Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.



Similar documents
2. Cyber legislation harmonization process in Central Africa

Cybersecurity Governance

2013 Africa Union Framework for Cyber security in Africa

Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?

Cyber ITU. By Tomas Lamanauskas, ITU

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

The global challenge

Reaffirming Bearing in mind Recognizing

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ASEAN s Cooperation on Cybersecurity and against Cybercrime

Global Platform for Disaster Risk Reduction, Second Session, Geneva, Switzerland June, 2009

SRO-EA s Cyber security Initiatives in Eastern Africa

Honourable members of the National Parliaments of the EU member states and candidate countries,

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Cyber Diplomacy A New Component of Foreign Policy 6

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

Promoting a cyber security culture and demand compliance with minimum security standards;

Policy Brief. Tackling the challenges of cybersecurity in Africa. 1. Introduction

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

The internet and digital technologies play an integral part

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

Middle Class Economics: Cybersecurity Updated August 7, 2015

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

CISSA Cybersecurity capacity building workshop. May 2015

ITU Global Cybersecurity Agenda (GCA)

ITU National Cybersecurity/CIIP Self-Assessment Tool

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Cyber Security Strategy of Georgia

Update on the Continental Free Trade Area (CFTA)

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth

How To Understand And Understand The European Priorities In Information Security

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia

African Internet Governance Forum (AfIGF) Girma Dessalegn - AfIGF Secretariat

Working Party on Information Security and Privacy

AG/RES CYBER SECURITY STRATEGY (RESOLUTION)

Cyber Security Recommendations October 29, 2002

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

Cybersecurity in the Commonwealth: Setting the Stage

Concerning the remarks made during the meetings the Presidency wishes to clarify the following

Cyber Security Strategy

Cyber security Country Experience: Establishment of Information Security Projects.

AFRICAN UNION ROADMAP: PROGRESS IN THE FIRST YEAR

ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye

Council 2014 Geneva, 6-15 May 2014

Cybersecurity for ALL

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Michael Yakushev PIR-Center, Moscow (Russia)

Lessons from Defending Cyberspace

DIGITAL AGENDA FOR LATIN AMERICA AND THE CARIBBEAN (elac2018)

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

How To Write An Article On The European Cyberspace Policy And Security Strategy

DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A LEGAL FRAMEWORK CONDUCIVE TO CYBER SECURITY IN AFRICA

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

8674/15 MC/pf 1 DGD 1B

Lith Networking and Network Marketing Safety

DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA

The official nomination of national focal points for issues relating to statelessness in seven (7) States (commitment 22)

UNIÃO AFRICANA Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) Fax: (251-11)

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Recognizing that women smallholder farmers constitute the majority of food producers, but remain vulnerable and require targeted support;

(Intercontinental CityStars Hotel, Cairo, Egypt, May 9 11, 2016)

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Declaration of the Ministerial Conference of the Khartoum Process

Addis Ababa, ETHIOPIA P. O. Box 3243 Telephone 517 Fax:

CYBERCRIME AND THE LAW

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

Cyber Security Strategy

Overview of ITU Cybersecurity Activities

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

A GLOBAL STRATEGY OF MIGRATION FOR DEVELOPMENT

ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int.

S. ll IN THE SENATE OF THE UNITED STATES

A Global Protocol on Cybersecurity and Cybercrime

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

National Cyber Security Strategy

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

ECOWAS COMMON APPROACH ON MIGRATION - The current and future policy framework of ECOWAS

ECOWAS COMMON POSITION ON THE ARMS TRADE TREATY

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

Cyber Security Strategy for Germany

INTERNATIONAL CONFERENCE ON AFRICA S FIGHTAGAINST EBOLA - PLENARY OF AFRICAN HEADS OF STATE AND GOVERNMENT 21 July 2015

National Cyber Security Strategy of Afghanistan (NCSA)

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

How To Be A Successful Member Of The European Agency For Security And Safety

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

A Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC

KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA

TITLE III JUSTICE, FREEDOM AND SECURITY

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Cybersecurity in Nepal

Transcription:

Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues.

FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating to cybersecurity and cybercrime are emerging and there is a need to ensure that citizens, governments and business are protected. African countries need to urgently scale up efforts to combat cybercrimes through multi stake holders approach involving governments,industry and civil society organizations in an integrated and comprehensive manner. African governments are at different level of establishing policy instruments and legislative framework and given the international dimension of Cybersecurity it s important to reinforce international cooperation including confidence building measures. 2

Cyber security Challenges for Africa Low level of security provisions sufficient to prevent and control technological and informational risks. Lack of know-how in terms of cyber security and inability to monitor and defend national networks, making African countries vulnerable to incidences of cyber terrorism and cyber espionage. Inability to develop the necessary cyber security legal frameworks to fight cybercrime and while many countries have proposed legislations the level of deployment of security systems in both the private and the public sector is low. Cyber security concerns are broader than national security and yet, few cybersecurity initiatives have been implemented in Africa. 3

AU response to Cyber Insecurity issue The convention embodies the treatment of Cybercrime and cybersecurity but it s not only confined in these elements it embraces important elements of electronic transactions and protection of personal data. The objective is to harmonize e-legislation related, to e-transactions development, personal data protection, cyber security promotion and fight against cybercrime, Define key cyber terminologies in legislation Develop general principles and specific provisions related to cyber legislation Outline cyber legislative measures required at Member State level Develop general principles and specific provision on international cooperation as related to cyber legislation Protect the rights of persons during data gathering / processing against the threats and attacks capable of compromising their privacy. Protecting Institutions against the threats and attacks capable of endangering their survival and efficacy. 4

AU Convention on the Confidence and Security in Cyberspace Development of the AU convention on Cyber-Security AU organs Decisions ( Ministerial conferences and Summit of Heads of States and governments A draft Convention on Cyber Security has been developed (2010-11) Regional Workshops have been organized on Cyber Legislation and on the AU Draft Convention on Cyber Security: - ECCAS: Libreville, Gabon, November 2011 - ECOWAS: Abidjan, Côte d Ivoire, February 2012 - Tripartite [COMESA, SADC, CEAC] + UMA (Northern Africa): Addis-Ababa, Ethiopia, June 2012 Final Expert Group meeting to finalize the Draft Convention before the CITMC-4 Addis- Ababa, Ethiopia, August 2012 5

AU Convention on the Confidence and security in Cyberspace Endorsement of the AU Final Draft Convention on Cyber legislation by the 4 th Ministerial Conference of the African Union Ministers in charge of Communication and Information Technologies (CITMC-4). Adoption of the convention by the conference of ministers in charge Justice and Legal Affairs The African Union Convention on Cyber security and personal data protection has been adopted by the 23 rd Assembly of Heads of States and Governments held in Malabo, Equatorial Guinea in June 2014 6

WAY FORWARD 7

AU Convention on the Confidence and Security in Cyberspace The Convention main parts PART I: ORGANIZATION OF ELECTRONIC COMMERCE PART II: PROTECTION OF PERSONNAL DATA PART III: PROMOTING CYBER SECURITY AND COMBATING CYBER CRIME PART IV: COMMON AND FINAL PROVISIONS webpage for the AUC Convention: http://www.au.int/infosoc/cybersecurity 8

AU Convention on the Confidence and Security in Cyberspace PART I: Electronic Transactions Section I : Electronic Commerce Section II: Contractual Obligation in Electronic Form Section III : Security of Electronic Transactions 9

AU Convention on the Confidence and Security in Cyberspace Section I : Personal Data Protection PART II: Personal Data Protection Section II : Institutional framework for the protection of personal data Section III : Obligation relating to conditions governing personal data processing Section IV : The Data Subject Rights Section V : Obligation of personal data controller 10

AU Convention on the Confidence and Security in Cyberspace PART III: PROMOTING CYBER SECURITY AND COMBATING CYBER CRIME Section I : Cyber Security Measures to be taken at National Level. Chapter 1: National cyber security framework Chapter 2: Legislative measures Chapter 3 : National cyber security system Chapter 4 : National cyber security monitoring structures Chapter 5 : International cooperation - Harmonization - Mutual assistance - Exchange of information - Means of cooperation 11

AU Convention on the Confidence and Security in Cyberspace Section II: Criminal Provisions Chapter I: Adapting certain ICTs offenses Chapter II: Adapting certain sanctions to the ICTs Chapter III : Offenses specific to ICTs - Attack on computer systems - Attack on computerized data - Offenses relating to electronic message security measures. - Content related offenses / definition of cyber threats against children 12

AU Project on Cybersecurity Capacity Building The AU project is intended to implement the following activities : Ratification of the AU Cybersecurity Convention by at least 15 countries. Transposition of the convention s provision into National and Regional Cyber-legislations ( Organization of National and Regional workshops en Cyber legislation) Human and institutional Capacity Building on Cybersecurity, Cybercrime, e-transaction and personal data protection; Development of National and Regional Computer Emergency Readiness Team (CERTs) ( provide countries with the capability to identify, respond and manage cyber threats ) 13

Cooperation at Regional and International level Given the current state of cybercrime in general which constitutes a real threat to the security of computer networks and the development of the Information Society in Africa, there is need to implement the AU convention on cybersecurity and define broad guidelines of the strategy for the repression of cybercrime in Member States of the African Union, taking into account their existing commitments at sub-regional, regional and international levels. AU believe that by creating an appropriate legal framework both at national and regional level to secure and build confidence in the use of internet as a global public good we contribute to protect all the internet related human rights which include privacy and free flow of information 14

Cooperation at Regional and International level Considering the multiple dimensions and complexity of Cyber security there is a need to establish comprehensive legal frameworks for national and international cooperation. African Union in collaboration with African Regional organizations and specialized institutions aims to consolidate and elaborate the regional strategy to promote confidence building measures for a regional and international cooperation that can provide guidance in implementing initiatives aiming at strengthening Security in cyberspace The AUC is member of the Global ConferenceCyberSpace 2015 initiative Global Forum Capacity Expertise ( GFCE). 15

Cooperation at Regional and International level The African Union has started collaborating with the USA government, notably in promoting cyber security due diligence in Africa. To promote a culture of cyber security on the continent by developing the policies, legal frameworks and organizational structures necessary to improve cyber security due diligence and effectively combat cybercrime This Initiative builds on previous U.S-AUC efforts to raise cyber capacity on the continent by assisting African member states to develop the key components of a national cyber security framework required to support national and international engagement on cyber policy. 16

Cooperation at Regional and International level Three partite collaboration AUC / USA and Symantec to produce a report that collects and presents detailed technical data on cyber security threats and trends in Africa. The report will assess the major trends in the region in terms of threats to the cyber domain and the potential impact they could have on those that utilize it - from government institutions to private enterprises, to individual users. The report will serve as a comprehensive document on cyber security matters in Africa, from which members of the African Union can draw useful conclusions and gain a more nuanced understanding of the major cyber trends in Africa as well as the current capacity to deal with those threats. 17

In summary African union is committed to promote the culture of Cyber security and works closely with the African Regional Economic Communities to provide guidance to African member states on cybercrime and cyber security policies. The African Union aims to consolidate and elaborate a common African strategy and provide guidance in implementing initiatives for regional and international cooperation and enable the continent to operate as one institution against cyber crime. The African Union is open for cooperation with relevant partners and specialized organizations in cyber security domain for the establishment of international mechanisms to address the cyber security issue, combat different forms of cybercrime and ensure security and stability in cyberspace. 18

THANK YOU FOR YOUR ATTENTION AU Commission http://www.au.int/infosoc/cybersecurity 19