1 Cyber Laws: Uganda UGANDA’S CYBER LAWS Presentation Presentation by by Ambrose Ruyooka, PMP® Ag Commissioner Information Technology Ministry of ICT ISACA.

Slides:



Advertisements
Similar presentations
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on the SADC Harmonized.
Advertisements

ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Kampala, Uganda, 23 June 2014 E-Waste Management in Uganda Michael Ocero, Acting Commissioner – IT Dept. Ministry of ICT ITU Regional.
1 Brief Overview of Selective Legal and Regulatory Issues in Electronic Commerce United Nations Conference on Trade and Development Geneva, 14 June 2001.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
National Smartcard Project Work Package 8 – Security Issues Report.
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
EAST AFRICAN INTERNET GOVERNANCE FORUM KIGALI, RWANDA 4 th Uganda Internet Governance Forum 2011 Report Presented by Lillian Nalwoga CIPESA.
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Cyber Laws 1.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Computer Legislation The need for computer laws Go to Contents.
Strategic Planning Process in the Labor Administration _________________________________________ Ministry of Labor and Social Welfare (MTPS) El Salvador.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Cybersecurity Governance in Ethiopia
Joint Facilitation Meeting on WSIS Action Lines C7 on e-Business E -COMMERCE AS A KEY FACILITATOR FOR SME COMPETITIVENESS 22 May 2008, ITU Ms. Cécile Barayre-El.
Lecture 11: Law and Ethics
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
MODEL POLICY FRAMEWORK FOR E-WASTE MANAGEMENT IN THE EAST AFRICAN REGION Nakiguli Helen Cynthia, Uganda Communications Commission,
11/6/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Overview of Selective Legal.
International Telecommunication Union Accra, Ghana, June 2009 Towards Cyber Security - Kenyan Experience Christopher Kemei, Asst. Director Licensing.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Privacy and Security Solutions For Interoperable Health Information Exchange Presented by Linda Dimitropoulos, PhD RTI International Presented at AHRQ.
1 FAO REGIONAL WORKSHOP ON RICE AND AQUACULTURE FOR PRODUCTIVITY INCREASE AND MARKET DEVELOPMENT IN EAST AFRICA, KAMPALA,UGANDA, APRIL 2009 AQUACULTURE.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
E-commerce and the Law EC  E-commerce and the Law List     End Overview of E-commerce Law The Law Issues in EC’s Transactions.
Cyberlaw Harmonization in the East African Community Cécile Barayre-El Shami Programme Manager, E-Commerce and Law Reform, ICT Analysis Section, Division.
APEC E-Commerce Business Alliances Forum Jinjaing, China June 2016 Shintaro Hamanaka Institute of Developing Economies (IDE-JETRO) E-commerce Chapter.
Law and Ethics INFORMATION SECURITY MANAGEMENT
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
Cybersecurity in the ECOWAS region
PRESENTATION OF MONTENEGRO
Support for Harmonization of the ICT Policies in Sub-Sahara Africa,
IMPLEMENTATION OF LAND POLICY INITIATIVE DECLARATION IN THE CONTEXT OF KENYA’S EXPERIENCE IN THE FORMULATION AND IMPLEMENTATION OF NATIONAL LAND POLICY.
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
کمیسیون حقوق تجارت بین‌‌الملل سازمان ملل متحد (آنسیترال)
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
Securing free and fair European elections
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
LO1 - Know about aspects of cyber security
Introduction to Digital Forensics
Cyber Law and E-Commerce
Presentation transcript:

1 Cyber Laws: Uganda UGANDA’S CYBER LAWS Presentation Presentation by by Ambrose Ruyooka, PMP® Ag Commissioner Information Technology Ministry of ICT ISACA KAMPALA CHAPTER ANNUAL INFORMATION SECURITY WORKSHOP 11 th August 2011

2 Background The “Uganda Cyber Laws”, a stack of three namely: Computer Misuse; Electronic Transactions; Electronic Signatures. H.E. The President assented to the three laws in February, Commencement date: 15 April 2011

3 Background The drafting was based on international benchmarks and best practices, such as; Draft East African Framework for Cyber Laws (2008), Council of Europe Convention of Cyber Crime (2001), United Nations Convention on the use of Electronic Communications in International Contracts (2005), UNCITRAL Model law on Electronic Commerce (1996), UNCITRAL Model law on Electronic Signatures (2001) Council of Europe Convention of Cybercrime (2001),

OBJECTS OF THE LAWS

5 COMPUTER MISUSE “Computer Misuse” refers to unauthorized access to private computers and network systems, deliberate corruption or destruction of other people’s data, disrupting the network or systems, introduction of viruses or disrupting the work of others; the creation and forwarding of defamatory material, infringement of copyright, as well as the transmission of unsolicited advertising or other material to outside organizations,

6 Computer Misuse The definition of “Computer Misuse” includes the ‘downloading, displaying, viewing and manipulation of offensive or obscene material’. This would include pornography or scenes of violence. In extreme cases this may include the criminal act of downloading or displaying indecent photographs of children.

7 Computer Misuse The Computer Misuse Act: Provides for the safety and security of electronic transactions and information systems; prevents unlawful access, abuse or misuse of information systems, including computers provides for securing the conduct of electronic transactions in a trustworthy electronic environment and; provides for other related matters.

8 Electronic Signature Electronic Signature “Electronic Signature” means data in electronic form in, affixed thereto or logically associated with, a data message, which may be used to identify the signatory in relation to the data message and indicate the signatory’s approval of the information contained in the data message.

9 Electronic Signature Electronic Signature “Digital Signature” means a transformation of a message using an asymmetric cryptosystem such that a person having the initial message and the signer’s public key can accurately determine: i.whether the transformation was created using the private key that corresponds to the signer’s public key; and ii.whether the message has been altered since the transformation was made.

10 Electronic Signature The Electronic Signatures Act provides for use of electronic signatures, and regulation criminalization of unauthorized access and modification of electronic signatures, determination of minimum requirements for functional equivalence of electronic signatures,

11 Electronic Signature Object ctd… modernization and harmonization of the laws relating to computer generated evidence, and amendments of the current laws to provide for admissibility and evidential weight of electronic communications.

12 Electronic Transactions “Electronic Transaction” means a transaction of either commercial or non- commercial nature communicated electronically by means of data messages and includes the provision of information and e-government services.

13 Electronic Transactions The Electronic Transactions Act: makes provision for the use, security, facilitation and regulation of electronic communications and transactions; to encourage the use of e-Government service, and to provide for related matters.

14 Electronic Transactions The Electronic Transaction Act addresses the following issues, among others: Enforceability and form requirements for electronic contracts. Regulation of domain names which are a new form of digital property. Privacy protection for consumers and users of electronic media.

15 Electronic Transactions Establishment of a regulatory frame work that is complaint with the rapid technological charges. Determining the levels of responsibility in tort and contract attached to enhanced abilities of machines. Classification of trade in information products especially where the relationship between the producer and ultimate consumer is remote.

IMPLEMENTATION

17 CYBER LAWS TTT The Permanent Secretary, constituted a Think Tank Team for the operationalisation of the three Cyber laws. The composition of the TTT was drawn from: MoICT, MoJCA, NITA-U, URA, ULRC, UPF & MoIA,MTTC. (BoU and ISACA to be contacted for representation on task team)

18 Cyber Laws Implementation Scope of work for TTT: Drafted the Ministerial Gazette for the commencement of the Cyber Laws; and Overseeing and guiding the process of developing attendant Regulations for the Electronic Signatures Act and the Electronic Transactions Act;  Process to be completed by end of August 2011 *The Computer Misuse Act is ‘self-prosecuting’ and does not require attendant regulations.

19 Cyber Laws Implementation ctd.. Conducting awareness among all stakeholders and the general public; Localising international relevant legislation on cyber crime such as the EU convention on cyber crime. Continued engagement to identify any upcoming issues and gaps in the Laws.(so far gaps Identified in the areas of Data Privacy, Intellectual Property)

20 Cyber Laws Implementation ctd A draft National information Security Strategy has been developed. This provides among others for: ◦ Establishment of high level Security Advisory Group ◦ Establishment of the Computer Incident response teams (CIRT) ◦ Creation of Directorate of IT security within NITA-U

THANK YOU