Cybersecurity Governance



Similar documents
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

2. Cyber legislation harmonization process in Central Africa

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Tentative Action Plan

Cyber ITU. By Tomas Lamanauskas, ITU

DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA

ITU National Cybersecurity/CIIP Self-Assessment Tool

ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye

Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Mobile Money Services: legal and regulatory challenges The experience of the East African Community

TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

The Development of Consumer Protection Laws in Tanzania for Electronic Consumer Contracts

The global challenge

(DRAFT)( 2 ) MOTION FOR A RESOLUTION

Update on the Continental Free Trade Area (CFTA)

Draft WGIG Issues Paper on E-Commerce

DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A LEGAL FRAMEWORK CONDUCIVE TO CYBER SECURITY IN AFRICA

ITU Global Cybersecurity Agenda (GCA)

Okinawa Charter on Global Information Society

E-commerce and Development Key Trends and Issues

National. icr Policy

National Cyber Security Strategy

Theme II: CREATING, PROMOTING AND SUSTAINING AN INNOVATIVE ENVIRONMENT: Funding, Tax and Other Incentives for Promoting Innovation

AG/RES CYBER SECURITY STRATEGY (RESOLUTION)

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

How To Understand And Understand The European Priorities In Information Security

EUROPEAN ECONOMIC AREA JOINT PARLIAMENTARY COMMITTEE. REPORT on E-Commerce and EEA legislation

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities

ECOWAS COMMON APPROACH ON MIGRATION - The current and future policy framework of ECOWAS

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations

DATE: 1 APRIL Introduction

KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA

Promoting a cyber security culture and demand compliance with minimum security standards;

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber Security Recommendations October 29, 2002

Day 3-24 April Day 2-23 April 2013

DIGITAL AGENDA FOR LATIN AMERICA AND THE CARIBBEAN (elac2018)

Michael Yakushev PIR-Center, Moscow (Russia)

Legal Interoperability to Enable Cross-Border Data Exchange through SW Facilities

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

CYBERCRIME AND THE LAW

How To Protect Children Online From Harm

THE 5 TH MEETING OF THE WORKING GROUP 3 ON ICTs SERVICE TRANSACTIONS AND E-APPLICATIONS, HELD FROM 7 TH - 11 TH SEPTEMBER 2015, ARUSHA TANZANIA

Working Party on Information Security and Privacy

Declaration of the Ministerial Conference of the Khartoum Process

The AU s cybercrime response A positive start, but substantial challenges ahead

DECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

REGIONAL MIGRATION POLICY The current and future policy framework of ECOWAS. Tony Luka Elumelu Directorate of Free Movement & Tourism

National Cyber Security Strategy of Afghanistan (NCSA)

HIPSSA Project. Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Second Mission -Namibia

Reaffirming Bearing in mind Recognizing

Chairperson of the NEPAD Heads of State and Government Orientation Committee, President Macky Sall of the Republic of Senegal

AFRICAN UNION ROADMAP: PROGRESS IN THE FIRST YEAR

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

TD/B/C.II/EM.5/2. United Nations Conference on Trade and Development. United Nations

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

Self-Assessment of a Comprehensive Privacy Programme: A Tool for Practitioners

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Cyber Security Strategy

Conferences AFRICA REMITTANCES & MONEY TRANSFER MARKETS FORUM. 6-7 June 2013 Palace of the National Assembly Praia, Cape Verde

ASEAN s Cooperation on Cybersecurity and against Cybercrime

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,

Global Platform for Disaster Risk Reduction, Second Session, Geneva, Switzerland June, 2009

The Ohada and Ecowas Treaties as Tools for Regional Integration and Regulatory Reforms

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Electronic signature, authentication, identity management & UNCITRAL

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

AFRICAN BIOSPHERE RESERVES NETWORK AfriMAB

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Models for Cyber-legislation in ESCWA member countries

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy

Transcription:

AfriSIG 2014 Cybersecurity Governance Pria.za.africa

Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches

Cybersecurity Governance Political Will and Leadership Institutional Governance Infrastructure and Equipment Capability, Interoperability, Standards, Protocols Skills and Training Capability Incident Response Capability and Maturity Resources and Budget Allocations International, National, Sectoral and Inter-sector cooperation Enforcement Legal Frameworks that identify

Cybersecurity Governance UNCITRAL Budapest Conv. EU ITU UNCTAD UNECA AU SADC EAC Globally, there are multiple initiatives, efforts, models at international, national and regional levels. Particularly to: Promote harmonised, global, coherent and co-ordinated approaches; Address legal barriers to electronic transactions; and Promote trust and confidence in (international) electronic transacting methods

Africa Acronyms Initiatives by, for instance: AU (African Union) SADC (the Southern African Development Community) UNECA (Economic Commission for Africa UNCTAD (Commission Trade and Development) ECOWAS (Economic Community of West African States), EAC (East African Community)

UNCITRAL (1996) MLEC Model Law on Electronic Commerce Promote greater consistency in national and regional approaches. Create a more secure legal environment for electronic commerce for providing a model reference for legislators Implemented by several countries In Africa implemented by South Africa, Cape Verde, Mauritius

Encoding Cybersecurity Norms and Principles African Union Convention

AU According to the Website: The Draft Convention gives effect to a Resolution of the last session of the Assembly of Heads of State and Government of the African Union, and seeks to harmonize African cyber legislations on electronic commerce organization, personal data protection, cyber security promotion and cyber crime control. In pursuance of the principles of the African Information Society Initiative (AISI) and the African Regional Action Plan for thesource/ Knowledge Economy Read More: http://au.int/en/cyberlegislation (ARAPKE), the Draft Convention is intended not only

AU Draft Convention The objective of this Convention was to propose the adoption at the level of the African Union, a Convention establishing a credible framework for cybersecurity in Africa through organisation of electronic transactions, protection of personal data, promotion of cyber security, e-governance and combating cybercrime

AU Draft Convention - Complexities Information security impacts on the security of the digital and cultural heritage of individuals, organizations and nations; The vulnerability in the normal functioning of institutions can compromise the survival and sovereignty of States; Addressing cyber security calls for clear-sighted political will to define and implement a strategy for development of digital infrastructure and services (eservices) and articulate a coherent, effective and controllable multi-disciplinary cyber security strategy.

AU Draft Convention - Challenges Achieve a level of technological security adequate enough to prevent and effectively control technological and informational risks; Build an information society that respects values, protects rights and freedoms, and guarantees the security of the property of persons, organizations and nations; Contribute to the knowledge economy, guarantee equal access to information while stimulating the creation of authentic knowledge; Create a climate of confidence and trust, that is: Predictable in terms of prevention and resolution of disputes; and evolving because it takes into account continued technological evolution; Organized: covering the relevant sectors; Protective: of consumers and intellectual property (civil and penal) of citizens, organizations and nations; Secured: striking proper balance between legal and technological

AU Convention - Content Provisions relating to legality of I am a document, open me electronic transactions, protection of personal data, promotion of cyber security, e-governance and combatting cybercrime

AU Convention - Criticism Provisions: too much power to the government, particularly in accessing private information. processing of personal data and sensitive data without consent of the owner for the purpose of state security and public interest could be misused. broad and unchecked powers to investigating judges. Such powers include the power to issue search and seizure warrants for any electronic records. prosecution of anyone seen to promote theories of racism and xenophobia. only approved e-commerce payments may be used in a country. This requirement would force popular global platforms, such as Paypal, to seek regulatory approval, considerably slowing down the rate at which they could spread their services across Africa Source/ Read More: http://techpresident.com/news/wegov/24712/africa-union-cybersecurity-law-flawed

Encoding Cybersecurity Norms and Principles Regional Model Approaches

SADC Cybersecurity, 2012 SADC Model Laws - adopted at a SADC Ministerial meeting in Botswana in 2012 SADC Model Law on Data Protection, 2012 SADC Model Law on Cybercrime, 2012 SADC Model Law on Electronic Transactions, 2012 Commenced with a regional and international assessment Technical Assistance was offered by ITU for the drafting of the Model Laws and in-country transpositions

SADC Model Law on E-Transactions and ECommerce, 2012 I am a document, open me

ECOWAS Directive on Fighting Cybercrime, 2009 Incorporation of legal framework for Member States Emphasis on cybercrime, data protection, search and seizure Source/ Read More: Sizwe Snail, Lecture 2013, P&DM www.snailattorneys.com

EAC Regional e-government Programme adopted by the EAC Council of Ministers (2006) Enabling legal framework as a critical factor: etransactions, cybersecurity Harmonized regional and national legal frameworks Creation of an EAC Task Force (2008) Background: East African Community Secretariat, Report of the 2nd EAC Regional Taskforce Meting on Cyber Laws (2008) http://r0.unctad.org/ecommerce/event_docs/kampala_eac_2008_report.pdf

EAC The East African Development Strategy (2011/12 2015/16) proposes the key drivers for the realization of the EAC regional integration agenda in the next five years to include, among others, creation of a strong legal framework ( ) The development of cyber laws in the region is critical to underpin the realisation of full potentials in regional ecommerce, electronic financial transactions and business processes outsourcing. Hon. Musa Sirma, Chairperson of the Council of Ministers of the East African Community and Minister for East African Community, Republic of Kenya, at the occasion of the presentation of the budget of the EAC for the financial year 2012/2013 to the legislative assembly

Khartoum Ministerial Declaration emphasises the need for African countries to accelerate the formulation of cyberlegilsation Source/ Read More: http://www1.uneca.org/articledetail/tabid/3018/articleid/1934/ict-ministers-call-forharmonized-policies-and-cyberlegislations-on-cybersecurity.aspx

Source/ Read More: http://www1.uneca.org/articledetail/tabid/3018/articleid/1430/experts-adoptdeclaration-of-addis-ababa-on-harmonization-of-cyber-legislation.aspx

For Consideration Political will, drivers, objectives Budget Implementation of cybersecurity institutions, centres and capabilities requires finances Impact of cybersecurity readiness on trade (and development) Impact on rights and freedoms privacy, access to information, neutrality of the internet Limitations of rights Balancing of interests

Pria Chetty Pria.chetty@endcode.org endcode.org THANKS, QUESTIONS?