Electronic Communications and Transactions Act Internet Service Providers’ Association Ant Brooks

Slides:



Advertisements
Similar presentations
International Telecommunication Union ITU HIPSSA Project: Support for Harmonization of the ICT Policies in Sub- Sahara Africa; Transposition of e- transaction.
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Local Commerce in Social Networks in Mexico and its Regulations.
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Consumers Online: Privacy, Security and Identity Professor Margaret Jackson and Marita Shelly Presentation to the RMIT Financial Literacy, Banking & Identity.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
(Geneva, Switzerland, September 2014)
INTERNET and CODE OF CONDUCT
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
1 Brief Overview of Selective Legal and Regulatory Issues in Electronic Commerce United Nations Conference on Trade and Development Geneva, 14 June 2001.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Certification & Engineering Bureau CB notification Inquiries & Issues Nicolas DesMarais Certification Officer Agent d’Homologation TCB Workshop – February.
Company LOGO Workshop on Macedonian e-Gov project and best UE practices (Slovenian experience) Skopje Blagica Andreeva Ministry of Information.
CPS Acceptable Use Policy Day 2 – Technology Session.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
COMP 6125 An Introduction to Electronic Commerce Session 4: E-Commerce In Developing Countries.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
PUBLIC PROCUREMENT OPERATIONS Dr. Fred Mugambi Mwirigi JKUAT 1.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Payment Gateways for e-Government services 24 May 2007
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Web-site Design Strategy.  For P4, learners are required to design a website for LocalBiz - Manningham, this is for a specified purpose and a defined.
Chapter 17 E-Commerce and Digital Law
PRESENTATION TO PORTFOLIO COMMITTEE ON COMMUNICATIONS ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL Presentation by: Andile Ngcaba, Director-General.
OECD - HCOPIL - ICC Conference on Building Trust in the Online Environment The Hague, December 11-12, 2000 THE ONLINE DISPUTE RESOLUTION EXPERIENCE OF.
Michael Coonan Content Assessment International Training Program Melbourne, September 2006 Strategies for regulating online content.
FAQs about the new regulatory framework Lucy Rhodes
The law on Intermediary Liability in India
Promoting Good Practices in Domain Name Registration Supported by.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
ICT AND BUSINESS AND SOCIETY
1 Chapter 32 e-business Copyright © Nelson Australia Pty Ltd 2003.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Mexican Tax Administration Service Major Developments & Results September, 2006 Mexican Tax Administration Service.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
11/6/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Overview of Selective Legal.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Virtual Business Virtual Communication Copyright © Texas Education Agency, All rights reserved.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
CABLING SYSTEM WARRANTY REGISTRATION. PURPOSE OF CABLING REGISTRATION.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Electronic Communications and Transaction Bill submission
PRESENTATION ON THE ONLINE GAMBLING - REGULATION 2 March 2012
PRESENTATION OF MONTENEGRO
Legal and Ethical Issues in E-Commerce
Chapter 17: E-Contracts and Licensing
CHAPTER 22 E-COMMERCE 2011 Thomson Reuters Legal & Regulatory Ltd. All Rights Reserved. PowerPoint slides to accompany A Guide to Business Law, 19th.
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
E-Contracts and Internet Law
Unit# 5: Internet and Worldwide Web
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Electronic Communications and Transactions Act Internet Service Providers’ Association Ant Brooks

Act 25 of 2002 n n The objective of the ECT Act is to enable and facilitate electronic communications and transactions n n Act 25 of 2002, published in Government Gazette No on 2 August 2002 n n Came into force on 30 August 2002

II: National e-strategy n n Great to see government putting energy into a national strategy for electronic transactions and universal access n n A 3-year national e-strategy will be developed – –Minister has 24 months to do this (too slow?) n n Aims include: – –“provide Internet connectivity to disadvantaged communities” – –“stimulate public awareness, understanding and acceptance of the benefits of Internet connectivity and electronic transacting”

III: Electronic transactions n n Puts a solid legal framework in place for electronic data messages and transactions – –conclude contracts online – –sign documents n n Adds a degree of legal certainty to a rapidly growing area of business n n Electronic messages can be submitted as evidence in court – –evidentiary weight is based on the integrity of the message – –replaces the Computer Evidence Act

III: Electronic transactions n n An electronic agent can do binding business on your behalf n n One likely impact on the Internet industry – –increased demand for the storage of records

IV: E-government n n Encourages (or at least allows) government departments to interact electronically – –online submission of tax returns – –online licensing n n SA Post Office is a preferred authentication provider n n Other providers can also be designated as preferred – –subject to universal access commitments

V: Cryptography n n All cryptography providers must register with the Department n n Where does cryptography get used? – –electronic transactions need to be secure – –encryption is used for almost all business transactions – –cryptography services and products are therefore ubiquitous n n Registration recommended for any ISP that: – –hosts secure web sites – –provides any form of secure remote login service – –provides any software containing cryptography n n Windows, Internet Explorer, Netscape

V: Cryptography n n Problems – –international applicability – –threat to open source development – –minimal apparent value

VI: Authentication n n Department accredits authentication providers, products and services – –Department can also revoke accreditation and audit n n Legal to provide authentication products or services without accreditation – –but illegal to falsely claim to be accredited n n Accreditation required to provide advanced signatures – –advanced signatures are required for electronic transactions with government – –(recall: SA Post Office is a preferred provider for authentication)

VII: Consumer protection n n Doing business on the web means providing: – –name and legal status – –physical address and telephone number – –web site and address – –membership of self-regulatory or accreditation bodies – –any code of conduct that applies – –registration number, office bearers, place of registration – –description of the good or services – –full price and manner of payment – –terms of agreement – –delivery times – –how to obtain a record of the transaction – –refunds policy – –dispute resolution code – –privacy policy – –duration of the agreement (where applicable) – –cooling-off rights of the customer

VII: Consumer protection n n Customer gets a 7-day cooling off period for the return of goods – –limited; doesn’t apply to all goods and services. n n Spam! – –unsolicited commercial communications must give the consumer an option to be remove from that mailing list – –consumer can request the origin of their personal information – –sending further spam after a complaint constitutes an offence

VIII: Protection of personal information n n Principles outlines for collection of personal information – –with permission of subject – –must disclose purpose – –information must be duly protected – –can develop statistical profiles n n Voluntary adoption – –all or nothing deal

IX: Critical databases n n Minister has sweeping powers – –can declare any database critical which is “of importance to the protection of the national security [...] or the economic and social well-being of its citizens” – –can also prescribe how the database is managed – –can audit critical database administrators n n Problems – –open to abuse – –threat to international data hosting business?

X: ZA domain name n n Government’s Domain Name Authority (DNA) – –to be established by the Minister within one year – –board appointed indirectly by the Minister – –it will become illegal to administer a second-level.ZA domain, or update a zone file, without a licence n n Problem – –the global domain name system is run by ICANN under contract with the US Department of Commerce – –ICANN cannot be forced to re-delegate.ZA the proposed DNA – –re-delegation requires Internet community support

X: ZA domain name n n Optimistic view – –further compromise and discussion between government and industry will lead to a new.ZA admin that meets everybody’s needs n n Pessimistic view – –unlicensed second-level domain admins shut down and.ZA subdomains cease functioning – –lengthy legal tussle over jurisdiction and government’s right to appropriate asset

XI: Limitation on ISP liability n n Protection for ISPs from liability for... – –information passing through the network (mere conduit) – –information hosted for others (hosting) – –cached information (caching) – –search engine links (information location tools) n n Requirements – –must belong to a recognised body – –that body must have a code of conduct – –must have a take-down notification process n n Take-down notification – –high costs – –copyright content?

XI: Limitation on ISP liability n n Australian Broadcasting Authority – –from 1 Jan 2001 to 31 May 2001 – –635 complaints, 29 sites taken down – –US$330,000 per year – –4.5 million users – –only child porn and unprotected X-rated material n n UK Internet Watch Foundation – –estimates for 2002 – –18,000 complaints, only 1% resulting in a take down – –US$400,000 per year, 5 full-time staff – –20 million users – –only child porn

XII: Cyber inspectors n n Department staff can be appointed as cyber inspectors n n Cyber inspectors can – –surf the Internet looking for illegal activities – –investigate cryptography and authentication providers – –assist the police and other organisations where needed n n Procedure – –a warrant is required prior to entering premises or accessing information systems – –it is an offence to obstruct or hinder a cyber inspector

XIII: Cyber crime n n Fine or up to five years in prison for... – –breaking into a system – –denial of service attack n n Fine or up to twelve months in prison for... – –intercepting or interfering with data – –designing a tool to circumvent security measures – –pretending to be an accredited authentication provider – –hindering a cyber inspector – –pretending to be a cyber inspector

Conclusion n n The Electronic Communications and Transactions Act brings important legal certainty to doing business on the Internet n n Some sections of the Act will cause headaches for the Internet industry and the Internet community