{"id":5822,"date":"2026-02-09T22:42:17","date_gmt":"2026-02-09T14:42:17","guid":{"rendered":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/"},"modified":"2026-02-09T22:42:17","modified_gmt":"2026-02-09T14:42:17","slug":"what-the-un-treaty-on-cybercrime-may-mean-for-you","status":"publish","type":"post","link":"https:\/\/moresourcing.com\/ar\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/","title":{"rendered":"What the UN Treaty on Cybercrime May Mean for You"},"content":{"rendered":"<p><\/p>\n<div>\n<aside class=\"article-ad ad-300  ad-300x250 ad-desktop\">\n<\/aside>\n<aside class=\"article-ad ad-300  ad-300x250 ad-mobile\">\n<\/aside>\n<figure class=\"article-inline\">\n<img fetchpriority=\"high\" decoding=\"async\" width=\"1290\" height=\"860\" alt=\"\" class=\"wp-image-125263\" srcset=\"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/What-the-UN-Treaty-on-Cybercrime-May-Mean-for-You.jpg 1290w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-300x200.jpg 300w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-150x100.jpg 150w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-768x512.jpg 768w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-764x509.jpg 764w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-382x255.jpg 382w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-870x580.jpg 870w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-435x290.jpg 435w\" data-lazy-sizes=\"(max-width: 1290px) 100vw, 1290px\" src=\"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/What-the-UN-Treaty-on-Cybercrime-May-Mean-for-You.jpg\"\/><img fetchpriority=\"high\" decoding=\"async\" width=\"1290\" height=\"860\" src=\"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/What-the-UN-Treaty-on-Cybercrime-May-Mean-for-You.jpg\" alt=\"\" class=\"wp-image-125263\" srcset=\"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/What-the-UN-Treaty-on-Cybercrime-May-Mean-for-You.jpg 1290w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-300x200.jpg 300w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-150x100.jpg 150w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-768x512.jpg 768w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-764x509.jpg 764w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-382x255.jpg 382w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-870x580.jpg 870w, https:\/\/sloanreview.mit.edu\/wp-content\/uploads\/2026\/02\/Madnick-1290x860-1-435x290.jpg 435w\" sizes=\"(max-width: 1290px) 100vw, 1290px\"\/><figcaption>\n<p class=\"attribution\">\u0643\u0627\u0631\u0648\u0644\u064a\u0646 \u062c\u064a\u0633\u0648\u0646-\u0628\u064a\u0633\u064a\u0644\/\u0645\u0639\u0647\u062f \u0645\u0627\u0633\u0627\u062a\u0634\u0648\u0633\u062a\u0633 \u0644\u0644\u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0648\u0627\u0644\u0627\u0628\u062a\u0643\u0627\u0631<\/p>\n<\/figcaption><\/figure>\n<div class=\"article-summary\"><strong class=\"article-summary__strong\">\u0627\u0644\u0645\u0644\u062e\u0635: <\/strong><\/p>\n<p>A new United Nations treaty establishes an international framework for investigating and prosecuting online crimes, such as ransomware attacks and financial fraud, which often involve multiple countries. While it explicitly defines <em>cybercrime<\/em> and spells out what law enforcement and companies are responsible for in such cases, concerns related to privacy and civil liberties have yet to be addressed. Companies with a global presence should start preparing for enforcement now.<\/p>\n<\/div>\n<p><span class=\"smr-leadin\">In crimes such as robberies<\/span> or kidnappings, both the criminals and victims must directly interact in person, so it is obvious that they must both be in the same country for the crime to be committed. Local and\/or federal authorities address such crimes. But cybercrimes involving data theft and ransomware, for example, can be (and often are) committed by criminals based in other countries. How can local authorities address such crimes? The lack of a formal structure for cooperatively investigating these crimes is an important gap that the <a href=\"https:\/\/news.un.org\/en\/story\/2025\/10\/1166182\" target=\"_blank\" rel=\"noopener noreferrer\">United Nations Treaty on Cybercrime<\/a> is intended to address, at a time when <a href=\"https:\/\/www.wsj.com\/tech\/cybersecurity\/why-are-cybersecurity-data-breaches-still-rising-2f08866c\" target=\"_blank\" rel=\"noopener noreferrer\">global cyberattacks<\/a> and related costs are increasing.<\/p>\n<p>Adopted by the entire UN General Assembly in December 2024 after five years of negotiation, the treaty, formally known as the United Nations Convention Against Cybercrime, establishes the first universal framework for investigating and prosecuting offenses committed online \u2014 from ransomware attacks and financial fraud to the nonconsensual sharing of intimate images. <\/p>\n<p>The multilateral treaty is the first of its kind. It opened for signature by individual member countries in October 2025 and will enter into force 90 days after the 40th country deposits its instrument of ratification, acceptance, approval, or accession.\u00a0The United States has not signed the treaty as of now; the U.S. Senate would ultimately have to vote on a resolution of ratification. The treaty has some controversial aspects, particularly concerning data seizure and online privacy, that some countries might alter or reject (more on that below). In any case, it is expected that companies will have to deal with this treaty if they do business in countries that ratify it, as they have had to do with the European Union\u2019s General Data Protection Regulation (GDPR) since it went into effect in 2018. <\/p>\n<p>Based on several straw polls that we conducted at cybersecurity conferences in recent months, almost no one (and we polled cybersecurity professionals) has heard of the UN\u2019s cybercrime treaty, despite its expected global impact. It is important for business and IT leaders to understand the treaty\u2019s potential benefits and limitations \u2014 and new responsibilities that it imposes on all businesses. Organizations that prepare will be better positioned. <\/p>\n<h3>What Does the UN Treaty on Cybercrime Cover?<\/h3>\n<p>The treaty addresses two different but important issues: What is a cybercrime? And who is responsible for doing what, especially when it comes to law enforcement and companies?<\/p>\n<h4>What is a cybercrime?<\/h4>\n<p>Laws around the world differ in many ways. Given that cybercrimes are relatively new and happen in different countries in different ways, there has been no standard definition for what a cybercrime actually is. One goal of the treaty is to establish a baseline of agreed-upon cybercrimes.<\/p>\n<p>A few examples: <\/p>\n<ul>\n<li><strong>Article 7: Illegal access.<\/strong> Criminalizes unauthorized access to information and communications technology systems.<\/li>\n<li><strong>Article 11: Misuse of devices.<\/strong> Prohibits the production, sale, or possession of devices designed primarily for committing cybercrimes.<\/li>\n<li><strong>Article 14: Offenses related to online child sexual abuse or child sexual exploitation material.<\/strong> Criminalizes various online activities or materials related to child sexual abuse.<\/li>\n<\/ul>\n<h4>What are the new responsibilities for law enforcement?<\/h4>\n<p>Having a common understanding of what a cybercrime is can be helpful as educational material for everyone, but that doesn\u2019t directly lead to action. The second goal of the treaty is to define responsibilities and develop means of collaboration to address the cybercrimes. <\/p>\n<p>There are required forms of collaboration for law enforcement agencies. Two examples: <\/p>\n<ul>\n<li><strong>Article 40: General principles and procedures relating to mutual legal assistance.<\/strong> Establishes a framework for international cooperation in cybercrime investigations.<\/li>\n<li><strong>Article 41: 24\/7 network.<\/strong> Establishes an around-the-clock network of contact points available for immediate assistance.<\/li>\n<\/ul>\n<p>The articles designate new activities and responsibilities to law enforcement agencies in every country.<\/p>\n<aside class=\"article-ad ad-300  ad-300x600 ad-desktop\">\n<\/aside>\n<aside class=\"article-ad ad-300  ad-300x250 ad-mobile\">\n<\/aside>\n<h3>How Might the Treaty Impact You?<\/h3>\n<p>Probably the most important and significant aspect of the treaty is the responsibilities that victims and other players have in aiding in an investigation. For example:<\/p>\n<ul>\n<li><strong>Article 25: Expedited preservation of stored electronic data.<\/strong> Allows authorities to order the preservation of specific electronic data.<\/li>\n<li><strong>Article 28: Search and seizure of stored electronic data.<\/strong> Empowers authorities to search and seize electronic data.<\/li>\n<li><strong>Article 31: Freezing, seizure, and confiscation of the proceeds of crime.<\/strong> Enables the confiscation of proceeds derived from cybercrimes.<\/li>\n<\/ul>\n<p>This is where the treaty becomes controversial: Digging deeper into articles 25 and 28, the treaty empowers authorities to search or otherwise access and seize any \u201celectronic data\u201d in a computer system or digital storage medium. This could impact systems beyond those directly involved in a cybercrime, since it allows authorities to extend their search to other connected or remotely accessible systems if they believe that the relevant data is accessible from the targeted system. Furthermore, authorities can make and retain copies of data and may render it inaccessible in the targeted system. <\/p>\n<p>Article 28(4) of the treaty requires countries to have laws that can compel any person with knowledge of the system\u2019s functioning (such as employees of the targeted company or the technology companies that might have been deployed to aid in recovery from the cybercrime) to provide the information that will enable access and surveillance by cybercrime investigators. This could include forcing the disclosure of encryption keys or security vulnerabilities. <\/p>\n<p>The scope of these powers is also broad, applying not only to the specific cybercrimes defined in the treaty but also to a wide range of \u201cserious crimes\u201d (generally, those punishable by four years of imprisonment or more) where evidence is in electronic form, including purely domestic offenses. In this regard, certain aspects of the treaty will ultimately need to be settled by the courts, especially controversial aspects that apply to the definition of \u201cserious crimes\u201d; for example, there is the possibility that LGBTQ+ people could be targeted in the\u00a064 UN member states\u00a0in which homosexuality is illegal. <\/p>\n<h3>Pushback and Concerns About the Treaty<\/h3>\n<p>International governance frameworks face inherent challenges in regulating a wide range of digital activities. A central difficulty lies in distinguishing harmful conduct from legitimate behavior, given that online interactions rarely fit neatly into fixed legal categories. As a result, enforcement mechanisms in the UN treaty that were designed to address genuine threats may unintentionally constrain lawful activities that resemble prohibited ones. For example, cybersecurity researchers conducting ethical testing to locate vulnerabilities may trigger \u201cillegal access\u201d provisions. Whistleblowing platforms and online advocacy initiatives that disclose discovered vulnerabilities (with the intention that they be fixed) could face restrictions under broadly framed enforcement powers.<\/p>\n<div class=\"callout-pullquote callout-pullquote--no-quote\" data-aos-duration=\"900\" data-aos-anchor-placement=\"bottom-bottom\" data-aos-easing=\"ease-out-back\" data-aos=\"fade-new-left\">\n<p class=\"callout-pullquote__quote\">\n\t\t\t\t\tThe treaty empowers authorities to search or otherwise access and seize any \u201celectronic data\u201d in a computer system or digital storage medium.\n\t\t\t\t\t<\/p>\n<\/div>\n<p>This tension is most evident in the treaty\u2019s handling of child sexual abuse material (CSAM), which represents one of its primary regulatory priorities. While there is universal agreement on the need to combat CSAM and protect children, implementing safeguards remains complex. Automated detection technologies often struggle to distinguish abusive material from legitimate educational, research, or prevention-oriented content. Content moderators and platforms operating in good faith may also face heightened scrutiny despite their protective role. Notably, existing legal frameworks \u2014 such as the <a href=\"https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa\" target=\"_blank\" rel=\"noopener noreferrer\">Children\u2019s Online Privacy Protection Act<\/a> in the U.S., the U.K.\u2019s <a href=\"https:\/\/www.legislation.gov.uk\/ukpga\/2003\/42\/contents \" target=\"_blank\" rel=\"noopener noreferrer\">Sexual Offenses Act<\/a>\u0648 <a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2011\/93\/oj\/eng\" target=\"_blank\" rel=\"noopener noreferrer\">EU Directive 2011\/93\/EU<\/a> on combating sexual abuse of children \u2014 have required continuous refinement to balance child protection with lawful online activity. <\/p>\n<p>Beyond these operational challenges, the treaty has also raised broader concerns related to privacy and civil liberties. Critics argue that expansive investigative and cross-border enforcement powers, if coupled with vague definitions and limited safeguards, could disproportionately affect journalists, human rights defenders, nongovernmental organizations, and other civic organizations. <a href=\"https:\/\/www.gchumanrights.org\/preparedness\/the-un-cybercrime-convention-why-it-endangers-human-rights-defenders-and-journalists\/\" target=\"_blank\" rel=\"noopener noreferrer\">Analyses by the Global Campus of Human Rights<\/a> warn that such mechanisms may enable excessive surveillance, censorship, or data sharing, particularly in jurisdictions with weak oversight. Therefore, stronger privacy and due-process protections will be crucial to ensuring that the treaty upholds the rights and freedoms that it seeks to protect.<\/p>\n<h3>How to Plan Ahead<\/h3>\n<p>To a certain extent, leaders can think of the current status of the UN Treaty on Cybercrime somewhat like the GDPR law introduced about a decade ago. The exact details of how the treaty will impact businesses and society are not yet fully known, but in our view, several important consequences seem highly likely. <\/p>\n<p><strong>1. Law enforcement authorities will have new global tools to address the increasingly global spread of cybercrime.<\/strong> That will ideally help all of us in our fight against cybercrime. These powers will be exercised by national authorities, such as the FBI in the U.S. and the EU\u2019s European Cybercrime Centre, with 24\/7 networks enabling immediate international cooperation. Even companies operating in a single country could face coordinated cross-border investigations. Planning now can prevent costly disruptions when such investigative actions occur.<\/p>\n<p><strong>2. Individual companies will have additional new responsibilities, especially regarding data retention and sharing.<\/strong> Since changing such corporate policies and procedures is rarely quick and easy, it is best to start addressing these new responsibilities sooner rather than later. As many companies, even those outside the EU, learned from GDPR, ignoring such regulations can be very costly. GDPR\u2019s\u00a0extraterritorial scope applies to any business, regardless of location, that processes personal data of people within the EU by offering goods or services to them or monitoring their behavior. This means that non-EU companies must comply with the regulation to avoid fines and protect their EU-based customers\u2019 data. (The law also influenced many other countries to adopt similar privacy laws.)\u00a0Tech giants, including Meta, Amazon, and Google, have faced significant GDPR fines, while even smaller businesses faced fines for unsolicited marketing calls or emails.\u00a0<\/p>\n<div class=\"callout-pullquote callout-pullquote--no-quote callout-pullquote--long\" data-aos-duration=\"900\" data-aos-anchor-placement=\"bottom-bottom\" data-aos-easing=\"ease-out-back\" data-aos=\"fade-up\">\n<p class=\"callout-pullquote__quote\">\n\t\t\t\t\tIndividual companies will have additional new responsibilities, especially regarding data retention and sharing\n\t\t\t\t\t<\/p>\n<\/div>\n<p><strong>3. The treaty\u2019s extraterritorial reach will create complex jurisdictional challenges for multinational corporations.<\/strong> Similar to how GDPR applies to any company processing EU citizens\u2019 data regardless of the company\u2019s location, the UN cybercrime treaty will likely extend enforcement capabilities across borders. For instance, a U.S.-based cloud provider might face simultaneous legal requests from authorities in multiple jurisdictions, each with different procedural requirements and timelines. We saw this jurisdictional complexity emerge with the CLOUD (Clarifying Lawful Overseas Use of Data) Act of 2018, where <a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/584\/17-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft found itself caught between U.S. demands<\/a> for data stored in Ireland, and EU data protection requirements.<\/p>\n<p><strong>4. Technical infrastructure investments will be necessary to ensure compliance.<\/strong> Companies should evaluate their logging capabilities, data access controls, and ability to quickly isolate and preserve digital evidence. Much like GDPR required organizations to implement appropriate technical measures, the UN treaty will demand similar capabilities but will focus on evidence preservation rather than data protection. When the EU NIS2 (Network and Information Security) Directive came into force in 2023, organizations that had already implemented robust security monitoring faced significantly lower compliance costs than those starting from scratch.<\/p>\n<p><strong>5. Corporate governance structures may need reorganization.<\/strong> Consider establishing a cross-functional task force with representatives from legal, IT, security, and compliance teams. This approach echoes how GDPR drove the creation of privacy teams and data protection officers in many organizations. When the California Consumer Privacy Act went into effect in 2020, multinational companies that had already established GDPR-compliant governance frameworks found that they could use their existing compliance structures to address CCPA requirements. Additionally, clear lines of responsibility and communication channels will be essential for rapid response to international requests. Many of these actions would be beneficial to companies even if the treaty did not exist. Compliance with the treaty would provide a near-term data governance benefit as well as a longer-term benefit for the organization.<\/p>\n<hr class=\"break\"\/>\n<p>The ideal time for companies to deal with the changes outlined in the treaty is not <em>during<\/em> a cybercrime event. Planning and testing these new processes and procedures should be started now, to give you the time needed to sort out the complexities that are likely to arise.<\/p>\n<aside class=\"article-ad ad-300  ad-300x250 ad-desktop\">\n<\/aside>\n<aside class=\"article-ad ad-300  ad-300x250 ad-mobile\">\n<\/aside>\n<div class=\"article-authors\" id=\"article-authors\">\n<h4 class=\"article-authors__title\">\u0646\u0628\u0630\u0629 \u0639\u0646 \u0627\u0644\u0645\u0624\u0644\u0641\u064a\u0646<\/h4>\n<div class=\"article-authors__bio\">\n<p>Stuart Madnick, Ph.D., is the John Norris Maguire (1960) Professor of Information Technology at MIT Sloan, as well as a professor of engineering systems and the founder of the Cybersecurity at MIT Sloan (CAMS) research initiative. He has cofounded five tech firms and runs Langley Castle Hotel. Angelica Marotta, Ph.D., is a cybersecurity researcher affiliated with the MIT Sloan CAMS program, investigating regulatory compliance and AI. She holds an interdisciplinary background in computer science, justice studies, and regulatory compliance and is the founder and CEO of AM Academic Consulting.<\/p>\n<\/div><\/div>\n<\/div>\n<p>#Treaty #Cybercrime<\/p>","protected":false},"excerpt":{"rendered":"<p>Carolyn Geason-Beissel\/MIT SMR | Getty Images Summary: A new United Nations treaty establishes an international framework for investigating and prosecuting online crimes, such as ransomware attacks and financial fraud, which often involve multiple countries. While it explicitly defines cybercrime and spells out what law enforcement and companies are responsible for in such cases, concerns related [&hellip;]<\/p>","protected":false},"author":1,"featured_media":5823,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-5822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What the UN Treaty on Cybercrime May Mean for You - MORE SOURCING LTD<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/moresourcing.com\/ar\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What the UN Treaty on Cybercrime May Mean for You\" \/>\n<meta property=\"og:description\" content=\"Carolyn Geason-Beissel\/MIT SMR | Getty Images Summary: A new United Nations treaty establishes an international framework for investigating and prosecuting online crimes, such as ransomware attacks and financial fraud, which often involve multiple countries. While it explicitly defines cybercrime and spells out what law enforcement and companies are responsible for in such cases, concerns related [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/moresourcing.com\/ar\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/\" \/>\n<meta property=\"og:site_name\" content=\"MORE SOURCING LTD\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-09T14:42:17+00:00\" \/>\n<meta name=\"author\" content=\"MS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"MS\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 \u062f\u0642\u064a\u0642\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/\"},\"author\":{\"name\":\"MS\",\"@id\":\"https:\/\/moresourcing.com\/#\/schema\/person\/2c9a233f0ad18413717419291cacdf69\"},\"headline\":\"What the UN Treaty on Cybercrime May Mean for You\",\"datePublished\":\"2026-02-09T14:42:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/\"},\"wordCount\":2135,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/moresourcing.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/Madnick-2400x1260-1-1200x630.jpg\",\"articleSection\":[\"Management\"],\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/\",\"url\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/\",\"name\":\"What the UN Treaty on Cybercrime May Mean for You - MORE SOURCING LTD\",\"isPartOf\":{\"@id\":\"https:\/\/moresourcing.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/Madnick-2400x1260-1-1200x630.jpg\",\"datePublished\":\"2026-02-09T14:42:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#primaryimage\",\"url\":\"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/Madnick-2400x1260-1-1200x630.jpg\",\"contentUrl\":\"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/Madnick-2400x1260-1-1200x630.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/moresourcing.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What the UN Treaty on Cybercrime May Mean for You\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/moresourcing.com\/#website\",\"url\":\"https:\/\/moresourcing.com\/\",\"name\":\"MORE SOURCING LTD\",\"description\":\"Your Global Trade Experts\",\"publisher\":{\"@id\":\"https:\/\/moresourcing.com\/#organization\"},\"alternateName\":\"MORE SOURCING LTD\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/moresourcing.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/moresourcing.com\/#organization\",\"name\":\"MORE SOURCING LTD\",\"url\":\"https:\/\/moresourcing.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/moresourcing.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/moresourcing.com\/wp-content\/uploads\/2025\/07\/cropped-cropped-MS-logo-02-scaled-2.png\",\"contentUrl\":\"https:\/\/moresourcing.com\/wp-content\/uploads\/2025\/07\/cropped-cropped-MS-logo-02-scaled-2.png\",\"width\":2558,\"height\":1273,\"caption\":\"MORE SOURCING LTD\"},\"image\":{\"@id\":\"https:\/\/moresourcing.com\/#\/schema\/logo\/image\/\"},\"ownershipFundingInfo\":\"https:\/\/moresourcing.com\/about-us\/\",\"ethicsPolicy\":\"https:\/\/moresourcing.com\/service\/\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/moresourcing.com\/#\/schema\/person\/2c9a233f0ad18413717419291cacdf69\",\"name\":\"MS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/moresourcing.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcff4c53e422761d0d6db624cdaf171933d38385c2c22c13ce39ea3918a9cd66?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcff4c53e422761d0d6db624cdaf171933d38385c2c22c13ce39ea3918a9cd66?s=96&d=mm&r=g\",\"caption\":\"MS\"},\"sameAs\":[\"https:\/\/moresourcing.com\"],\"url\":\"https:\/\/moresourcing.com\/ar\/author\/moresourcing\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What the UN Treaty on Cybercrime May Mean for You - MORE SOURCING LTD","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/moresourcing.com\/ar\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/","og_locale":"ar_AR","og_type":"article","og_title":"What the UN Treaty on Cybercrime May Mean for You","og_description":"Carolyn Geason-Beissel\/MIT SMR | Getty Images Summary: A new United Nations treaty establishes an international framework for investigating and prosecuting online crimes, such as ransomware attacks and financial fraud, which often involve multiple countries. While it explicitly defines cybercrime and spells out what law enforcement and companies are responsible for in such cases, concerns related [&hellip;]","og_url":"https:\/\/moresourcing.com\/ar\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/","og_site_name":"MORE SOURCING LTD","article_published_time":"2026-02-09T14:42:17+00:00","author":"MS","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"MS","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"11 \u062f\u0642\u064a\u0642\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#article","isPartOf":{"@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/"},"author":{"name":"MS","@id":"https:\/\/moresourcing.com\/#\/schema\/person\/2c9a233f0ad18413717419291cacdf69"},"headline":"What the UN Treaty on Cybercrime May Mean for You","datePublished":"2026-02-09T14:42:17+00:00","mainEntityOfPage":{"@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/"},"wordCount":2135,"commentCount":0,"publisher":{"@id":"https:\/\/moresourcing.com\/#organization"},"image":{"@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#primaryimage"},"thumbnailUrl":"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/Madnick-2400x1260-1-1200x630.jpg","articleSection":["Management"],"inLanguage":"ar","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/","url":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/","name":"What the UN Treaty on Cybercrime May Mean for You - MORE SOURCING LTD","isPartOf":{"@id":"https:\/\/moresourcing.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#primaryimage"},"image":{"@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#primaryimage"},"thumbnailUrl":"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/Madnick-2400x1260-1-1200x630.jpg","datePublished":"2026-02-09T14:42:17+00:00","breadcrumb":{"@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#primaryimage","url":"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/Madnick-2400x1260-1-1200x630.jpg","contentUrl":"https:\/\/moresourcing.com\/wp-content\/uploads\/2026\/02\/Madnick-2400x1260-1-1200x630.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/moresourcing.com\/what-the-un-treaty-on-cybercrime-may-mean-for-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/moresourcing.com\/"},{"@type":"ListItem","position":2,"name":"What the UN Treaty on Cybercrime May Mean for You"}]},{"@type":"WebSite","@id":"https:\/\/moresourcing.com\/#website","url":"https:\/\/moresourcing.com\/","name":"\u0627\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0645\u0635\u0627\u062f\u0631 \u0627\u0644\u0645\u062d\u062f\u0648\u062f\u0629","description":"\u062e\u0628\u0631\u0627\u0621 \u062a\u062c\u0627\u0631\u062a\u0643 \u0627\u0644\u0639\u0627\u0644\u0645\u064a\u0629","publisher":{"@id":"https:\/\/moresourcing.com\/#organization"},"alternateName":"MORE SOURCING LTD","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/moresourcing.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/moresourcing.com\/#organization","name":"\u0627\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0645\u0635\u0627\u062f\u0631 \u0627\u0644\u0645\u062d\u062f\u0648\u062f\u0629","url":"https:\/\/moresourcing.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/moresourcing.com\/#\/schema\/logo\/image\/","url":"https:\/\/moresourcing.com\/wp-content\/uploads\/2025\/07\/cropped-cropped-MS-logo-02-scaled-2.png","contentUrl":"https:\/\/moresourcing.com\/wp-content\/uploads\/2025\/07\/cropped-cropped-MS-logo-02-scaled-2.png","width":2558,"height":1273,"caption":"MORE SOURCING LTD"},"image":{"@id":"https:\/\/moresourcing.com\/#\/schema\/logo\/image\/"},"ownershipFundingInfo":"https:\/\/moresourcing.com\/about-us\/","ethicsPolicy":"https:\/\/moresourcing.com\/service\/"},{"@type":"Person","@id":"https:\/\/moresourcing.com\/#\/schema\/person\/2c9a233f0ad18413717419291cacdf69","name":"MS","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/moresourcing.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcff4c53e422761d0d6db624cdaf171933d38385c2c22c13ce39ea3918a9cd66?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcff4c53e422761d0d6db624cdaf171933d38385c2c22c13ce39ea3918a9cd66?s=96&d=mm&r=g","caption":"MS"},"sameAs":["https:\/\/moresourcing.com"],"url":"https:\/\/moresourcing.com\/ar\/author\/moresourcing\/"}]}},"_links":{"self":[{"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/posts\/5822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/comments?post=5822"}],"version-history":[{"count":0,"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/posts\/5822\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/media\/5823"}],"wp:attachment":[{"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/media?parent=5822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/categories?post=5822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/moresourcing.com\/ar\/wp-json\/wp\/v2\/tags?post=5822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}