2013 Africa Union Framework for Cyber security in Africa
|
|
- Jonathan Clark
- 8 years ago
- Views:
Transcription
1 Contributions by DotConnectAfrica 2013 Africa Union Framework for Cyber security in Africa Comments to the DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A CREDIBLE LEGAL FRAMEWORK FOR CYBER SECURITY IN AFRICA
2 Executive Summary The rapid development of ICT and its penetration in all sectors of the economies and especially Africa is a progress that must be appreciated, catalyzed and encouraged. With the increase in online dependence of ICT, there also comes the proliferation of cyber crime and thus necessitating the strengthening of cyber security measures as well as establishment of cyber legislations. It s our hope that the proposed Convention on Cyber Security will be prepared in a multistakeholder model that will include all the voices in order to develop proper mechanism to contribute to the preservation of the institutional, human, financial, technological and informational assets and resources put in place by institutions to achieve their objectives and embraces important elements of electronic commerce and the protection of personal data. Introduction of DotConnectAfrica DotConnectAfrica (DCA) is a not-for-profit, non-partisan organization that has its base of operation in Nairobi, Kenya and headquartered in I/F River Court 6th Denis Street Port Louis, Mauritius, Africa, Reg.ID CT8710DCA90). Its main charitable objects are: (a) for the advancement of education in information technology to the African society; and (b) in connection with (a) to provide the African society with a continental Internet domain name to have access to Internet services for the people of Africa as a purpose beneficial to the public in general. DCA is well represented in Addis Ababa Ethiopia, Nigeria, South Africa, London United Kingdom, and California, USA. DotConnectAfrica (DCA) has been spearheading the proposed new Top Level Domain (TLD).africa (DotAfrica) Initiative since DotAfrica is one of the new generic Top Level Domains (gtlds) that will be delegated into the root zone of the Internet Domain Name Structure (DNS) by the Internet Corporation of Assigned Names and Numbers (ICANN), a US-based institution that is at the apex of Global Internet Governance. As an independent Non-Profit, non-partisan entity, DCA Trust intends to utilize surplus proceeds from the registry operation accruing to the Trust Fund for Charitable projects. Funds will be regularly allocated to different corporate social responsibility programs. Specific projects will be identified, and supported. As the first gtld for Africa, it will aim at bridging the digital divide that exists between other regions of the Internet community and Africa by promoting the use of ICT for development.
3 Preamble: The Draft Convention should lay a background for the African states to review their legislations on cyber security. ICT is becoming a key element and player in the development of a nation and more importantly day to day running of institutional mandates. Businesses play a key role in deriving and generating revenue that is used to run governmental affairs, this affects how tax regimes and systems must be properly instituted to match the changing commercial sector that is increasingly dependent on ICT and most importantly mobile online transactions. Africa is growing into this important technology, ICT comes with several critical issues that must be addressed for proper operations that can curb issues such as cyber crime that includes fraud, impersonation, spam among many others. Interventions that are of a continental or global levels that require signing of such conventions must be properly drafted and understood by all the stakeholders, this includes the governments, businesses, academia and citizens, this will provide a harmonized treaty that will at least not overlook critical existing individual government legislations nor contradict them. Electronic commerce organization, personal data protection, cyber security promotion and cyber crime control are the most important factors of the online economy and while it s critical to create harmonized continental legislation it s important that the personal data and privacy is protected as the bottom line.
4 Recommendations on select sections of the draft legislations. 3) Objective and goal The objective of the Convention on Cyber Security is to contribute to the preservation of the institutional, human, financial, technological and informational assets and resources put in place by institutions to achieve their objectives. The Convention embodies the treatment of cyber crime and cyber security in its strict sense, but is not confined solely to these elements. It also embraces important elements of electronic commerce and the protection of personal data. Its ultimate goal is eminently protective given that it is geared to protecting: Institutions against the threats and attacks capable of endangering their survival and efficacy; The rights of persons during data gathering and processing against the threats and attacks capable of compromising such rights. Similarly, the Convention seeks to: Reduce related institutional (and personal) intrusions or gaps in the event of disaster; Facilitate the return to normal functioning at reasonable cost and within a reasonable timeframe; Establish the legal and institutional mechanisms likely to guarantee normal exercise of human rights in cyber space. Comment 1 The bullet point needs to add the wording and personal in the verbatim for completeness Section II: Electronic Commerce Chapter 1: Field of application of electronic commerce Article I 2: Electronic commerce is an economic activity by which a person offers or provides goods and services by electronic means. Comment 2: Structure the statement so as to complete the entire transaction, i.e. Electronic commerce is an economic activity by which a person offers/provides or receives/solicits goods and services by electronic means. Article I 4: Without prejudice to other information obligations defined by extant legislative and regulatory texts in African Union Member States, any person/ (Add: persons) exercising the activities set forth in Article I 2 of this Convention shall provide to those for whom the goods and services are meant, easy, direct and uninterrupted access using an open standard in regard to the following information:
5 Comment 3: Define the terms open standard, is there a known universal meaning of the word open standard and what its implications are and or institutionalism Article I 8: Also the addition of the word Persons for completeness Any publicity action, irrespective of its form, accessible through on-line communication service, shall be clearly identified as such. It shall clearly identify the individual or corporate body on behalf of whom it is undertaken. Comment 4: Clearly outline the word identify in this case so as not to go against the online anonymity as a defined right of a user. Since online anonymity is not built into the cyberspace structures, and is also an avenue for individuall right to self-determination and privacy and therefore it may a breach of declaration of peoples unanimous freedom of the cyberspace Article I 9: Publicity actions, especially promotional offers such as price discounts, bonuses or free gift, as well as promotional competitions or games disseminated by electronic mail, shall upon receipt be clearly and unequivocally identified in the title of the message by their addressees or, where this is technically impossible, on the body of the message. Comment 5: This section though defined will not be very helpful because of the generality of the statement, further its perhaps unhelpful to the users, further its unnecessary for an international treaty, perhaps this could be covered in the country legislation if at all necessary. This portion over emphasizes unnecessary rationale Article I 14: Concealing the identity of the person on behalf of whom the communication is issued or mentioning a subject unrelated to the transaction or service offered, shall equally be prohibited in the African Union. Comment 6: There in need for more clarification required here in Identity concealing and third parties Section IV: Treaty obligations in electronic form Chapter 1: Contracts in electronic form Article I 16: Electronic means may be used to disseminate contractual conditions or information on goods or services. Comment 7: Define the role of the notary in this state for the purposes of contractual conditions
6 Article 1 18: Information meant for a professional may be addressed to him/her by electronic mail provided he/she has communicated his/her electronic professional address. Comment 8: The article may have the following phrase as an addition and given consent as to the use of the said address as proof of communication Article 1 18: Information meant for a professional may be addressed to him/her by electronic mail provided he/she has communicated his/her electronic professional address. Article I 19: 5) The means of electronic consultation of the professional and commercial rules by which the author of the offer intends to be guided, if need be. Article I 22: Agreements concluded between professionals may be exempted from the provisions of Articles I 20 and 21 of this Convention. Comment 9: There need for the definition of the broad scope of the word professional as implied in the draft in order to avoid ambiguity of the law. Article I 23: In the absence of legal provisions to the contrary, no person shall be compelled to take a legal action by electronic means. Article I 39: Subject to legal provisions to the contrary, no one shall be compelled to undertake a legal act by electronic means. Comment 10: There is repetition in this law, please consolidate these points Article I 35: Where the legal provisions of Member States have not laid down other provisions, and where there is no valid agreement between the parties, the judge shall resolve proof related conflicts by determining by all means possible the most plausible claim regardless of the message base employed The respective countries have to build their legislations to mitigate cross border/ international conflicts concerning cyber law. In this case, the notaries and all related parties have to be given their definitive mandate, however in this case Article 1-35 does not define its scope
7 **************** Article III 1 7: International cooperation Each Member State shall adopt such measures as it deems necessary to foster exchange of information and the sharing of quick, expeditious and reciprocal data by Member States organizations and similar organizations of other Member States with responsibility to cause the law to be applied in the territory on bilateral or multilateral basis. Comment 11: At this juncture it will be necessary to ensure the proper understanding of the legislations and their harmonization and upgrading of existing individual governmental laws to prevent a case of contradicting legislations that can break the existing laws. Before a continental ratification, individual government legislations must be used as the default, harmonization of such is therefore encouraged. Section II: Legal framework for personal data protection Chapter 1: Objectives of this Convention with respect to personal data Article II 14: Each Member State of the African Union shall establish an authority with responsibility to protect personal data. The body so established shall be an independent administrative authority with the task of ensuring that the processing of personal data is conducted in accordance with the provisions of this Convention. Article II 16: The protection authority shall comprise parliamentarians, deputies, senators, senior judges of the Tribunal of Accounts, Council of State, Civil and Criminal Appeal Court, personalities qualified as a result their knowledge of computer science, as well as professional networks or sectors. Article II 18: Members of the protection authority shall be subject to professional secrecy in accordance with the extant texts of each Member State. Each protection authority shall formulate rules of procedure containing, inter alia, rules governing deliberations, processing and presentation of cases. Comment 12: These articles define the membership and the constituting mandates of the said Protection authority however it should be left to the countries to define the authorities under inbuilt country contributions/laws or bylaws so as not to create a different center of power or parallel agency.
8 Article II 2: Page 21 Each Member State of the African Union shall put in place a legal framework with a view to establishing a mechanism to combat breaches of private life likely to arise from the gathering, processing, transmission, storage and use of personal data. The mechanism so established shall ensure that any data processing, in whatsoever form, respects the freedoms and fundamental rights of physical persons while recognizing the prerogatives of the State, the rights of local communities and the interest of enterprises. Comment 13: Should add an addendum, if so possible, the said individual states shall enact their legislations before the ratification of the aforementioned convention
DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A LEGAL FRAMEWORK CONDUCIVE TO CYBER SECURITY IN AFRICA
ECONOMIC COMMISSION FOR AFRICA AFRICAN UNION COMMISSION DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A LEGAL FRAMEWORK CONDUCIVE TO CYBER SECURITY IN AFRICA OR DRAFT AFRICAN UNION CONVENTION
More informationCyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
More informationAFRICAN UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA PROTECTION EX.CL/846(XXV)
AFRICAN UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA PROTECTION EX.CL/846(XXV) AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA P.O. Box: 3243, Addis Ababa, Ethiopia, Tel.: +251-115 18 24 02 Fax: +251-115
More informationDiversity of Cultural Expressions INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS
Diversity of Cultural Expressions 1.EXT.IGC Distribution limited CE/08/1.EXT.IGC/Dec. Rev. 2 Paris, 20 August 2008 Original: English / French INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION
More informationATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION
ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION We, over 125 members of the global access to information community from 40 countries, representing governments,
More informationGUIDELINES ON COMPLIANCE WITH AND ENFORCEMENT OF MULTILATERAL ENVIRONMENTAL AGREEMENTS
GUIDELINES ON COMPLIANCE WITH AND ENFORCEMENT OF MULTILATERAL ENVIRONMENTAL AGREEMENTS 1. In its decision 21/27, dated 9 February 2001, the Governing Council of the United Nations Environment Programme
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationCYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
More informationLEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT
LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT 2300 Pursuant to its authority from Article 59 of the Rules of Procedure of the Croatian Parliament, the Legislation Committee determined the revised text
More informationDeclaration of Internet Rights Preamble
Declaration of Internet Rights Preamble The Internet has played a decisive role in redefining public and private space, structuring relationships between people and between people and institutions. It
More informationCYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
More informationStanding Committee on Copyright and Related Rights
E SCCR/24/5 ORIGINAL: ENGLISH DATE: JULY 2, 2012 Standing Committee on Copyright and Related Rights Twenty-fourth Session Geneva, July 16 to 25, 2012 DRAFT TREATY ON THE PROTECTION OF BROADCASTING ORGANIZATIONS
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationCriminal Justice Sector and Rule of Law Working Group
Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions
More informationHow To Write A Cyber Security Convention In Africa
A REPORT OF THE ONLINE DEBATE ON AFRICA UNION CONVENTION ON CYBERSECURITY (AUCC) Submitted to: Africa Union Commission (AUC) Compiled By Grace Githaiga December, 2013 The Kenya ICT Action Network (KICTANet)
More informationCCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
More informationThe Romanian Parliament adopts the present law. Chapter I: General Provisions
Law No. 677/2001 on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data, amended and completed The Romanian Parliament adopts the present law.
More informationCOMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011
COMMISSION DE L UNION AFRICAINE REPUBLIQUE DU SENEGAL ---------------- MINISTERE DE LA COMMUNICATION, DES TELECOMMUNICATIONS ET DES TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION AFRICAN ICT MINISTERIAL
More informationMultilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?
2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M.Maybaum, A.-M.Osula, L.Lindström (Eds.) 2015 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies
More information7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
More informationDraft WGIG Issues Paper on Spam
Draft WGIG Issues Paper on Spam 1. Issue Spam directly engages a very wide range of stakeholders that includes individual consumers, all organizations of whatever size in the private and public sectors
More informationCYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
More information-«Trustee Authority»: Entity that defines and regulates the conditions of assignment and use of Domain Names, applying to each particular Extension.
NETIM - GENERAL TERMS AND CONDITIONS OF DOMAIN NAMES CG-ND version 2.1-15 th November 2015 NETIM, limited liability company under french law, with head office located 165 avenue de bretagne 59000 LILLE
More informationUNDERSTANDING REGARDING NOTIFICATION, CONSULTATION, DISPUTE SETTLEMENT AND SURVEILLANCE
DISPUTE SETTLEMENT 200 UNDERSTANDING REGARDING NOTIFICATION, CONSULTATION, DISPUTE SETTLEMENT AND SURVEILLANCE Adopted on 28 November 979 (L/4907). The CONTRACTING PARTIES reaffirm their adherence to the
More informationPersonal Data Act (1998:204);
Personal Data Act (1998:204); issued 29 April 1998. Be it enacted as follows. General provisions Purpose of this Act Section 1 The purpose of this Act is to protect people against the violation of their
More informationDATA PROTECTION LAWS OF THE WORLD. India
DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,
More informationRegulations of the Audit and Compliance Committee of Gamesa Corporación Tecnológica, S.A.
Regulations of the Audit and Compliance Committee of Gamesa Corporación Tecnológica, S.A. (Consolidated text approved by the Board of Directors on March 24, 2015) INDEX CHAPTER I. INTRODUCTION... 3 Article
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationCROATIAN PARLIAMENT 1364
CROATIAN PARLIAMENT 1364 Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON PERSONAL DATA PROTECTION I hereby promulgate the Act on
More informationengagement will not only ensure the best possible law, but will also promote the law s successful implementation.
US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments
More informationLife Insurance Charter of Quality
Life Insurance Charter of Quality PREAMBLE This Life Insurance Charter of Quality is largely inspired by the ICMA Private Wealth Management Charter of Quality, which lists the guiding principles of best
More informationDRAFT BILL. The PRESIDENT OF THE REPUBLIC To be known that the National Congress decrees and I sanction the following Law.
DRAFT BILL Provides for the processing of personal data 1 to guarantee the free development of the natural person's personality and of its dignity. The PRESIDENT OF THE REPUBLIC To be known that the National
More informationUNIÃO AFRICANA Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) 5513 822 Fax: (251-11) 5519 321 Email: situationroom@africa-union.
AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) 5513 822 Fax: (251-11) 5519 321 Email: situationroom@africa-union.org ACTION PLAN FOR THE IMPLEMENTATION
More informationLife Insurance Charter of Quality
Life Insurance Charter of Quality PREAMBLE This Life Insurance Charter of Quality is largely inspired by the ICMA Private Wealth Management Charter of Quality, which lists the guiding principles of best
More informationDRAFT BILL PROPOSITION
DRAFT BILL PROPOSITION Establishes principles, guarantees, rights and obligations related to the use of the Internet in Brazil. THE NATIONAL CONGRESS decrees: CHAPTER I PRELIMINAR PROVISIONS Article 1.
More informationOPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE INVOLVEMENT OF CHILDREN IN ARMED CONFLICT
[ ENGLISH TEXT TEXTE ANGLAIS ] OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE INVOLVEMENT OF CHILDREN IN ARMED CONFLICT The States Parties to the present Protocol, Encouraged by
More informationPublic Consultation On Draft Resolution to Issue Anti-SPAM Regulations
Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations Contents Chapter One Introduction Chapter Two Consultation Process Chapter Three Key Principles for Anti-SPAM Draft Regulations Chapter
More informationCredit Union Code for the Protection of Personal Information
Introduction Canada is part of a global economy based on the creation, processing, and exchange of information. The technology underlying the information economy provides a number of benefits that improve
More informationCredit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationPhilippines Philippines Philippinen. Report Q173. in the name of the Philippine Group
Philippines Philippines Philippinen Report Q173 in the name of the Philippine Group Issues of co-existence of trademarks and domain names: public versus private international registration systems 1. Analysis
More informationOF THE REPUBLIC OF ARMENIA ON LIMITED LIABILITY COMPANIES
LAW OF THE REPUBLIC OF ARMENIA Adopted on October 24, 2001 CHAPTER 1. GENERAL PROVISIONS Article 1. Scope of the Law This law regulates the legal relationships arising from establishment, activity, reorganization
More informationPolicy on the Security of Informational Assets
Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources
More informationTHE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING
THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement
More informationPERMANENT COURT OF ARBITRATION OPTIONAL RULES FOR ARBITRATING DISPUTES BETWEEN TWO STATES
PERMANENT COURT OF ARBITRATION OPTIONAL RULES FOR ARBITRATING DISPUTES BETWEEN TWO STATES 39 OPTIONAL ARBITRATION RULES TWO STATES CONTENTS Introduction 43 Section I. Introductory Rules 45 Scope of Application
More informationUnder European law teleradiology is both a health service and an information society service.
ESR statement on the European Commission Staff Working Document on the applicability of the existing EU legal framework to telemedicine services (SWD 2012/413). The European Society of Radiology (ESR)
More informationRE: Comments on Vietnam s Draft Law on Information Security, version 2.22
July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology
More informationREPUBLIC OF ARMENIA LAW ON COMBATING MONEY LAUNDERING AND TERRORISM FINANCING
REPUBLIC OF ARMENIA LAW ON COMBATING MONEY LAUNDERING AND TERRORISM FINANCING CHAPTER 1 GENERAL PROVISIONS The purpose of this Law shall be protecting the rights, freedoms, and legitimate interests of
More informationOnline Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications
Brussels, October 8 th 2008 Online Security, Traffic Data and IP Addresses Review of the Regulatory Framework for Electronic Communications Francisco Mingorance Senior Director Government Affairs franciscom@bsa.org
More informationEBA FINAL draft Regulatory Technical Standards
EBA/RTS/2015/03 03 July 2015 EBA FINAL draft Regulatory Technical Standards on resolution colleges under Article 88(7) of Directive 2014/59/EU Contents 1. Executive summary 3 2. Background and rationale
More informationFederation of Law Societies of Canada
Submission to the Standing Committee on Public Safety and National Security in respect of Bill C-44, An Act to Amend the Canadian Security Intelligence Service Act and other Acts Federation of Law Societies
More informationThe Asian Bankers Association (ABA) And Formal Workout Regime
Position Paper PROVIDING THE LEGAL AND POLICY ENVIRONMENT TO SUPPORT EFFECTIVE INFORMAL WORKOUT REGIMES IN THE ASIA-PACIFIC REGION 1. The Asian Bankers Association (ABA) considers robust insolvency and
More informationCouncil of the European Union Brussels, 26 June 2015 (OR. en)
Council of the European Union Brussels, 26 June 2015 (OR. en) Interinstitutional File: 2012/0011 (COD) 9985/1/15 REV 1 LIMITE DATAPROTECT 103 JAI 465 MI 402 DIGIT 52 DAPIX 100 FREMP 138 COMIX 281 CODEC
More informationDEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT
DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT LAW No. /2003 INTERNAL SECURITY Ensuring internal security constitutes a pre-condition for safeguarding the peace and stability of any sovereign country
More informationInternet Technical Governance: Orange s view
Internet Technical Governance: Orange s view 1 Internet Technical Governance: Orange s view With the increasing use of IP technologies in the electronic communication networks and services, Internet Technical
More informationBASEL CONVENTION ON THE CONTROL OF TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES AND THEIR DISPOSAL
BASEL CONVENTION ON THE CONTROL OF TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES AND THEIR DISPOSAL PROTOCOL ON LIABILITY AND COMPENSATION FOR DAMAGE RESULTING FROM TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES
More informationHuman Services Quality Framework. User Guide
Human Services Quality Framework User Guide Purpose The purpose of the user guide is to assist in interpreting and applying the Human Services Quality Standards and associated indicators across all service
More informationDocket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via ISAO@hq.dhs.gov and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
More informationGARANTE PER LA PROTEZIONE DEI DATI PERSONALI WHEREAS
[doc. web n. 1589969] Spamming: How to Lawfully Email Advertising Messages GARANTE PER LA PROTEZIONE DEI DATI PERSONALI Prof. Stefano Rodotà, President, Prof. Giuseppe Santaniello, Vice-President, Prof.
More informationPROMOTION AND PROTECTION OF INVESTMENT BILL
REPUBLIC OF SOUTH AFRICA PROMOTION AND PROTECTION OF INVESTMENT BILL (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette No. 39009
More informationDEPARTMENT OF HUMAN RESOURCES, SCIENCE AND TECHNOLOGY
AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA Addis Ababa, ETHIOPIA P. O. Box 3243 Telephone: 251 11 5517700 Fax: 251 11 5 517844 website: www.africa-union.org DEPARTMENT OF HUMAN RESOURCES, SCIENCE AND
More informationTHE CONCEPT of State Migration Policy
The Decree of the President of Ukraine, #622/2011 On the Concept of State Migration Policy With a purpose of creation of proper conditions for realization of state policy in the sphere of migration I hereby
More informationSt. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
More informationtechnical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
More informationFreedom of information guidance Exemptions guidance Section 41 Information provided in confidence
Freedom of information guidance Exemptions guidance Section 41 Information provided in confidence 14 May 2008 Contents Introduction 2 What information may be covered by this exemption? 3 Was the information
More informationANNEX FRAMEWORK OF COOPERATION FOR AFRICA TURKEY PARTNERSHIP
ANNEX FRAMEWORK OF COOPERATION FOR AFRICA TURKEY PARTNERSHIP The Heads of State and Government and Heads of Delegation of Africa, representing the Continent and the African Union and its Institutions;
More informationRe: RIN 3235-AL13 - Notice of Proposed Rulemaking: Clearing Agency Standards for Operation and Governance (File Number 57-8-11)
April 29, 2011 Elizabeth M. Murphy Secretary Securities and Exchange Commission 100 F St., NE. Washington DC 20549-1090 Re: RIN 3235-AL13 - Notice of Proposed Rulemaking: Clearing Agency Standards for
More informationConvention on the Promotion of a Transnational Long-term Voluntary Service for Young People
Convention on the Promotion of a Transnational Long-term Voluntary Service for Young People Strasbourg, 11.V.2000 Preamble The member States of the Council of Europe and the other States Parties to the
More informationH. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationFederation of Law Societies of Canada. Ottawa, November 26, 2013
Submission to the Standing Senate Committee on Banking, Trade and Commerce in Respect of Bill C-4 (a second Act to implement certain provisions of the budget tabled in Parliament on March 21, 2013 and
More informationRECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP
RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP 1. Identity Ecosystem Steering Group Charter The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President
More informationHow To Stop Spam
Combating Spam: Policy, Technical and Industry Approaches INTRODUCTION Spam continues to be a significant problem for Internet users and operators, even as email filtering and blocking efforts by network
More informationADDENDUM TO ADMINISTRATIVE SERVICES AGREEMENT FOR HIPAA PRIVACY/SECURITY RULES
ADDENDUM TO ADMINISTRATIVE SERVICES AGREEMENT FOR HIPAA PRIVACY/SECURITY RULES This Addendum is entered into effective as of, by and among Delta Dental of Virginia ("Business Associate"), and ( Covered
More informationTHE EUROPEAN LAW INSTITUTE (ELI)
THE EUROPEAN LAW INSTITUTE (ELI) AISBL IVZW IVOG ARTICLES OF ASSOCIATION: Article 1: Name, Identity and Duration (1) The Association is called "European Law Institute", abbreviated ELI. It may be referred
More informationKenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014
Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 1 July 2014 RESTRICTED 1 ICT as a Modern Solution Security Threats, Early Detection and Prevention
More informationICC Guidelines on Whistleblowing
ICC Guidelines on Whistleblowing Prepared by the ICC Commission on Anti-Corruption A. Introduction 1. No abatement of corruption and economic fraud Fraud remains one of the most problematic issues for
More informationTable of contents: ***
Table of contents: *** In Europe the issue of personal data protection is settled by European Parliament s and European Council s Directive 95/46/WE of October 24, 1995 (which is basis of Polish regulations)
More informationMapping of outsourcing requirements
Mapping of outsourcing requirements Following comments received during the first round of consultation, CEBS and the Committee of European Securities Regulators (CESR) have worked closely together to ensure
More informationPROTECTION OF PERSONAL INFORMATION BILL
REPUBLIC OF SOUTH AFRICA PROTECTION OF PERSONAL INFORMATION BILL (As amended by the Portfolio Committee on Justice and Constitutional Development (National Assembly) after consideration of proposed National
More informationUniversal Declaration on Bioethics and Human Rights
Universal Declaration on Bioethics and Human Rights Adopted by the UNESCO General Conference, 19 October 2005 The General Conference, Conscious of the unique capacity of human beings to reflect upon their
More informationVienna Convention on Succession of States in respect of Treaties
Vienna Convention on Succession of States in respect of Treaties 1978 Done at Vienna on 23 August 1978. Entered into force on 6 November 1996. United Nations, Treaty Series, vol. 1946, p. 3 Copyright United
More informationInformation and Observations on the Scope and Application of Universal Jurisdiction. Resolution 65/33 of the General Assembly
United Nations General Assembly Sixty-seventh Session Sixth Committee Information and Observations on the Scope and Application of Universal Jurisdiction Resolution 65/33 of the General Assembly pursuant
More informationDaniel Castro. Senior Analyst. Information Technology and Innovation Foundation (ITIF)
Daniel Castro Senior Analyst Information Technology and Innovation Foundation (ITIF) Should the Department of Commerce Relinquish Direct Oversight Over ICANN Before the Committee on the Judiciary Subcommittee
More informationTaking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
More informationICMA Private Wealth Management Charter of Quality
ICMA Private Wealth Management Charter of Quality Preamble 1. The Private Wealth Management Charter of Quality ( the Charter of Quality ) is a voluntary standard of recommended minimum good market practice.
More informationPROTECTION OF PERSONAL INFORMATION
PROTECTION OF PERSONAL INFORMATION Definitions Privacy Officer - The person within the Goderich Community Credit Union Limited (GCCU) who is responsible for ensuring compliance with privacy obligations,
More information* * * Initial Provisions for. CHAPTER [ ] - Regulatory Cooperation
REMARKS: This is an initial textual proposal for a draft Chapter on Regulatory Cooperation that the Commission intends to submit to the US on Friday, 30 January, in preparation of the 8 th round of TTIP
More informationCharter of Consumer Rights in the Digital World
DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create
More informationSecond Cyber Security Summit, November 11, 2013 in Bonn Final communique
Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationUNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013
UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 Preliminary Summary of Discussions National Counter- Terrorism Strategies
More informationConference of the States Parties to the United Nations Convention against Corruption
United Nations CAC/COSP/2015/L.7/Rev.2 Conference of the States Parties to the United Nations Convention against Corruption Distr.: Limited 5 November 2015 Original: English Sixth session St. Petersburg,
More informationBinding Corporate Rules ( BCR ) Summary of Third Party Rights
Binding Corporate Rules ( BCR ) Summary of Third Party Rights This document contains in its Sections 3 9 all provision of the Binding Corporate Rules (BCR) for Siemens Group Companies and Other Adopting
More informationUNMIK REGULATION NO. 2003/37 ON THE PROMULGATION OF THE LAW ON POSTAL SERVICES ADOPTED BY THE ASSEMBLY OF KOSOVO
UNITED NATIONS United Nations Interim Administration Mission in Kosovo UNMIK NATIONS UNIES Mission d Administration Intérimaire des Nations Unies au Kosovo UNMIK/REG/2003/37 17 December 2003 REGULATION
More informationAcceptable Use Policy and Terms of Service
Acceptable Use Policy and Terms of Service Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.nic.sucks Version 1.0
More informationSELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF)
1 SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF) A. GENERALITIES Purpose of the Rules 1 The Self-Regulation Rules, enacted by the Association romande des intermédiaires
More informationPractice Note. 10 (Revised) October 2010 AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM
October 2010 Practice Note 10 (Revised) AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM The Auditing Practices Board (APB) is one of the operating bodies of the Financial Reporting
More informationOuagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially
More informationAdvance copy of the authentic text. The copy certified by the Secretary-General will be issued at a later time.
PROTOCOL TO PREVENT, SUPPRESS AND PUNISH TRAFFICKING IN PERSONS, ESPECIALLY WOMEN AND CHILDREN, SUPPLEMENTING THE UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME Advance copy of the authentic
More informationAccreditation by Overseas Qualification, Professional Association Membership or Advanced Standing
BOOKLET C Accreditation by Overseas Qualification, Professional Association Membership or Advanced Standing Information Booklet This booklet has been developed to assist applicants wishing to obtain accreditation
More information