Skip to main content

Digital Library

Displaying 1 - 5 of 9 results

  • Sub-regional training on the role of ICTs in the context of regional and international security

    Venue
    Athens, Greece
    Date(s)
    -
    Category
    Event

    The OSCE Transnational Threats Department, in co-operation with the Greek Government, will organize a sub-regional training for the promotion of practical measures for reducing international tensions in the wake of major cyber-attacks, in particular, OSCE cyber/ICT Confidence-Building Measures (CBMs).

  • Police Experts Meeting on "Strengthening the role of the police and enhancing co-operation in combating terrorism"

    Date(s)
    -
    Category
    Event

    This event will bring together anti-terrorism police experts with the aim of exchanging and promoting good practices among police agencies in the fight against terrorism. There will be a special focus on the Mediterranean and South Eastern Europe.

  • Workshop "Gender balance in police management positions"

    Date(s)
    -
    Category
    Event

    Police managers from law enforcement agencies across the OSCE area will meet with the aim to examine the issue of gender balance in police upper management positions.

  • Specialized training and adjacent workshop on "Appropriate and Effective Responses to Gender-based Violence"

    Venue
    Budapest, Hungary
    Date(s)
    -
    Category
    Event

    This event is organized by OSCE’s Transnational Threats Department/Strategic Police Matters Unit, within the framework of the Project "Effective Criminal Justice Strategies and Practices to Combat Gender-based Violence in Eastern Europe", and will consist of a four-day course for police and prosecutors, followed by a one-day workshop with additional judges and social workers.

  • Convention on Cybercrime

    Category
    Publication

    The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. It also contains a series of powers and procedures such as the search of computer networks and interception.