Support for Harmonization of the ICT Policies in Sub-Sahara Africa

Slides:



Advertisements
Similar presentations
Williams v. Sprint/United Management Co.
Advertisements

The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa Model Law for Electronic Transactions.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, TRAINING /DATA PROTECTION LAW.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Tanzanian ICT.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
PARTNERSHIPS, CORPORATIONS AND THE VARIANTS PROF. BRUCE MCCANN SPRING SEMESTER LECTURE 1 DUTY OF LOYALTY PP Business Organizations Lectures.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Developing a Records & Information Retention & Disposition Program:
Evidence and Argument Evidence – The asserted facts that the arbitrator will consider in making a decision – Information – What is presented at the hearing.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
Electronic evidence in Spanish civil procedure: where wishes clash against reality Julio Pérez Gil Universidad de Burgos.
Internet service providers’ liability in France 10/07/2012 Pauline Leger Summer seminar July 9 th -13 th 2012.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
Circulation of authentic instruments under Regulation 650/2012 speaker – Ivaylo Ivanov – Bulgarian Notary Chamber.
Vatera.hu Notice and takedown (NTD) Protocol Gergely SzékelyJanuary 12, 2009 ICTrain 2009 eCommerce Day.
Alignment of South African E-Commerce Law Tana Pistorius Department of Mercantile Law UNISA CYBER SA 3 – CONFERENCE & BOOK LAUNCH.
230 F.R.D. 640 (D. Kan. 2005).  Shirley Williams is a former employee of Sprint/United Management Co.  Her employment was terminated during a Reduction-in-
NRCCL (University of Oslo, Faculty of Law) Hyperlinks and search engines(I) Jon Bing Norwegian Research Center for Computers and Law Master Lecture 16.
Small claims procedure Regulation (EC) No 861/2007of European Parlament and of the Council of 11 July establishing a European Small Claims Procedure (OJ.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
The Accomplished Connoisseur: Professional Expertise in Support for the Corporate Law Department Presented by: Lisa Daulby Canadian Association of Law.
SBIR Budgeting Leanne Robey Chief, Special Reviews Branch, NIH.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Massella Ducci Teri Italian approach to long-term digital preservation Policies for Digital Preservation ERPANET Training Seminar.
Electronic Records Management Alan Cameron Records Management Consultant.
E-records and the law John D. Gregory Policy Division Ministry of the Attorney General May 14, 2007.
Management Advisory and Compliance Services Towson University Management Advisory and Compliance Services Internal Controls.
Paperless Government and the Law John D. Gregory Ministry of the Attorney General June 5, 2009.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Electronic Records Management Alan Cameron Records Management Consultant.
ADA/504 Technical Assistance Tool Ken Woodruff, Civil Rights Program Manager, FHWA.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
© 2016 Chapter 6 Data Management Health Information Management Technology: An Applied Approach.
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
Videoconferencing for Juvenile Detention Hearings
Raising Confidence in e-Commerce: the United Nations Convention on the Use of Electronic Communications in International Contracts José Angelo Estrella.
Digital evidence Stephen Mason, Barrister Visiting Research Fellow
Support for Harmonization of the ICT Policies in Sub-Sahara Africa
Support for Harmonization of the ICT Policies in Sub-Sahara Africa
Overview of the Electronic Transactions and Communications Bill
UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW
Records Management Program Deliverables
(The Use of Electronic Transactions & Communications Bill).
HIPSSA/SA-1. HIPSSA/SA-1 Support for Harmonization of the ICT Policies in Sub-Sahara AfricaФ or the HIPSSA project is part of a programme funded by.
Forensic and Investigative Accounting
Electronic Transactions & Authentication
Support for Harmonization of the ICT Policies in Sub-Sahara Africa,
PRESENTATION OF MONTENEGRO
Internet Service Provider Liability Under U.S. Copyright Law
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa: Transposition of SADC Cyber-security Model Laws Capacity Building on.
Internal Controls Towson University
Litigation Holds: Don’t Live in Fear of Spoliation
Other Assurance Services
UEMS accounts managed by uems sections
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa: Transposition of SADC Cyber-security Model Laws Overview of the E-transaction.
Principles of Evidence
Law of Evidence CONFESSIONS 9/12/2014 Chapter 10.
Witnesses’ Roles in a Case
Evidence in an Electronic Age – What is admissible?
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
How To Repair PDF File After Disk Crash???. What is PDF file..??? PDF file is portable document file. This file format is used during the exchange .
On-Site Investigations
Presentation transcript:

Support for Harmonization of the ICT Policies in Sub-Sahara Africa HIPSSA Project MINISTRY OF COMMUNICATION, SCIENCE AND TECHNOLOGY (MCST)   TRANSPOSITION OF SADC CYBERSECURITY MODEL LAWS INTO NATIONAL LAWS FOR LESOTHO, 2013 CAPACITY BUILDING e-COMMERCE SADC Model Law on Electronic Transactions and Electronic Commerce 4TH APRIL 2013 Support for Harmonization of the ICT Policies in Sub-Sahara Africa Bonjour à tous, Je suis tres heureux d‘être parmi vous aujourd‘hui. Je voudrais remercier Mr. Kamdem pour son invitation a l‘atelier. Permettez-moi de me presenter. Je viens de rejoindre le bureau de regional de l‘UIT pour l‘Afrique d‘Addis Abeba pour coordonner le projet d‘harmonisation reglementaire de l‘UIT et de la CE en Afrique sub-saharienne Je travaillais precedemment chez le regulateur français l‘ARCEP au service economique. Je m‘occupais de travaux de modelisation technico-economique et j‘etais plus particulièrement en charge de l‘évaluation du cout du service universel et de la terminaison d‘appel mobile dans les departements français d‘outremer.

CHALLENGES & RULES OF INTERPRETATION TRANSPOSITION CONTENTS SCOPE CASE STUDIES SOURCES CHALLENGES & RULES OF INTERPRETATION TRANSPOSITION

SERVICE PROVIDER ROLES & OBLIGATIONS EVIDENCE RULES SCOPE SERVICE PROVIDER ROLES & OBLIGATIONS EVIDENCE RULES PRINCIPLE HOW IT IS APPLIED (CASE STUDIES) LESSONS LEARNED

Service Provider Roles SADC MODEL (Part 10) & Draft LS Law Part IX & COMMUNICATIONS ACT (S44) Message relay(Conduit) Host (Avail 3rd Party Information for public access) Cashing (3rd Party Information location & Temporary Storage) No authority to Authenticate nor change contents

Mere Conduit Mere conduit - Access to for for operating facilities for transmission, routing or storage of e-communications if: Does not initiate Or select recipient; automatic, technical; no modification

Caching: automatic intermediate storage of data Does not modify; conditions of access; rules updating; rights management information; removes or disables access

Hosting No knowledge; no facts or circumstances; take-down upon receipt Source: http://jumpdog.us

Information location tools No knowledge; no facts or circumstances; No financial benefits; Removes access to link after info Source: http://webchannel.ae/

CASE STUDY LIABILITY SERVICE PROVIDERS APPLICATION CASE STUDY LIABILITY SERVICE PROVIDERS

LIABILITY – SERVICE PROVIDERS A Paris court dismissed a lawsuit against YouTube filed by French television, saying the video-sharing website was not obligated to control content of uploaded material Read more at: http://phys.org/news/2012-05-french-court-youtube-obligated-content.html#jCp

LIABILITY – SERVICE PROVIDERS YouTube cannot be held responsible for screening images uploaded on its site, a Spanish court said on throwing out a case brought by a local TV channel over alleged copyright infringement Read more at: http://phys.org/news204443124.html#jCp

EVIDENCE RULES SOURCES (e-documents)

e-EVIDENCE

CHALLENGES CASE STUDIES & RULES OF INTEPRETATION EVIDENCE RULES CHALLENGES CASE STUDIES & RULES OF INTEPRETATION

e-EVIDENCE (challenges) RELEVANCE (does it prove existence of any fact?) AUTHENTICATION (is it real?) ORIGINAL FORM (has it been tampered with after creation?) UNFAIR PREJUDICE (will its in-admission prejudice the case?) HEARSAY (does deponent have 1st hand knowledge?) BEST EVIDENCE (is it the best evidence in the circumstances?)

e-EVIDENCE (challenges - US)

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US RELEVANCE SA – computer print out held correct & reliable (Gamede & Ors Vs the State – AR43/08) US – computer programs contained in computer discs (Gates Rubber Vs Bando Chemicals 1996

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authenticity

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authenticity

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authentication

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authentication

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authentication

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authentication

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authentication (rule)

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authentication - business

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Authentication- business

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US Original Form information – not capable of tampering/change Chain of custody for the document Storage – controlled access

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US HEARSAY

HOW ARE THE CHALLENGES ADDRESSED – Case Studies Other HEARSAY (Tanzania Report) The details on the stolen motor car were recorded on a card by the worker responsible and the completed card was photographed and recorded on microfilm. Decision; By a 3-2 majority, the house of Lord held that this evidence would be inadmissible for hearsay. As the prosecution had failed to produce evidence demonstrating reason why the workers responsible for making the original records could not give, there was no justification for admitting the microfilm. R v. Spiby; Evidence from a Machine-generated documents showing phone calls being made from a certain Hotel Room in France to the defendant's telephone in England was admitted as evidence. Court argument: The hearsay rule does not apply to statements containing information recorded by a machine-There was no human intervention.

HOW ARE THE CHALLENGES ADDRESSED – Case Studies - US BEST EVIDENCE Duplicates admissible (where originals lost/destroyed or cannot be obtained by any judicial means/ process) unless – questions raised re authenticity & Originality If in the circumstances it would be unfair to admit them in lieu of originals

TRANSPOSITION SADC MODEL & DRAFT BILL EVIDENCE RULES TRANSPOSITION SADC MODEL & DRAFT BILL

SERVICE PROVIDER LIABILITY SADC MODEL – RECONGNISES THE SAFE HARBOURS (CHAP 10 for conduit, hosting & cashing) DRAFT BILL LIMITATION OF LIABILITY SERVICE PROVIDERS (S.44, 45, 46 & 47) NO OBLIGATION TO MONITOR CONTENT (S.49)

RELEVANCE SUBSUMED IN ORIGINALITY RULE EVIDENCE RULES RELEVANCE SUBSUMED IN ORIGINALITY RULE

HOW ARE THE CHALLENGES ADDRESSED AUTHENTICATION MODEL & DRAFT BILL (S.20) Established (business)if: communication is made by/on behalf in course of business & certified as correct & rules of law (common/self regulating codes) as evidence of facts contained Conditions to be met – reliability, integrity, identifiable manner of originator & reliable information systems Thakeli Vs Rex (manipulation of computer data – refuted expert witness with control over data )

HOW ARE THE CHALLENGES ADDRESSED AUTHENTICATION MODEL & DRAFT BILL Established (Other) NOT ADDRESSED – RELIANCE ON JUDICIAL INTEPRETATION See Thakeli Vs Rex - C of A(CRI) NO.10/2009 – (phone records authenticating link to accused through unique pin no’s assigned to employees)

SADC & LESOTHO PERSPECTIVE ORIGINALITY MODEL & BILL (S.19) Requirement is met if: reliable assurance on integrity capable of display in form to the person to whom it is presented Criteria – information unaltered Assessment – to take account of all relevant circumstances

HOW ARE THE CHALLENGES ADDRESSED INTEGRITY MODEL & DRAFT BILL (S.22) Maintained if: There is reliable means to ensure integrity of information & info is readily accessible & usable for subsequent reference Conditions – complete & unaltered save changes in course of communication, storage or display

HOW ARE THE CHALLENGES ADDRESSED UNFAIR PREJUDICE MODEL & BILL (S.20) Evidence not to be excluded (a)simply by virtue of being in electronic form(b)If it is best evidence available Weighting to consider (a)reliability of generation, storage or communicated (b)maintenance of integrity (c) identifiable originator

HOW ARE THE CHALLENGES ADDRESSED HEARSAY MODEL & BILL (NOT ADDRESSED – RELIANCE ON JUDICIAL INTEPRETATION)

HOW ARE THE CHALLENGES ADDRESSED BEST EVIDENCE RULE MODEL & DRAFT BILL (See Unfair Prejudice)

Nthabiseng Motjolopane Research Professor: UNISA ?… Nthabiseng Motjolopane ITU NATIONAL EXPERT & pistot@unisa.ac.za Research Professor: UNISA Union Internationale des Télécommunications International Telecommunication Union Merci de votre attention. Je me tiens a votre disposition pour repondre a vos questions. Je peux vous faire parvenir par email une version electronique de ce support de presentation. Sachant que nous abordons tout juste le lancement de ce projet, les informations contenues dans cette presentation sont susceptibles a certaines evolutions.

Nthabiseng Motjolopane Research Professor: UNISA THANK YOU… Nthabiseng Motjolopane ITU NATIONAL EXPERT & pistot@unisa.ac.za Research Professor: UNISA Union Internationale des Télécommunications International Telecommunication Union Merci de votre attention. Je me tiens a votre disposition pour repondre a vos questions. Je peux vous faire parvenir par email une version electronique de ce support de presentation. Sachant que nous abordons tout juste le lancement de ce projet, les informations contenues dans cette presentation sont susceptibles a certaines evolutions.