attacks 5 Right to privacy and cybercrime investigation
  • 6. Why Ukraine is 5th? Weak legislation Good technical education Very good corruption 6 Right to privacy and cybercrime investigation
  • 7. Cybercrimes statistics in Ukraine No 5 most popular crime in Ukraine Each 5th company faced cyber attack in 2011 25 % of companies do not have any internal instructions how to deal with cybercrimes Key businesses facing cybercrimes: finance, retail, services 7 Right to privacy and cybercrime investigation
  • 8. About Arzinger Arzinger - Offices 12 8 Right to privacy and cybercrime investigation
  • 9. About Arzinger 9 Right to privacy and cybercrime investigation
  • 10. About Arzinger – expertise in IT Copyright in the Internet (www.ex.ua) Certification of cryptographic software Personal data issues in cross-border IT outsourcing Cybercrimes investigations (legal assistance of the victims, forensic) Data security Licensing of telecommunication services etc. 10 Right to privacy and cybercrime investigation
  • 11. Case 1 1 Infection TargetCo Bank ShellCo2 ShellCo1 2 Wire transfer Bank2 Bank1 3 Cash withdrawal 4 Cash transferring to the beneficiary 11 Right to privacy and cybercrime investigation
  • 12. Features of cybercrimes easy to learn how to commit require few resources relative to the potential damage caused can be committed in a jurisdiction without being physically present in it often not clearly illegal 12 Right to privacy and cybercrime investigation
  • 13. Case 2 Daughter company of leading global provider of digital map data UaCo Unidentified person stolen the database containing location data 13 Right to privacy and cybercrime investigation
  • 14. Balance 14 Right to privacy and cybercrime investigation
  • 15. IP address Case 1 Case 2 Infected the target with more then 30 Stealing of the database is only a viruses copyright infringement (no criminal liability, only civil) Used anonymous proxy servers IP number and personal mail-box are Was using free WiFi in the cafe personal data, which cannot be disclosed beyond the criminal investigation Knowing IP address makes no sense Impossible to get the data 15 Right to privacy and cybercrime investigation
  • 16. Google – User data requests 16 Right to privacy and cybercrime investigation
  • 17. Balance 17 Right to privacy and cybercrime investigation
  • 18. Conclusions Private data is more or less protected in Ukraine Data protection mechanisms make impossible effective legal defence of rights (cybercrimes, copyright infringements, etc.) Tighten rights to privacy (e.g. obligation for the ISP to disclose data about Internet users)? 18 Right to privacy and cybercrime investigation