1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

ITU – EC HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2nd Workshop on Lesotho National Transposition of SADC Cybersecurity.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2 nd Workshop on Tanzania National.
International Telecommunication Union Support for Harmonization of the ICT Policies in Sub-Sahara Africa Name of presenter HIPSSA Project.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
UN Comprehensive Study on Cybercrime
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
2 Language of Computer Crime Investigation
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
VICTIM SUPPORT: The International Context Bali Process Workshop on Victim Support 7 – 9 November 2006 Michel Bonnieu, Senior Regional Legal Advisor UNODC.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
CONTROLLING INFORMATION SYSTEMS
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Cyber Law And Ethics And Ethics.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
CS457 Introduction to Information Security Systems
Advanced Income Tax Law
GCSE ICT SECURITY THREATS.
Dispute Resolution Between ICT Service Providers in Saudi Arabia
The Legal System and Ethics in Information Security
MODUS OPERANDI OF CYBER CRIME
Seminar On Cyber Crime Submitted To: Submitted By:
WitnessProtection Presentation
Crimes against Property
Securing Information Systems
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
8 Building Blocks of National Cyber Strategies
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Trafficking in Persons (TIP)
Chapter 13 Security and Ethical Challenges.
Cybercrime in the election process:
Forensic and Investigative Accounting
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter four – International Criminal Law:General Introduction
Tax Crime and Compliance Issues
Preventing Information Technology Crimes
Qatar’s Gateway to the 21st Century
LO1 - Know about aspects of cyber security
Deborah Housen-Couriel, ADV.
Protecting Yourself from Fraud including Identity Theft
Chiamaka Anyaegbu Centre for Socio-Legal Studies
UNODC and CYBERCRIME October 2009.
Presentation transcript:

1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC Model Law Cybercrime into Namibian Law Presented by: Ndapwilapo Selma Shimutwikeni

The Evaluation Of Cybercrime Laws And Regulations Must Be Understood In The Context Of A Growing Dependence On ICTs Most services such as the supply of electricity, transportation and military services depend on the use of ICTs.

Namibia’s policy on ICTs: ‘universal access and service is a dynamic component of an emerging broadband-enabled economy and society, and a key to promoting Namibia’s social development and economic growth, enabling infrastructure, content and services to reach all Namibians. More and more offenders are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activity. Cyber attacks against Internet services and information infrastructure such as water and electricity supply, traffic control now have a potential to harm society in new and serious ways.

ANTI-CYBERCRIME-RELATED PROVISIONS IN NAMIBIAN STATUTES value-added tax act no.10 of 2000 anti-corruption act no.8 of 2003 The companies act no.28 of 2004 Motor vehicle accident fund act no. 10 of 2007 The financial intelligence act no. 2 of 2007 the communications Act no.8 of 2009 The statistics act no.9 of 2011

OBJECTIVE OF THE SADC MODEL LAW ON CYBERCRIME & The NAMIBIAN ECT BILL The objective of the Act is to provide a legal framework for the criminalisation and investigation of computer and network related offences i.e. cybercrime It aims to criminalize certain illegal activity or content in line with regional and international best practices and provide the necessary specific procedural mechanisms for the investigation of such offences and it also defines the liability of service providers.

SADC MODEL LAW ON CYBERCRIME PART I: stipulates the objective of the Act and provides definitions using sufficiently broad wording which facilitates both technological advancements and new and innovative developments in cybercrime Examples: “Computer system” or “information system” – a device or a group of inter-connected or related devices, one or more of which, pursuant to a program, performs automatic processing of data or any other function; “Critical infrastructure” - computer systems, devices, networks, computer programs, computer data, so vital to the country that the incapacity or destruction of or interference with such systems and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters PART II - provides Substantive criminal law provisions (offences)

SADC MODEL LAW ON CYBERCRIME PART II - provides Substantive criminal law provisions all offences established in the SADC Model Law on Cybercrime , require that an offender is carrying out the offences intentionally. Reckless acts are not covered. Illegal Access 4. A person who intentionally, without lawful excuse or justification or in excess of a lawful excuse or justification, accesses the whole or any part of a computer system commits an offence punishable, on conviction, by imprisonment for a period not Section 68: Unauthorised Access Any person or party who causes an information system to perform a function, knowing that the access he intends to secure is unauthorized, shall commit an offence.

SADC MODEL LAW ON CYBERCRIME Part III provides procedures to determine the jurisdiction of courts. A court in Namibia trying an offence in terms of this Act has jurisdiction where- the offence was committed in Namibia; any act of preparation towards the offence or any part of the offence was committed in Namibia, or where any result of the offence has had an effect in Namibia; the offence was committed by a Namibian citizen or a person with permanent residence in Namibia or by a person carrying on business in the Namibia; or the offence was committed on board any ship or aircraft registered in Namibia or on a voyage or flight to or from Namibia at the time that the offence was committed.

SADC MODEL LAW ON CYBERCRIME PART IV. Electronic evidence – deals with admissibility of electronic evidence. The SADC Model Law states that the fact that evidence has been generated from a computer system does not itself prevent that evidence from being admissible. Section 24 of ECT Bill - electronic evidence is admissible in any civil, criminal, administrative and disciplinary hearing PART V. Procedural law – Provides a set of procedural instruments necessary to investigate Cybercrime. Key for the identification of offenders, protection of the integrity of computer data during an investigation contains several inherently unique challenges for law enforcement authorities. PART VI: deals with the liability of service providers.

TYPES OF OFFENCES Offences against confidentiality, integrity and availability of computer Data and Systems Content related offences Computer related offences Combination offences

1. Offences Against the Confidentiality, Integrity and Availability of Computer Data and Systems offences in this category are directed against at least one of the three legal principles of confidentiality, integrity and availability. the effective prosecution of these acts requires that existing criminal law provisions not only protect tangible items and physical documents from manipulation but also extend to include these new legal principles. Examples: Illegal access (hacking) – unlawful access to a computer system. Illegal data acquisition (data espionage) – internet used to obtain trade secrets/personal information such as bank account or credit card numbers. Illegal Interception: offenders can intercept communications between users to record information exchanged. Data interference: users depend on the availability of data and interference can result in financial losses.

2. CONTENT-RELATED OFFENCES This category covers content that is considered illegal such as child pornography and xenophobic material, libel and false information, spam, copyright and related offences, trademark related offences etc Challenge: If offenders create content that is illegal in some countries, but not in the country they are operating from, prosecution of the offenders is challenging. development of legal instruments in this category is more influenced by national approaches, which can take into account fundamental cultural and legal principles.

3. COMPUTER-RELATED OFFENCES This category covers various offences that need a computer system to be committed. These include: Computer-related Fraud: it enables the offender to use automation and software tools to mask criminals identities. Computer related forgery: refers to the manipulation of digital documents e.g. Altering text documents. Phishing: acts that are carried out to make victims disclose personal information. identity theft: criminal act of fraudulently obtaining and using another persons identity. misuse of devices: specially designed software tools used to attack other computers.

4. COMBINATION OFFENCES This category covers various terms used to describe complex scams that combine a number of different offences. For example: phishing and cyberlaundering.

SADC Model Laws & Namibia ECT Bill List of Offences (1) SUBSTANTIVE CRIMINAL LAW SADC MODEL LAW NAMIBIA ECT BILL 1. Illegal Access x 2. Illegal Remaining 3. Illegal Interception 4. Illegal Data Interference 5. Data Espionage 6. Illegal System Interference 7. Illegal Devices

SADC Model Laws & Namibia ECT Bill List of Offences (2) SUBSTANTIVE CRIMINAL LAW SADC MODEL LAW NAMIBIA ECT BILL 8. Computer-Related Forgery x 9. Computer-Related Fraud 10. Child Pornography 11. Pornography 12. Identity-Related Crimes Data 13. Racist and Xenophobic Material 14. Racist and Xenophobic Motivated

SADC Model Laws & Namibia ECT Bill List of Offences (3) SUBSTANTIVE CRIMINAL LAW SADC MODEL LAW NAMIBIA ECT BILL 15. Denial of Genocide and Crimes Against Humanity x 16. Spam 17: Disclosure of Details of an Investigation 18. Failure to permit assistance 19: Harassment Utilizing means of Electronic Communication

NAMIBIA ECT BILL: MISSING PROVISIONS Data Espionage Pornography Identity-Related Crimes Racist and Xenophobic Material Racist and Xenophobic Motivated Denial of Genocide and Crimes Against Humanity Spam Disclosure of Details of an Investigation Failure to permit assistance

CONCLUSION Cybersecurity plays a pivotal role in the continuing development of information technology and Internet services In order to safeguard Namibia’s security and economic wellbeing, it is vital that the Country enhance cyber security and to protect information infrastructure. Equally important is ensuring that the Internet is safe and that the growing numbers of Internet users are protected.