Panorama of legal issues concerning IT forensic investigations

29
A panorama of legal issues concerning IT forensic investigations ACFE Annual Meeting | Brussels | 5 February 2014 Johan Vandendriessche Partner (crosslaw) | www.crosslaw.be |

description

A high level overview of legal issues in relation to IT forensic investigations, focusing on corporate espionage as a red line.

Transcript of Panorama of legal issues concerning IT forensic investigations

Page 1: Panorama of legal issues concerning IT forensic investigations

A panorama of legal issues concerning IT

forensic investigations

ACFE Annual Meeting | Brussels | 5 February 2014

Johan Vandendriessche

Partner (crosslaw)

| www.crosslaw.be |

Page 2: Panorama of legal issues concerning IT forensic investigations

GENERAL

2

Page 3: Panorama of legal issues concerning IT forensic investigations

Fraud – prevention, detection

and investigation

Fraud

• Deliberately practiced deception to obtain or secure an unlawful gain

• Civil wrong (“tortuous liability” or “contractual liability”)

• Criminal offence

• Fraud takes many forms

• ‘Unlawful gain’ can be very varied

Fraud prevention

• Technical and organizational measures

• Security measures

• Policies

• Contractual arrangements

Page 4: Panorama of legal issues concerning IT forensic investigations

Fraud – prevention, detection

and investigation

Fraud detection

• Organized detection

• Technical measures (e.g. camera surveillance, data

mining, …)

• Organizational measures

• Incidental detection

Fraud investigation

• Informal private hearing

• Private detective

• IT forensic investigation

• Criminal investigation4

Page 5: Panorama of legal issues concerning IT forensic investigations

Data Protection

Limitations in relation to the processing of

personal data

• Personal data: “any information in relation to an

identified or identifiable physical person […]”

• Very large legal interpretation to the concept of

personal data

• Not necessarily sensitive information (although stricter

rules apply to special categories of personal data)

• Processing: “any operation or set of operations which

is performed upon personal data […]”

5

Page 6: Panorama of legal issues concerning IT forensic investigations

Data Protection

Processing of personal data is prohibited, unless

allowed by the Data Protection Law

The data processing must comply with specific

principles

• Proportionality

• Purpose limitation

• Limited in time

• (Individual and collective) Transparency

• Data quality

• Data security

• (Individual and collective) Enforcement measures

6

Page 7: Panorama of legal issues concerning IT forensic investigations

Data Protection

Specific issues in relation to fraud prevention and detection• Employee surveillance

• Electronic Communication (CBA No. 81)

• Workplace Camera Surveillance (CBA No. 68)

• Camera Surveillance (security cameras)

• Whistle blowing policies

• Blacklists

• Access control / identity control (ID card related issues)

• Biometrical data (e.g. identification and access restrictions)

• Screening / background checks (e.g. “certificate of good behaviour”)

• Archiving

• Data mining

Impact on evidence value in case of investigations

7

Page 8: Panorama of legal issues concerning IT forensic investigations

PRACTICAL APPROACH

8

Page 9: Panorama of legal issues concerning IT forensic investigations

An example

Corporate espionage

• Internal vs external

• Employee

• Self-employed

• Third party

• Purpose

• Competing activity

• Other

• Object

• Corporate know-how and IP

• Client list / supplier list

• Confidential Information9

Page 10: Panorama of legal issues concerning IT forensic investigations

An example

Infringer

• Employee / Consultant

Nature of the wrong

• Civil / contractual

• Criminal

Equipment

• Laptop owned by employer/client

• Laptop owned by employee/consultant

10

Page 11: Panorama of legal issues concerning IT forensic investigations

Strategy

Options

• Internal investigation

• Forensic IT investigation on IT equipment

• External investigation

• Criminal complaint (?)

• Court proceedings

Sequestration (“sekwester” / “séquestre”)

Private search (“beslag inzake namaak” / “saisie en

contrefaçon”)

Court order to provide evidence

• Define actions (forensic or otherwise)

11

Page 12: Panorama of legal issues concerning IT forensic investigations

LEGAL ISSUES

12

Page 13: Panorama of legal issues concerning IT forensic investigations

Overview

Forensic IT investigation

• Capacity of the investigator

• Access to the IT equipment

• Company owned

• Third party owned

• Access to the data contained therein

• privacy issues

13

Page 14: Panorama of legal issues concerning IT forensic investigations

Cybercrime

Criminal acts posing a threat against the

confidentiality, the integrity and the availability of IT

systems and data

• Hacking

• Computer sabotage

Investigation powers

• (Network search)

• (IT system and data seizure)

• Cooperation duty of IT experts

Page 15: Panorama of legal issues concerning IT forensic investigations

Hacking

Hacking: “the unauthorized intrusion in or

maintenance of access to an IT system” (article

550bis Criminal Code)• Internal hacking

• Person with access rights that exceeds such rights

• With a fraudulent purpose or with the purpose to cause damage

• External hacking

• Person without access rights

• Knowingly

There is no requirement of breach of security

measures

Organizing hacking or using data that was obtained

through hacking are also criminal offences15

Page 16: Panorama of legal issues concerning IT forensic investigations

Hacking

Sanction (also applicable in case of attempt to hack)• Internal hacking

• Fines: 26 to 25.000 EUR (x6); and/or

• Prison sentence: 3 months up to 1 year (doubled in case of intent to fraud)

• External hacking

• Fines: 26 to 25.000 EUR (x6); and/or

• Prison sentence: 6 months up to 2 years

Criminal sanctions are increased in case of:• Copying any data on the IT system

• Use of the IT system or use thereof to hack another IT system

• Damage to the IT system or its data or any third-party IT system or data

16

Page 17: Panorama of legal issues concerning IT forensic investigations

Computer sabotage

Computer sabotage: “the direct or indirect insertion, modification or erasure of information in an IT system or any other change to the normal use of information in an IT system” (article 550ter Criminal Code)• Virus, worm, or any other malicious code

• Unauthorized time-locks or other blocking mechanisms

Developing, distributing or commercializing malicious code or tools to commit computer sabotage is a criminal offence

17

Page 18: Panorama of legal issues concerning IT forensic investigations

Computer sabotage

Sanction (also applicable in case of attempted sabotage):• Fine: 26 to 25.000 EUR (x6); and/or

• Prison sentence: 6 months up to 3 years (increased in case of fraudulent intent or intention to cause damage)

Criminal sanctions are increased in case of:• Causing damage to data in any IT system as a result of computer

sabotage

• Interfering with the proper functioning of any IT system as a result of computer sabotage

Sanctions are doubled in some cases of cybercrime recidivism

18

Page 19: Panorama of legal issues concerning IT forensic investigations

Privacy

What is privacy?

Various sources

• European Convention on Human Rights

• Treaty on the Functioning of the European Union

(TFEU)

• National (constitutional) legislation

Principle of privacy at work has been confirmed by

ECHR and Article 29 Working Party

19

Page 20: Panorama of legal issues concerning IT forensic investigations

Secrecy of letters

Secrecy of letters

• Article 29 of the Belgian Constitution

Drafts of outgoing letters

• Electronic documents

• Not applicable

Copies of incoming letters

Interception of incoming letters

• Address

• Mentions

20

Page 21: Panorama of legal issues concerning IT forensic investigations

Secrecy of electronic

communication

Electronic communication is protected

• Interception of electronic communication

• Art. 314bis of the Criminal Code

• Access to electronic communication

• Art. 124-125 of the Act of 13 June 2005

Specific problem for investigation of e-mail and IM

21

Page 22: Panorama of legal issues concerning IT forensic investigations

Secrecy of electronic

communication

General interdiction to:• Consult any electronic communication

• Identify participants to such electronic communication

• To process in any manner such electronic communication

UNLESS: if consent is obtained from all participants

Specific exceptions exist (only business relevant exceptions are mentioned):• If allowed or imposed by law

• With the sole purpose of ensuring the proper functioning of the network or the proper performance of the communication service

• For offering a service that consists of preventing the receipt of unsolicited electronic communication, provided consent has been obtained for the recipient

No distinction is made between private and professional communication!

22

Page 23: Panorama of legal issues concerning IT forensic investigations

Secrecy of electronic

communication

Monitoring of any form of electronic communication• Use of e-mail

• Use of Internet

CBA No. 81 allows a limited degree of monitoring• Surveillance is possible for limited purposes

• The prevention of illegal acts, slander and violation of decency

• The protection of the economic, trade and financial interests of the company

• The protection of the security and proper functioning of the company’s IT system

• The compliance with company policies in relation to online technologies

• Procedural requirements

• Collective information

• Individual information

• Sanctions?

23

Page 24: Panorama of legal issues concerning IT forensic investigations

EVIDENCE LAW

24

Page 25: Panorama of legal issues concerning IT forensic investigations

Evidence Law

Admissible

• Type of evidence (‘matters of fact’ vs ‘legal acts’)

• Lawful

• Illegal evidence

• Illegally obtained evidence

• Probatory value (‘credibility’)

• Weight carried by the submitted evidence

• Influenced by the reliability

Gathering process of digital evidence

Inherent reliability (?)

Page 26: Panorama of legal issues concerning IT forensic investigations

Evidence Law

“Antigoon” case law

• Illegally obtained evidence

• Evidence is no longer automatically discarded

Evidence is retained, except:

• Nullity is legally imposed sanction

• Unfair trial

• Impact on reliability

Small note: “Antigoon” case law is relatively new

and still evolving

26

Page 27: Panorama of legal issues concerning IT forensic investigations

Evidence law: lessons learnt

Problems with electronic evidence

• Rules of evidence strongly favour “paper evidence”

• Courts may be reluctant in the face of new

technologies

• Case law usually dismisses electronic evidence at the

slightest indication of the possibility of fraud /

tampered evidence

General rules

• ensure the accountability and integrity of any

electronic evidence at all times

• Implement procedures and policies / provide evidence

that these policies are regularly verified or audited27

Page 28: Panorama of legal issues concerning IT forensic investigations

Evidence Law: lessons learnt

Practical approach in Belgium

• Ensure that the evidence collection is organized in a

manner guaranteeing evidence integrity

• Assistance of a court appointed expert (feasible?)

• Assistance of a bailiff

• Assistance of a unilaterally appointed expert

• Assistance of the Belgian Federal Computer Crime Unit

(FCCU)

• Ensure that the evidence is stored in a secure

manner

Court proceedings are likely to include a court

expertise

28

Page 29: Panorama of legal issues concerning IT forensic investigations

QUESTIONS?

Thank you for your attention.

29