NIGERIAN CYBERCRIME ACT 2015
|
|
|
- Karen Randall
- 9 years ago
- Views:
Transcription
1 NIGERIAN CYBERCRIME ACT 2015 A Legal Review Focusing on Compliance and Enforcement Challenges Basil Udotai, Esq., Managing Partner, Technology Advisors ICT LAWYERS & CONSULTANTS
2 Digital Weak Link For years the Nigerian digital economy had carried on with the absence of a legal framework for cybercrime/ cybersecurity; a glaring gap in law enforcement/ nalonal security framework as well as a debilitalng weak link in our digital economy value chain; Has the Nigerian Cybercrime Act ably responded by filling the gap and strengthening the weak link? Does the law enforcement framework insltuted in the law reflect current cybercrime and cybersecurity challenges; would it lead to effeclve and efficient enforcement of the Act; and facilitate ease of compliance?
3 Milestones Pat on the Back: First ever statutory instrument criminalizing online aclons, prescribing punishment and crealng legal procedures for inveslgalon, proseculon and enforcement; InternaLonal Legal CooperaLon bealng the Dual Criminality challenge; CriLcal InformaLon Infrastructure ProtecLon (CIIP); InsLtuLonalized CERT and a NaLonal Forensic Lab; CreaLon of Regulatory Mandate over Cybercrime & Cybersecurity in the A\orney General of the FederaLon; Created a Stakeholder Community through the Advisory Council; Truly ground breaking with potenlal to greatly impact jurisprudence and legal development; governance (egovt); businesses and commercial aclviles; law enforcement and nalonal security; foreign direct investment and economic growth, etc
4 What are the Challenges? Challenges: Decentralized and Distributed Enforcement Framework; Issues with compliance; Possible ConsLtuLonal challenge (the NSA Act); Impact of the Cybersecurity Fund doub_ul; Technology- specificity; Special provisions on the Financial Sector worrisome (needless really); and tendency for focus shiaing dangerous; Unnecessarily TransacLonal in certain areas;
5 Why? Long, tortuous and complicated LegislaLve History: 2004/5 Cybercrime Bill 2005 by the Nigerian Cybercrime Working Group (NCWG) Computer Security Bill; More than 10 different bills (including the Electronic Fraud ProtecLon Bill sponsored by Senator Ayo Arise of EkiL) 2011 HarmonizaLon of the various bills by the ONSA culminated in the Cybersecurity Bill 2011; and A\orney General inilated process resulted in the Cybercrimes Act 2015; - The Former A\orney General and the last NaLonal Assembly could have done a be\er job at this NOTE: I was involved in the process up to 2011; provided only nonbinding and informal advise between
6 There is no operalng system or technology that has not yet been hacked! And some of the most protected and secured corporalons and governments insltulons have already been compromised!!!
7
8 Dr. Ibe Kachikwu - Appointed August 4; Impersonated same day, NNPC reacted August 16
9 Ideally The principles around Cybercrime LegislaLons require that the law focuses on : computer- related offences; Content- related offences; Computer integrity offences; JurisdicLon and Procedural issues: InternaLonal harmonizalon/relalons; A review of the law indicates that in addilon to meelng the foregoing milestones commendably, the draaers made strenuous efforts in seeking to bank transaclons: the DANGER of a single story
10 INTRODUCTION Summary of the Act Summary of the Act The Cybercrime Act is made up of: 59 SecLons 8 Parts; and 2 Schedules; 1st Schedule lists the Cybercrime Advisory Council; 2nd Schedule lists businesses to be levied for the purpose of the Cybersecurity Fund under S.44(2)(a): GSM service providers and all telecom companies Internet service providers Banks and other financial insltulons Insurance companies Nigerian Stock Exchange
11 Summary of the Act The Act is comprehensive in its coverage: CriLcal Infrastructure ProtecLon; Computer related offences; Content related offences; Offences against integrity, funclonality and confidenlality of systems and networks; Procedural provisions inveslgalon, proseculon and general enforcement; JurisdicLon and InternaLonal CooperaLon
12 SecLon- by- SecLon Review Part I- Objects and ApplicaLon SecLon 1: ObjecLves SecLon 2: ApplicaLon Part II- proteclon of crilcal NaLonal InformaLon Infrastructure SecLon 3: DesignaLon of certain computer systems or networks as CriLcal NaLonal InformaLon Infrastructure. SecLon 4: Audit and InspecLon of CriLcal NaLonal InformaLon Infrastructure.
13 SecLon- by- SecLon Part III- offences & PenalLes SecLon 5: Offences against CriLcal NaLonal InformaLon Infrastructure SecLon 6: Unlawful Access to computers SecLon 7: RegistraLon of Cybercafé SecLon 8: System Interference. SecLon 9: IntercepLng Electronic Messages, s Electronic Money Transfers. SecLon 10: Tampering with CriLcal Infrastructure SecLon 11: Willful MisdirecLon of Electronic Messages. SecLon 12: Unlawful interceplons. SecLon 13: Computer Related Forgery. SecLon 14: Computer Related Fraud. SecLon 15: Thea of Electronic Devices. SecLon 16: Unauthorized modificalon of computer systems, network data and System interference. SecLon 17: Electronic Signatures. SecLon 18: Cyber Terrorism.
14 SecLon- by- SecLon Offences & PenalLes SecLon 19: ExcepLons to Financial InsLtuLons PosLng and authorized oplons. SecLon 20: Fraudulent issuance of E- InstrucLons. SecLon 21: ReporLng of Cyber Threats. SecLon 22: IdenLty thea and impersonalon. SecLon 23: Child pornography and related offences. SecLon 24: Cyberstalking. SecLon 25: Cybersquapng. SecLon 26: Racist and xenophobic offences. SecLon 27: A\empt, conspiracy, aiding and abepng. SecLon 28: ImportaLon and fabricalon of E- Tools. SecLon 29: Breach of Confidence by Service Providers SecLon 30: ManipulaLon of ATM/POS Terminals. SecLon 31: Employees Responsibility SecLon 32: Phishing, Spamming, Spreading of Computer Virus. SecLon 33: Electronic cards related fraud. SecLon 34: Dealing in Card of Another. SecLon 35: Purchase or Sale of Card of Another SecLon 36: Use of Fraudulent Device or A\ached E- mails and Websites.
15 SecLon- by- SecLon Offences & PenalLes/AdministraLon Part IV- DuLes of Financial InsLtuLons SecLon 37: DuLes of Financial InsLtuLons DuLes of Service Providers SecLon 38: Records retenlon and proteclon of data. SecLon 39: IntercepLon of electronic communicalons SecLon 40: Failure of service provider to perform certain dules. Part V- AdministraLon and Enforcement SecLon 41: Co- ordinalon and enforcement. SecLon 42: Establishment of the Cybercrime Advisory Council SecLon 43: FuncLons and powers of the Council SecLon 44: Establishment of NaLonal Cyber Security Fund
16 SecLon- by- SecLon Part VI- Arrest, Search, Seizure and ProsecuLon SecLon 45: Power of arrest, search and seizure. SecLon 46: ObstrucLon and refusal to release informalon SecLon 47: ProsecuLon of offences SecLon 48: Order of forfeiture of assets. SecLon 49: Order for payment of compensalon or resltulon. Part VII- JurisdicLon and InternaLonal Co- operalon SecLon 50: JurisdicLon SecLon 51: ExtradiLon. SecLon 52: Request for mutual assistance SecLon 53: Evidence pursuant to a request. SecLon 54: Form of request from a foreign state. SecLon 55: Expedited PreservaLon of computer data SecLon 56: DesignaLon of contact point. Part VIII- Miscellaneous SecLon 57: RegulaLons. SecLon 58: InterpretaLon. SecLon 59: CitaLon
17 Enforcement Framework Is there a conspiracy to ensure Nigeria doesn t enforce cybercrime? You may feel that way if you look at the enforcement framework designed for this Law. But I think it was an error, which should be corrected: Decentralized and Distributed Enforcement Framework: NSA to coordinate enforcement by all LEA and Security Agencies ( relevant law enforcement agencies ); - Cybercrime inveslgalon, proseculon and enforcement separated? - TradiLonal approach in our Criminal JusLce System; - Usually based on CONFERED Authority; - Unprecedented departure from the norm, and very unlikely to work; - Threat of chaolc compliance
18 Possible ConsLtuLonal Challenge The NSA Act CONSTITUTION OF THE FEDERAL REPUBLIC OF NIGERIA SecLon (1) Subject to the provisions of this ConsLtuLon, an exislng law shall have effect with such modificalons as may be necessary to bring it into conformity with the provisions of this ConsLtuLon and shall be deemed to be - (a) an Act of the NaLonal Assembly to the extent that it is a law with respect to any ma\er on which the NaLonal Assembly is empowered by this ConsLtuLon to make laws; and (b) a Law made by a House of Assembly to the extent that it is a law with respect to any ma\er on which a House of Assembly is empowered by this ConsLtuLon to make laws. (2) The appropriate authority may at any Lme by order make such modificalons in the text of any exislng law as the appropriate authority considers necessary or expedient to bring that law into conformity with the provisions of this ConsLtuLon. (3) Nothing in this ConsLtuLon shall be construed as affeclng the power of a court of law or any tribunal established by law to declare invalid any provision of an exislng law on the ground of inconsistency with the provision of any other law, that is to say- (a) any other exislng law; (b) a Law of a House of Assembly; (c) an Act of the NaLonal Assembly; or (d) any provision of this ConsLtuLon. (4) In this seclon, the following expressions have the meanings assigned to them, respeclvely - (a) "appropriate authority" means - (i) the President, in relalon to the provisions of any law of the FederaLon, (ii) the Governor of a State, in relalon to the provisions of any exislng law deemed to be a Law made by the House of Assembly of that State, or (iii) any person appointed by any law to revise or rewrite the laws of the FederaLon or of a State;
19 ConsLtuLon and the NSA Act (b) "exislng law" means any law and includes any rule of law or any enactment or instrument whatsoever which is in force immediately before the date when this seclon comes into force or which having been passed or made before that date comes into force aaer that date; and (c) "modificalon" includes addilon, alteralon, omission or repeal. (5) Nothing in this ConsLtuLon shall invalidate the following enactments, that is to say - (a) the NaLonal Youth Service Corps Decree 1993; (b) the Public Complaints Commission Act; (c) the NaLonal Security Agencies Act; (d) the Land Use Act, and the provisions of those enactments shall conlnue to apply and have full effect in accordance with their tenor and to the like extent as any other provisions forming part of this ConsLtuLon and shall not be altered or repealed except in accordance with the provisions of seclon 9 (2) of this ConsLtuLon. (6) Without prejudice to subseclon (5) of this seclon, the enactments menloned in the said subseclon shall hereaaer conlnue to have effect as Federal enactments and as if they related to ma\ers included in the Exclusive LegislaLve List set out in Part I of the Second Schedule to this ConsLtuLon.
20 Cybersecurity Fund MAY NOT DELIVER: - By SecLon 44 (a) levy of of all electronic transaclons by the businesses specified in the second schedule to this Act: GSM service providers and all telecom companies Internet service providers Banks and other financial insltulons Insurance companies Nigerian Stock Exchange With a trillion or so worth of transaclons, someone put the number that is likely to result to the fund at N600m
21 CONCLUSION The Cybercrime Act though long in coming and beset with certain challenging components, may be applied to effeclve tackle Nigeria s cybercrime and cybersecurity challenges. But deliberate efforts have to be made by the key players; ONSA and the OAGF working with stakeholders to make this a reality
22 CONTACT: THANK YOU
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES
LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, OUTLINE Interconnected world The Nigerian
CYBERSECURITY BILL, 2011
CYBERSECURITY BILL, 2011 Page 1 of 19 CYBERSECURITY BILL, 2011 ARRANGEMENT OF SECTIONS Sections PART I - GENERAL PROVISIONS 1 Objects and scope PART II OFFENCES AND PENALTIES 2. Unlawful access to a computer
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
CYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION
GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol
DEBT MANAGEMENT OFFICE (ESTABLISHMENT, ETC.) ACT
DEBT MANAGEMENT OFFICE (ESTABLISHMENT, ETC.) ACT ARRANGEMENT OF SECTIONS PART I Preliminary SECTION 1. Short title. 2. Commencement. 3. Interpretation. PART II Establishment of the Debt Management Office,
2016 -- H 7542 S T A T E O F R H O D E I S L A N D
LC00 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO PUBLIC UTILITIES AND CARRIERS - DUTIES OF UTILITIES AND CARRIERS Introduced By: Representatives
THE MURREE-KAHUTA DEVELOPMENT AUTHORITY ACT, 1986
1 of 8 6/2/2011 4:18 PM THE MURREE-KAHUTA DEVELOPMENT AUTHORITY ACT, 1986 (Pb. Act I of 1987) C O N T E N T S SECTIONS CHAPTER I PRELIMINARY 1. Short title, extent and commencement. 2. Definitions. CHAPTER
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
LEGAL AID ACT ARRANGEMENT OF SECTIONS PART I. Establishment of Legal Aid Council. 1. Legal Aid Council. 2. Membership of the Council, etc.
LEGAL AID ACT ARRANGEMENT OF SECTIONS PART I Establishment of Legal Aid Council 1. Legal Aid Council. 2. Membership of the Council, etc. 3. Director-General of Legal Aid and other staff of the Council.
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
CREDIT REPORTING BILL EXPLANATORY NOTES
CREDIT REPORTING BILL EXPLANATORY NOTES INTRODUCTION These explanatory notes are intended as a guide to the proposed new Act. They are not meant as a substitute for a careful reading of the Bill itself.
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
The Health Information Protection Act
1 The Health Information Protection Act being Chapter H-0.021* of the Statutes of Saskatchewan, 1999 (effective September 1, 2003, except for subsections 17(1), 18(2) and (4) and section 69) as amended
Broker agreement (Group Insurance & Group Annuities)
This agreement entered into Between: ( the Company ) and ( the Broker ) witnesseth that in consideration of the mutual covenants of the parties herein contained, the parties hereto agree as follows: 1.
New South Wales. 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness?
New South Wales Page 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness? 5 Witness protection program 5 6 Inclusion in the witness protection program 5 7 Assessing witness for inclusion in witness
BYLAW 11-10 BEING A BYLAW OF THE TOWN OF OKOTOKS IN THE PROVINCE OF ALBERTA FOR THE PURPOSE OF REDUCING FALSE ALARMS
BYLAW 11-10 BEING A BYLAW OF THE TOWN OF OKOTOKS IN THE PROVINCE OF ALBERTA FOR THE PURPOSE OF REDUCING FALSE ALARMS WHEREAS the Municipal Government Act RSA 2000, M -26 and regulations as amended, provides
PLEASE NOTE. For more information concerning the history of this Act, please see the Table of Public Acts.
PLEASE NOTE This document, prepared by the Legislative Counsel Office, is an office consolidation of this Act, current to September 1, 2013. It is intended for information and reference purposes only.
PUBLIC FINANCE MANAGEMENT ACT
LAWS OF KENYA PUBLIC FINANCE MANAGEMENT ACT CHAPTER 412C Revised Edition 2014 [2013] Published by the National Council for Law Reporting with the Authority of the Attorney-General www.kenyalaw.org [Rev.
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA ON THE AMENDMENT OF THE ORDER NO. 1V-1013 ON THE APPROVAL OF THE RULES ON THE ENSURANCE OF SECURITY AND INTEGRITY
Identity Theft. What it is and How to Protect Yourself
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft
CAYMAN ISLANDS. Supplement No. 9 published with Extraordinary Gazette No. 53 of 17th July, 2015. DRUG REHABILITATION COURT LAW.
CAYMAN ISLANDS Supplement No. 9 published with Extraordinary Gazette No. 53 of 17th July, 2015. DRUG REHABILITATION COURT LAW (2015 Revision) Law 26 of 2006 consolidated with 19 of 2012. Revised under
REAL ID Act Title II H.R.1268
H.R.1268 Emergency Supplemental Appropriations Act for Defense, the Global War on Terror, and Tsunami Relief, 2005 (Enrolled as Agreed to or Passed by Both House and Senate) TITLE II--IMPROVED SECURITY
DEBT MANAGEMENT OFFICE ESTABLISHMENT (ETC.) ACT 2003
DEBT MANAGEMENT OFFICE ESTABLISHMENT (ETC.) ACT 2003 ARRANGEMENT OF SECTIONS SECTION: 1. Short title. 2. Commencement. 3. Interpretation. PART I - PRELIMINARY PART II-ESTABLISHMENT OF THE DEBT MANAGEMENT
THE FINANCIAL SERVICES DEVELOPMENT ACT 2001. (Act No. of 2001) ARRANGEMENT OF SECTIONS PART I - PRELIMINARY PART II THE FINANCIAL SERVICES COMMISSION
55 Note: - The text of this internet version has been prepared to reflect the text passed by the National Assembly on 15 May 2001. The authoritative version is the one to be published in the Government
New Zealand Bill of Rights Act 1990
Reprint as at 1 July 2013 New Zealand Bill of Rights Act 1990 Public Act 1990 No 109 Date of assent 28 August 1990 Commencement see section 1(2) Contents Page Title 2 1 Short Title and commencement 3 Part
Civil Law (Wrongs) (Proportionate Liability and Professional Standards) Amendment Act 2004
Australian Capital Territory Civil Law (Wrongs) (Proportionate Liability and Professional Standards) Amendment Act 2004 Contents Page 1 Name of Act 2 2 Commencement 2 3 Legislation amended 2 4 New chapter
Cyber Crime and Data Retention
COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences
13 LC 37 1568ER. Senate Bill 202 By: Senators Unterman of the 45th, Mullis of the 53rd and Chance of the 16th A BILL TO BE ENTITLED AN ACT
Senate Bill 202 By: Senators Unterman of the 45th, Mullis of the 53rd and Chance of the 16th A BILL TO BE ENTITLED AN ACT 1 2 3 4 To amend Article 5 of Chapter 8 of Title 31 of the Official Code of Georgia
BE IT ENACTED by the Queen s Most Excellent Majesty, by
At a Tynwald held in Douglas, Isle of Man, the 21st day of October in the fifty-seventh year of the reign of our Sovereign Lady ELIZABETH THE SECOND by the Grace of God of the United Kingdom of Great Britain
The Saskatchewan Medical Care Insurance Act
1 SASKATCHEWAN MEDICAL CARE INSURANCE c. S-29 The Saskatchewan Medical Care Insurance Act being Chapter S-29 of The Revised Statutes of Saskatchewan, 1978 (effective February 26, 1979) as amended by the
B. Material breach means the failure to comply with this CO in whole or in part by commission or omission.
CITY OF NEW YORK DEPARTMENT OF CONSUMER AFFAIRS ---------------------------------------------------------------------X DEPARTMENT OF CONSUMER AFFAIRS, Complainant, -against- BRASS PRIVATE INVESTIGATIONS
DATA PROTECTION LAWS OF THE WORLD. India
DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,
DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services
DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security
THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995
[St.-135] THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 CHAPTER I PRELIMINARY 1. Short title, extent and commencement 137 2. Definitions 137 CHAPTER II REGULATION OF CABLE TELEVISION NETWORK 3.
Personal Data Protection LAWS OF MALAYSIA. Act 709 PERSONAL DATA PROTECTION ACT 2010
1 LAWS OF MALAYSIA Act 709 PERSONAL DATA PROTECTION ACT 2010 2 Laws of Malaysia ACT 709 Date of Royal Assent...... 2 June 2010 Date of publication in the Gazette......... 10 June 2010 Publisher s Copyright
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 CHAPTER I PRELIMINARY. 1. Short title, extent and commencement 137. 2. Definitions 137 CHAPTER II
THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 CHAPTER I PRELIMINARY 1. Short title, extent and commencement 137 2. Definitions 137 CHAPTER II REGULATION OF CABLE TELEVISION NETWORK 3. Cable television
Parliamentary Research Branch. Legislative Summary BILL C-15: INTERNATIONAL TRANSFER OF OFFENDERS ACT. Robin MacKay Law and Government Division
Legislative Summary LS-469E BILL C-15: INTERNATIONAL TRANSFER OF OFFENDERS ACT Robin MacKay Law and Government Division 16 February 2004 Library of Parliament Bibliothèque du Parlement Parliamentary Research
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
Criminal Injuries Compensation Act 1983
1350 ANNO TRICESIMO SECUNDO ELIZABETHAE SECUNDAE REGLNAE VICTORIA Criminal Injuries Compensation Act 1983 No. 9992 An Act to Re-enact with Amendments the Law relating to Compensation for Persons injured
Casino Control Act 2006
Australian Capital Territory A2006-2 Republication No 13 Effective: 14 October 2015 Republication date: 14 October 2015 Last amendment made by A2015-33 Authorised by the ACT Parliamentary Counsel About
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Peace and Justice in Cyberspace
Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)
COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised
Errors and Omissions Insurance. 1.0 Introduction and Definition
Errors and Omissions Insurance 1.0 Introduction and Definition 1.1 Under the terms of this policy the word employee means any trustee of the Board of Education, any employee of the Hicksville Board of
The global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
THE CABLE TELEVISION NETWORKS
Cable TV act THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 CHAPTER I Preliminary 1. Short title, extent and commencement 137 2. Definitions 137 CHAPTER II Regulation of cable television network
REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 16 of 2004
Legal Supplement Part A to the Trinidad and Tobago Gazette, Vol. 43, No. 102, 17th June, 2004 Legal Supplement Part A to the Trinidad and Tobago Second Session Eighth Parliament Republic of Trinidad and
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
APPLICATION REQUIREMENTS Fees: $105 Make check payable to the Florida Department of Business and Professional Regulation.
State of Florida Regulatory Council of Community Association Managers Application for Community Association Management Firm License Form # DBPR CAM 2 1 of 5 This application is used to request initial
How To Get A Nursing License
SENATE, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED AUGUST, 0 Sponsored by: Senator LORETTA WEINBERG District (Bergen) SYNOPSIS Enters New Jersey in Nurse Multistate Licensure Compact. CURRENT VERSION
LAW ON ELECTRONIC TRANSACTIONS
Lao People s Democratic Republic Peace Independence Democracy Unity Prosperity National Assembly No 20/NA Vientiane Capital, Date: 7 December 2012 (Unofficial Translation) LAW ON ELECTRONIC TRANSACTIONS
Province of Alberta DRUG PROGRAM ACT. Statutes of Alberta, 2009 Chapter D-17.5. Assented to June 4, 2009. Published by Alberta Queen s Printer
Province of Alberta Statutes of Alberta, Assented to June 4, Published by Alberta Queen s Printer Alberta Queen s Printer 5 th Floor, Park Plaza 10611-98 Avenue Edmonton, AB T5K 2P7 Phone: 780-427-4952
CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
CHAPTER 26.1-02.1 INSURANCE FRAUD
CHAPTER 26.1-02.1 INSURANCE FRAUD 26.1-02.1-01. Definitions. As used in this chapter: 1. "Business of insurance" means the writing of insurance or the reinsuring of risks by an insurer, including acts
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009
RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
NIGERIAN INSTITUTE OF ADVANCED LEGAL STUDIES INTERNAL MEMO. Date: 28 th May 2011 PROPOSED ROAD ACCIDENT VICTIMS COMPENSATION BILL
NIGERIAN INSTITUTE OF ADVANCED LEGAL STUDIES INTERNAL MEMO From: Dr. Francisca E. Nlerum To: Director-General Peter Anyebe Gozie Ebo Date: 28 th May 2011 PROPOSED ROAD ACCIDENT VICTIMS COMPENSATION BILL
Electronic Documents Law
Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or
Act 6 Whistleblowers Protection Act 2010 THE WHISTLEBLOWERS PROTECTION ACT, 2010.
ACTS SUPPLEMENT No. 4 11th May, 2010. ACTS SUPPLEMENT to The Uganda Gazette No. 27 Volume CIII dated 11th May 2010. Printed by UPPC, Entebbe, by Order of the Government. Act 6 Whistleblowers Protection
DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA
AHG/Decl.2 (XXXII) 32 nd OAU Summit DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA The features of the Plan of Action elaborated herewith comprise five sections
Witness Protection Act 1995 No 87
New South Wales Witness Protection Act 1995 No 87 Status information Currency of version Current version for 5 October 2012 to date (generated 10 October 2012 at 19:15). Legislation on the NSW legislation
The National Government Co-ordination Bill, 2012 THE NATIONAL GOVERNMENT CO-ORDINATION BILL, 2012 ARRANGEMENT OF CLAUSES PART I PRELIMINARY
THE NATIONAL GOVERNMENT CO-ORDINATION BILL, 2012 ARRANGEMENT OF CLAUSES PART I PRELIMINARY 1 Short title and commencement. 2 Interpretation. 3 Object of the Act. 4 Guiding principles. 5 Accessibility of
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
COMPUTER MISUSE AND CYBERCRIME ACT
COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
CGU PROFESSIONAL RISKS
CGU PROFESSIONAL RISKS BUSINESS PROTECTION MANAGEMENT LIABILITY INSURANCE Summary of significant changes Business Insurance Policy (CGU BPML 11-15) Replacing Lumley Policy Policy General Definitions Authority
M O N T S E R R A T NO. 3 OF 2008 THE FINANCIAL SERVICES COMMISSION ACT 2008 ARRANGEMENT OF SECTIONS PART I PRELIMINARY PROVISIONS PART 2
No. 3 of 2008 Financial Services Act MONTSERRAT 1 M O N T S E R R A T NO. 3 OF 2008 THE FINANCIAL SERVICES COMMISSION ACT 2008 ARRANGEMENT OF SECTIONS SECTION 1. Short title. 2. Interpretation. PART I
MUTUAL FUND DEALERS ASSOCIATION OF CANADA INFORMATION REPORTING REQUIREMENTS (POLICY NO. 6)
1. Introduction MUTUAL FUND DEALERS ASSOCIATION OF CANADA INFORMATION REPORTING REQUIREMENTS (POLICY NO. 6) This Policy establishes minimum requirements concerning events that Approved Persons are required
ICE CLEAR EUROPE LIMITED. - and - COMPANY NAME
Dated 20 ICE CLEAR EUROPE LIMITED - and - COMPANY NAME SPONSOR AGREEMENT LNDOCS01/795343.7 TABLE OF CONTENTS Clause Page PURPOSE OF THE AGREEMENT... 3 1. INTERPRETATION... 3 2. OBLIGATIONS OF THE COMPANY...
Australia s proposed accession to the Council of Europe Convention on Cybercrime
Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: [email protected] Australia
Terms of Use Gateway Clipper Website
Terms of Use Gateway Clipper Website General Information Regarding These Terms of Use Master terms: Unless otherwise noted on a particular site or service, these master terms of use ( Master Terms ) apply
THE COMPUTER MISUSE AND CYBERCRIME ACT 2003. I assent ------------- ARRANGEMENT OF SECTIONS
1 Act No. 22 of 2003 THE COMPUTER MISUSE AND CYBERCRIME ACT 2003 I assent 30 July 2003 KARL AUGUSTE OFFMANN President of the Republic Section ------------- ARRANGEMENT OF SECTIONS PART I - PRELIMINARY
SAINT VINCENT AND THE GRENADINES ELECTRONIC TRANSACTIONS ACT, 2007 ARRANGEMENT OF SECTIONS PART I PRELIMINARY SECTION 1. Short title and commencement
SAINT VINCENT AND THE GRENADINES ELECTRONIC TRANSACTIONS ACT, 2007 ARRANGEMENT OF SECTIONS PART I PRELIMINARY SECTION 1. Short title and commencement 2. Interpretation 3. Act to bind Crown PART II LEGAL
PUBLIC INTEREST DISCLOSURE (WHISTLEBLOWER PROTECTION) ACT
Province of Alberta Statutes of Alberta, Current as of June 1, 2013 Office Consolidation Published by Alberta Queen s Printer Alberta Queen s Printer 7 th Floor, Park Plaza 10611-98 Avenue Edmonton, AB
Prepared By: The Professional Staff of the Committee on Banking and Insurance REVISED:
BILL: SB 80 The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) Prepared By: The Professional
STATE OF NEW JERSEY. SENATE, No. 1988. 213th LEGISLATURE. Sponsored by: Senator JEFF VAN DREW District 1 (Cape May, Atlantic and Cumberland)
SENATE, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED JUNE, 00 Sponsored by: Senator JEFF VAN DREW District (Cape May, Atlantic and Cumberland) SYNOPSIS "New Jersey Fair Debt Collection Practices Act."
Central LHIN Governance Manual. Title: Whistleblower Policy Policy Number: GP-003
Central LHIN Governance Manual Title: Whistleblower Policy Policy Number: GP-003 Purpose: Originated: September 25, 2012 Board Approved: September 25, 2012 To set out the LHIN s obligations under the Public
