The AU s cybercrime response A positive start, but substantial challenges ahead
|
|
|
- Berenice Atkinson
- 10 years ago
- Views:
Transcription
1 POLICY BRIEF 73 JANUARY 2015 The AU s cybercrime response A positive start, but substantial challenges ahead Eric Tamarkin Recommendations 1African states should ratify the AU Convention on Cyber Security and Personal Data Protection. 2African states should prioritise the implementation of the cybercrime aspects of the convention by enacting comprehensive and harmonised cybercrime laws and enhancing formal and informal international cooperation. 3The AU should support capacity-building so that African states can adopt cybercrime provisions and bolster cybersecurity. 4The AU should provide robust oversight of the implementation of the convention. 5African states should not wait for the convention process to address deficiencies in cybersecurity and gaps in their capacity to fight cybercrime. 6African states pursuing ratification of the AU convention should also take steps to ratify the Council of Europe s Budapest convention, as cybercrime is a global problem that cannot be addressed on the continent alone. Summary African governments, the private sector and individuals increasingly rely on the Internet to conduct sensitive transactions and store important data. Most African states are lagging behind in strengthening cybersecurity and fighting cybercrime; cybercriminals have recognised this vulnerability and are targeting the continent. After a lengthy process, the African Union (AU) recently responded to the surge in cybercrime by adopting the Convention on Cyber Security and Personal Data Protection. Stakeholders have raised several concerns about the convention, including that it is too broad in scope. African states should focus on the convention s cybersecurity and cybercrime provisions first, as it is unrealistic to expect states to implement the entire convention in a timely manner. Additionally, African states must embrace capacity-building efforts and join international cybercrime agreements that reach beyond the African continent. These steps will have the most immediate effect in curbing the growth of cybercrime in Africa and worldwide. Internet penetration is growing exponentially in Africa and around the globe. According to the International Telecommunication Union, by the end of 2014, there will be almost 3 billion Internet users, two-thirds of them coming from the developing world. 1 In Africa, almost 20% of the population will have Internet access by the end of 2014, up from 10% in Much of this growth has been fuelled by a dramatic increase in the use of mobile technology, particularly in Africa. A recent study by technology company Ericsson found that Internet use on mobile phones in sub-saharan Africa was expected to increase 20-fold between the end of 2013 and the end of This is double the rate of growth in the rest of the world. 3 Ericsson determined that by the end of 2014, there
2 policy brief would be over 635 million mobile subscriptions in sub-saharan Africa, and by the end of 2019 the number of subscriptions in the region was expected to reach about 930 million. 4 While increased Internet connectivity is revolutionising daily interactions between individuals, businesses and governments, it has also provided an opening that criminals can exploit. According to a June 2014 study by information and communications technology (ICT) security company McAfee and the Center for Strategic and International Studies, the annual cost to the global economy from cybercrime is more than [US]$445 billion. 5 Because the Internet is globally connected, borderless, anonymous, fast, low-risk, easily accessible and has high volumes of rich data including financial data, personal information, military information and business information, organised criminal entities are increasingly attracted to cybercrime. 6 Organised cybercrime groups now have technical capacity rivalling that of nation states. They can build complex systems aimed at stealing money and intellectual property on a grand scale, costing almost the same to the global economy as counterfeiting or the narcotics trade. 7 African states that fail to adequately address the evolving cybercrime problem will jeopardise their economic growth and national security A report by TrendMicro, an ICT security company, concluded that Africa was becoming a cybercrime safe harbour because of increased Internet availability at lower costs, a rapidly growing Internet user base and a dearth of cybercrime laws on the continent. 8 Cybercriminals in Africa are not only using techniques such as the 419 scam or advance fee fraud that originated in Nigeria, but are also deploying more advanced and lucrative forms of cybercrime that involve the use of botnets, remote access Trojans, and banking/finance-related malware. 9 African states that fail to adequately address the evolving cybercrime problem will jeopardise their economic growth and national security. An effective multilayered approach to combating cybercrime requires the proactive participation of and cooperation between individuals, the private sector and governments. Essential elements of this approach are governments enacting robust laws to criminalise cybercrime, harmonising their cybercrime laws, developing the capacity to enforce cybercrime laws and enhancing timely international cooperation on cybercrime investigations. 27 JUNE 2014 The African Union adopts the AU Convention on Cyber Security and Personal Data Protection Unlike physical crimes, the perpetrators and victims of cybercrime are often in different parts of the world. According to Troels Oerting, head of Europol s Cybercrime Centre, the biggest issue facing cybercrime fighters is the fact that cybercrime is borderless. He noted that because criminals commit their crimes from a distance, Europol cannot use the normal tools to catch them. 10 The transnational nature of most cybercrime adds complexities of sovereignty, jurisdiction, extraterritorial evidence and international cooperation. 11 The additional challenges faced in ensuring international cooperation on fighting cybercrime include extradition, mutual legal assistance, mutual recognition of foreign judgments, and informal police-to-police cooperation. 12 Through the recent adoption of the AU Convention on Cyber Security and Personal Data Protection, the AU took a positive step in addressing some of these problems. 2 The AU s cybercrime response: A positive start, but substantial challenges ahead
3 However, the AU faces significant hurdles in convincing all African states to ratify the convention and implement its provisions. Furthermore, some of the convention s cybercrime provisions remain controversial and it fails to tackle the fact that fighting cybercrime requires international cooperation reaching beyond Africa s geographical borders. The AU convention s circuitous procedural history The AU adopted the convention on 27 June 2014, at the 23 rd Ordinary Session of the Summit of the AU in Malabo, Equatorial Guinea. This was the culmination of a process that started with the Oliver Tambo Declaration at the Extraordinary Session of the AU Ministers in charge of ICT in November 2009 in Johannesburg. This declaration asked that the AU Commission jointly develop with the United Nations Economic Commission for Africa a convention on cyber legislation based on the Continent s needs and which adheres to the legal and regulatory requirements on electronic transactions, cyber security, and personal data protection. 13 It also recommended that AU Member States adopt this convention by After consultations and regional workshops that engaged African stakeholders and international experts, the AU Commission released a draft convention that was endorsed by the AU Conference of Ministers in charge of ICT in Khartoum in September The convention was slated for consideration at the AU Summit in January 2014, but the AU abruptly removed it from the agenda over concerns raised by the private sector, civil society organisations and privacy advocates, 16 including the Kenya ICT Action Network, the Kenyan and Ugandan chapters of the Internet Society, the I-Network in Uganda and the Collaboration on International ICT Policy in East and Southern Africa. 17 Curiously, the convention was tucked away in a 194-page legal instrument that was finally adopted in June 2014 with little fanfare or discussion. Cybercrime provisions in the AU convention The convention attempts to address a wide range of online activities, including electronic commerce, data protection, cybersecurity and cybercrime. Regarding cybercrime, it requires African states to adopt laws that criminalise: Attacks on computer systems (e.g. fraudulently accessing a computer system) Computerised data breaches (e.g. fraudulently intercepting data) Content-related offences (e.g. disseminating child pornography) Offences relating to electronic message security measures Furthermore, the convention emphasises the importance of enhancing international cooperation to fight cybercrime. Article 28 requires states to harmonise cybercrime legislation and regulations to respect the principle of double criminal liability. 18 In order to facilitate information-sharing across borders and enhance collaboration on a bilateral and multilateral basis, the convention calls on states without cybercrime mutual legal assistance agreements to try to rectify this deficit. 19 The convention recognises that building capacity to fight cybercrime is essential, requiring African states to establish appropriate institutions to combat cybercrime and to offer training to those stakeholders tasked with fighting cybercrime. 20 Additionally, it requires that African states enact cybercrime offences that are punishable by effective, proportionate and dissuasive criminal penalties. 21 The convention thus rightly emphasises the need to create sufficient deterrents to reverse the status quo of criminals turning to cybercrime because it is low risk. Article 32 designates the AU Commission Chairperson as responsible for overseeing the establishment and monitoring of the convention. Among other responsibilities, the Chairperson is required to: Encourage African states to adopt and implement the convention s measures Advise African states on how to promote cybersecurity and combat the scourge of cybercrime at a national level Analyse the nature and magnitude of cybercrime, including gathering information about cybercrime activity in Africa and transmitting such information to the competent national authorities Establish partnerships with African civil society and governmental, intergovernmental and non-governmental organisations in order to facilitate dialogue on combating cybercrime Submit regular reports on the progress made by each African state in the implementation of the convention s provisions 22 Fifteen countries must ratify the convention before it enters into force. To date, no countries have done so and the AU faces substantial challenges in convincing states to support the convention and implement its provisions. POLICY BRIEF 73 JANUARY
4 policy brief Concerns over and challenges with the AU approach The convention deserves praise for prioritising the need for African states to address the problem of cybercrime and tackle deficiencies in their cybersecurity. However, it is unclear whether the concerns that had delayed the convention s consideration in January 2014 have been adequately addressed. For example, one Kenyan advocacy group criticised the content-related offences section as imposing dangerously broad limitations on free speech. 23 The draft language that led to those concerns appears to remain substantially unchanged in the final version. In particular, free speech critics of the AU s approach cite the provision that requires the criminalisation of the computerised creation and dissemination of writings, messages, photographs, drawings or any other presentation of ideas or theories of racist or xenophobic nature. 24 Additionally, free speech critics object to the required criminalisation of using a computer system to insult persons for the reason that they belong to a group distinguished by race, colour, descent, national or ethnic origin, or religion or political opinion. 25 Finally, they question the required criminalisation of using a computer system to deliberately deny, approve or justify acts constituting genocide or crimes against humanity. 26 There are further concerns that the scope of the convention is overly ambitious and too cumbersome, as it deals with many areas of electronic activity beyond cybercrime. The few African states that have enacted cybercrime laws, including Cameroon, Kenya, Mauritius, South Africa and Zambia, will have to engage in an arduous process to reconcile differences between their laws and the convention s requirements. 27 The vast majority of African states without cybercrime laws will have to draft cybercrime legislation from scratch. This process will be difficult given the lack of awareness about cybercrime in Africa, the inherent complexities of the problem and deficiencies in capacity across the continent. The vast majority of African states without cybercrime laws will have to draft cybercrime legislation from scratch there are deficiencies in the training of police, prosecutors and judges as well as in developing investigative methods for computer-related crimes and electronic criminal evidence Capacity shortfalls are a particularly challenging hurdle to the timely implementation of the convention s cybercrime provisions. Many African states lack the technical expertise to draft and enforce such laws. Furthermore, there are deficiencies in the training of police, prosecutors and judges as well as in developing investigative methods for computer-related crimes and electronic criminal evidence. According to a cybercrime study by the United Nations Office on Drugs and Crime (UNODC), every country in Africa that responded to its questionnaire indicated a need for technical assistance. 28 Respondents sought assistance in international cooperation and prosecution, computer forensics and evidence, general cybercrime investigations and trial support. 29 The AU has recognised these challenges and tasked the New Partnership for Africa s Development (NEPAD) with developing and implementing a capacity-building project that closes the following capacity gaps: Shortage of expertise and resources to help African states ratify and transpose the convention and monitor progress 4 The AU s cybercrime response: A positive start, but substantial challenges ahead
5 Lack of cybercrime and cybersecurity legal and regulatory environments in African states Shortage of a high-quality cybersecurity workforce and of public and private leadership Deficiencies in educational and training platforms required to develop and support a future cybersecurity workforce Limited availability and use of technology, processes, business models and standards to manage cyber risks to individuals, the private sector and governments 30 Unfortunately, NEPAD may not have the necessary resources to fund this plan and, as a result, the burden of capacity building may fall on traditional development partners outside Africa. For example, the United States recently hosted a sub-saharan African cybersecurity and cybercrime workshop in Botswana at which 15 Southern African states were represented. 31 Among other issues, the programme focused on mobile device security, a key concern for the continent given the tremendous growth in mobile technologies in Africa. Too many international cybercrime instruments? The AU convention faces another challenge in that it joins a crowded field of bilateral and multilateral cybercrime conventions, draft frameworks and model laws. In Africa, regional economic communities (RECs) have developed the following: East African Community (EAC) Draft Legal Framework for Cyberlaws (2008) Economic Community of West African States (ECOWAS) Draft Directive on Fighting Cybercrime (2009) Common Market for Eastern and Southern Africa (COMESA) Cyber Security Draft Model Bill (2011) Southern African Development Community (SADC) Model Law on Computer Crime and Cybercrime (2012) The EAC draft legal framework, the COMESA draft model bill and the SADC model law are non-binding instruments that are not intended to create legal obligations for states. 32 Instead, these instruments are designed to serve as inspiration or models for [the] development of national legislative provisions. 33 In contrast, the AU convention and the ECOWAS directive are binding measures that create legal obligations on member states. Regardless of their form, instruments developed by RECs have had difficulty gaining support in their respective regions. Whether the AU convention will have more success across the continent is yet to be determined. In addition to the competing cybercrime instruments in Africa, there is an array of other international instruments initiated outside the continent. The Council of Europe s Convention on Cybercrime (the Budapest convention), which opened for signature on 23 November 2001 and entered into force on 1 July 2004, is the most broadly supported. To date, 44 states have ratified the Budapest convention, but Mauritius is the only African state to have taken that step. South Africa signed the Budapest convention in November 2001 but has yet to ratify, and Morocco 34 and Senegal are in the process of joining. Besides specifying cyber acts that should be criminalised, the Budapest convention requires that states harmonise their cybercrime laws, develop the capacity to investigate online crimes and establish mechanisms to facilitate formal and informal international cooperation. It is not surprising that the AU convention s language has generated similar free speech concerns The Council of Europe has also adopted the Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems. This additional protocol, which was opened for signature on 28 January 2003 and entered into force on 1 March 2006, was separated from the core provisions of the Budapest convention in response to free speech concerns raised by several states. Thus far only 22 countries have ratified the additional protocol. While no African states have ratified it, South Africa became a signatory as of April Since the cybercrime provisions of the AU convention contain similar language as the additional protocol, it is not surprising that the AU convention s language has generated similar free speech concerns. In a competing instrument adopted in 2009, China, Russia, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan endorsed the Shanghai Cooperation Organization Agreement on Cooperation in the Field of International Information Security. Rather than specifying cyber acts that should be criminalised or identifying ways to enhance international cooperation, this agreement is a broad policy document that focuses on information security. 35 Parties to this agreement seek to reframe the cybercrime debate by emphasising the need to enact controls to block online content that could destabilise a state s political, economic and social systems. Russia and China also backed an unsuccessful effort in 2010 to create a new United Nations treaty on cybercrime that POLICY BRIEF 73 JANUARY
6 policy brief focused on information security. They are currently negotiating a bilateral agreement on cybersecurity that is expected to be finalised in early A problem with regional or bilateral cybercrime instruments is that they create a cooperation cluster that is unable to address the global nature of cybercrime. 36 Under the current system, states that are not parties to the same agreement are restricted to traditional modes of international cooperation that fail to provide the mechanisms to handle the real-time information-sharing and data-preservation aspects of electronic evidence. 37 Conclusion Despite the substantial hurdles and shortcomings of the international treaty approach, states that coalesce around a common instrument will have a stronger position in the global fight against cybercrime. So long as there remains a weak link in the cybersecurity chain, cybercriminals will seek to exploit it. Unless and until there is broad global agreement on criminalising cybercrime and robust international cooperation to enforce those laws, cybercriminals operating in cybercrime safe havens will continue to target individuals, businesses and governments with impunity. If Africa becomes known as a cybercrime safe harbour, this could have devastating consequences for the continent s potential growth. Furthermore, if an African state becomes known as a hospitable environment for cybercriminals, it will not only damage that country but will also have a negatively impact on the reputation of the continent as a whole. The AU s convention is a positive step toward prodding African states into taking proactive domestic measures to help curb the scourge of cybercrime. The Budapest convention remains the best available instrument to unite the international community under a common framework to fight cybercrime, but African states should not wait for the international cybercrime treaty process to unfold, as ratification is not a panacea to the cybercrime problem. They should instead focus on shoring up their cybersecurity and enhancing their capacity to fight cybercrime without delay. Notes 1 International Telecommunication Union, ITU releases 2014 ICT figures, 5 May 2014, pressoffice/press_releases/2014/23.aspx#.vhhussib3s8. 2 Ibid. 3 Ericsson, Sub-Saharan Africa: Ericsson Mobility Report Appendix, June 2014, docs/2014/emr-june2014-regional-appendices-ssa.pdf. 4 Ibid. 5 Center for Strategic and International Studies and McAfee, Net losses: estimating the global cost of cybercrime: economic impact of cybercrime II, June 2014, rp-economic-impact-cybercrime2.pdf. African states should not wait for the international cybercrime treaty process to unfold, as ratification is not a panacea to the cybercrime problem 6 Australian Crime Commission, Organised crime: cybercrime, organised-crime/crime-enablers-and-pathways/cybercrime. 7 S. Ranger, Organised cybercrime groups are now as powerful as nations, ZDNet, 9 June 2014, L. Kharouni, Africa: a new safe harbor for cybercriminals?, Trend Micro Inc., Research Paper, 2013, 9 Trend Micro, Checking in on Africa: the latest developments in cybercrime, 11 August 2014, blog.trendmicro.com/trendlabs-security-intelligence/checking-in-on-africa-the-latest-developments-incybercrime/. 6 The AU s cybercrime response: A positive start, but substantial challenges ahead
7 10 Only 100 cybercrime brains worldwide says Europol boss, BBC News, 10 October 2014, 11 United Nations Office on Drugs and Crime (UNODC), Comprehensive study on cybercrime: draft February 2013, February 2013, xxiv, www. unodc.org/documents/organized-crime/unodc_ccpcj_eg.4_2013/ CYBERCRIME_STUDY_ pdf. 12 Ibid., xxv. 13 African Union (AU), Oliver Tambo Declaration, Johannesburg, South Africa, 5 November 2009, TheOliverTamboDeclaration.pdf. 14 Ibid. 15 AU, Report on experts session, Khartoum, Sudan, 2 4 September 2012, CITMC4_EN_Final_0.pdf. 16 E Kenyanito, Africa moves towards a common cyber security legal framework, Access Blog, 2 June 2014, blog/2014/06/02/africa-moves-towards-a-common-cyber-security-legalframework. 17 Ibid. 18 AU, Convention on Cyber Security and Personal Data Protection, 30, CSConvention.pdf. 19 Ibid. 20 Ibid., Ibid., Ibid., Centre for Intellectual Property and Information Technology Law, Letter to the African Union, key=key-2gk1zf4n9bc15cqfhrbv&allow_share=true&escape=false&view_ mode=scroll. 24 AU, Convention on Cyber Security and Personal Data Protection, 33, CSConvention.pdf. 25 Ibid., Ibid. 27 According to the Global Centre for Information and Communication Technologies in Parliament, only five African countries have enacted cybercrime laws: Cameroon s Cybersécurité et la Cybercriminalité au Cameroun (2010), Kenya s Communications (Amendment) Act (2009), Mauritius Computer Misuse and Cybercrime Act (2003), South Africa s Electronic Communications and Transactions Act (2002), and Zambia s Computer Misuse and Crimes Act (2004). 28 UNODC, Comprehensive study on cybercrime: draft February 2013, February 2013, 178, UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_ pdf. Eleven African countries responded to the UNODC cybercrime questionnaire. 29 Ibid. 30 The New Partnership for Africa s Development e-africa Programme Infrastructure Strategic Business Unit, Draft cyber security capacity building project, October United States State Department, Sub-Saharan African Cybersecurity and Cybercrime Workshop, 4 6 June 2014, ps/2014/06/ htm. 32 UNODC, Comprehensive study on cybercrime: draft February 2013, February 2013, 65, UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_ pdf. 33 Ibid. 34 Morocco is not a part of the AU and thus not eligible to ratify the AU convention. 35 UNODC, Comprehensive study on cybercrime: draft February 2013, February 2013, 69, UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_ pdf. 36 Ibid., Ibid. POLICY BRIEF 73 JANUARY
8 POLICY BRIEF About the author Eric Tamarkin is an independent researcher. He previously served as a Senior Counsel to the United States Senate Homeland Security and Governmental Affairs Committee, where he specialised in cybersecurity policy. About the ISS The Institute for Security Studies is an African organisation that aims to enhance human security on the continent. It does independent and authoritative research, provides expert policy analysis and advice, and delivers practical training and technical assistance. Acknowledgements The ISS is grateful for support from the following members of the ISS Partnership Forum: the governments of Australia, Canada, Denmark, Finland, Japan, Netherlands, Norway, Sweden and the USA. ISS Pretoria Block C, Brooklyn Court 361 Veale Street New Muckleneuk Pretoria, South Africa Tel: Fax: [email protected] ISS Addis Ababa 5th Floor, Get House Building, Africa Avenue Addis Ababa, Ethiopia Tel: Fax: [email protected] ISS Dakar 4th Floor, Immeuble Atryum Route de Ouakam Dakar, Senegal Tel: /42 Fax: [email protected] ISS Nairobi Braeside Gardens off Muthangari Road Lavington, Nairobi, Kenya Cell: Cell: [email protected] , Institute for Security Studies Copyright in the volume as a whole is vested in the Institute for Security Studies and the author, and no part may be reproduced in whole or in part without the express permission, in writing, of both the authors and the publishers. The opinions expressed do not reflect those of the ISS, its trustees, members of the Advisory Council or donors. Authors contribute to ISS publications in their personal capacity. ISS Policy Brief No 73
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
CYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?
2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M.Maybaum, A.-M.Osula, L.Lindström (Eds.) 2015 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies
Cyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children
Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially
Cybersecurity Governance
AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
2. Cyber legislation harmonization process in Central Africa
Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation
Cybercrime & Cybersecurity
Cybercrime & Cybersecurity Professor Ian Walden Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London Introductory Remarks Inherently transnational
Australia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: [email protected] Australia
Optional Protocol on the sale of children, child prostitution and child pornography
United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol
Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section
Transnational Challenges and Approaches to Investigating Trafficking Offences Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Trafficking in persons: a low risk / high profit crime
Update on the Continental Free Trade Area (CFTA)
AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA P. O. Box 3243, Addis Ababa, ETHIOPIA Tel.: (251-11) 5182402 Fax: (251-11) 5182400 Website: www.au.int Update on the Continental Free Trade Area (CFTA) PROGRESS
Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime
COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES
CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES [As finalized by the ASEAN Ad-Hoc Working Group on Trafficking in Persons, 25 June 2007, Vientiane, Lao PDR; and endorsed
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
Summary of key points & outcomes
Roundtable discussion on Prospects for international criminal justice in Africa: lessons from eastern and southern Africa, and Sudan 8 Dec 2008, Pretoria Summary of key points & outcomes Aims of the roundtable
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
Migration/ Asylum. Co-operation in the field of drugs
Non-exhaustive list of issues and questions to facilitate preparations for the bilateral meeting with Turkey in the area of Chapter 24 Justice, freedom and security Migration/ Asylum - Which are currently
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia
Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia Criminal legal framework In 2009 the Republic of Serbia ratified the Convention on Cybercrime adopted in Budapest 2001 as
ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye
ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye Director, ISS Regional Office for West Africa [email protected] 0 www.issafrica.org OUTLINE Historical Overview
Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign
PARLIAMENTS UNITED in combating sexual violence against children Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign Tanja Kleinsorge Head of the
Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice
Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice We, the States Members of the United Nations, Having assembled at the Eleventh United Nations Congress
A GLOBAL STRATEGY OF MIGRATION FOR DEVELOPMENT
A GLOBAL STRATEGY OF MIGRATION FOR DEVELOPMENT BEYOND THE MIDA APPROACH TO MOBILIZING AND SHARING OF HUMAN AND FINANCIAL RESOURCES OF THE OVERSEAS AFRICAN COMMUNITY 2006-2010 Geneva, June 2006 FOREWORD
Cybercrime: Improving international cooperation
The Hague, 12/06/2015 Cybercrime: Improving international cooperation GCCS2015 Parallel session 4 Document Reference [765004] Version [2] Discussion paper Europol Public Information 1 Introduction In preparation
STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK
Final COMMON STEPS TOWARDS VISA FREE SHORT-TERM TRAVEL OF RUSSIAN AND EU CITIZENS (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK The European Union and the Russian Federation reiterate their international
Cyber Security @ ITU. By Tomas Lamanauskas, ITU
Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and
Minister Shatter presents Presidency priorities in the JHA area to European Parliament
Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency
CISSA Cybersecurity capacity building workshop. May 2015
CISSA Cybersecurity capacity building workshop Good Practices in Developing Cybersecurity and Cybercrime Strategies Prof Anthoni van Nieuwkerk Centre for Defence and Security Management University of the
CRC/C/OPSC/SWE/CO/1. Convention on the Rights of the Child. United Nations
United Nations Convention on the Rights of the Child CRC/C/OPSC/SWE/CO/1 Distr.: General 23 January 2012 Original: English Committee on the Rights of the Child Fifty-eighth session 19 September 7 October
PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS
PROTECTION, ASSISTANCE AND SUPPORT OF CHILD VICTIMS PUBLIC HEARING Combating sexual abuse, sexual exploitation of children and child pornography Committee on Civil Liberties, Justice and Home Affairs 28-29
Commonwealth Organised Crime Strategic Framework: Overview
Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart
Fact sheet 2 Overview of the Extradition Process
Fact sheet 2 Overview of the Extradition Process This fact sheet is information, not legal advice This fact sheet provides general information only. It does not give legal advice on the operation of the
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
Presidency conclusions on establishing a strategy to combat the manipulation of sport results
COU CIL OF THE EUROPEA U IO EN Presidency conclusions on establishing a strategy to combat the manipulation of sport results 3201st EDUCATIO, YOUTH, CULTURE and SPORT Council meeting Brussels, 26 and 27
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME
1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
Cybersecurity in the Commonwealth: Setting the Stage
Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if
G20 ANTI-CORRUPTION WORKING GROUP PROGRESS REPORT 2013
G20 ANTI-CORRUPTION WORKING GROUP PROGRESS REPORT 2013 September, 2013 G20 Anti-Corruption Working Group Progress Report 2013 ANTI-CORRUPTION WORKING GROUP PROGRESS Introduction 1. The renewal of the G20
5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
Declaration of the Ministerial Conference of the Khartoum Process
Declaration of the Ministerial Conference of the Khartoum Process (EU-Horn of Africa Migration Route Initiative) Rome, 28 th November 2014 We, Ministers of the following countries: Austria, Belgium, Bulgaria,
UNIÃO AFRICANA Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) 5513 822 Fax: (251-11) 5519 321 Email: situationroom@africa-union.
AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) 5513 822 Fax: (251-11) 5519 321 Email: [email protected] ACTION PLAN FOR THE IMPLEMENTATION
Breakout Session B: Cyber Security and Cybercrime Trends in Africa
Breakout Session B: Cyber Security and Cybercrime Trends in Africa Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop
Twelfth United Nations Congress on Crime Prevention and Criminal Justice
United Nations A/65/92 General Assembly Distr.: General 10 June 2010 Original: English Sixty-fifth session Item 107 of the preliminary list * Crime prevention and criminal justice Twelfth United Nations
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers
Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police
Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
Section 1: Development of the EU s competence in the field of police and judicial cooperation in criminal matters
CALL FOR EVIDENCE ON THE GOVERNMENT S REVIEW OF THE BALANCE OF COMPETENCES BETWEEN THE UNITED KINGDOM AND THE EUROPEAN UNION Police and Criminal Justice LEGAL ANNEX Section 1: Development of the EU s competence
A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
Recommendations to eliminate illegal killing and taking of birds. Legal perspective
Recommendations to eliminate illegal killing and taking of birds. Legal perspective Workshop on Environmental Crime: Illegal killing and taking of birds 11th February 2015 Madrid The present document provides
ITU Global Cybersecurity Agenda (GCA)
International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,
REPORT OF THE COMMITTEE OF EMINENT AFRICAN JURISTS ON THE CASE OF HISSENE HABRE
AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA Addis Ababa, ETHIOPIA P. O. Box 3243 Telephone : +251-115- 517 700 Fax : +251-115- 517844 website : www. africa-union.org REPORT OF THE COMMITTEE OF EMINENT
Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,
Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach, Organized by American Chamber of Commerce in Cyprus, 30 October
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit
Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
The global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
64/180. 2 A/CONF.213/RPM.1/1, A/CONF.213/RPM.2/1, A/CONF.213/RPM.3/1 and
Salvador Declaration on Comprehensive Strategies for Global Challenges: Crime Prevention and Criminal Justice Systems and Their Development in a Changing World We, the States Members of the United Nations,
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
Information and Observations on the Scope and Application of Universal Jurisdiction. Resolution 65/33 of the General Assembly
United Nations General Assembly Sixty-seventh Session Sixth Committee Information and Observations on the Scope and Application of Universal Jurisdiction Resolution 65/33 of the General Assembly pursuant
COUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
CRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations
United Nations Convention on the Rights of the Child CRC/C/OPAC/NLD/CO/1 Distr.: General 5 June 2015 ADVANCE UNEDITED VERSION Original: English Committee on the Rights of the Child Concluding observations
Advance copy of the authentic text. The copy certified by the Secretary-General will be issued at a later time.
PROTOCOL TO PREVENT, SUPPRESS AND PUNISH TRAFFICKING IN PERSONS, ESPECIALLY WOMEN AND CHILDREN, SUPPLEMENTING THE UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME Advance copy of the authentic
Reaffirming Bearing in mind Recognizing
AFRICAN UNION MEMORANDUM OF UNDERSTANDING ON COOPERATION IN THE AREA OF PEACE AND SECURITY BETWEEN THE AFRICAN UNION, THE REGIONAL ECONOMIC COMMUNITIES AND THE COORDINATING MECHANISMS OF THE REGIONAL STANDBY
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
Expert Group Meeting on the Technical and Legal Obstacles to the Use of Videoconferencing
20 October 2010 Original: English Conference of the Parties to the United Nations Convention against Transnational Organized Crime Fifth session Vienna, 18-22 October 2010 Agenda item 6 * International
12 th -16 th May 2013 ---------------------------------------------------------------------------------------------------- Country Progress Report
ASEAN INTER-PARLIAMENTARY ASSEMBLY The Tenth Meeting of the AIPA Fact-Finding Committee (AIFOCOM) to Combat the Drug Menace Bandar Seri Begawan, Brunei Darussalam 12 th -16 th May 2013 ----------------------------------------------------------------------------------------------------
KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA
KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA We, the Representatives of the African Parliaments to the Kigali International Conference Recalling the commitment of
SPEECH FOR THE SIGNING OF BILATERAL AIR SERVICE AGREEMENT (BASA) WITH BOTSWANA, ETHIOPIA AND MAURITIUS IN GABORONE, BOTSWANA
REPUBLIC OF BOTSWANA SPEECH FOR THE SIGNING OF BILATERAL AIR SERVICE AGREEMENT (BASA) WITH BOTSWANA, ETHIOPIA AND MAURITIUS IN GABORONE, BOTSWANA BY HONOURABLE NONOFO E. MOLEFHI M.P, MINISTER OF TRANSPORT
DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA
AHG/Decl.2 (XXXII) 32 nd OAU Summit DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA The features of the Plan of Action elaborated herewith comprise five sections
T-CY Guidance Note #4 Identity theft and phishing in relation to fraud
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
LAW ENFORCEMENT and LEGAL FRAMEWORK (EAST AFRICAN REGION)
LAW ENFORCEMENT and LEGAL FRAMEWORK (EAST AFRICAN REGION) Presentation by: Japheth Kasimbu (ANPPCAN) BACKGROUND 2007 - ANPPCAN held an international conference on child sexual abuse Issues deliberated
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
MULTILATERAL MEMORANDUM OF UNDERSTANDING CONCERNING CO-OPERATION IN THE EXCHANGE OF INFORMATION FOR AUDIT OVERSIGHT
MULTILATERAL MEMORANDUM OF UNDERSTANDING CONCERNING CO-OPERATION IN THE EXCHANGE OF INFORMATION FOR AUDIT OVERSIGHT INTERNATIONAL FORUM OF INDEPENDENT AUDIT REGULATORS Adopted on June 30, 2015 1 Table
Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.
FAQs - Harmful Digital Communications Bill What are harmful digital communications? Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. Examples include sending
Home Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
