<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Inter Press ServiceConvention on Cybercrime Topics</title>
	<atom:link href="https://www.ipsnews.net/topics/convention-on-cybercrime/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ipsnews.net/topics/convention-on-cybercrime/</link>
	<description>News and Views from the Global South</description>
	<lastBuildDate>Tue, 21 Apr 2026 18:17:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
		<item>
		<title>Peru’s New Cybercrime Law Undermines Transparency Legislation</title>
		<link>https://www.ipsnews.net/2013/11/perus-new-cybercrime-law-undermines-transparency-legislation/</link>
		<comments>https://www.ipsnews.net/2013/11/perus-new-cybercrime-law-undermines-transparency-legislation/#respond</comments>
		<pubDate>Wed, 27 Nov 2013 09:41:49 +0000</pubDate>
		<dc:creator>Milagros Salazar</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Convention on Cybercrime]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Hiperderecho]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Peru]]></category>
		<category><![CDATA[Press and Society Institute (IPYS)]]></category>
		<category><![CDATA[transparency]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=129089</guid>
		<description><![CDATA[A new law against cybercrime that restricts the use of data and freedom of information in Peru clashes with earlier legislation, on transparency, which represented a major stride forward in citizen rights. The advances made in the law on transparency and access to public information have been undermined by the hastily passed law on computer [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="168" src="https://www.ipsnews.net/Library/2013/11/Peru-small-300x168.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://www.ipsnews.net/Library/2013/11/Peru-small-300x168.jpg 300w, https://www.ipsnews.net/Library/2013/11/Peru-small.jpg 629w" sizes="(max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Critics say Peru's new law on cybercrime is vaguely worded and threatens access to information. Credit: Public domain
</p></font></p><p>By Milagros Salazar<br />LIMA, Nov 27 2013 (IPS) </p><p>A new law against cybercrime that restricts the use of data and freedom of information in Peru clashes with earlier legislation, on transparency, which represented a major stride forward in citizen rights.</p>
<p><span id="more-129089"></span>The advances made in the law on transparency and access to public information have been undermined by the hastily passed law on computer crimes, which restricts and penalises the use of online databases, according to experts consulted by IPS.</p>
<p>The new law was put into effect to crack down on cybercrimes, including sexual harassment of minors. But civil society organisations complain that elements attacking the right to information were incorporated without debate or public input.</p>
<p>The Defensoría del Pueblo or ombudsman’s office says the transparency law, which entered into force in 2002, has a few shortcomings, but is important because of the creation and use of government databases &#8211; which would be hindered, however, by the law on cybercrime.</p>
<p>The transparency law was passed with the aim of making government more transparent, to comply with the 1993 constitution, which guaranteed the right of people to request and obtain public information, and established the right of habeas data, under which any government official or civil servant who denies that right can be sued.</p>
<p>Since then, the Defensoría del Pueblo has received 6,714 complaints about requests for public information that did not receive a satisfactory response from the authorities, according to a report to be published in the first week of December, to which IPS had access.</p>
<p>Based on those complaints, the assistant ombudsman on constitutional affairs, Fernando Castañeda, told IPS that his office identified and interviewed 122 public employees responsible for turning over the information, to find out why the requests had not been met.</p>
<p>The main conclusion reached by his office was that an independent authority was needed to monitor and oversee responses to information requests, because civil servants are limited by the orders of their superiors, and in some cases have been punished when they provide information to members of the public.</p>
<p>And things do not get any better when citizens take legal action to complain about the lack of response to their requests for information, especially in rural areas.</p>
<p>Between January 2007 and March 2013, 841 habeas data actions were handled in the justice system, where cases can take up to a year in the first instance court, another year in the second instance court and two more in the Constitutional Court, Castañeda pointed out.</p>
<p>In other words, a four-year journey to try to obtain public information that has been denied.</p>
<p>The official said that the most significant aspect of the law was the creation of tools to facilitate citizens’ access to information, with websites and open access to databases, under the concept of open data.</p>
<p>However, that access will be directly restricted by the new law on computer crimes, which was given fast-track treatment in Congress and signed into law a few weeks later, on Oct. 22, by President Ollanta Humala.</p>
<p>Protests by experts and civil society groups forced Justice Minister Daniel Figallo to state on Nov. 13 that he would study proposed reforms to the law. “We will revise some articles of the law,” he said.</p>
<p>But Figallo defended the legislation, saying the aim was to fight data interference or interception rather than the dissemination of information. His ministry argues that Peru is thus accepting the guidelines of the Council of Europe&#8217;s Convention on Cybercrime, the first international treaty of its kind, which since 2001 has provided global guidelines for the adoption of laws against computer crimes.</p>
<p>The president of the congressional justice commission, Juan Carlos Eguren, also said he was open to suggestions.</p>
<p>The law creates a three- to six-year sentence for people found guilty of capturing computer information from a public institution, to find out, for example, what is spent on social programmes and to complement that with the introduction of new data or alteration to analyse the information, lawyer Roberto Pereira of the <a href="http://www.ipys.org/" target="_blank">Press and Society Institute (IPYS) </a>told IPS.</p>
<p>That is based on article three of the law, which penalises those who use computer technologies to “introduce, delete, deteriorate, alter or suppress data, or render data inaccessible.”</p>
<p>The law also establishes a three- to five-year sentence for creating a database on an identified or identifiable subject to provide information on any aspect of his or her personal, family, financial or labour life, whether or not it causes harm.</p>
<p>A common practice by journalists is to create databases on companies that are subcontractors for the state, in order to monitor public spending. But under the new law, doing that would automatically make them “cyber criminals,” Pereira explained.</p>
<p>The IPYS stated in a communiqué that the law poses “a serious threat to the freedom of journalistic information, and to research and investigation in general.” The majority of the local media, regardless of their ideological bent, agree with that criticism.</p>
<p>The law on cybercrime could “end up criminalising legal behaviour in cyberspace,” said Pereira.</p>
<p>It also creates “an unacceptable framework of discretionality in its application,” because of the broad, ambiguous criteria it contains, and ends up undermining other basic rights, he said.</p>
<p>There has been a great deal of speculation in Peru on what lay behind the passage of the controversial law.</p>
<p>Pereira cited three explanations: the legislators’ ignorance about cyberspace; the interest on the part of some public figures in criminalising digital freedom and thus blocking investigations of corruption; “and the genuine interest of sectors of the government in improving penal legislation on cybercrime.”</p>
<p>The non-governmental organisation <a href="http://www.hiperderecho.org/" target="_blank">Hiperderecho</a>, which defends digital rights, noted in a communiqué that Congress passed the law “in less than five hours, with their backs turned to the public.”</p>
<p>The organisation criticised the fact that on Sept. 12, Congress suddenly began to debate a bill that had just been introduced by the government, without incorporating in the discussion a long-debated justice commission ruling on another cybercrime bill.</p>
<p>The executive branch presented its bill after a telephone conversation by Defence Minister Pedro Cateriano was made public, and after progress was made towards a common regional code against cybercrime during a technical level meeting of experts of the Ibero-American Conference of Justice Ministers (COMJIB), held in Lima in June.</p>
<p>Miguel Morachimo, a representative of Hiperderecho, admitted to IPS that it was reasonable for the government to fight cybercrime. But he said that when the bill was debated in Congress, “it was completely overhauled.”</p>
<p>In his view, the government was pressured by COMJIB and the banking association &#8211; which is worried about card cloning &#8211; and ended up acting in haste as a result.</p>
<p>The Defensoría del Pueblo’s office on constitutional affairs has not yet taken a stance on the details of the new law, said Castañeda. But it did acknowledge that it runs counter to some objectives of the transparency law.</p>
<p>Hiperderecho has sent suggestions to Congress for improving the law on cybercrime. Meanwhile, what one law defends, the other blocks.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2011/08/swaziland-impossible-for-children-to-access-public-information/" >SWAZILAND: Impossible for Children to Access Public Information</a></li>
<li><a href="http://www.ipsnews.net/2010/09/mexico-freedom-of-information-laws-a-model-not-so-the-practice/" >MEXICO: Freedom of Information Laws a Model; Not So the Practice</a></li>
<li><a href="http://www.ipsnews.net/2009/04/chile-transparency-law-opens-access-to-information/" >CHILE: Transparency Law Opens Access to Information</a></li>
<li><a href="http://www.ipsnews.net/2008/07/honduras-the-data-you-seek-will-be-available-in-2018/" >HONDURAS: The Data You Seek Will Be Available – in 2018</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/11/perus-new-cybercrime-law-undermines-transparency-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cybercrime Treaty Could Be Used to Go After Cyberespionage</title>
		<link>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/</link>
		<comments>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/#respond</comments>
		<pubDate>Thu, 03 Oct 2013 13:48:19 +0000</pubDate>
		<dc:creator>Emilio Godoy</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Globalisation]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Budapest Convention]]></category>
		<category><![CDATA[Convention on Cybercrime]]></category>
		<category><![CDATA[Council of Europe]]></category>
		<category><![CDATA[Cyber-espionage]]></category>
		<category><![CDATA[Cybercrime Convention Committee]]></category>
		<category><![CDATA[Cybercrimes]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[WikiLeaks]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=127912</guid>
		<description><![CDATA[Governments of countries that engage in large-scale electronic espionage, like the United States, and companies that develop spying software could theoretically face legal action for violating the Convention on Cybercrime. The Convention, adopted in Budapest in 2001 and in force since 2004, is the first international treaty seeking to address Internet and computer crime, and [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="225" src="https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-300x225.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-300x225.jpg 300w, https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small.jpg 629w, https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-200x149.jpg 200w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">New technologies make it easier than ever for spy agencies to invade privacy. In the photo, students at the Campus Tecnológico in Guatemala. Credit: Danilo Valladares/IPS</p></font></p><p>By Emilio Godoy<br />MEXICO CITY, Oct 3 2013 (IPS) </p><p>Governments of countries that engage in large-scale electronic espionage, like the United States, and companies that develop spying software could theoretically face legal action for violating the Convention on Cybercrime.</p>
<p><span id="more-127912"></span>The Convention, adopted in Budapest in 2001 and in force since 2004, is the first international treaty seeking to address Internet and computer crime, and has a provision that aims to protect the right of privacy of data communication from unauthorised interception.</p>
<p>The treaty, also known as the <a href="http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&amp;CM=&amp;DF=&amp;CL=ENG" target="_blank">Budapest Convention</a>, requires member states to criminalise four kinds of conduct against confidentiality or the integrity and availability of computer systems or data: illegal access, illegal interception, data and system interference, and misuse of devices for the purpose of committing these offences.</p>
<p>These are precisely the practices engaged in by the U.S., British and other governments, according to <a href="https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" target="_blank">documents leaked</a> to the media in June by former U.S. <a href="https://www.ipsnews.net/topics/nsa/" target="_blank">National Security Agency</a> (NSA) contractor <a href="https://www.ipsnews.net/topics/edward-snowden/" target="_blank">Edward Snowden</a>.</p>
<p>Cyber surveillance “violates the Convention, and perpetrators can be sued” under the Cybercrime Convention Committee, Lorena Pichardo, a law school professor at the National Autonomous University of Mexico (UNAM), told IPS.</p>
<p>The Convention was adopted by the Council of Europe, which was set up to promote democracy and protect human rights and the rule of law in Europe. But the treaty has also been signed by non-member states, like Canada, the United States and Japan. The United States ratified it in 2006.</p>
<p>So far, 51 states have signed the Convention and 40 have ratified it.</p>
<p>It is possible to file a complaint with the Cybercrime Convention Committee, but any action taken is based on the national laws that its members must approve in order to live up to the Convention. Complainants can also turn to the European Court of Human Rights.</p>
<p>A complaint “can be successful, but it would be partial, because among the countries that are party to the Convention, there are interests at stake. The law can be bent and accommodated to national legislation,” Enoc Gutiérrez, a professor of information and communications technology (ICT) at the Autonomous University of the State of Mexico, told IPS.</p>
<p>In a <a href="http://www.uaemex.mx/Evento/2012/UAPCI/docs/mesa_de_trabajo/Ing_Enoc_Gutierrez_Pallares3.pdf" target="_blank">2012 study </a>that analysed Mexican, U.S. and EU laws, Gutiérrez and his colleagues Lucio Ordóñez and Víctor Saucedo argued the need for special legislation and a special court on computer crime.</p>
<p>The problem is that the Convention does not take into account that cybercrimes can include espionage by a state. The general impression is that when a government seeks cross-border access to computer data, it is doing so to investigate crimes and pursue criminals.</p>
<p>Article 32b of the Budapest Convention introduced an exception to the principle of territorial sovereignty:</p>
<p>“A Party may, without the authorisation of another Party [..] access or receive, through a computer system in its territory, stored computer data located in another Party, if the Party obtains the lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system.”</p>
<p>The Cybercrimes Convention Committee held its <a href="http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/T-CY/TCY_Meetings/TCY_Meetings_2013_9.asp" target="_blank">ninth full session</a> Jun. 4-5 – one day before the Guardian and the Washington Post published the first leaks by Snowden. In the meeting, the Committee did not debate anything related to cyber espionage.</p>
<p>But in a<a href="http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY2012/TCY_2012_3_transborder_rep_V31public_7Dec12.pdf" target="_blank"> recent report</a>, the Committee’s ad hoc sub-group on jurisdiction and transborder access to data said that new developments, such as cloud storage of data and the activities of law enforcement authorities, made it necessary to revise the reach of article 32b.</p>
<p>“Current practices regarding direct law enforcement access to data as well as access via Internet service providers and other private sector entities…illustrate that law enforcement authorities of many States access data stored on computers in other States in order to secure electronic evidence. Such practices frequently go beyond the limited possibilities foreseen in Article 32b and the Budapest Convention in general,” the sub-group says.</p>
<p>This poses risks to human rights, they warn.</p>
<p>“Personal data are increasingly stored by private entities, including cloud service providers. Access by law enforcement to, or the disclosure to law enforcement authorities of personal data stored in a foreign jurisdiction by such private sector entities may violate data protection regulations,” they add.</p>
<p>The NSA and other intelligence agencies use software that enables them to intercept private communications around the world.</p>
<p>Mexico, for example, acquired software from U.S. and European companies to monitor telephone calls, email, chats, Internet browsing histories and social networks.</p>
<p>Of the at least 95 corporations that develop and distribute this kind of software worldwide, 32 are in the U.S., 17 are British and the rest come from some two dozen other nations, according to confidential documents from intelligence contractors <a href="http://wikileaks.org/the-spyfiles.html" target="_blank">published by Wikileaks</a> in December 2011.</p>
<p>The list mentions 78 different products, including Trojan viruses, audio transmitters, audio and video recorders, and tracking tools.</p>
<p>“Any technology with such a huge potential for the violation of fundamental rights should be the focus of the highest level of legal protection, especially if it’s in the hands of private corporations that operate according to purely business objectives,” two officials from Spain’s Interior Ministry, Miguel Ángel Castellano and Pedro David Santamaría, wrote in a December 2012 article, <a href="http://catedraseguridad.usal.es/sites/default/files/Cuaderno_09_Control%20del%20Ciberespacio%20final.pdf" target="_blank">“El control del ciberespacio por parte de gobiernos y empresas”</a> (“Control of cyberspace by governments and companies”).</p>
<p>Pichardo, the law professor, said national legislation tends to take precedence in cases that invoke international principles.</p>
<p>“If we already have a charge of espionage, the serious problem of asking for data from other states is redundant,” she said.</p>
<p>Gutiérrez believes the existing international legal frameworks do not protect citizens, and specific laws are necessary. His studies focus on how to move from ICTs to technologies of learning and communication.</p>
<p>“When citizens are active in a social network like Facebook, by the simple act of accepting the terms of the contract they are saying their information can be shared with banks or government institutions,” he said. “They steal information from us and we don’t even realise it.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/09/when-mexico-let-big-brother-spy/" >When Mexico Let Big Brother Spy</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
<li><a href="http://www.ipsnews.net/2013/09/the-oil-is-ours-but-its-secrets-are-the-nsas/" >“The Oil Is Ours” – But Its Secrets Are the NSA’s</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>

</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
