LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES



Similar documents
NIGERIAN CYBERCRIME ACT 2015

CYBERSECURITY BILL, 2011

Cyber Crime and Data Retention

CYBERCRIME AND THE LAW

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Australia s proposed accession to the Council of Europe Convention on Cybercrime

GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

T-CY Guidance Note #5

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

A Global Treaty on Cybersecurity and Cybercrime

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

COMPUTER MISUSE AND CYBERCRIME ACT

Crimes (Computer Hacking)

The EU approach to Cybersecurity and Cybercrime

ITU TOOLKIT FOR CYBERCRIME LEGISLATION

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CRC/C/OPSC/SWE/CO/1. Convention on the Rights of the Child. United Nations

Models for Cyber-legislation in ESCWA member countries

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Cybercrime: risks, penalties and prevention

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

An Overview of Cybersecurity and Cybercrime in Taiwan

Cyber Security Recommendations October 29, 2002

Migration/ Asylum. Co-operation in the field of drugs

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Federal Act on the Implementation of International Sanctions

Criminal Code And Civil Liability Amendment Bill 2007

Optional Protocol on the sale of children, child prostitution and child pornography

How To Implement International Terrorism Agreements

Information Security Law: Control of Digital Assets.

Peace and Justice in Cyberspace

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

S. ll IN THE SENATE OF THE UNITED STATES A BILL

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

In an age where so many businesses and systems are reliant on computer systems,

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Protection of Freedoms Bill

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?

Cybercrimes: A Multidisciplinary Analysis

CHAPTER 124B COMPUTER MISUSE

Honourable members of the National Parliaments of the EU member states and candidate countries,

THE COMPUTER MISUSE AND CYBERCRIME ACT I assent ARRANGEMENT OF SECTIONS

Cybersecurity Governance

AG/RES CYBER SECURITY STRATEGY (RESOLUTION)

ITU Global Cybersecurity Agenda (GCA)

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Executive Director Centre for Cyber Victim Counselling /

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Touring the World of Cybersecurity Law

An Executive Overview of GAPP. Generally Accepted Privacy Principles

The Massachusetts Strategic Plan for Cyber Crime

Cyber Diplomacy A New Component of Foreign Policy 6

OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY

BSA GLOBAL CYBERSECURITY FRAMEWORK

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, June 2006)

Promoting a cyber security culture and demand compliance with minimum security standards;

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in :

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Legislative Language

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

Modalities for Forensic Review of Computer Related Frauds

Cybercrime & Cybersecurity

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Basel Committee on Banking Supervision. Sharing of financial records between jurisdictions in connection with the fight against terrorist financing

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

MCOLES Information and Tracking Network. Security Policy. Version 2.0

The global challenge

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

Conference of the States Parties to the United Nations Convention against Corruption

A Global Protocol on Cybersecurity and Cybercrime

Transcription:

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice,

OUTLINE Interconnected world The Nigerian situation Crimes in an interconnected world The imperative for Nigeria Legislation and institutional framework Challenges Recommendations Conclusion

Interconnected world High speed communications and convergence Social Media and Interactions (Facebook/Twitter) 5 Billion interconnected devices $8 Trillion in e-commerce transactions Migration of businesses to online environment Government services have now gone online

The Nigerian Situation E-government services Payment platform for e-commerce ATM Machines Electronic Activities of the NSE Cashless Lagos and soon Nigeria Electronic Identification system

Crimes in an Interconnected World All crimes imaginable offline can be achieved with the use of computer networks as a tool Threats to lives and properties Disruption of critical services Terrorism and economic sabotage Propaganda Theft of information(identity & credit card theft)

The Imperatives for Nigeria Establishment of Legal and Regulatory Framework Establishment of Institutional Framework for coordination of implementation; Standards and Regulations; Capacity Building Compliance & Enforcement; Emergency Response & Readiness; Public enlightenment International Cooperation

Legislation and Institutional Framework Several Draft Bills pending in the National Assembly NSA s Committee on Cybersecurity Bill 2011 - General Objectives - Offences and Penalties - Critical Information Infrastructure Protection - Search Arrest and Prosecutions - International Cooperation - Miscellaneous

Harmonized Cybersecurity Bill 2011 Part I General Objectives Part 1 deals with the general objectives, the scope of the Bill and its application. The objects and scope of this Act are to provide an effective, unified and comprehensive legal framework for the prohibition, prevention, detection, prosecution and punishment of cybercrimes in Nigeria; Enhance cybersecurity and the protection of computer systems and networks, electronic communications; data and computer programs, Intellectual property and privacy rights; The provisions of this Act shall be enforced by law enforcement agencies in Nigeria to the extent of an agency's statutory powers in relation to similar offences.

Harmonized Cybersecurity Bill 2011 Part II Offences & Penalties This Part ( Sections 2 to 18) criminalizes specific computer and computer related offences, which include: Unlawful access to a computer; Unauthorized disclosure of access code; Data forgery; Computer fraud; System interference; Misuse of devices; Denial of service; Identity theft and impersonation; Child Pornography; Records Retention and Preservation; Unlawful Interception; Cybersquatting; Cyberterrorism; Failure of Service Providers to Perform certain Duties; Racist and xenophobic Offences; Attempt, conspiracy and abetment; and Corporate Liability.

Harmonized Cybersecurity Bill 2011 Part III Critical Information Infrastructure Protection Part III provides for the security and protection of critical information infrastructure. It further provides for the audit and inspection of critical information infrastructure and punishment for offences against critical information infrastructure.

Harmonized Cybersecurity Bill 2011 Part IV Search, Arrest and Prosecution Part IV deals with issues such as jurisdiction, powers of search and arrest, obstruction of law enforcement officers, prosecution, forfeiture of assets, compounding of offences; payment of compensation; and the power to make regulations.

Harmonized Cybersecurity Bill 2011 Part V: International Cooperation Cybercrime and cybersecurity issues are not restricted by geographical boundaries and legal jurisdictions but can only be checked through international cooperation which is covered in Sections 29 to 34 of the Bill. The issues covered include: Extradition; Mutual Assistance Requests; Expedited preservation of data, Evidence Pursuant to a Request; and Form of Requests

Harmonized Cybersecurity Bill 2011 Part VI: Miscellaneous Part VI deals with issues of a general character such as Directives of a general character; Regulations and the Interpretation. The above provisions of the draft Cybersecurity Bill, 2011 have met the milestones required of legislation on cybercrime, even when reviewed or compared against international instruments and standards, such as the Council of Europe s Budapest Convention, 2001 3 and the ITU Toolkit on Cybersecurity Legislation.

Challenges Turf battles (supremacy disagreements) among law enforcement, intelligence and security agencies; Lack of understanding of the dire consequences of not criminalising conduct that amounts to cybercrime or the serious dangers, economic loss and national security vulnerability that flows from the lack of adequate cybersecurity framework, on the part of our lawmakers; The absence of a knowledgeable and committed champion at the highest policy levels to sustain the drive for the passage of the Bill, while emphasising the peril of not doing so. Lack of integration of public private sector stakeholders in the process, due largely to distrust of government by the private sector, as well as sectored infighting; Insufficient sustained lobbying of the lawmakers by the sponsors of the various previous pending Bills.

Recommendations Enactment of substantive laws to criminalize malevolent activities on the internet Capacity building Cooperation between actors (Private or Public) Establishment of Institutional framework for coordinating cybersecurity efforts Enactment of related Bills to strengthen the cybersecurity framework

Conclusion Completion of the legislative process and establishment of institutional framework should be considered a matter of urgency A state of Emergency should be declared in this area until the recommendations in this paper are implemented

Thank you T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, 71B, Shehu Shagari Way, Maitama, Abuja M: +234 803 322 0559 E: george.tyendezwa@fmj.gov.ng W: www.fmj.gov.gov/ccpu