Hello Christa, I think that would be great to get an opinion from a lawyer which knows and speaks the lingo... After all the target audience are lawyers..
Thanks for your help - Markus
-----Original Message----- From: swinog-bounces@lists.swinog.ch [mailto:swinog-bounces@lists.swinog.ch] On Behalf Of Christa Pfister Sent: Wednesday, March 18, 2009 4:22 PM To: swinog@swinog.ch Subject: Re: [swinog] "Hackerparagraph" (fwd)
I have a suggestion: I could draft a comment (regarding "hacking-tools") for the Vernehmlassung and submit it to the mailing-list for approval and input by SWINOG members. As the author of a doctoral thesis on Art. 143bis (the Swiss hacking provision), I might be able to add a certain academic weight to the SWINOG position.
I would be prepared to do this for free, it wouldn't be a paid "Gutachten", but rather a joint statement by an association of people who deal with this issues on a daily basis and a lawyer who has studied this provision in depth.
If SWINOG agrees (do you have any decision procedures?), I would submit a draft by 15 May 2009. The Vernehmlassung ends 30 June, so that would leave us enough time for discussion.
Regards, Christa
________________________________
Von: swinog-bounces@lists.swinog.ch im Auftrag von Daniel Roethlisberger Gesendet: Mi 18.03.2009 15:45 An: SWINOG Betreff: Re: [swinog] "Hackerparagraph" (fwd)
Andreas Fink afink@list.fink.org 2009-03-17:
Collegues,
The federal adminstration wants to change the law about cyber crime.
See also:
(or especially Genehmigung und Umsetzung des Übereinkommens des Europarates über die Cyberkriminalität )
[...]
Note that according to the "Adressatenliste", SwiNOG was explicitly invited to comment on the proposed change of law.
I guess SwiNOG should comment on Art. 143bis Abs. 2 and request a clarification, in order to make sure that academical, commercial and private IT security research will not be affected by the change of law. The proposed wording of Abs. 2 currently does not adequatly honour the fact that security tools are dual-use goods by nature; i.e. they are not inherently good or evil. Or in other words, there is no practical way to distinguish a tool used by a professional penetration tester from a tool used by a blackhat. The difference between the two is not in the tools, it's in the contracts (i.e. approval of the target's owner).
-- Daniel Roethlisberger http://daniel.roe.ch/
_______________________________________________ swinog mailing list swinog@lists.swinog.ch http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog