Feeds

Senate ratifies Cybercrime treaty

'Symbolic gesture'

Security for virtualized datacentres

The US Senate ratified the Convention on Cybercrime on Thursday, the first international treaty on computer-related crime and the gathering of electronic evidence.

US Senate Foreign Relations Committee chairman Dick Lugar said the move will enhance America's ability to join with other countries in fighting computer crime internationally.

"The United States was a leading participant in the negotiation of the convention and expects it to have a significant law enforcement impact, particularly in terms of our ability to obtain assistance from other countries in the investigation and prosecution of trans-border computer-related crimes," he said. "In particular, it will enhance our ability to cooperate with foreign governments in fighting terrorism, computer hacking, money laundering, and child pornography, among other crimes."

The convention, which also deals with copyright infringement, lists a number of substantive crimes that parties agree to prohibit under their domestic law, requires parties to adopt improved procedures for investigating computer crimes and provides for international cooperation in the investigation of such crimes. American law is already in compliance with the convention, so no implementing legislation is required, making ratification a largely symbolic gesture.

The convention was signed in November 2001 and came into force in July 2004. The UK has signed the convention but has yet to formally ratify it. While ratification requires implementation of the convention's principles into national laws, most of them are already in the UK's laws.

An Additional Protocol against racism and xenophobic material on the internet is not likely to be signed by the US because it is inconsistent with the country's Constitutional right to free speech. Canada became the 28th state and the first non-European country to sign the Additional Protocol last July.

See:

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Beginner's guide to SSL certificates

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
HBO shocks US pay TV world: We're down with OTT. Netflix says, 'Gee'
This affects every broadcaster, every cable guy
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
French 'terror law' declares WAR on the INTERNET itself, say digi-rights folks
Liberté, Égalité, Fraternité: Two out of three ain't bad
SCREW YOU, EU: BBC rolls out Right To Remember as Google deletes links
Not even Google can withstand the power of Auntie
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.