N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.

Slides:



Advertisements
Similar presentations
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa Model Law for Electronic Transactions.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa: Transposition of SADC Cyber-security.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
1 Office of the General Counsel FERPA  Family Educational Rights and Privacy Act (20 U.S.C § 1232g)
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
PART FOUR – COMMERCIAL LEGISLATION in the UAE Legislative Structures affecting business in the UAE: An Overview Ch 16.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
 E-Commerce  The sale of goods and services by computer over the Internet  Internet  A collection of millions of computers that provide a network.
Cyber Law & Islamic Ethics
UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW UNCITRAL Model Law on Electronic Commerce Renaud Sorieul Senior legal Officer UNCITRAL.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
1 Cyber Laws: Uganda UGANDA’S CYBER LAWS Presentation Presentation by by Ambrose Ruyooka, PMP® Ag Commissioner Information Technology Ministry of ICT ISACA.
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Business Law for the Entrepreneur and Manager
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
Internet Security for Small & Medium Business Week 6
THE E-COMMERCE LEGAL ENVIRONMENT Bangkok, November, 2002 David Marsh.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
PRESENTATION TO PORTFOLIO COMMITTEE ON COMMUNICATIONS ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL Presentation by: Andile Ngcaba, Director-General.
Electronic Signatures in the SFA Loan Programs Electronic P-Notes Presented by Jeff Baker & Kay Jacks.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
International Telecommunication Union Accra, Ghana, June 2009 Towards Cyber Security - Kenyan Experience Christopher Kemei, Asst. Director Licensing.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
DIGITAL SIGNATURE.
FTAA Joint Government-Private Sector Committee of Experts on Electronic Commerce - Feb.15, 2002 Some views on consumer protection in the context of electronic.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
The Information Technology Act Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
Health Sciences Administration Brown Bag Training Topics in Records Management November 12, 2015.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
LAWS OF MALAYSIA ACT 658 ELECTRONIC COMMERCE ACT 2006.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW
Cyber Laws in Pakistan.
Electronic Transactions & Authentication
Regulation of Investigatory Powers Act 2000
Digital Signature.
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Cyber Laws in Pakistan Hassan Khalil.
14. “(1) Unless otherwise agreed where the originator has stated that the electronic communication is conditional on receipt of acknowledgment, the electronic.
Presentation transcript:

N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE

I NTRODUCTION INFORMATION AND COMMUNICATIONS ACT, 2009 AN ACT to provide for the re-structuring, development, and regulation of the information and communications sectors in The Gambia and for matters connected therewith

ICT P ROFILE Domestic Telephone lines: combined fixed-line and mobile- cellular teledensity, aided by four (4) mobile-cellular providers, is roughly 80 per 100 persons Mobile and Internet facts: 85% mobile coverage in 2010, and the number of mobile phone subscribers increased 264-fold to 1.47 million between 2000 and  Internet access increased ten-fold from 0.92 per 100 individuals in 2000, to 9.2 individuals per 100 in  We have six (6) ISPs

IC ACT 2009: E -C OMMERCE & E LECTRONIC T RANSACTIONS Functions of the Ministry; 1. (a) facilitate electronic communications by means of reliable electronic records; (b) facilitate electronic commerce and eliminate barriers to electronic commerce resulting from uncertainties over writing and signature requirements;

IC ACT 2009: E -C OMMERCE & E LECTRONIC T RANSACTIONS C ONT. (c) promote public confidence in the integrity and reliability of electronic records and electronic transactions; (d) foster the development of electronic commerce through the use of electronic signatures to lend authenticity and integrity to correspondence in any electronic medium;

IC ACT 2009: E -C OMMERCE & E LECTRONIC T RANSACTIONS C ONT. (e) facilitate access to e-government services; and (f) minimize the incidence of forged electronic records and fraud in electronic commerce and other electronic transactions;

PROCESSING OF PERSONAL DATA & PROTECTION OF PRIVACY Principles Operators have authority to process personal data of end user or subscribers Intercept: The national security agencies and investigating authorities may monitor, intercept and store communications. Measures to ensure privacy of communications: Service providers can block any unauthorized attempt to intercept, store or monitor transmitted communication related to traffic data. Use of communications for direct marketing: Use of communications for direct marketing is subject to the consent of the subscriber

PROCESSING OF PERSONAL DATA & PROTECTION OF PRIVACY C ONT. Unsolicited goods, services or communications: A person who sends unsolicited commercial communications to consumers, shall provide the consumer with- (a ) the option to cancel his or her subscription to the mailing list of that person; and (b) the identifying particulars of the source from which that person obtained the consumer’s personal information, on request of the consumer Unsolicited calls for direct marketing purposes: A person shall not use, or instigate the use of, a public communications service for the purposes of making unsolicited calls for direct marketing purposes

COMPUTER MISUSE & CYBER CRIME Unauthorized access to computer data: A person who causes a computer system to perform a function, knowing that the access he or she intends to secure is unauthorized, commits an offence Unauthorized access to and interception of computer service: A person who intercepts or causes to be intercepted, directly or indirectly, any function of, or any data within a computer system commit an offence

COMPUTER MISUSE & CYBER CRIME CONT. Publishing of Information which is obscene in electronic form: A person who publishes or transmits or causes to be published in electronic form, any material which is lascivious or appeals to the prurient interest, or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied therein, commits an offence Computer-related extortion, fraud and forgery

PROTECTION OF CHILDREN Indecent photographs of children: A person who takes or permits to be taken or to make, distributes, in possession, publishes or causes to be published indecent photograph or pseudo-photograph of a child has commit an offence. Deletion order:

ELECTRONIC RECORDS & ELECTRONIC SIGNATURES Sphere of application Legal recognition of data messages Incorporation by reference Requirement for writing Other requirements Retention Retention of information in original form Production of document or information Expression of intent or other statement Attribution of electronic record and signature Effect of change or error

ELECTRONIC RECORDS & ELECTRONIC SIGNATURES C ONT. Acknowledgement of receipt of electronic message Admissibility and evidential weight of data messages Signatures Recognition of foreign certificates and electronic signatures Notarization, acknowledgement and certification Equal treatment of signature technologies Conduct of a person relying on an electronic signature Conduct of the certification service provider Trustworthiness Generating key pair Acceptance of certificate Control of private key Initiating suspension or revocation

ELECTRONIC TRANSACTIONS Formation and validity of contracts Automated transactions Variation by agreement between parties Time of dispatch Time of receipt Place of dispatch and receipt Information to be provided Cooling-off period Unsolicited goods, services or communications Performance Applicability of foreign law Non-exclusion

I SSUES & C HALLENGES Inadequate capacity for law enforcement agencies Level of awareness with regard to the IC Act that caters for e- Commerce, Cyber Crime and Electronic Transactions. Inadequate financial resources to laws pertaining to e- Commerce. Level of Comprehension of the law governing e-Commerce and Electronic Transactions

Thank You