Cyber Law Update October 2008 - Issue no. 10
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Estonia’s Cyber Security Policy
A year-and-a-half after the coordinated denial-of-service attacks against its government and commercial computer systems, Estonia has released a national cyber security strategy that includes details about the attacks and offers recommendations for preventing attacks in the future and for a global stance toward cyber security. The report identifies four “policy fronts”:
1) application of a graduated system of security measures in Estonia;
2) development of Estonia’s expertise in and high awareness of information security to the highest standard of excellence;
3) development of an appropriate regulatory and legal framework to support the secure and seamless operability of information systems;
4) and promoting international cooperation aimed at strengthening global cyber security.
If you are interested in reading the detail then Estonia’s cyber security policy can be found at the following URL
http://www.mod.gov.ee/static/sisu/files/Estonian_Cyber_Security_Strategy.pdfPublished in OliverHow to prevent cyber terrorism? Polish law needs changes to accommodate prevention of new threats such as cyber terrorism, say MPs belonging to a parliamentary commission following their talks with heads of special services in Poland.
Published in Polish RadioWorld Bank Under Cyber Siege in 'Unprecedented Crisis'
The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.
It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.
In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month.
Published in FoxNews'Satyam banned from World Bank'
NEW YORK: Software major Satyam Computer Services has reportedly been banned from doing any off-shore work with the World Bank after forensic experts and bank investigators discovered that spy software was covertly installed on workstations inside the bank's Washington headquarters, allegedly by one or more contractors from Satyam Computer Services.
According to a FOX News report, apart from Satyam, two IP intrusions have been reported from China, and there have been six intrusions in all.
Investigators say that the software, which operates through a method known as keystroke logging, enabled every character typed on a keyboard to be transmitted to a still-unknown location via the Internet.
Published in IndiatimesSatyam refutes reports on World Bank bar
Hyderabad, Oct. 11 Satyam Computer Services has refuted reports in the international media that World Bank has barred it from doing offshore work. The reports said the bank had taken this decision after noticing reported intrusions into systems. “The story has no validity,” a Satyam spokesperson said.
Incidentally, a five-year contract between the bank and Satyam lapsed in September. The fourth largest IT services provider from India had bagged the contract in 2003 to implement Enterprise Resource Planning solution, extend document management and integrated messaging system.
Quoting from a World Bank statement that was issued to the agencies that ran the story, the spokesperson said here on Saturday that the story was wrong and was riddled with falsehoods and errors. “The story cites misinformation from unattributed sources and leaked e-mails that are taken out of context,” the statement said.
Reported in HinduElectoral Rolls in Delhi Hacked!
It is reported that the Delhi Electoral rolls have been found to have been deliberately tampered with by the officials of an IT Company Webel Technology Limited. This would amount to Section 66 offence under ITA 2000 and the Company and its officials are in serious danger of being hauled up to the Courts and probably to the jails as well. Again this boils down to what "Due Diligence" the Company's top management had taken to ensure against any of its lower rank employees playing mischief. Reported in Naavi.org
Men indicted over cyber attacks
Two Europeans were indicted for allegedly launching internet attacks to shut down two retail websites in the US.
Published in the Press AssociationUS patent office’s notice floors legal outsourcing
NEW DELHI: The US slowdown has kicked off a heated debate in the US legal circles. At the heart of debate is a recent notice by the United States Patent and Trademark Office (USPTO) barring companies who send information overseas regarding inventions and
patents without government clearance. While some believe offshoring is good as it cut costs for legal firms, lawyer groups in the US are against it.
Published in Economic TimesCyber Intelligence-led Security - Reshaping the Role of Today’s CIO
Today, an increasing number of CIOs are embracing a new paradigm in the way they approach enterprise security. Previously, a significant amount of security resources were focused on protecting the perimeter. Now, however, a new, more dynamic and proactive approach is emerging as traditional reactive measures are no longer sufficient.
Published in CIOCyber threats on the rise, FBI official says
Malicious cyber activity has grown more prevalent and sophisticated during the past year and threats come from organized crime groups, terrorist organizations and foreign governments, according to a senior FBI official.
Published in FCWStraightening the Tangle
The growing broadband adoption in India is encouraging, however, it has also opened a plethora of security concerns among enterprises
As the call for high-speed Internet and broadband is making waves among enterprises, hackers and fraudsters are having a ball of a time finding exciting opportunities to access vital documents in bandwidth-intensive unprotected networks of organizations. The network, according to experts is no longer delineating a physical network perimeter, people using the system-employees, customers, and partners constitute the new boundaries. … Experts also believe that India's unsafe security environment could be costing its BPO industry an estimated $500 mn annually.
Published in VoiceNDataOutsourced--And Out Of Control
As the economy sinks and budgets are squeezed, outsourcing looks more and more like a thrifty necessity. But when it comes to the data security of those far-flung offices, businesses may find they get what they pay for.
A study released Tuesday, compiled from surveys of information technology managers and users in 10 countries, reveals an alarming gap between the information-security practices of developed countries and those of emerging markets like China, Brazil and, to a lesser degree, India.
Published in ForbesU.S. IT Security Better Than Rest of the World?
While there are some problems with IT security in the U.S., Americans in general have better security behavior to prevent data loss than other parts of the world. That's a general finding in a new report sponsored by Cisco that asked 2,000 globally dispersed professionals about their views on behaviors that could lead to data leakage.
….So what are some of the better IT behaviors?
One of them is using corporate-owned assets to communicate with personal e-mail. In the U.S., 39 percent of respondents admitted to using their company owned computer for personal e-mail while in Germany the figure was 47 percent, India 58 percent and in China a whopping 61 percent.
Published in Internet news.comCyber Security Study: Many consumers less secure than they think
In our latest report on staying safe in cyberspace,
7 online blunders, the top mistake we warn about is assuming your
security software is protecting you.
Now, a
study just released by the
National Cyber Security Alliance, underscores our advice by suggesting that many online consumers think their computers are more secure than they really are.
Published in Consumer Report ElectronicsAmericans Still Somewhat Befuddled by Cyber Security
Users continue not to install antivirus software, believe they have protections they don't.
Every year there's a kickoff for a campaign on cyber-security awareness in the form of National Cyber Security Awareness Month. The campaign looks to better inform people on the hazards that may await them online. Each year, Symantec and the National Cyber Security Alliance perform some basic assessments of users' internet behaviors and each year they get a disappointing confirmation that many Americans still
just don't get some important concepts cyber security.
Published in DailyTechWarning! You Might Be Fooled Into Clicking This Pop-Up
Have you ever been clicking your way through cyberspace, when suddenly, a very important-looking window pops up? It usually looks like it’s part of Microsoft Windows, and it says something like, “Warning! Your computer is at risk! Click ‘OK’!” Do you click on it? Is your computer really at risk? Is Windows trying to tell you something?
By now, you’ve probably figured out where this is going: that pop-up is a scam, something known as “scareware.”
Published in Privacy CouncilUganda cyber laws going to Parliament
Uganda's draft electronic laws have been approved by Cabinet and are set to be debated before they are passed into law by Parliament.
The Ministry of ICT hopes to enact the draft laws -- the Computer Misuse Bill, Electronic Signatures Bill and Electronic Transactions Bill -- during this financial year, according to ICT Minister Ham Mukasa Mulira.
Published in Network WorldCopyright (New Technologies) Amendment comes into force in New Zeeland
Associate Commerce Minister Judith Tizard has announced that recent amendments to copyright legislation will soon come into force. The amendments update New Zealand's copyright law to reflect current advances in digital technology.
"The Copyright (New Technologies) Amendment Act 2008 will ensure our copyright laws keep up to speed with the dynamic nature of digital technology," Judith Tizard said. Reported in Behive.govt.nz
Spies Launch 'Cyber-Behavior' Investigation
A while back, the Office of the Director of National Intelligence (ODNI) said it wanted to start reviewing wannabe spies' "cyber behavior," before they handed the spooks security clearances. Suspect activities might include "social network usage," "compulsive internet use," "distribution of pirated materials," and "online contact with foreign nationals," the ODNI said. Published in Wired News
Scrabulous makers score a mixed ruling
Rajat and Jayant Agarwalla, the Indian brothers who came up with the Scrabble-style word game for Facebook called Scrabulous, told fans that their country's courts ruled that their game did not violate Mattel Inc.'s copyrights.It did, however, consider the name Scrabulous a trademark violation and ordered the Agarwallas to stop using the word, the brothers said. Published in LA Times
Banks Team Up for Cyber Security Awareness Month to Help Canadians Avoid Online Threats From Social Networking and File Sharing Sites
The Internet has made it easier than ever to bank, shop, communicate with others and find information about almost anything at any time. But as Internet use among Canadians continues to rise, so too does the number of criminals who commit identity theft and fraud using information they've found online. Published in Market Watch
Corporate, Government and Academic Leaders Unite to Fight Cyber Crime, Identity Theft and other Identity Management Challenges
An unprecedented coalition of leading corporate, government and academic institutions today announced the formation of the Center for Applied Identity Management Research (CAIMR). CAIMR is focused on developing research and solutions for society's most daunting identity management challenges such as cyber crime, terrorism, financial crimes, identity theft and fraud, weapons of mass destruction, and narcotics and human trafficking. The Center is the first of its kind to bring cross-disciplinary experts in criminal justice, financial crime, biometrics, cyber crime and cyber defense, data protection, homeland security and national defense to address identity management challenges that impact individuals, public safety, commerce, government programs and national security.
Published in Market WatchCyber Crime Cell arrest one for extortion over web
Chandigarh, October 12 Cyber Crime Investigation Cell of the Chandigarh Police today arrested one Puja Negi, for involvement in an “extortion through the Web” racket. Published in Newsline
IB to go hi-tech, get more manpower to fight terror
NEW DELHI: Intelligence Bureau — which has come under flak for its failure to keep tabs on tech savvy jihadis — is set for major revamp with the government recruiting 6,000 more spies to strengthen its existing cadre of nearly 25,000 personnel. The IB will also get modern gadgets to monitor cyber communication. Published in Times of India
Fed Blotter: New Charges Filed Against Alleged Cyber Peeping Tom
Federal prosecutors are going after a Florida college student who allegedly installed spyware on a woman's laptop to covertly snap nude photos of her through her webcam.
Published in Wired News
Compulsory registration for cyber cafes in MP town
In view of spiralling cyber crimes in the financial capital of Madhya Pradesh, it was made mandatory for the cyber cafe owners to register themselves at the Indore Police's web portal. Published in Central Chronicle
Average privacy policy takes 10 minutes to read, research finds
Website privacy policies take on average 10 minutes to read and sometimes run into thousands of words, researchers have found. While some are short, others would take over half an hour to read, researchers said.
Published in out-law.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PRODUCTS AND SERVICES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email at cyberlawcollege@gmail.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.
It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
New format of e-forms – as and when updated / revised
Efilling of Forms
Annual Return as per Schedule 5
All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
Minutes book with 500+ resolutions in-built plus user editing option
Compliance Certificate
Combined Company Registers
Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
Fixed Asset Registers & Reports
Charges and Notice
Certificate Printing
Director Details Entry
Attachment in PDF format.
For more details of the above software email at digitalsigncert@gmail.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitalsigncert@gmail.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For posting your products and services, please email details at dipak00001@gmail.com with subject line “Product”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JOBS/ FREELANCE MARKETS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Coming soon….
For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW/IS EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Coming soon….
For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Advertise with Cyber Law Update!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”