Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyrighted Work- ADAM MAMBI

Similar presentations


Presentation on theme: "Copyrighted Work- ADAM MAMBI"— Presentation transcript:

1 Copyrighted Work- ADAM MAMBI
CYBER LAWS WORKSHOP FOR EAC, April 2006, Kampala. The Status of Cyber Laws in Tanzania. Presenter; ADAM MAMBI State Attorney (Head legal Research Dpt.), The Law Reform Commission of Tanzania. April 2006 Copyrighted Work- ADAM MAMBI

2 Copyrighted Work- ADAM MAMBI
April 2006 Emerging issues that EAC need will to consider for the establishment and implementation Legal frame framework for ICT and E-Government The impact of ICT on the Laws, economy and the Society. E-Commerce/E-government Barriers to the commercial exploitation of ICT (e.g.-Commerce) Cyber Crimes. Definition of Theft under digital era? April 2006 Copyrighted Work- ADAM MAMBI Copyrighted Work, Adam Mambi

3 Copyrighted Work- ADAM MAMBI
E-evidence, e-signatures/Evidential Status of electronic documents. Jurisdiction problem on cyber space Extradition treaties on cyber space Are we E-EAC or off-line-EAC? April 2006 Copyrighted Work- ADAM MAMBI

4 E-Commerce and the Status of Cyber Laws in Tanzania
The technology has brought fundamental changes in the way commerce takes place The impact on the use (EDI) E-commerce is growing explosively April 2006 Copyrighted Work- ADAM MAMBI

5 The Current Legal system in Tanzania
Transactions that are paper based methods. The e-transactions hindered by legal obstacles( written documents manuscript signatures, authentication in transactions). Contracts to be made by deed in writing and evidenced using original documents April 2006 Copyrighted Work- ADAM MAMBI

6 Copyrighted Work- ADAM MAMBI
laws designed to facilitate paper-based transactions. Lack of Regulatory steps to secure e- transactions such as digital signatures, e-government Lack of e-dispute settlement mechanisms Should we apply 1800s Postal Rules on e-communications? [Adams v. Lindsale] 1818 April 2006 Copyrighted Work- ADAM MAMBI

7 Exceptions to written, and signature requirements
Contracts for licensing and assignments f copyright, creation of transfer in title deeds , Wills and trusts , negotiable instruments, and Bill of lading. April 2006 Copyrighted Work- ADAM MAMBI

8 Some e-Laws recognizing exceptions
The UK CDPA 1988 The Law of Property Act 1989 Marine Insurance Act 1906 Consumer Credit Act 1974 April 2006 Copyrighted Work- ADAM MAMBI

9 Jurisdictional Problem on Dispute settlement!
Under cyber space with boundary less where things happen? When and where the contract is actually made? When communication of offer/acceptance is deemed to be effective forming a contract? Are we able to point out the time and the place where the contract is made electronically? April 2006 Copyrighted Work- ADAM MAMBI

10 Copyrighted Work- ADAM MAMBI
Do we still need to apply Postal rule? Which legal system will apply? Which court will have jurisdiction? Who are relevant law enforcers in cyber crimes? April 2006 Copyrighted Work- ADAM MAMBI

11 Copyrighted Work- ADAM MAMBI
ADR vs ODR Laws govern ADR of-line {Arbitration Act, Civil Procedure Act) 1967) Online Dispute Resolution (ODR) for cyberspace/Internet disputes and offline disputes is growing through Website Mediation and negotiation services (cyber mediation & negotiation). Using Sophiscated Software and a Neutral Third Party See and April 2006 Copyrighted Work- ADAM MAMBI

12 Copyrighted Work- ADAM MAMBI
How can we incorporate ODR /e-ADR in our e-government strategies and Laws? Do we have laws that recognize e-justice and cyber courts? April 2006 Copyrighted Work- ADAM MAMBI

13 Off-line Auctions vis-à-vis On-line auctions
Sale by auction is complete when the auctioneer announces its completion by the fall of the hammer With on-line-auction it is the time that matters. April 2006 Copyrighted Work- ADAM MAMBI

14 Digital/Electronic Signatures:
E-Commerce has brought a revolution on a paper based signatures to digital or e-Signatures E-Signature means Data in electronic form in, affixed to or logically associated with, a data message. Laws in Tanzania do not recognize e-signatures April 2006 Copyrighted Work- ADAM MAMBI

15 Copyrighted Work- ADAM MAMBI
Identity and identification on the Internet Capacity to contracts (Minors not allowed) “On the Internet no body knows you are a dog" (Reed, Interne Law page 119): April 2006 Copyrighted Work- ADAM MAMBI

16 Copyrighted Work- ADAM MAMBI
Business Laws-contracts to be made or evidenced in a particular way namely: By deed, under seal and writing. be signed before a witness. Be evidenced with original documents April 2006 Copyrighted Work- ADAM MAMBI

17 Copyrighted Work- ADAM MAMBI
Retention of information in a manual filling system. Keeping written documents Barrier in implementing e-government April 2006 Copyrighted Work- ADAM MAMBI

18 Copyrighted Work- ADAM MAMBI
Suggested Solutions Enact/amend our laws in line with UNCITRAL and CMW Model Laws requirements for functional equivalence. Articles 6UNCM/7(CWL) (writing), 7UNCM/9(CWL) (Signature), 8UNCM/6CWL(Original),9UNCM/3(CWL)(Admissibility and evidential weight of data message/e-evidence) and 11 of UNCITRAL Model Law on E-Commerce April 2006 Copyrighted Work- ADAM MAMBI

19 Copyrighted Work- ADAM MAMBI
Article 6UNCM/9CWL(e-/digital Signature) and 12 of UNCITRAL Model Law on E-Signatures While other countries legislation which reflect UNCITRAL Model Laws some countries like Tanzania, Kenya and Tanzania have still off-line laws. Where are we? April 2006 Copyrighted Work- ADAM MAMBI

20 Consumer protection Under distance Contracts and e-banking;
There is a practical danger to consumers who buy goods or services on-line. Most Laws protect consumers on off-line business only. April 2006 Copyrighted Work- ADAM MAMBI

21 E-PAYMENTS/E-Banking
Most Banks and other financial institutions have introduced ATMs Cards and other related Cards. Most laws regulating this area are not in tune to e-banking, calling for further reforms. April 2006 Copyrighted Work- ADAM MAMBI

22 Copyrighted Work- ADAM MAMBI
Is the use of credit/debit cards is safe, risk less? Negotiable instruments Are the definitions of bill of exchange and cheques affected by e-banking? Definition of Bills of Exchange “An unconditional order in writing, addressed by one person to another, signed by the person giving it…. April 2006 Copyrighted Work- ADAM MAMBI

23 Copyrighted Work- ADAM MAMBI
An endorsement in order to be a negotiation must comply with the following conditions, namely- (a) it must be written on the bill itself and be signed by the indorser and the simple signature of the indorser on the bill, without additional words, is sufficient. April 2006 Copyrighted Work- ADAM MAMBI

24 Taxation under e-commerce
Impact of e-commerce on Taxation system Tax principles of source, residence and jurisdiction affected by e-commerce. Under digital technology digitized goods can be delivered electronically which pose a challenge on taxation system. How can we assist Tax collectors? Where and where taxes can be collected? April 2006 Copyrighted Work- ADAM MAMBI

25 Issues to be considered under e-taxation!!!!
Where a business is to be regarded as established for fiscal purposes? Where income is earned in one country by an individual resident or undertaking established in another country where taxes fall due to be paid. How can we avoid double taxation and prevent fiscal tax evasion? How can we reform our Tax laws to cope with e-developments? April 2006 Copyrighted Work- ADAM MAMBI

26 International harmonization on e-taxation
OECD Model Tax Convention provides the basis for more than 1,500 bilateral treaties between states providing for tax arrangements regarding each other’s nation. Are we part of this Convention? How far is it useful? April 2006 Copyrighted Work- ADAM MAMBI

27 Copyrighted Work- ADAM MAMBI
THINK ABOUT THESE! E-commerce unleashed and unbowed? (Turban E., Ecommerce 2002) What are the impact of internet on the way we live, work and think? The future has just happened!!! April 2006 Copyrighted Work- ADAM MAMBI

28 Data Protection and Privacy
Are we assured with security under our computer systems? Do we have any legal framework on database and data protection?. Can the personal data and confidential information flow freely. Balance between the right to privacy and public interest Can the data processing techniques pose threat to the rights and freedoms of individuals. April 2006 Copyrighted Work- ADAM MAMBI

29 Intellectual Property Rights and Digital Technology
Digital infringement of IP rights such as Copyright and domain names cybersquating Impact of ICT on IP Laws. E-Publishing and digital infringement of IP Rights. Software and web piracy April 2006 Copyrighted Work- ADAM MAMBI

30 (ISPs &OSPs) liability on digitised services.
The relevance of IP the New Media/ICT. Off-line IP Laws The Role of ISP on digital infringement of IPRs. ISPs and other on-line service providers can be secondarily held liable as facilitators for the infringement of copyrighted materials online. April 2006 Copyrighted Work- ADAM MAMBI

31 MP3—Peer 2 Peer File Sharing.
MP3 music files under e-commerce has great impact on Copyrighted work. MP3 is a file that stores compressed music file. April 2006 Copyrighted Work- ADAM MAMBI

32 Copyrighted Work- ADAM MAMBI
Do current Copyright reflect digital infringement of copyrighted works?. Are there digital infringement theories developed under NAPSTER Case?. Consider the US Digital Millennium Copyright Act. CDPA(UK) 1988 April 2006 Copyrighted Work- ADAM MAMBI

33 Copyrighted Work- ADAM MAMBI
Internet Domain names Domain names are Web or Internet addresses used by web servers to identify each other on the Internet. ICANN responsible for administering Internet Domain names. Are we ruled or bound by California Laws? Do we have laws to regulate this area (cybersquating)? April 2006 Copyrighted Work- ADAM MAMBI

34 Copyrighted Work- ADAM MAMBI
Other jurisdictions The US has enacted the US Anti-cybersquating Consumer Protection Act (ACPA) for regulating Domain names. . Example of domain names disputes case of Prince Pl v. Prince Sportswear Group Inc[1998]. The UK had also experienced the conflict on domain names in Pitman Training Ltd v.Nominet UK [1997)and Mark & Spenser plc v.One in a Million Ltd[1998] Dispute on multiple trademark holders Nissan Motor Co.v. Nissan Computer Corp. April 2006 Copyrighted Work- ADAM MAMBI

35 Impact of ICT on Criminal Law; Cyber or Computer crime
Computers technology has impacted criminal law in two main ways. It can facilitate the commission of crimes such as fraud and theft created new range of activities/offences such as computer hacking and the development and distribution of computer viruses, unsolicited s and hacking. April 2006 Copyrighted Work- ADAM MAMBI

36 Hacking unauthorized access to computer material .Threat by Hackers
serious threat to the security of computer systems read or copy confidential information, erase or modify information or programs download programs or data, or add something, Steal money or direct the computer to have goods sent to him. April 2006 Copyrighted Work- ADAM MAMBI

37 Copyrighted Work- ADAM MAMBI
See Re v. Levin [1997] QB 65.The applicant in St Petersburg to access to Citibank's computer system in New Jersey and transferred money. He was arrested in the UK and US sought extradition. April 2006 Copyrighted Work- ADAM MAMBI

38 Computer Viruses and time bomb;
Creation or dissemination of computer viruses. Misconduct in computer field A virus will typically be transferred from one system to another through either disks or storage devices. April 2006 Copyrighted Work- ADAM MAMBI

39 Fraud and theft under digital technology
Stealing money or property by means of a computer Using a computer to obtain dishonestly, including money and cheques or credit or services or to evade dishonestly some debt or liability. Obtaining property e.g. money by deception; Definition of Theft under the current Laws (permanently depriving some ones tangible property) .Does this cover theft using computers? e.g. intangible property rights? April 2006 Copyrighted Work- ADAM MAMBI

40 Copyrighted Work- ADAM MAMBI
Spamming This unsolicited s on the Internet normally sent by e-bussines trying to advertise and sell goods and services. This can block ISPs Services. A trespass to other IPRs. eg. trade marks and Domain names. In the US There has been more than 20 cases. April 2006 Copyrighted Work- ADAM MAMBI

41 Computer Pornography:
Recording and transmission of images and texts on digital media different from paper or video tapes. Digitization, transmission, upload and download obscene sexual images and fantasies over the Internet. Children are more vulnerable on the impact of these obscene materials. Current Laws not effective in combating these crimes April 2006 Copyrighted Work- ADAM MAMBI

42 Copyrighted Work- ADAM MAMBI
Consider the following issues How can we control/regulate on-line transmission of obscene, indecent material and defamatory information? Who are the “new actors in the new Stage”?. Opt to intermediary liability? April 2006 Copyrighted Work- ADAM MAMBI

43 Copyrighted Work- ADAM MAMBI
Most laws do not accommodate cyber crimes. laws does not provide cyber crime offences such as computer frauds, theft, piracy and the prosecution thereof. April 2006 Copyrighted Work- ADAM MAMBI

44 Reliability and admissibility of Computer Evidence.
Most Current Evidence statues are derived from Common law using “BEST EVIDENCE RULE”. April 2006 Copyrighted Work- ADAM MAMBI

45 Copyrighted Work- ADAM MAMBI
In Tanzania The Evidence Act, 1967 does not provide room for the admissibility of computer/electronic Evidence. The best evidence under this law is the primary evidence which in most cases will be the written, and signed or authenticated documents. . April 2006 Copyrighted Work- ADAM MAMBI

46 The Role of the Judiciary in Tanzania
The lacuna on the admissibility of electronic evidence was tested by the High Court of Tanzania (Commercial Division) in the case of Trust Bank Ltd. v. Le-marsh Enterprises Ltd., Joseph Mbui Magari, Lawrence Macharia(No.4 of 2000 (Unreported) April 2006 Copyrighted Work- ADAM MAMBI

47 What do we learn from this case
Although the laws in Tanzania do not recognize computer evidence as original, the case has put paper based evidence and e-evidence in equal footing weight. The Judge urged that in the absence of e-laws (emphasis added) the court will find way of dispensing justice even in difficult circumstances of absence f legal guidance. April 2006 Copyrighted Work- ADAM MAMBI

48 Copyrighted Work- ADAM MAMBI
the question before Judge Nsekela was whether Computer/electronic Evidence is admissible in our Courts under our Laws. April 2006 Copyrighted Work- ADAM MAMBI

49 Impact of Court Decision:
E-Evidence admissible under our courts. Departure from strict application of “BEST EVIDENCE RULE” April 2006 Copyrighted Work- ADAM MAMBI

50 Integrity of computers and electronic records system.
How can one proof the integrity of computers computer generated information and computer print-out. Can “the best rule” apply in electronic evidence? April 2006 Copyrighted Work- ADAM MAMBI

51 Copyrighted Work- ADAM MAMBI
Jurisdiction problem Which legal system will apply when dealing with cyber crimes? Which court will have jurisdiction? The cyberspace has no boundaries. A crime can be committed anywhere in the world. Which country has the right to arrest offenders and prosecute? Do we need Extradition treaties for all countries in the world? April 2006 Copyrighted Work- ADAM MAMBI

52 Copyrighted Work- ADAM MAMBI
GOVERNMENTS INITIATIVES THE LAW REFORM COMMISSION OF TANZANIA Response on the impact of ICT LRCT has undertaken a review and research on the e-commerce and Cyber crimes area and come up with the recommendation which will lead to the enactment of the laws that will regulate this fast growing area. April 2006 Copyrighted Work- ADAM MAMBI

53 Proposed Draft Bills by The Law Reform Commission of Tanzania
Four Proposed Draft Bills based on Functional equivalence were prepared from the final Report on E-Commerce and Cyber and Computer related crimes. The Final Report plus the proposed Draft Bills to be submitted to the Minister of Justice and Constitutional Affairs. April 2006 Copyrighted Work- ADAM MAMBI

54 1. ELECTRONIC EVIDENCE BILL
Cross cutting issues addressed; Recognition and admissibility of electronic records as evidence equivalent with the “best evidence rule” Giving due evidential weight information in a form of data message. Admissibility of e-Signatures Burden of proving authenticity of e-records. Presumption of integrity of e-records April 2006 Copyrighted Work- ADAM MAMBI

55 ELECTRONIC TRANSACTION AND COMMUNICATION BILL
Cross cutting issues addressed; Writing requirement met by e-Information/data message Handwritten signature satisfied by e-Signature Production/retention of original documents satisfied by e-documents April 2006 Copyrighted Work- ADAM MAMBI

56 Copyrighted Work- ADAM MAMBI
Recognition of e-contracts & e-communications. Determination of time and place of sending and receiving e-communications Recognition of foreign e-Documents / e-Signatures April 2006 Copyrighted Work- ADAM MAMBI

57 Copyrighted Work- ADAM MAMBI
Notarisation, acknowledgement and certification met by e-Signatures, establishment of Authentication Authority on e-signatures etc e-Government service delivery – acceptance of electronic filing; application; payment; digital signatures; e-publication / e-Gazette; etc. Administration of country-code Top Level Domain April 2006 Copyrighted Work- ADAM MAMBI

58 Copyrighted Work- ADAM MAMBI
Establishment of Authentication Authority Accreditation Authority Authentication Service providers Establish register of Cryptography providers Establishment of domain name authority April 2006 Copyrighted Work- ADAM MAMBI

59 CYBER AND COMPUTER RELATED CRIMES BILL
Cross cutting issues addressed; Illegal access and interfering with computer systems Use of illegal devices Interfering with data and computer system Publication of immoral & obscene materials (eg. obscenity, inciting hatred, harmful to children, etc.) April 2006 Copyrighted Work- ADAM MAMBI

60 Copyrighted Work- ADAM MAMBI
Production of computer viruses, worms, logic bombs, etc. Powers of authorised officers to search & seize computer systems/e-devices and access data Powers of authorised officers to prosecute cyber-crimes Cyber Inspectors and their powers April 2006 Copyrighted Work- ADAM MAMBI

61 DATA AND PRIVACY PROTECTION BILL.
Cross cutting issues addressed; Collection, use, disclosure and retention of personal information Limits on the use and disclosure of personal information Storage and security for personal information Retention and disposal of personal information April 2006 Copyrighted Work- ADAM MAMBI

62 Copyrighted Work- ADAM MAMBI
Principles of data protection and consumer rights Powers of Minister to make regulations Establishment of the Office of Data Protection and Privacy Commissioner April 2006 Copyrighted Work- ADAM MAMBI

63 General Exceptions on e-principles.
Contracts for licensing and assignments f copyright, creation of transfer in title deeds , Wills and trusts created by wills, negotiable instruments, and Bill of lading. April 2006 Copyrighted Work- ADAM MAMBI

64 Copyrighted Work- ADAM MAMBI
Concluding Remarks Having realized all cross cutting issues which seem to be barriers for e-commerce and e-government implementation, there is a need of having harmonized and uniform Legal framework on ICT within EAC. Need for benchmarking from other countries with legal framework on ICT April 2006 Copyrighted Work- ADAM MAMBI

65 Copyrighted Work- ADAM MAMBI
Consideration of UNCITRAL Model Laws and Commonwealth Model Laws on E-Commerce and E-Signatures Lets make our law enforcers to be e-enforcers Have e-courts April 2006 Copyrighted Work- ADAM MAMBI

66 Copyrighted Work- ADAM MAMBI
The End Thank you for you Attention!! Adam Mambi, State Attorney (Head Research Department), The law Reform Commission of Tanzania: Expert on Cyber Law/ICT Law, Intellectual Property Law, Competition Law and Environmental Law. Mobile Phone: +255(0) April 2006 Copyrighted Work- ADAM MAMBI


Download ppt "Copyrighted Work- ADAM MAMBI"

Similar presentations


Ads by Google