FOURTH PARLIAMENTARY FORUM ON SHAPING THE INFORMATION SOCIETY THE TRIPLE CHALLENGE OF CYBER-SECURITY: INFORMATION, CITIZENS AND INFRASTRUCTURE

Size: px
Start display at page:

Download "FOURTH PARLIAMENTARY FORUM ON SHAPING THE INFORMATION SOCIETY THE TRIPLE CHALLENGE OF CYBER-SECURITY: INFORMATION, CITIZENS AND INFRASTRUCTURE"

Transcription

1 FOURTH PARLIAMENTARY FORUM ON SHAPING THE INFORMATION SOCIETY THE TRIPLE CHALLENGE OF CYBER-SECURITY: INFORMATION, CITIZENS AND INFRASTRUCTURE THE ZAMBIAN PARLIAMENT EXPERIENCE May 2011,Room II ILO Conference Center International Labour Organization, Geneva, Switzerland MICHAEL MUKUKA PRINCIPAL CLERK ICT ZAMBIAN PARLIAMENT

2 BACKGROUND Parliamentary Reforms and use of ICTs in meeting the reforms agenda posses a new challenge of security of information, people and infrastructure Parliamentary engagement in the new information age. The need to appreciate the new operating environment and speeding up our response to the challenge The challenge of MPs capacity to adequately deal with the Cyber security issues The wait-and and-see approach in dealing with challenges such as Cyber-Security

3 THE ZAMBIAN RESPONSE TO CYBER- SECURITY AN OVERVIEW Evolvement of Legislation dealing with Cyber-Security issues: The Telecommunications Act 1994 Radio Communication Act Computer Misuse and Crimes Act Electronic Communications and Transactions Act Establishment of statutory bodies: The Zambia Police Service Cyber Crimes Bureau The Zambia Information and Communications Technology Authority (ZICTA) 2009 Act National Work Group on Cyber-Security (NWGC)

4 ZICTA AND THE NWGC INIATIVE NWGC was conceived after the international conference organised by ITU, COMESA and CAZ in 2008 Multi-sectoral approach involving government agencies, non-governmental organisations and private sector Interim structure to provide a national strategic approach towards Cyber-Security Development of the National Cyber-Security Draft being considered by the Ministry of Communications and Transport

5 PARLIAMENTARY ENGAGEMENT THE COMPUTER MISUSE AND CRIMES ACT Very basic law with a lot gaps No mention of Cyber Crime Protection of personal information was non existent Slow adoption of e-commerce e in the country Could not easily be used to deal with a number of emerging challenges the Information Society is currently facing A handful of stakeholders participated

6 PARLIAMENTARY ENGAGEMENT THE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS ACT Brings out a number of pertinent issues not covered in the Computer Misuse and Crimes Act of 2004 Legal requirement for data messages Communications of data messages. Spam is a crime. Consumer protection and protection of personal information Domain name regulations Cyber Crime and Cyber Inspection Encrypting Communications Comprehensive consultations with stakeholders and Interest Groups

7 PARLIAMENTARY ENGAGEMENT THE PARLIAMENTARY INFORMATION SYSTEMS OPERATIONS POLICY (PISOP) Parliaments need to show the way by taking the lead. Putting our House in order! Ensuring secure ICT infrastructure Ensuring the Integrity, Authenticity and reliability of information and data so as to protect the image of Parliament Ensuring that Members and Staff of Parliament are protected from being victims of Cyber Crime and are discouraged from being lured into using parliamentary infrastructure to undertake undesirable activities To ensure that Member Constituent engagement is done orderly and in a secure environment

8 PARLIAMENTARY ENGAGEMENT - CHALLENGES Oversight Limited or inadequate knowledge by Parliamentarians Lack of appropriate structure with focused approach Representative and Advocacy Inability to follow-up issues on cyber security due to inadequate knowledge and appropriate structure. MPs can play a critical role of advocacy and sensitisation in dealing with Cyber security Parliamentarians as change agents Legislative Inadequate laws are made which leave gaps and hence not very helpful in protecting the information asset, the public and the infrastructure this is common in most developing countries

9 STRENGTHENING AND SPEEDING UP PARLIAMENTARY RESPONSE Inter-parliamentary cooperation and collaboration Regional and Global groupings Use of existing initiatives Organisational (Committee systems) National (Regulators) Regional (SADC PF) Global Initiatives (Global Centre)

10 CONCLUSION The need for pro-active parliamentary involvement in the area of Cyber-Security cannot be underscored. Institutions of Parliaments need to realise the importance of focused approach by forming structures and building the capacity of its members to better deal with Cyber-Security Security.

11 THANK YOU!!!

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

Fourth Parliamentary Forum on Shaping the Information Society The Triple Challenge of Cyber-Security: Information, Citizens and Infrastructure

Fourth Parliamentary Forum on Shaping the Information Society The Triple Challenge of Cyber-Security: Information, Citizens and Infrastructure United Nations Inter-Parliamentary Union International Telecommunication Union Fourth Parliamentary Forum on Shaping the Information Society The Triple Challenge of Cyber-Security: Information, Citizens

More information

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

TO BE PRESENTED BY CHAMA M MFULA AND LOVENESS M MAYAKA

TO BE PRESENTED BY CHAMA M MFULA AND LOVENESS M MAYAKA PARLIAMENTARY INFORMATION SERVICES: THE ROLE OF THE LIBRARY AND RESAERCH DEPARTMENTS IN THE ZAMBIAN PARLIAMENT IN HELPING MEMBERS OF PARLIAMENT MAKE BETTER LAWS TO BE PRESENTED BY CHAMA M MFULA AND LOVENESS

More information

Third Parliamentary Forum on Shaping the Information Society

Third Parliamentary Forum on Shaping the Information Society Third Parliamentary Forum on Shaping the Information Society ICT and the Global Economic Crisis: Current Situation and Future Perspectives 3-5 May 2010 Room B ITU Tower International Telecommunication

More information

World e-parliament Conference 2016

World e-parliament Conference 2016 World e-parliament Conference 2016 28-30 June 2016 Co-organized by the Inter-Parliamentary Union and the Chamber of Deputies of Chile #eparliament NOTE FOR SPEAKERS AND MODERATORS 16 June 2016 Thank you

More information

Optional Protocol on the sale of children, child prostitution and child pornography

Optional Protocol on the sale of children, child prostitution and child pornography United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol

More information

Agenda 1. Introduction and Background:

Agenda 1. Introduction and Background: National ICT Policy & Licensing Public Consultations NIUE Agenda 1. Introduction and Background: for the Pacific and for Niue 2. What has been completed for Niue? Draft National ICT Policy Draft Report

More information

Memorandum of Understanding on Labour Cooperation

Memorandum of Understanding on Labour Cooperation Memorandum of Understanding on Labour Cooperation The Department of Labour of New Zealand, in the name of New Zealand and the Ministry of Human Resources and Social Security of the People s Republic of

More information

Cybersecurity in the Commonwealth: Setting the Stage

Cybersecurity in the Commonwealth: Setting the Stage Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

Cybersecurity Governance

Cybersecurity Governance AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional

More information

Harmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities

Harmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities Harmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities Caribbean Telecommunications Union Presented by Nigel Cassimire Telecommunications Specialist ICT in the Caribbean 1. Caribbean

More information

ITU Global Cybersecurity Agenda (GCA)

ITU Global Cybersecurity Agenda (GCA) International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,

More information

Overview TECHIS60441. Carry out security testing activities

Overview TECHIS60441. Carry out security testing activities Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:

More information

Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015

Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities

More information

Save the Children. Protecting Children in Zambia from Violence, Abuse, Neglect and Exploitation

Save the Children. Protecting Children in Zambia from Violence, Abuse, Neglect and Exploitation Protecting Children in Zambia from Violence, Abuse, Neglect and Exploitation Baseline 2010: National Child Protection System in Zambia What is a National Child Protection System and why do we need it?

More information

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology

More information

Can Public Accounts Committees add value a case study approach

Can Public Accounts Committees add value a case study approach 1 Can Public Accounts Committees add value a case study approach Marco Bini, Director Policy and Coordination Victorian Auditor-General s Office Graduate Management Centre, Deakin University Thursday 9

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International

More information

AID FOR TRADE CASE STORY: ZIMBABWE

AID FOR TRADE CASE STORY: ZIMBABWE AID FOR TRADE: CASE STORY ZIMBABWE Date of submission : 31 January 2011 Region : Southern Africa Country : Zimbabwe Type : Project Author : Ministry of Industry and Commerce CHIRUNDU ONE STOP BORDER POST:

More information

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union ALL ALL Cybersec rsecurity for ITU s Work for a Safer World International Telecommunication Union ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified Cybersecurity

More information

CRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations

CRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations United Nations Convention on the Rights of the Child CRC/C/OPAC/NLD/CO/1 Distr.: General 5 June 2015 ADVANCE UNEDITED VERSION Original: English Committee on the Rights of the Child Concluding observations

More information

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that: 3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant

More information

2. Cyber legislation harmonization process in Central Africa

2. Cyber legislation harmonization process in Central Africa Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation

More information

FURTHER DEVOLUTION TO GREATER MANCHESTER COMBINED AUTHORITY

FURTHER DEVOLUTION TO GREATER MANCHESTER COMBINED AUTHORITY FURTHER DEVOLUTION TO GREATER MANCHESTER COMBINED AUTHORITY 1. This document marks the fourth devolution deal agreed between Greater Manchester Combined Authority and government, along with the Memorandum

More information

EARLY VERSIONS OF THE COURSE

EARLY VERSIONS OF THE COURSE 1 Parliamentary Strengthening Programs: Improving Access, Availability and Governance Through a Self-Paced Learning Program Rick Stapenhurst, The World Bank Institute, fstapenhurst@worldbank.org Brooke

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

International Workshop e Parliament: Managing Innovation and World e Parliament Conference 2007 Challenges and benefits of ICTs in Parliament

International Workshop e Parliament: Managing Innovation and World e Parliament Conference 2007 Challenges and benefits of ICTs in Parliament Application of Open Source in the Legislation processes International Workshop e Parliament: Managing Innovation and World e Parliament Conference 2007 Challenges and benefits of ICTs in Parliament Presented

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA

KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA We, the Representatives of the African Parliaments to the Kigali International Conference Recalling the commitment of

More information

Alternative report from UNICEF Sweden re. the UPR process re. Sweden

Alternative report from UNICEF Sweden re. the UPR process re. Sweden To The Human rights council Geneva Stockholm 13 June 2014 Alternative report from UNICEF Sweden re. the UPR process re. Sweden Introduction This is a comment to the coming Universal Periodic Review (UPR)

More information

Ministry of Science and Technology Strategy and Research Division

Ministry of Science and Technology Strategy and Research Division Job Title: Director, Strategy and Research The Job: A three (3) year contract position. Job Summary: The incumbent is responsible, at an Executive level, for the technical, operational and administrative

More information

How To Run The National Ict4D Network In Zambia

How To Run The National Ict4D Network In Zambia Learning Brief National ICT4D Network Zambia May 2010 e-brain hosts an ICT4D Radio Programme that is broadcasted three times a week on the Zambian radio station Hone FM. e-brain Forum of Zambia The National

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

The Independent Police Complaints Commission (IPCC) Consultation on HMIC s Proposed 2014/15 Inspection Programme

The Independent Police Complaints Commission (IPCC) Consultation on HMIC s Proposed 2014/15 Inspection Programme CONSULTATION RESPONSE TO HMIC FROM The Independent Police Complaints Commission (IPCC) REGARDING Consultation on HMIC s Proposed 2014/15 Inspection Programme The IPCC and its remit The IPCC s primary statutory

More information

RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY

RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on

More information

Report on Canadian Interest in Internet Governance November 2010

Report on Canadian Interest in Internet Governance November 2010 Report on Canadiann Interest in Internet Governance November 20100 Report Title: Report on Canadian Interest in Internet Governance Date Published: November 2010 The Canadian Internet Registration Authority

More information

EN 31IC/11/R7 Original: English Adopted

EN 31IC/11/R7 Original: English Adopted EN 31IC/11/R7 Original: English Adopted 31st INTERNATIONAL CONFERENCE OF THE RED CROSS AND RED CRESCENT Geneva, Switzerland 28 November 1 December 2011 Strengthening normative frameworks and addressing

More information

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national

More information

Försäkringskassan. (Swedish Social Security Agency) Computer Analyses to Identify Frauds 2013 Page 1

Försäkringskassan. (Swedish Social Security Agency) Computer Analyses to Identify Frauds 2013 Page 1 Försäkringskassan (Swedish Social Security Agency) Computer Analyses to Identify Frauds 2013 Page 1 Håkan Hagberg Internal investigations Computer analyses Identify frauds against Försäkringskassan Computer

More information

48th Session of the International Conference of Education (ICE)

48th Session of the International Conference of Education (ICE) 48th Session of the International Conference of Education (ICE) Inclusive Education : The Way of the Future 25-28 November 2008 Geneva, Switzerland, UNESCO- IBE Organised by: With the participation of

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM INFORMATION SECURITY AWARENESS & TRAINING PROGRAM By Serah Francis MSc Student, Gjøvik University, Norway ISES Member IFIP TC3 ISES Project INTRODUCTION Africa has 167 million Internet Users and is estimated

More information

Payment Systems Regulator

Payment Systems Regulator BRIEFING PAPER Number 06866, 25 February 2016 Payment Systems Regulator By Timothy Edmonds Inside: 1. Payment services in the UK 2. Establishing the Regulator 3. Regulatory activity www.parliament.uk/commons-library

More information

Multisectoral collaboration

Multisectoral collaboration Unit 6. MULTISECTORAL COLLABORATION 89 UNIT 6 Multisectoral collaboration Overview Objectives Why collaborate? What kind of collaboration can be developed? Activity International collaboration National

More information

National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA

National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA FEATURE ADDRESS BY THE HON. KHEMRAJ RAMJATTAN, M.P., VICE-PRESIDENT AND MINISTER OF PUBLIC SECURITY AT THE OPENING OF A National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA August 12 13,

More information

FOR DEBATE AND GUIDANCE

FOR DEBATE AND GUIDANCE INTERNATIONAL LABOUR OFFICE GB.304/MNE/1 304th Session Governing Body Geneva, March 2009 Subcommittee on Multinational Enterprises MNE FOR DEBATE AND GUIDANCE FIRST ITEM ON THE AGENDA Update on strategic

More information

ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia

ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia Common Market for Eastern and Southern Africa ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia Document RFL/2008/01-E Rev.1 29 August 2008 Original: English Meeting Report : ITU Regional Cybersecurity

More information

Vacancy Announcement

Vacancy Announcement Vacancy Announcement Job Title: Legal Advisor Number of vacancies: 1 vacancy Nationality: Somali Employer: National Independent Electoral Commission References Required 3 references Deadline for applications

More information

Helmut Wacket Head of Oversight Division. Cybersecurity: regulatory framework and central bank initiatives in the EU

Helmut Wacket Head of Oversight Division. Cybersecurity: regulatory framework and central bank initiatives in the EU Helmut Wacket Head of Oversight Division Cybersecurity: regulatory framework and central bank initiatives in the EU Cybersecurity in the EU Securing network and information systems in the EU is essential

More information

Information Communication Technology

Information Communication Technology Information Communication Technology Strategic Plan 2011 15 BTS11/00102 Commonwealth of Australia 2011 This work is copyright. You may download, display, print and reproduce this material in unaltered

More information

UNIT 6. Government Accountability and Parliamentary Committees

UNIT 6. Government Accountability and Parliamentary Committees UNIT 6. Government Accountability and Parliamentary Committees Learning Objectives What role do parliamentary committees play in assuring government accountability? After studying this unit you should

More information

Objectives, Achievements, Challenges and Opportunities

Objectives, Achievements, Challenges and Opportunities Association of Regulators of Information and Communications for Eastern and Southern Africa (ARICEA) Objectives, Achievements, Challenges and Opportunities A Presentation to the Informal Meeting of Associations

More information

NOTIFICATION FOR THE VACANCY OF THE POST OF SECRETARY GENERAL OF CPA - INTERNATIONAL JOB DESCRIPTION

NOTIFICATION FOR THE VACANCY OF THE POST OF SECRETARY GENERAL OF CPA - INTERNATIONAL JOB DESCRIPTION NOTIFICATION FOR THE VACANCY OF THE POST OF SECRETARY GENERAL OF CPA - INTERNATIONAL JOB DESCRIPTION Job title: Reporting to: Secretary-General/Chief Executive Officer (CEO) General Assembly/Executive

More information

Tentative Action Plan

Tentative Action Plan Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information

More information

Information Security Seminar 2013

Information Security Seminar 2013 Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative

More information

Empowerment and Leadership Skills Development Programme for Girls

Empowerment and Leadership Skills Development Programme for Girls Empowerment and Leadership Skills Development Programme for Girls Situation Analysis The number of women elected as Members of Parliament is a practical proxy measure of the state of gender equality in

More information

CERT.AZ description as per RfC 2350

CERT.AZ description as per RfC 2350 CERT.AZ description as per RfC 2350 Contact Cyber Security Center (CSC) Computer Emergency Response Team (CERT) Address Block 702, Drogal lane Baku, Azerbaijan Telephone: +99412 4932056 +99412 4932057

More information

JOB DESCRIPTION. Post Title: PRINCIPAL S PA. Post Holder: [ADD POST HOLDER NAME]

JOB DESCRIPTION. Post Title: PRINCIPAL S PA. Post Holder: [ADD POST HOLDER NAME] JOB DESCRIPTION Post Title: PRINCIPAL S PA Post Holder: [ADD POST HOLDER NAME] The description of the duties, responsibilities and accountabilities for the post of Principal s PA within the Trust have

More information

PRINCIPLES AND GOOD PRACTICES

PRINCIPLES AND GOOD PRACTICES ISSAI 21 The International Standards of Supreme Audit Institutions, ISSAI, are issued by the International Organization of Supreme Audit Institutions, INTOSAI. For more information visit www.issai.org

More information

HPF Tool. Template for the Performance and Accountability Statement Second round reviews. Amended December 2012

HPF Tool. Template for the Performance and Accountability Statement Second round reviews. Amended December 2012 HPF Tool Template for the Performance and Accountability Statement Second round reviews Amended December 2012 The High Performance Framework was developed by the Public Sector Performance Commission. This

More information

Capacity Building in Cyberspace Security

Capacity Building in Cyberspace Security Capacity Building in Cyberspace Security Muhammad Amir Malik Member (IT), Government of Pakistan amir@moitt.gov.pk Sequence of Presentation Country Profile of Pakistan ICT Profile of Pakistan Cyberspace

More information

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY

More information

BUILDING A CROWN CORPORATION DIRECTOR PROFILE

BUILDING A CROWN CORPORATION DIRECTOR PROFILE BUILDING A CROWN CORPORATION DIRECTOR PROFILE Prepared by: Management Priorities and Senior Personnel Secretariat Privy Council Office In collaboration with: Renaud Foster Management Consultants June 2001

More information

Regional Road Safety Capacity Building Workshop BW Hotel M (Belgrade), October 15-16, 2014. Eric Howard, Whiting Moyne Consulting

Regional Road Safety Capacity Building Workshop BW Hotel M (Belgrade), October 15-16, 2014. Eric Howard, Whiting Moyne Consulting UN I T E D NA T I O N S EC O N O M I C CO M M I S S I O N F O R EU R O P E Republic of Serbia Ministry of Construction, Transport and Infrastructure Regional Road Safety Capacity Building Workshop BW Hotel

More information

PPIAF Assistance in Afghanistan

PPIAF Assistance in Afghanistan August 2012 PPIAF Assistance in Afghanistan Emerging from a decade of war, massive support from various development partners has been pouring in over the last few years to help rebuild Afghanistan. PPIAF

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

ENQA Review 2011: Empfehlungen und deren Umsetzung durch das OAQ / 1. Implementation of the ENQA recommendations on ESG Part 2

ENQA Review 2011: Empfehlungen und deren Umsetzung durch das OAQ / 1. Implementation of the ENQA recommendations on ESG Part 2 ENQA Review 2011: Empfehlungen und deren Umsetzung durch das OAQ / 1 Implementation of the ENQA recommendations on ESG Part 2 ESG 2.1 Use of internal quality assurance procedures (ENQA Criterion 1) External

More information

Cybersecurity Initiatives

Cybersecurity Initiatives Port Vila, 20 November 2014 The Government of The Republic of Vanuatu Cybersecurity Initiatives Telecommunications & Radiocommunications Regulator By Louise Nasak, Technical and Internet Governance Manager,

More information

ESKITP714401 Implement procedures and standards relating to metrics for IT service delivery

ESKITP714401 Implement procedures and standards relating to metrics for IT service delivery Overview This sub-discipline covers the competencies required to perform performance metrics. Monitoring service level performance is a complex task requiring collection of data, detailed analysis, and

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

Newsletter. Opening letter from Chair, Jeremy Newman

Newsletter. Opening letter from Chair, Jeremy Newman Newsletter Opening letter from Chair, Jeremy Newman Dear Stakeholders Happy New Year to you all. 2015 is shaping up to be a very exciting and challenging year for the SSRO. Hopefully you will be aware

More information

CYSPA - EC projects supporting NIS

CYSPA - EC projects supporting NIS CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom

More information

Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line

Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line Exploring the role and potential of existing platforms to promote a safe,

More information

The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices

The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices Hans Born, Senior Fellow, DCAF Geneva Brussels, 29 April 2004 Presentation given at the Book

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

NATIONAL TREASURY STRATEGIC PLAN 2011/14

NATIONAL TREASURY STRATEGIC PLAN 2011/14 NATIONAL TREASURY STRATEGIC PLAN 2011/14 PRESENTATION TO PARLIAMENTARY FINANCE COMMITTEES Presenter: Lungisa Fuzile Director General, National Treasury 31 May 2011 TREASURY AIMS AND OBJECTIVES Chapter

More information

Universal Periodic Review

Universal Periodic Review Universal Periodic Review Civil society Follow-up Kit 2014 Nomenclature CAT CRPD ECOSOC HRC ICC ICESCR MIA NGO NHRI OHCHR SuR UPR Convention against Torture Convention on the Rights of Persons with Disabilities

More information

Day 3-24 April 2013. Day 2-23 April 2013

Day 3-24 April 2013. Day 2-23 April 2013 Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim

More information

Government of Antigua and Barbuda Public and Social Sector Transformation Project Project Preparation Advance (P4650-001)

Government of Antigua and Barbuda Public and Social Sector Transformation Project Project Preparation Advance (P4650-001) Government of Antigua and Barbuda Public and Social Sector Transformation Project Project Preparation Advance (P4650-001) Terms of Reference Communications Specialist for Public and Social Sector Transformation

More information

The Relationships between the Public Accounts Committee and the Auditor General Office

The Relationships between the Public Accounts Committee and the Auditor General Office The Relationships between the Public Accounts Committee and the Auditor General Office Professor Zahirul Hoque Executive Director, Centre for Public Sector Governance, Accountability and Performance, La

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyberlaws and Regulations for enhancing e-commerce including Case Studies

More information

PROPOSED MANDATE FOR THE GLOBAL PARTNERSHIP FOR EFFECTIVE DEVELOPMENT CO-OPERATION

PROPOSED MANDATE FOR THE GLOBAL PARTNERSHIP FOR EFFECTIVE DEVELOPMENT CO-OPERATION PROPOSED MANDATE FOR THE GLOBAL PARTNERSHIP FOR EFFECTIVE DEVELOPMENT CO-OPERATION This document sets out the proposed mandate of the Global Partnership for Effective Development Co-operation. It was discussed

More information

Evaluation of the status of the e-government in Comoros

Evaluation of the status of the e-government in Comoros Evaluation of the status of the e-government in Karim Attoumani Mohamed, Abstract E-government consists of the use of information and communication technologies (ICTs) by a government to transform itself

More information

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion

More information

Overview TECHIS60241. Carry out risk assessment and management activities

Overview TECHIS60241. Carry out risk assessment and management activities Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection

More information

ESKISP6046.02 Direct security architecture development

ESKISP6046.02 Direct security architecture development Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable

More information

Cyber Security: Policy of the Internet Infrastructure

Cyber Security: Policy of the Internet Infrastructure Cyber Security: Policy of the Internet Infrastructure Dr. Basuki Yusuf Iskandar Acting Director General of Post and Telecommunications/ Secretary General of MCIT Republic of Indonesia 2009 ITU Regional

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information