2013 Africa Union Framework for Cyber security in Africa

Size: px
Start display at page:

Download "2013 Africa Union Framework for Cyber security in Africa"

Transcription

1 Contributions by DotConnectAfrica 2013 Africa Union Framework for Cyber security in Africa Comments to the DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A CREDIBLE LEGAL FRAMEWORK FOR CYBER SECURITY IN AFRICA

2 Executive Summary The rapid development of ICT and its penetration in all sectors of the economies and especially Africa is a progress that must be appreciated, catalyzed and encouraged. With the increase in online dependence of ICT, there also comes the proliferation of cyber crime and thus necessitating the strengthening of cyber security measures as well as establishment of cyber legislations. It s our hope that the proposed Convention on Cyber Security will be prepared in a multistakeholder model that will include all the voices in order to develop proper mechanism to contribute to the preservation of the institutional, human, financial, technological and informational assets and resources put in place by institutions to achieve their objectives and embraces important elements of electronic commerce and the protection of personal data. Introduction of DotConnectAfrica DotConnectAfrica (DCA) is a not-for-profit, non-partisan organization that has its base of operation in Nairobi, Kenya and headquartered in I/F River Court 6th Denis Street Port Louis, Mauritius, Africa, Reg.ID CT8710DCA90). Its main charitable objects are: (a) for the advancement of education in information technology to the African society; and (b) in connection with (a) to provide the African society with a continental Internet domain name to have access to Internet services for the people of Africa as a purpose beneficial to the public in general. DCA is well represented in Addis Ababa Ethiopia, Nigeria, South Africa, London United Kingdom, and California, USA. DotConnectAfrica (DCA) has been spearheading the proposed new Top Level Domain (TLD).africa (DotAfrica) Initiative since DotAfrica is one of the new generic Top Level Domains (gtlds) that will be delegated into the root zone of the Internet Domain Name Structure (DNS) by the Internet Corporation of Assigned Names and Numbers (ICANN), a US-based institution that is at the apex of Global Internet Governance. As an independent Non-Profit, non-partisan entity, DCA Trust intends to utilize surplus proceeds from the registry operation accruing to the Trust Fund for Charitable projects. Funds will be regularly allocated to different corporate social responsibility programs. Specific projects will be identified, and supported. As the first gtld for Africa, it will aim at bridging the digital divide that exists between other regions of the Internet community and Africa by promoting the use of ICT for development.

3 Preamble: The Draft Convention should lay a background for the African states to review their legislations on cyber security. ICT is becoming a key element and player in the development of a nation and more importantly day to day running of institutional mandates. Businesses play a key role in deriving and generating revenue that is used to run governmental affairs, this affects how tax regimes and systems must be properly instituted to match the changing commercial sector that is increasingly dependent on ICT and most importantly mobile online transactions. Africa is growing into this important technology, ICT comes with several critical issues that must be addressed for proper operations that can curb issues such as cyber crime that includes fraud, impersonation, spam among many others. Interventions that are of a continental or global levels that require signing of such conventions must be properly drafted and understood by all the stakeholders, this includes the governments, businesses, academia and citizens, this will provide a harmonized treaty that will at least not overlook critical existing individual government legislations nor contradict them. Electronic commerce organization, personal data protection, cyber security promotion and cyber crime control are the most important factors of the online economy and while it s critical to create harmonized continental legislation it s important that the personal data and privacy is protected as the bottom line.

4 Recommendations on select sections of the draft legislations. 3) Objective and goal The objective of the Convention on Cyber Security is to contribute to the preservation of the institutional, human, financial, technological and informational assets and resources put in place by institutions to achieve their objectives. The Convention embodies the treatment of cyber crime and cyber security in its strict sense, but is not confined solely to these elements. It also embraces important elements of electronic commerce and the protection of personal data. Its ultimate goal is eminently protective given that it is geared to protecting: Institutions against the threats and attacks capable of endangering their survival and efficacy; The rights of persons during data gathering and processing against the threats and attacks capable of compromising such rights. Similarly, the Convention seeks to: Reduce related institutional (and personal) intrusions or gaps in the event of disaster; Facilitate the return to normal functioning at reasonable cost and within a reasonable timeframe; Establish the legal and institutional mechanisms likely to guarantee normal exercise of human rights in cyber space. Comment 1 The bullet point needs to add the wording and personal in the verbatim for completeness Section II: Electronic Commerce Chapter 1: Field of application of electronic commerce Article I 2: Electronic commerce is an economic activity by which a person offers or provides goods and services by electronic means. Comment 2: Structure the statement so as to complete the entire transaction, i.e. Electronic commerce is an economic activity by which a person offers/provides or receives/solicits goods and services by electronic means. Article I 4: Without prejudice to other information obligations defined by extant legislative and regulatory texts in African Union Member States, any person/ (Add: persons) exercising the activities set forth in Article I 2 of this Convention shall provide to those for whom the goods and services are meant, easy, direct and uninterrupted access using an open standard in regard to the following information:

5 Comment 3: Define the terms open standard, is there a known universal meaning of the word open standard and what its implications are and or institutionalism Article I 8: Also the addition of the word Persons for completeness Any publicity action, irrespective of its form, accessible through on-line communication service, shall be clearly identified as such. It shall clearly identify the individual or corporate body on behalf of whom it is undertaken. Comment 4: Clearly outline the word identify in this case so as not to go against the online anonymity as a defined right of a user. Since online anonymity is not built into the cyberspace structures, and is also an avenue for individuall right to self-determination and privacy and therefore it may a breach of declaration of peoples unanimous freedom of the cyberspace Article I 9: Publicity actions, especially promotional offers such as price discounts, bonuses or free gift, as well as promotional competitions or games disseminated by electronic mail, shall upon receipt be clearly and unequivocally identified in the title of the message by their addressees or, where this is technically impossible, on the body of the message. Comment 5: This section though defined will not be very helpful because of the generality of the statement, further its perhaps unhelpful to the users, further its unnecessary for an international treaty, perhaps this could be covered in the country legislation if at all necessary. This portion over emphasizes unnecessary rationale Article I 14: Concealing the identity of the person on behalf of whom the communication is issued or mentioning a subject unrelated to the transaction or service offered, shall equally be prohibited in the African Union. Comment 6: There in need for more clarification required here in Identity concealing and third parties Section IV: Treaty obligations in electronic form Chapter 1: Contracts in electronic form Article I 16: Electronic means may be used to disseminate contractual conditions or information on goods or services. Comment 7: Define the role of the notary in this state for the purposes of contractual conditions

6 Article 1 18: Information meant for a professional may be addressed to him/her by electronic mail provided he/she has communicated his/her electronic professional address. Comment 8: The article may have the following phrase as an addition and given consent as to the use of the said address as proof of communication Article 1 18: Information meant for a professional may be addressed to him/her by electronic mail provided he/she has communicated his/her electronic professional address. Article I 19: 5) The means of electronic consultation of the professional and commercial rules by which the author of the offer intends to be guided, if need be. Article I 22: Agreements concluded between professionals may be exempted from the provisions of Articles I 20 and 21 of this Convention. Comment 9: There need for the definition of the broad scope of the word professional as implied in the draft in order to avoid ambiguity of the law. Article I 23: In the absence of legal provisions to the contrary, no person shall be compelled to take a legal action by electronic means. Article I 39: Subject to legal provisions to the contrary, no one shall be compelled to undertake a legal act by electronic means. Comment 10: There is repetition in this law, please consolidate these points Article I 35: Where the legal provisions of Member States have not laid down other provisions, and where there is no valid agreement between the parties, the judge shall resolve proof related conflicts by determining by all means possible the most plausible claim regardless of the message base employed The respective countries have to build their legislations to mitigate cross border/ international conflicts concerning cyber law. In this case, the notaries and all related parties have to be given their definitive mandate, however in this case Article 1-35 does not define its scope

7 **************** Article III 1 7: International cooperation Each Member State shall adopt such measures as it deems necessary to foster exchange of information and the sharing of quick, expeditious and reciprocal data by Member States organizations and similar organizations of other Member States with responsibility to cause the law to be applied in the territory on bilateral or multilateral basis. Comment 11: At this juncture it will be necessary to ensure the proper understanding of the legislations and their harmonization and upgrading of existing individual governmental laws to prevent a case of contradicting legislations that can break the existing laws. Before a continental ratification, individual government legislations must be used as the default, harmonization of such is therefore encouraged. Section II: Legal framework for personal data protection Chapter 1: Objectives of this Convention with respect to personal data Article II 14: Each Member State of the African Union shall establish an authority with responsibility to protect personal data. The body so established shall be an independent administrative authority with the task of ensuring that the processing of personal data is conducted in accordance with the provisions of this Convention. Article II 16: The protection authority shall comprise parliamentarians, deputies, senators, senior judges of the Tribunal of Accounts, Council of State, Civil and Criminal Appeal Court, personalities qualified as a result their knowledge of computer science, as well as professional networks or sectors. Article II 18: Members of the protection authority shall be subject to professional secrecy in accordance with the extant texts of each Member State. Each protection authority shall formulate rules of procedure containing, inter alia, rules governing deliberations, processing and presentation of cases. Comment 12: These articles define the membership and the constituting mandates of the said Protection authority however it should be left to the countries to define the authorities under inbuilt country contributions/laws or bylaws so as not to create a different center of power or parallel agency.

8 Article II 2: Page 21 Each Member State of the African Union shall put in place a legal framework with a view to establishing a mechanism to combat breaches of private life likely to arise from the gathering, processing, transmission, storage and use of personal data. The mechanism so established shall ensure that any data processing, in whatsoever form, respects the freedoms and fundamental rights of physical persons while recognizing the prerogatives of the State, the rights of local communities and the interest of enterprises. Comment 13: Should add an addendum, if so possible, the said individual states shall enact their legislations before the ratification of the aforementioned convention

DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A LEGAL FRAMEWORK CONDUCIVE TO CYBER SECURITY IN AFRICA

DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A LEGAL FRAMEWORK CONDUCIVE TO CYBER SECURITY IN AFRICA ECONOMIC COMMISSION FOR AFRICA AFRICAN UNION COMMISSION DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A LEGAL FRAMEWORK CONDUCIVE TO CYBER SECURITY IN AFRICA OR DRAFT AFRICAN UNION CONVENTION

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

AFRICAN UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA PROTECTION EX.CL/846(XXV)

AFRICAN UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA PROTECTION EX.CL/846(XXV) AFRICAN UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA PROTECTION EX.CL/846(XXV) AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA P.O. Box: 3243, Addis Ababa, Ethiopia, Tel.: +251-115 18 24 02 Fax: +251-115

More information

Diversity of Cultural Expressions INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS

Diversity of Cultural Expressions INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS Diversity of Cultural Expressions 1.EXT.IGC Distribution limited CE/08/1.EXT.IGC/Dec. Rev. 2 Paris, 20 August 2008 Original: English / French INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION

More information

ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION

ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION We, over 125 members of the global access to information community from 40 countries, representing governments,

More information

GUIDELINES ON COMPLIANCE WITH AND ENFORCEMENT OF MULTILATERAL ENVIRONMENTAL AGREEMENTS

GUIDELINES ON COMPLIANCE WITH AND ENFORCEMENT OF MULTILATERAL ENVIRONMENTAL AGREEMENTS GUIDELINES ON COMPLIANCE WITH AND ENFORCEMENT OF MULTILATERAL ENVIRONMENTAL AGREEMENTS 1. In its decision 21/27, dated 9 February 2001, the Governing Council of the United Nations Environment Programme

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT 2300 Pursuant to its authority from Article 59 of the Rules of Procedure of the Croatian Parliament, the Legislation Committee determined the revised text

More information

Declaration of Internet Rights Preamble

Declaration of Internet Rights Preamble Declaration of Internet Rights Preamble The Internet has played a decisive role in redefining public and private space, structuring relationships between people and between people and institutions. It

More information

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

Standing Committee on Copyright and Related Rights

Standing Committee on Copyright and Related Rights E SCCR/24/5 ORIGINAL: ENGLISH DATE: JULY 2, 2012 Standing Committee on Copyright and Related Rights Twenty-fourth Session Geneva, July 16 to 25, 2012 DRAFT TREATY ON THE PROTECTION OF BROADCASTING ORGANIZATIONS

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

How To Write A Cyber Security Convention In Africa

How To Write A Cyber Security Convention In Africa A REPORT OF THE ONLINE DEBATE ON AFRICA UNION CONVENTION ON CYBERSECURITY (AUCC) Submitted to: Africa Union Commission (AUC) Compiled By Grace Githaiga December, 2013 The Kenya ICT Action Network (KICTANet)

More information

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION

More information

The Romanian Parliament adopts the present law. Chapter I: General Provisions

The Romanian Parliament adopts the present law. Chapter I: General Provisions Law No. 677/2001 on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data, amended and completed The Romanian Parliament adopts the present law.

More information

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011 COMMISSION DE L UNION AFRICAINE REPUBLIQUE DU SENEGAL ---------------- MINISTERE DE LA COMMUNICATION, DES TELECOMMUNICATIONS ET DES TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION AFRICAN ICT MINISTERIAL

More information

Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?

Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation? 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M.Maybaum, A.-M.Osula, L.Lindström (Eds.) 2015 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies

More information

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development 7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing

More information

Draft WGIG Issues Paper on Spam

Draft WGIG Issues Paper on Spam Draft WGIG Issues Paper on Spam 1. Issue Spam directly engages a very wide range of stakeholders that includes individual consumers, all organizations of whatever size in the private and public sectors

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

-«Trustee Authority»: Entity that defines and regulates the conditions of assignment and use of Domain Names, applying to each particular Extension.

-«Trustee Authority»: Entity that defines and regulates the conditions of assignment and use of Domain Names, applying to each particular Extension. NETIM - GENERAL TERMS AND CONDITIONS OF DOMAIN NAMES CG-ND version 2.1-15 th November 2015 NETIM, limited liability company under french law, with head office located 165 avenue de bretagne 59000 LILLE

More information

UNDERSTANDING REGARDING NOTIFICATION, CONSULTATION, DISPUTE SETTLEMENT AND SURVEILLANCE

UNDERSTANDING REGARDING NOTIFICATION, CONSULTATION, DISPUTE SETTLEMENT AND SURVEILLANCE DISPUTE SETTLEMENT 200 UNDERSTANDING REGARDING NOTIFICATION, CONSULTATION, DISPUTE SETTLEMENT AND SURVEILLANCE Adopted on 28 November 979 (L/4907). The CONTRACTING PARTIES reaffirm their adherence to the

More information

Personal Data Act (1998:204);

Personal Data Act (1998:204); Personal Data Act (1998:204); issued 29 April 1998. Be it enacted as follows. General provisions Purpose of this Act Section 1 The purpose of this Act is to protect people against the violation of their

More information

DATA PROTECTION LAWS OF THE WORLD. India

DATA PROTECTION LAWS OF THE WORLD. India DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,

More information

Regulations of the Audit and Compliance Committee of Gamesa Corporación Tecnológica, S.A.

Regulations of the Audit and Compliance Committee of Gamesa Corporación Tecnológica, S.A. Regulations of the Audit and Compliance Committee of Gamesa Corporación Tecnológica, S.A. (Consolidated text approved by the Board of Directors on March 24, 2015) INDEX CHAPTER I. INTRODUCTION... 3 Article

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

CROATIAN PARLIAMENT 1364

CROATIAN PARLIAMENT 1364 CROATIAN PARLIAMENT 1364 Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON PERSONAL DATA PROTECTION I hereby promulgate the Act on

More information

engagement will not only ensure the best possible law, but will also promote the law s successful implementation.

engagement will not only ensure the best possible law, but will also promote the law s successful implementation. US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments

More information

Life Insurance Charter of Quality

Life Insurance Charter of Quality Life Insurance Charter of Quality PREAMBLE This Life Insurance Charter of Quality is largely inspired by the ICMA Private Wealth Management Charter of Quality, which lists the guiding principles of best

More information

DRAFT BILL. The PRESIDENT OF THE REPUBLIC To be known that the National Congress decrees and I sanction the following Law.

DRAFT BILL. The PRESIDENT OF THE REPUBLIC To be known that the National Congress decrees and I sanction the following Law. DRAFT BILL Provides for the processing of personal data 1 to guarantee the free development of the natural person's personality and of its dignity. The PRESIDENT OF THE REPUBLIC To be known that the National

More information

UNIÃO AFRICANA Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) 5513 822 Fax: (251-11) 5519 321 Email: situationroom@africa-union.

UNIÃO AFRICANA Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) 5513 822 Fax: (251-11) 5519 321 Email: situationroom@africa-union. AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) 5513 822 Fax: (251-11) 5519 321 Email: situationroom@africa-union.org ACTION PLAN FOR THE IMPLEMENTATION

More information

Life Insurance Charter of Quality

Life Insurance Charter of Quality Life Insurance Charter of Quality PREAMBLE This Life Insurance Charter of Quality is largely inspired by the ICMA Private Wealth Management Charter of Quality, which lists the guiding principles of best

More information

DRAFT BILL PROPOSITION

DRAFT BILL PROPOSITION DRAFT BILL PROPOSITION Establishes principles, guarantees, rights and obligations related to the use of the Internet in Brazil. THE NATIONAL CONGRESS decrees: CHAPTER I PRELIMINAR PROVISIONS Article 1.

More information

OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE INVOLVEMENT OF CHILDREN IN ARMED CONFLICT

OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE INVOLVEMENT OF CHILDREN IN ARMED CONFLICT [ ENGLISH TEXT TEXTE ANGLAIS ] OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE INVOLVEMENT OF CHILDREN IN ARMED CONFLICT The States Parties to the present Protocol, Encouraged by

More information

Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations

Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations Contents Chapter One Introduction Chapter Two Consultation Process Chapter Three Key Principles for Anti-SPAM Draft Regulations Chapter

More information

Credit Union Code for the Protection of Personal Information

Credit Union Code for the Protection of Personal Information Introduction Canada is part of a global economy based on the creation, processing, and exchange of information. The technology underlying the information economy provides a number of benefits that improve

More information

Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information

Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

Philippines Philippines Philippinen. Report Q173. in the name of the Philippine Group

Philippines Philippines Philippinen. Report Q173. in the name of the Philippine Group Philippines Philippines Philippinen Report Q173 in the name of the Philippine Group Issues of co-existence of trademarks and domain names: public versus private international registration systems 1. Analysis

More information

OF THE REPUBLIC OF ARMENIA ON LIMITED LIABILITY COMPANIES

OF THE REPUBLIC OF ARMENIA ON LIMITED LIABILITY COMPANIES LAW OF THE REPUBLIC OF ARMENIA Adopted on October 24, 2001 CHAPTER 1. GENERAL PROVISIONS Article 1. Scope of the Law This law regulates the legal relationships arising from establishment, activity, reorganization

More information

Policy on the Security of Informational Assets

Policy on the Security of Informational Assets Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources

More information

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING 1990 A. GENERAL FRAMEWORK OF THE RECOMMENDATIONS 1. Each country should, without further delay, take steps to fully implement

More information

PERMANENT COURT OF ARBITRATION OPTIONAL RULES FOR ARBITRATING DISPUTES BETWEEN TWO STATES

PERMANENT COURT OF ARBITRATION OPTIONAL RULES FOR ARBITRATING DISPUTES BETWEEN TWO STATES PERMANENT COURT OF ARBITRATION OPTIONAL RULES FOR ARBITRATING DISPUTES BETWEEN TWO STATES 39 OPTIONAL ARBITRATION RULES TWO STATES CONTENTS Introduction 43 Section I. Introductory Rules 45 Scope of Application

More information

Under European law teleradiology is both a health service and an information society service.

Under European law teleradiology is both a health service and an information society service. ESR statement on the European Commission Staff Working Document on the applicability of the existing EU legal framework to telemedicine services (SWD 2012/413). The European Society of Radiology (ESR)

More information

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology

More information

REPUBLIC OF ARMENIA LAW ON COMBATING MONEY LAUNDERING AND TERRORISM FINANCING

REPUBLIC OF ARMENIA LAW ON COMBATING MONEY LAUNDERING AND TERRORISM FINANCING REPUBLIC OF ARMENIA LAW ON COMBATING MONEY LAUNDERING AND TERRORISM FINANCING CHAPTER 1 GENERAL PROVISIONS The purpose of this Law shall be protecting the rights, freedoms, and legitimate interests of

More information

Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications

Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications Brussels, October 8 th 2008 Online Security, Traffic Data and IP Addresses Review of the Regulatory Framework for Electronic Communications Francisco Mingorance Senior Director Government Affairs franciscom@bsa.org

More information

EBA FINAL draft Regulatory Technical Standards

EBA FINAL draft Regulatory Technical Standards EBA/RTS/2015/03 03 July 2015 EBA FINAL draft Regulatory Technical Standards on resolution colleges under Article 88(7) of Directive 2014/59/EU Contents 1. Executive summary 3 2. Background and rationale

More information

Federation of Law Societies of Canada

Federation of Law Societies of Canada Submission to the Standing Committee on Public Safety and National Security in respect of Bill C-44, An Act to Amend the Canadian Security Intelligence Service Act and other Acts Federation of Law Societies

More information

The Asian Bankers Association (ABA) And Formal Workout Regime

The Asian Bankers Association (ABA) And Formal Workout Regime Position Paper PROVIDING THE LEGAL AND POLICY ENVIRONMENT TO SUPPORT EFFECTIVE INFORMAL WORKOUT REGIMES IN THE ASIA-PACIFIC REGION 1. The Asian Bankers Association (ABA) considers robust insolvency and

More information

Council of the European Union Brussels, 26 June 2015 (OR. en)

Council of the European Union Brussels, 26 June 2015 (OR. en) Council of the European Union Brussels, 26 June 2015 (OR. en) Interinstitutional File: 2012/0011 (COD) 9985/1/15 REV 1 LIMITE DATAPROTECT 103 JAI 465 MI 402 DIGIT 52 DAPIX 100 FREMP 138 COMIX 281 CODEC

More information

DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT

DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT LAW No. /2003 INTERNAL SECURITY Ensuring internal security constitutes a pre-condition for safeguarding the peace and stability of any sovereign country

More information

Internet Technical Governance: Orange s view

Internet Technical Governance: Orange s view Internet Technical Governance: Orange s view 1 Internet Technical Governance: Orange s view With the increasing use of IP technologies in the electronic communication networks and services, Internet Technical

More information

BASEL CONVENTION ON THE CONTROL OF TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES AND THEIR DISPOSAL

BASEL CONVENTION ON THE CONTROL OF TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES AND THEIR DISPOSAL BASEL CONVENTION ON THE CONTROL OF TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES AND THEIR DISPOSAL PROTOCOL ON LIABILITY AND COMPENSATION FOR DAMAGE RESULTING FROM TRANSBOUNDARY MOVEMENTS OF HAZARDOUS WASTES

More information

Human Services Quality Framework. User Guide

Human Services Quality Framework. User Guide Human Services Quality Framework User Guide Purpose The purpose of the user guide is to assist in interpreting and applying the Human Services Quality Standards and associated indicators across all service

More information

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations Submitted via ISAO@hq.dhs.gov and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA

More information

GARANTE PER LA PROTEZIONE DEI DATI PERSONALI WHEREAS

GARANTE PER LA PROTEZIONE DEI DATI PERSONALI WHEREAS [doc. web n. 1589969] Spamming: How to Lawfully Email Advertising Messages GARANTE PER LA PROTEZIONE DEI DATI PERSONALI Prof. Stefano Rodotà, President, Prof. Giuseppe Santaniello, Vice-President, Prof.

More information

PROMOTION AND PROTECTION OF INVESTMENT BILL

PROMOTION AND PROTECTION OF INVESTMENT BILL REPUBLIC OF SOUTH AFRICA PROMOTION AND PROTECTION OF INVESTMENT BILL (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette No. 39009

More information

DEPARTMENT OF HUMAN RESOURCES, SCIENCE AND TECHNOLOGY

DEPARTMENT OF HUMAN RESOURCES, SCIENCE AND TECHNOLOGY AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA Addis Ababa, ETHIOPIA P. O. Box 3243 Telephone: 251 11 5517700 Fax: 251 11 5 517844 website: www.africa-union.org DEPARTMENT OF HUMAN RESOURCES, SCIENCE AND

More information

THE CONCEPT of State Migration Policy

THE CONCEPT of State Migration Policy The Decree of the President of Ukraine, #622/2011 On the Concept of State Migration Policy With a purpose of creation of proper conditions for realization of state policy in the sphere of migration I hereby

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

technical factsheet 176

technical factsheet 176 technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection

More information

Freedom of information guidance Exemptions guidance Section 41 Information provided in confidence

Freedom of information guidance Exemptions guidance Section 41 Information provided in confidence Freedom of information guidance Exemptions guidance Section 41 Information provided in confidence 14 May 2008 Contents Introduction 2 What information may be covered by this exemption? 3 Was the information

More information

ANNEX FRAMEWORK OF COOPERATION FOR AFRICA TURKEY PARTNERSHIP

ANNEX FRAMEWORK OF COOPERATION FOR AFRICA TURKEY PARTNERSHIP ANNEX FRAMEWORK OF COOPERATION FOR AFRICA TURKEY PARTNERSHIP The Heads of State and Government and Heads of Delegation of Africa, representing the Continent and the African Union and its Institutions;

More information

Re: RIN 3235-AL13 - Notice of Proposed Rulemaking: Clearing Agency Standards for Operation and Governance (File Number 57-8-11)

Re: RIN 3235-AL13 - Notice of Proposed Rulemaking: Clearing Agency Standards for Operation and Governance (File Number 57-8-11) April 29, 2011 Elizabeth M. Murphy Secretary Securities and Exchange Commission 100 F St., NE. Washington DC 20549-1090 Re: RIN 3235-AL13 - Notice of Proposed Rulemaking: Clearing Agency Standards for

More information

Convention on the Promotion of a Transnational Long-term Voluntary Service for Young People

Convention on the Promotion of a Transnational Long-term Voluntary Service for Young People Convention on the Promotion of a Transnational Long-term Voluntary Service for Young People Strasbourg, 11.V.2000 Preamble The member States of the Council of Europe and the other States Parties to the

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Federation of Law Societies of Canada. Ottawa, November 26, 2013

Federation of Law Societies of Canada. Ottawa, November 26, 2013 Submission to the Standing Senate Committee on Banking, Trade and Commerce in Respect of Bill C-4 (a second Act to implement certain provisions of the budget tabled in Parliament on March 21, 2013 and

More information

RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP

RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP 1. Identity Ecosystem Steering Group Charter The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President

More information

How To Stop Spam

How To Stop Spam Combating Spam: Policy, Technical and Industry Approaches INTRODUCTION Spam continues to be a significant problem for Internet users and operators, even as email filtering and blocking efforts by network

More information

ADDENDUM TO ADMINISTRATIVE SERVICES AGREEMENT FOR HIPAA PRIVACY/SECURITY RULES

ADDENDUM TO ADMINISTRATIVE SERVICES AGREEMENT FOR HIPAA PRIVACY/SECURITY RULES ADDENDUM TO ADMINISTRATIVE SERVICES AGREEMENT FOR HIPAA PRIVACY/SECURITY RULES This Addendum is entered into effective as of, by and among Delta Dental of Virginia ("Business Associate"), and ( Covered

More information

THE EUROPEAN LAW INSTITUTE (ELI)

THE EUROPEAN LAW INSTITUTE (ELI) THE EUROPEAN LAW INSTITUTE (ELI) AISBL IVZW IVOG ARTICLES OF ASSOCIATION: Article 1: Name, Identity and Duration (1) The Association is called "European Law Institute", abbreviated ELI. It may be referred

More information

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 1 July 2014 RESTRICTED 1 ICT as a Modern Solution Security Threats, Early Detection and Prevention

More information

ICC Guidelines on Whistleblowing

ICC Guidelines on Whistleblowing ICC Guidelines on Whistleblowing Prepared by the ICC Commission on Anti-Corruption A. Introduction 1. No abatement of corruption and economic fraud Fraud remains one of the most problematic issues for

More information

Table of contents: ***

Table of contents: *** Table of contents: *** In Europe the issue of personal data protection is settled by European Parliament s and European Council s Directive 95/46/WE of October 24, 1995 (which is basis of Polish regulations)

More information

Mapping of outsourcing requirements

Mapping of outsourcing requirements Mapping of outsourcing requirements Following comments received during the first round of consultation, CEBS and the Committee of European Securities Regulators (CESR) have worked closely together to ensure

More information

PROTECTION OF PERSONAL INFORMATION BILL

PROTECTION OF PERSONAL INFORMATION BILL REPUBLIC OF SOUTH AFRICA PROTECTION OF PERSONAL INFORMATION BILL (As amended by the Portfolio Committee on Justice and Constitutional Development (National Assembly) after consideration of proposed National

More information

Universal Declaration on Bioethics and Human Rights

Universal Declaration on Bioethics and Human Rights Universal Declaration on Bioethics and Human Rights Adopted by the UNESCO General Conference, 19 October 2005 The General Conference, Conscious of the unique capacity of human beings to reflect upon their

More information

Vienna Convention on Succession of States in respect of Treaties

Vienna Convention on Succession of States in respect of Treaties Vienna Convention on Succession of States in respect of Treaties 1978 Done at Vienna on 23 August 1978. Entered into force on 6 November 1996. United Nations, Treaty Series, vol. 1946, p. 3 Copyright United

More information

Information and Observations on the Scope and Application of Universal Jurisdiction. Resolution 65/33 of the General Assembly

Information and Observations on the Scope and Application of Universal Jurisdiction. Resolution 65/33 of the General Assembly United Nations General Assembly Sixty-seventh Session Sixth Committee Information and Observations on the Scope and Application of Universal Jurisdiction Resolution 65/33 of the General Assembly pursuant

More information

Daniel Castro. Senior Analyst. Information Technology and Innovation Foundation (ITIF)

Daniel Castro. Senior Analyst. Information Technology and Innovation Foundation (ITIF) Daniel Castro Senior Analyst Information Technology and Innovation Foundation (ITIF) Should the Department of Commerce Relinquish Direct Oversight Over ICANN Before the Committee on the Judiciary Subcommittee

More information

Taking care of what s important to you

Taking care of what s important to you A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten

More information

ICMA Private Wealth Management Charter of Quality

ICMA Private Wealth Management Charter of Quality ICMA Private Wealth Management Charter of Quality Preamble 1. The Private Wealth Management Charter of Quality ( the Charter of Quality ) is a voluntary standard of recommended minimum good market practice.

More information

PROTECTION OF PERSONAL INFORMATION

PROTECTION OF PERSONAL INFORMATION PROTECTION OF PERSONAL INFORMATION Definitions Privacy Officer - The person within the Goderich Community Credit Union Limited (GCCU) who is responsible for ensuring compliance with privacy obligations,

More information

* * * Initial Provisions for. CHAPTER [ ] - Regulatory Cooperation

* * * Initial Provisions for. CHAPTER [ ] - Regulatory Cooperation REMARKS: This is an initial textual proposal for a draft Chapter on Regulatory Cooperation that the Commission intends to submit to the US on Friday, 30 January, in preparation of the 8 th round of TTIP

More information

Charter of Consumer Rights in the Digital World

Charter of Consumer Rights in the Digital World DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create

More information

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013 Preliminary Summary of Discussions National Counter- Terrorism Strategies

More information

Conference of the States Parties to the United Nations Convention against Corruption

Conference of the States Parties to the United Nations Convention against Corruption United Nations CAC/COSP/2015/L.7/Rev.2 Conference of the States Parties to the United Nations Convention against Corruption Distr.: Limited 5 November 2015 Original: English Sixth session St. Petersburg,

More information

Binding Corporate Rules ( BCR ) Summary of Third Party Rights

Binding Corporate Rules ( BCR ) Summary of Third Party Rights Binding Corporate Rules ( BCR ) Summary of Third Party Rights This document contains in its Sections 3 9 all provision of the Binding Corporate Rules (BCR) for Siemens Group Companies and Other Adopting

More information

UNMIK REGULATION NO. 2003/37 ON THE PROMULGATION OF THE LAW ON POSTAL SERVICES ADOPTED BY THE ASSEMBLY OF KOSOVO

UNMIK REGULATION NO. 2003/37 ON THE PROMULGATION OF THE LAW ON POSTAL SERVICES ADOPTED BY THE ASSEMBLY OF KOSOVO UNITED NATIONS United Nations Interim Administration Mission in Kosovo UNMIK NATIONS UNIES Mission d Administration Intérimaire des Nations Unies au Kosovo UNMIK/REG/2003/37 17 December 2003 REGULATION

More information

Acceptable Use Policy and Terms of Service

Acceptable Use Policy and Terms of Service Acceptable Use Policy and Terms of Service Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.nic.sucks Version 1.0

More information

SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF)

SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF) 1 SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF) A. GENERALITIES Purpose of the Rules 1 The Self-Regulation Rules, enacted by the Association romande des intermédiaires

More information

Practice Note. 10 (Revised) October 2010 AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM

Practice Note. 10 (Revised) October 2010 AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM October 2010 Practice Note 10 (Revised) AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM The Auditing Practices Board (APB) is one of the operating bodies of the Financial Reporting

More information

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially

More information

Advance copy of the authentic text. The copy certified by the Secretary-General will be issued at a later time.

Advance copy of the authentic text. The copy certified by the Secretary-General will be issued at a later time. PROTOCOL TO PREVENT, SUPPRESS AND PUNISH TRAFFICKING IN PERSONS, ESPECIALLY WOMEN AND CHILDREN, SUPPLEMENTING THE UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME Advance copy of the authentic

More information

Accreditation by Overseas Qualification, Professional Association Membership or Advanced Standing

Accreditation by Overseas Qualification, Professional Association Membership or Advanced Standing BOOKLET C Accreditation by Overseas Qualification, Professional Association Membership or Advanced Standing Information Booklet This booklet has been developed to assist applicants wishing to obtain accreditation

More information