SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Co-ope at g t a
                       Co-operating with Law
                           Enforcement

                                       Professor Ian Walden
                            Institute of Computer and Communications Law
                            I i        fC           dC      i i      L
                Centre for Commercial Law Studies, Queen Mary, University of London
                                     Of Counsel, Baker & McKenzie




                              Introductory remarks
          edu




                     Law enforcement access
                      – Covert & coercive investigative techniques
  cl@ccls.e




                     Request recipients
                      – Cloud users
                      – Cloud Service providers
                             Contracted parties & infrastructure providers
                             Communication providers
                                              p
icc




                     Questions of vires and regulatory boundaries
                      – Jurisdictional reach
                      – Obligations to assist
                      – Evidential impact




                                                                                      1
Forensic challenges in the Cloud
          edu

                        Multiplicity
  cl@ccls.e

                         – e.g. Data replication for performance, availability,
                           back-up & redundancy
                        Distributed storage
                         – e.g. ‘sharding’ and ‘partitioning’
                        Protected data
icc




                         – e.g. cryptography
                        Identity
                         – Establishing links




                         LEA investigative powers
          edu




                    ‘Exercising a power’
  cl@ccls.e




                     –P
                      Permissible & impermissible conduct
                          i ibl     i     i ibl      d
                             e.g. entrapment
                    Expedited preservation, retention & delivery-up
                     – Differential authorisation procedures
                             Judicial, executive or administrative
                    Issues of legality & enforceability
icc




                     – Obtaining authorisation
                     – Executing the authorisation




                                                                                  2
edu               Jurisdictional reach
                   Within & beyond the territory
  cl@ccls.e

                     – e.g. Rackspace (2004)
                   Service provider & requested data
                     – ‘loss of location’
                           Reassembly as a proxy?
                   Cybercrime Convention (2001)
icc




                     – Art. 19: ‘Possession or control’ (art.19)
                     – Art. 32: open source or lawful and voluntary consent
                       of the person who has lawful authority to disclose
                           Contractual provisions




                     International co-operation
                                   co-
          edu




                   Mutual legal assistance
  cl@ccls.e




                    – Harmonisation
                    – Or mutual recognition
                           EU: EEW and the EIO
                   Informal co-operation with foreign LEA
                    – Proactive disclosure & 24/7 networks
icc




                   Direct liaison with foreign service providers
                    – Council of Europe Guidelines (2008)
                           e.g. Google Transparency Report
                   Engage directly with the material sought




                                                                              3
edu       Regulating service providers

                       Regulatory boundaries
  cl@ccls.e

                         – ‘electronic communication services’ & ‘information
                           society services’
                                  Google, Skype, Facetime.....?
                                  From SaaS to CaaS
                       Regulatory consequences
                         – Directive 02/58/EC art. 5(1) & art 15(1)
                                     02/58/EC, art        art.
icc




                                  Existing capability or build obligation?
                         – Directive 06/24/EC
                                  Providers of ‘electronic communication services’




                          Cloud-
                          Cloud-derived evidence
          edu




                   Admissibility
                        – Statutory rules & judicial discretion
  cl@ccls.e




                              e.g. Fair trial considerations (ECHR, art. 6)
                              Impact of lawfulness of obtaining?
                              Evidence gathered under MLA
                   Evidential weight
                        – Provenance issues with remote data retrieval
icc




                              authenticity, integrity & accountability




                                                                                      4
edu           Concluding remarks

                   Exceeding powers in application or reach
  cl@ccls.e


                    – Surrendering sovereignty
                    – Regulatory uncertainties
                   From formality to informality
                    – Issues of accountability
                    – Building a ‘culture of co-operation’!
icc




                          e.g. Amazon & WikiLeaks
                   Evidential consequences




                                                               5

Más contenido relacionado

La actualidad más candente

Administrative and semantic cooperation: The role of intelligent document
Administrative and semantic cooperation: The role of intelligent documentAdministrative and semantic cooperation: The role of intelligent document
Administrative and semantic cooperation: The role of intelligent documentRomeo Pruno
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
Document Exchange Methodology for Collaborative Work in eGovernment
Document Exchange Methodologyfor Collaborative Work ineGovernmentDocument Exchange Methodologyfor Collaborative Work ineGovernment
Document Exchange Methodology for Collaborative Work in eGovernmentRomeo Pruno
 
Ian walden - data protection in cloud computing
Ian walden - data protection in cloud computingIan walden - data protection in cloud computing
Ian walden - data protection in cloud computingoiisdp
 
meetup 11102018 - Data, Blockchain en de rol van de overheid
meetup 11102018 - Data, Blockchain en de rol van de overheidmeetup 11102018 - Data, Blockchain en de rol van de overheid
meetup 11102018 - Data, Blockchain en de rol van de overheidVNG Realisatie
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Servicesubtitle
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 

La actualidad más candente (8)

E lawyer - 2004
E lawyer - 2004E lawyer - 2004
E lawyer - 2004
 
Administrative and semantic cooperation: The role of intelligent document
Administrative and semantic cooperation: The role of intelligent documentAdministrative and semantic cooperation: The role of intelligent document
Administrative and semantic cooperation: The role of intelligent document
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Document Exchange Methodology for Collaborative Work in eGovernment
Document Exchange Methodologyfor Collaborative Work ineGovernmentDocument Exchange Methodologyfor Collaborative Work ineGovernment
Document Exchange Methodology for Collaborative Work in eGovernment
 
Ian walden - data protection in cloud computing
Ian walden - data protection in cloud computingIan walden - data protection in cloud computing
Ian walden - data protection in cloud computing
 
meetup 11102018 - Data, Blockchain en de rol van de overheid
meetup 11102018 - Data, Blockchain en de rol van de overheidmeetup 11102018 - Data, Blockchain en de rol van de overheid
meetup 11102018 - Data, Blockchain en de rol van de overheid
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Service
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 

Destacado

Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloudCloud Legal Project
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...Cloud Legal Project
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud Legal Project
 
Cloud computing - competition law issues
Cloud computing  - competition law issuesCloud computing  - competition law issues
Cloud computing - competition law issuesCloud Legal Project
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 

Destacado (7)

Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risks
 
Cloud computing - competition law issues
Cloud computing  - competition law issuesCloud computing  - competition law issues
Cloud computing - competition law issues
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 

Similar a Cloud computing - cooperating with law enforcement

Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryDan Michaluk
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Tom Kulik
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfBilal Ahmad
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Tyrone Grandison
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final PresentationKartik Uppal
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesKaitlin Thaney
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigmpparam02
 
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...Vytautas Čyras
 
ReinventLaw Silicon Valley 2013
ReinventLaw Silicon Valley 2013ReinventLaw Silicon Valley 2013
ReinventLaw Silicon Valley 2013Sean McGrath
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 
Positive intellectual rights and information exchange
Positive intellectual rights and information exchangePositive intellectual rights and information exchange
Positive intellectual rights and information exchangehuizheng8821
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
 
Audit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of SecurityAudit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of SecurityNbukhari
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 

Similar a Cloud computing - cooperating with law enforcement (20)

Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
Forensic data investigations in China
Forensic data investigations in ChinaForensic data investigations in China
Forensic data investigations in China
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social Issues
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
 
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
(DAMPS 2013) E-services via the Internet and compliance with the law. File 20...
 
ReinventLaw Silicon Valley 2013
ReinventLaw Silicon Valley 2013ReinventLaw Silicon Valley 2013
ReinventLaw Silicon Valley 2013
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Positive intellectual rights and information exchange
Positive intellectual rights and information exchangePositive intellectual rights and information exchange
Positive intellectual rights and information exchange
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
 
Audit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of SecurityAudit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of Security
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
Mod1_cyber-law.ppt
Mod1_cyber-law.pptMod1_cyber-law.ppt
Mod1_cyber-law.ppt
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Cloud computing - cooperating with law enforcement

  • 1. Co-ope at g t a Co-operating with Law Enforcement Professor Ian Walden Institute of Computer and Communications Law I i fC dC i i L Centre for Commercial Law Studies, Queen Mary, University of London Of Counsel, Baker & McKenzie Introductory remarks edu  Law enforcement access – Covert & coercive investigative techniques cl@ccls.e  Request recipients – Cloud users – Cloud Service providers  Contracted parties & infrastructure providers  Communication providers p icc  Questions of vires and regulatory boundaries – Jurisdictional reach – Obligations to assist – Evidential impact 1
  • 2. Forensic challenges in the Cloud edu  Multiplicity cl@ccls.e – e.g. Data replication for performance, availability, back-up & redundancy  Distributed storage – e.g. ‘sharding’ and ‘partitioning’  Protected data icc – e.g. cryptography  Identity – Establishing links LEA investigative powers edu  ‘Exercising a power’ cl@ccls.e –P Permissible & impermissible conduct i ibl i i ibl d  e.g. entrapment  Expedited preservation, retention & delivery-up – Differential authorisation procedures  Judicial, executive or administrative  Issues of legality & enforceability icc – Obtaining authorisation – Executing the authorisation 2
  • 3. edu Jurisdictional reach  Within & beyond the territory cl@ccls.e – e.g. Rackspace (2004)  Service provider & requested data – ‘loss of location’  Reassembly as a proxy?  Cybercrime Convention (2001) icc – Art. 19: ‘Possession or control’ (art.19) – Art. 32: open source or lawful and voluntary consent of the person who has lawful authority to disclose  Contractual provisions International co-operation co- edu  Mutual legal assistance cl@ccls.e – Harmonisation – Or mutual recognition  EU: EEW and the EIO  Informal co-operation with foreign LEA – Proactive disclosure & 24/7 networks icc  Direct liaison with foreign service providers – Council of Europe Guidelines (2008)  e.g. Google Transparency Report  Engage directly with the material sought 3
  • 4. edu Regulating service providers  Regulatory boundaries cl@ccls.e – ‘electronic communication services’ & ‘information society services’  Google, Skype, Facetime.....?  From SaaS to CaaS  Regulatory consequences – Directive 02/58/EC art. 5(1) & art 15(1) 02/58/EC, art art. icc  Existing capability or build obligation? – Directive 06/24/EC  Providers of ‘electronic communication services’ Cloud- Cloud-derived evidence edu  Admissibility – Statutory rules & judicial discretion cl@ccls.e  e.g. Fair trial considerations (ECHR, art. 6)  Impact of lawfulness of obtaining?  Evidence gathered under MLA  Evidential weight – Provenance issues with remote data retrieval icc  authenticity, integrity & accountability 4
  • 5. edu Concluding remarks  Exceeding powers in application or reach cl@ccls.e – Surrendering sovereignty – Regulatory uncertainties  From formality to informality – Issues of accountability – Building a ‘culture of co-operation’! icc  e.g. Amazon & WikiLeaks  Evidential consequences 5