You are on page 1of 1

Georgetown Law Library / Guides

/ Foreign & International Law


/ International and Foreign Cyberspace Law Research Guide
/ Treaties & International Agreements

Search this Guide Search

International and Foreign


Cyberspace Law Research
Guide
This guide covers resources on cyberspace law
where issues encompass the Internet, cybercrime,
privacy and ecommerce. Cyberspace law can
incorporate aspects of comparative,
international and foreign law

Contents

Introduction

Secondary Sources: Treatises & Books

Secondary Sources: Journal Articles

Internet Governance

Electronic Commerce

Data Protection & Privacy

Cyber Crime

Secondary Sources

Treaties & International Agreements

National Law

IGO, NGO & U.S. Government Resources

Cyber Warfare & Terrorism

News & Current Awareness Tools

Additional Resources & Update History

Key to Icons
Georgetown only

On Westlaw

On Lexis

On Bloomberg

PDF

More Info (hover)

Preeminent Treatise

Study Aid

Treaties & International


Agreements on Cyber Crime
United Nations Treaties

United Nations Convention Against


Transnational Organized Crime (2000)
This treaty, also known as the Palermo
Convention, obligates state parties to enact
domestic criminal offenses that target
organized criminal groups and to adopt new
frameworks for extradition, mutual legal
assistance, and law enforcement cooperation.
Although the treaty does not explicitly
address cyber crime, its provisions are highly
relevant.
Citation: 2225 U.N.T.S. 209
Status Information (including
ratifications, accessions, declarations &
reservations)
Legislative Guidance (for state
parties to enact domestic legislation to
implement the treaty)
Travaux Préparatoires (drafting
history)
Full Text in English (including
the optional protocols on human
trafficking, migrant smuggling, and the
illicit manufacturing and trafficking of
firearms)

Convention on the Rights of the Child


(1989)
Article 34 of the Convention obligates state
parties to protect children from all forms of
sexual exploitation and abuse, including
prostitution and pornography.
Citation: 1577 U.N.T.S. 3
Status Information (including
ratifications, accessions, declarations &
reservations)
Full Text in English

Optional Protocol to the Convention on


the Rights of the Child (2001)
This protocol to the 1981 Convention
addresses the sale of children, child
prostitution, and child pornography. Article
3(1)(c) prohibits the production, distribution,
dissemination, sale, and possession of child
pornography. The Preamble mentions the
Internet as a means of distribution. The
definition of child pornography, set forth in
Article 2(3), is broad enough to encompass
virtual images of children.
Citation: 2171 U.N.T.S. 227
Status Information (including
ratifications, accessions, declarations &
reservations)
Full Text in English

Council of Europe Treaties

The Council of Europe is one of several regional


organizations established in the aftermath of World
War II. It is separate and distinct from the
European Union and has a much larger
membership than the EU. The Council's core
mission is the protection of human rights, but it
also works to promote democracy, the rule of law,
and uniform standards.

Much of the Council of Europe's work is


accomplished through the drafting of treaties.
To date, three treaties drafted under the Council's
auspices for the purpose of combatting cyber crime
have entered into force. Each of these treaties is
open to signature by any country, whether or not it
is a member of the Council of Europe.

Convention on Cybercrime (2001)


Also known as the Budapest Convention,
this is the first international agreement aimed
at reducing computer-related crime by
harmonizing national laws, improving
investigative techniques, and increasing
international cooperation.
Citation: E.T.S. 185
Status Information (summary;
ratifications and accessions;
declarations and reservations)
Full Text in English

Additional Protocol to the Convention


on Cybercrime Concerning the
Criminalisation of Acts of a Racist or
Xenophobic Nature Committed
Through Computer Systems (2003)
State parties which have ratified this protocol
to the Budapest Convention are obligated to
enact laws to criminalize racist or xenophobic
acts that are expressed or otherwise
communicated online.
Citation: E.T.S. 189
Status Information (summary;
ratifications and accessions;
declarations and reservations)
Full Text in English

Convention on the Protection of


Children against Sexual Exploitation
and Sexual Abuse (2007)
This treaty expressly prohibits the use of
"information and computer technology (ICT)"
to access child pornography (Article 21(1)(f)),
to distribute child pornography (Article
30(5)) or to solicit children for sexual
purposes (Article 23).
Citation: C.E.T.S. 201
Status Information (summary;
ratifications and accessions;
declarations and reservations)
Full Text in English

<< Previous: Secondary Sources

Next: National Law >>

© Georgetown University Law Library. These guides


may be used for educational purposes, as long as
proper credit is given. These guides may not be sold.
Any comments, suggestions, or requests to republish or
adapt a guide should be submitted using the Research
Guides Comments form. Proper credit includes the
statement: Written by, or adapted from, Georgetown
Law Library (current as of .....).

Last Updated: Aug 30, 2019 10:54 PM


URL: https://guides.ll.georgetown.edu/cyberspace
! Print Page Login to LibApps.

You might also like