T-CY (2016)25

Implementation of Article 13 Budapest Convention by Parties and Observers: Assessment Report

June 2017
T-CY (2015)18

Assessing implementation of Article 13 Budapest Convention on Sanctions and Measures: Compilation of replies to the questionnaire

June 2017
T-CY(2017)3 Terms of Reference for the preparation of a draft 2nd Additional Protocol to the Budapest Convention on Cybercrime June 2017
T-CY(2017)13 Abridged meeting report      June 2017
T-CY(2015)16     Adopted Guidance Note on Production Orders  (Article 18) - adopted by written procedure 28 February 2017

March 2017

T-CY(2015)16 Draft Guidance Note on Production Orders  (Article 18) - Revised version as discussed by the T-CY at its 16th Plenary November 2016
T-CY(2016)11 Guidance Note on Terrorism - Adopted November 2016
T-CY(2016)32  Abridged meeting report  November 2016
T-CY(2016)11 Draft Guidance Note on Terrorism - Version 4 October 2016 October 2016
T-CY(2015)16 Draft Guidance Note on Production Orders (Article 18) - Version 15 September 2016 September 2016
TCY(2016)5 Criminal justice access to data in the cloud: Recommendations for consideration by the T-CY September 2016
T-CY(2016)19 Abridged meeting May 2016
T-CY(2016)13 Emergency requests for the immediate disclosure of data stored in another jurisdiction through mutual legal assistance channels or through direct requests to service providers: Compilation of replies May 2016
T-CY(2016)2 Criminal justice access to data in the cloud: cooperation with "foreign" service providers May 2016
T-CY(2015)16 Draft Guidance Note on Production Orders (Article 18) - Version 4 May 2016 May 2016
T-CY(2016)11 Draft Guidance Note on Terrorism - Version 15 April 2016 April 2016
TCY(2016)7 Criminal justice access to electronic evidence in the cloud - Informal summary of issues and options under consideration by the Cloud Evidence Group February 2016
T-CY(2015)25

Abridged Meeting Report

December 2015
T-CY(2015)12   Workplan 2016-17 December 2015
T-CY(2015)13 Abridged Meeting Report  June 2015
T-CY(2015)6 Assessment Report: Implementation of the preservation provisions of the Budapest Convention on Cybercrime : supplementary report June 2015
T-CY(2015)7  Assessment Report - Follow up given by Parties June 2015
T-CY(2015)3 Article 13 Assessment Questionnaire Adopted June 2015
T-CY(2015)10 Criminal Justice access to data in the cloud : challenges May 2015
T-CY(2013)25rev T-CY Rules of Procedure as revised by the 12th Plenary December 2014
T-CY(2013)7E Guidance Note # 3 on Transborder Access (Article 32)  December 2014
T-CY(2014)20 Guidance Note # 8 on Spam December 2014
T-CY(2014)17 Rules on obtaining subscriber information December 2014
T-CY(2013)17rev T-CY assessment report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime December 2014
T-CY(2014)16 Transborder access to data and jurisdiction: Options for further action by the T-CY December 2014
T-CY(2014)22 Abridged Meeting report December 2014
T-CY(2013)26 Guidance Note # 8 on Subscriber information (draft for discussion) November 2013
T-CY(2013)30 Report of the Transborder Group for 2013 November 2013
T-CY(2013)24 Workplan for the period 1 January 2014 - 31 December 2015 November 2013
T-CY (201312rev   Guidance Note # 7 on New forms of Malware adopted by the 9th Plenary of the T-CY June 2013
T-CY (2013)11  Rev Guidance Note # 6 on Critical Information Infrastructure attacks adopted by the 9th Plenary of the T-CY June 2013
T-CY (2013)10 Rev Guidance Note # 5 on DDOS attacks adopted by the 9th Plenary of the T-CY  June 2013
T-CY (2013)8 Rev Guidance Note # 4 on Identity theft adopted by the 9th Plenary of the T-CY June 2013
T-CY (2013)6 Rev Guidance Note # 2 on Botnets adopted by the 9th Plenary of the T-CY June 2013
T-CY(2013)20 Opinion of the T-CY on the draft Convention against the manipulation of sports competitions May 2013
T-CY(2013)12 T-CY Guidance Note 7 on Malware (draft for discussion) May 2013
T-CY(2013)19 Ensuring T-CY financing options for consideration by the 9th T-CY Plenary May 2013
T-CY(2013)18 Draft decision on Protocol May 2013 May 2013
T-CY(2013)14 Draft elements of an Additional Protocol to the Budapest Convention April 2013
T-CY(2013)8 T-CY Guidance Note 4 on Identity theft and phishing in relation to fraud (draft for discussion) April 2013
T-CY(2012)10 Assessment Report - Implementation of the preservation provisions of the Budapest Convention on Cybercrime (adopted at the 8th Plenary) January 2013
T-CY(2012)3 Transborder Access to Data and Jurisdiction: what are the options?(Adopted at the 8th Plenary) December 2012
T-CY(2012)26 8th Plenary of the T-CY (5-6 December 2012) - Abridged meeting report December 2012
T-CY(2012)24 Revised Rules of Procedure of the T-CY Bureau (adopted at the 8th Plenary) December 2012
T-CY(2012)21 T-CY Guidance Note 1 on the notion of computer system (adopted at the 8th Plenary) December 2012
T-CY(2012)16 Opinion of the T-CY on Draft Committee of Ministers declaration on risks to fundamental rights stemming from digital tracking and other surveillance technologies July 2010
T-CY(2012)14 7th Plenary of the T-CY (4-5 June 2012) - Abridged meeting report June 2012
T-CY(2012)13 Election of the Bureau / Election du Bureau June 2012
T-CY(2012)12 Criteria and procedures for accession to the Budapest Convention – Update June 2012
T-CY(2011)10 6th Plenary of the T-CY (23-24 November 2011) - Abridged meeting report November 2011
T-CY(2011)05 Ad-hoc Sub-Group on Transborder Access to Data and Jurisdiction: Terms of Reference (adopted at the 6th Plenary) November 2011
T-CY(2011)04 T-CY: The way ahead - Plan for the period 2012-2013 (adopted at the 6th Plenary) November 2011
T-CY(2011)03 Opinion of the T-CY on Accession Procedure and Criteria (adopted at the 6th Plenary) November 2011
T-CY(2010)09 5th Plenary of the T-CY (Paris, 24-25 June 2010) June 2010
T-CY(2010)03 Financing of activities of the Parties under the Convention on Cybercrime May 2010
PC-OC(2009)05 Summary of the replies to the questionnaire on Mutual Legal Assistance in Computer-Related Cases February 2009
T-CY(2006) 04            Strengthening cooperation between Law enforcement and the private sector: examples of how the private sector has blocked child pornographic sites February 2006