International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.

Slides:



Advertisements
Similar presentations
Advanced Piloting Cruise Plot.
Advertisements

Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on the SADC Harmonized.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
ITU – EC HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2nd Workshop on Lesotho National Transposition of SADC Cybersecurity.
International Telecommunication Union ITU – EC HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Sadc Harmoniseed Legal.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa Validation Workshop on Tanzania.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2 nd Workshop on Tanzania National.
International Telecommunication Union ITU-EC HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa Validation Workshop on Lesotho.
International Telecommunication Union Support for Harmonization of the ICT Policies in Sub-Sahara Africa Name of presenter HIPSSA Project.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Tanzanian ICT.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Consumersinternational.org EFFECTIVE COOPERATION WITH THE MEDIA Robert Michel Praia February 2011 CONSUMER LAW PROTECTION A Development guide Hong Kong.
EU market situation for eggs and poultry Management Committee 20 October 2011.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
2 |SharePoint Saturday New York City
VOORBLAD.
15. Oktober Oktober Oktober 2012.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa: Transposition of SADC Cyber-security.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
© 2012 National Heart Foundation of Australia. Slide 2.
Universität Kaiserslautern Institut für Technologie und Arbeit / Institute of Technology and Work 1 Q16) Willingness to participate in a follow-up case.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
An introduction to… INTRODUCTION FROM THE SEA Wendy Jackson NZ Ministry of Foreign Affairs and Trade 1.
25 seconds left…...
Januar MDMDFSSMDMDFSSS
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
African responses to e-commerce and Cyber Crime 18 th – 21 st March 2014 Sizwe Lindelo Snail Ka Mtuze Director- Snail Law Inc. Workshop on.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Johannesburg, South Africa
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Support for Harmonization of the ICT Policies in Sub-Sahara Africa,
ITU an Overview Combined International SNO and 8th African SNO
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
Cybercrime legislation and policies in Africa: Issues for discussion
Presentation transcript:

International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National Transposition of SADC Model Law Dar-es-Salaam 4 th- 5 th February 2013 Presenter: Judith M.C.Tembo HIPSSA Expert

2 1. Summary Context Background SADC Model Law on Cybercrime Conclusion

2.Background Context – Development of Tanzania law on cybercrime model law on cybercrime Globalization has given rise to activities and transactions increasingly conducted via ICT and internet ICT applications - e-Government, e-Commerce, e-Education, e-Health and e- Environment, seen as enablers for development, as they provide efficient channel to deliver a wide range of basic services Challenges - attacks against information infrastructure and internet, and cyber threats (legal, technical, institutional) Risks - financial, economic, health, security, technical etc Need to protect information infrastructure and internet against cybercrime 3

2.Background 1.0 Legal measures – cybercrime legislation (as part of cybersecurity strategy) Internet borderless, challenges global, global solution needed Harmonization of legislation needed 2.0 SADC countries situation analysis as at February 2011: -countries with cybercrime laws, -countries with cybercrime laws under development - countries with cybercrime related laws 2.1 Countries with cybercrime laws: Botswana, Mauritius, South Africa, Zambia 2.2 Countries with cybercrime legislation under development/cybercrime related legislation: Angola, Democratic Republic of Congo, Lesotho, Madagascar, Malawi, Mozambique, Namibia, Swaziland, Seychelles, Tanzania, Zimbabwe 4

2.Background Cybercrime is to a large degree abuse of technology for criminal purposes Cybercrime legislation - is part of cybersecurity strategy) Efficient penal legislation criminalising certain forms of computer crime and cybercrime (crimes against computers, computer system, content related offences) Existence of related procedural instruments that enable law enforcement to carry out investigations are essential requirements for the involvement of law enforcement agencies in the fight against computer crime and cybercrime Lack of adequate cybercrime legislation - deprives law enforcement agencies of effective tools to support citizens that have become victims of cybercrime -might protect /encourage offenders from abroad to move their illegal activities to countries with such legislation 5

2. Background Harmonisation important because mutual legal assistance usually based on dual criminality ie investigations globally usually limited to crimes criminalised in all affected countries 6

SADC Model Law On Computer Crime and Cybercrime Model Law on Computer crime and cyber crime - Law adopted by SADC ICT Ministers of at annual meeting held in Mauritius from 6-8 November, adapted to regional requirements but harmonised in line with international standards (definitions, criminalisation of certain offences, terminology, etc) – common understanding - UN resolutions -CoE Convention on Cybsercrime - Organisation of American States - ITU Tool kit -Commonwealth Model Law - AU - EAC Framework on Cyberlaws -ECOWAS Supplementary Acts - 7

SADC Model Law On Computer Crime and Cybercrime Model law Contd Divided into six parts 1.Preliminary 2.Substantive criminal law provisions (offences) 3.Jurisdiction territorial and extra-territorial (ship/aircraft registered in enacting country, citizen etc) 4.Electronic evidence – admissibility 5.Procedural law – investigative procedures and tools 6.Limitation of liability – carriers Penalties – severity effectiveness/deterrence. 8

SADC Model Law On Computer Crime and Cybercrime PART I.Preliminary Short Title Objective Definitions 9

SADC Model Law On Computer Crime and Cybercrime PART II.Offences 1.Illegal Access 2.Illegal Remaining 3.Illegal Interception 4.Illegal Data Interference 5.Data Espionage 6.Illegal System Interference 7.Illegal Devices 8.Computer-related Forgery 9.Computer-related Fraud 10

SADC Model Law On Computer Crime and Cybercrime 10.Child Pornography 11.Pornography 12.Identity-related crimes 13.Racist and Xenophobic Material 14.Racist and Xenophobic Motivated Insult 15.Denial of Genocide and Crimes Again Humanity 16.SPAM 17.Disclosure of details of an investigation 18.Failure to permit assistance 19.Harassment utilizing means of electronic communication 11

SADC Model Law On Computer Crime and Cybercrime PART III.JURISDICTION 20.Jurisdiction PART IV.ELECTRONIC EVIDENCE 21.Admissibility of Electronic Evidence 12

SADC Model Law On Computer Crime and Cybercrime PART V.procedural law 22.Search and Seizure 23.Assistance 24.Production Order 25.Expedited preservation 26.Partial Disclosure of traffic data 27.Collection of traffic data 28.Interception of content data 29.Forensic Tool 13

SADC Model Law On Computer Crime and Cybercrime PART VI.Liability 30.No Monitoring Obligation 31.Access Provider 32.Hosting Provider 33.Caching Provider 34.Hyperlinks Provider 35.Search Engine Provider 14

4. Conclusion cybercrime legislation important in context of misuse of ICT for criminal ourposes Legislation that facilitates international co-operation in investigations and effective penalties important Lack of effective penalties, differences in terminology, acts covered in offences, non- criminalisation of certain offences and or lack of provision for certain procedural instruments, and penalties encouragement for safe havens; SADC Model law on computercrime and cybercrime important building block for developing of Tanzania cybercrime legislation Differences including significant differences in penalties for offences of concern vis-avis effectiveness of deterrence provided for cybercrime and the need for removal of safe havens to would-be offenders; Harmonisation of laws in line with global standards to effectively fight cybercrime, remove safe havens improve international cooperation in the framework of cybercrime investigations and prosecution recommended is essential. 15

Thank you for your attention! j 16