PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.

Slides:



Advertisements
Similar presentations
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Advertisements

Department of Arts and Culture Briefing on the Use of Official Languages Bill to the Select Committee on Education and Recreation Date:15 August 2012.
Digital Assets Presented by Sharon Rivenson Mark, Esq. and Shirley B. Whitenack, Esq. Adapted from Presentation by Catherine A. Seal, Esq.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
NON-PROFIT ORGANISATIONS IN SOUTH AFRICA. Introduction Recognised under South African Law for more than a century Role in society has now become very.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Electronic Communications and Transactions Act Internet Service Providers’ Association Ant Brooks
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
 To provide for the health and safety of persons at work and for the health and safety of persons in connection with the use of plant and machinery;
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
Data Protection and the GRA. 1. Commentary on Data Protection 2. The GRA’s Role The Register Investigations, Mediation and Compensation Enforcement Notices.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
1 Regulatory Framework for C&I Regimes Presented by Andrew Kwan ITU Consultant Conformity and Interoperability Training for ARB Region on Type Approval.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
Records Management and the Law
ITIC PERSPECTIVE ON THE EFFECTIVE IMPLEMENTATION OF THE FCTC PROTOCOL ELIZABETH ALLEN ITIC – JULY 2014.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Theme 7: Occupational Health and Safety Act 85 of 1993
Cyber Law & Islamic Ethics
DATA PROTECTION OFFICE
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Cell C Department Comments on Electronic Commerce & Transactions Bill Wednesday, 15 May 2002.
DEPARTMENT: RURAL DEVELOPMENT & LAND REFORM DEPARTMENT OF RURAL DEVELOPMENT AND LAND REFORM GEOMATICS PROFESSION BILL 2013 A Briefing to the Parliamentary.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Re – use of PSI in Slovenia Kristina Kotnik Šumah Deputy of the Information Commisoner.
E-Commerce Directive 2002 Overview. This Map It was derived from Complying with the E-Commerce Regulations 2002 by the DTI.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
Kpm g © 2000 KPMG Electronic Communications and Transactions Bill Representations to the Parliamentary Portfolio Committee Mark Heyink 14 th May 2002.
Cryptography, Authentication and Digital Signatures
PRESENTATION TO PORTFOLIO COMMITTEE ON COMMUNICATIONS ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL Presentation by: Andile Ngcaba, Director-General.
Advanced Program in Auditing and Accounting Regulation Module 12 Enhancing Statutory Audit Quality from a Financial Regulator’s Perspective Presenter:
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
DIGITAL SIGNATURE.
TOURISM BILL “ THE CONTENTS ” Friday; 17 May 2013.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
Making South Africa a Global Leader in Harnessing ICTs for Socio-economic Development South African Post Office Bill, [B2-2010] Dep. of Communications.
SOUTH AFRICAN WEATHER SERVICE AMENDMENT BILL, 2013 Briefing to the Portfolio Committee on Water and Environmental Affairs 25 July
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
CIVILIAN SECRETARIAT FOR POLICE SOUTH AFRICAN POLICE SERVICE AMENDMENT BILL [B ] 19 JUNE 2012 CAPE TOWN PRESENTATION TO THE SELECT COMMITTEE ON SECURITY.
Select Committee on Education and Recreation 29 November 2011 Parliament, Cape Town.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Protection of Personal Information Act An Analysis on the impact.
Activity processes of brokers in carrying out operations on the customs clearance of goods Activity processes of brokers in carrying out operations on.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
NATIONAL ENVIRONMENTAL MANAGEMENT:1st AMENDMENT BILL AMENDMENTS TO CHP 7 ON COMPLIANCE, ENFORCEMENT & PROTECTION AMENDMENTS TO CHP 7 ON COMPLIANCE, ENFORCEMENT.
PRESENTATION TO THE PORTFOLIO COMMITTEE ON THE DEPARTMENT OF TRANSPORT BILLS ON LEGISLATIVE PROGRAMME, 2015.
BRIEFING TO THE SELECT COMMITTEE ON SECURITY AND JUSTICE: MUNICIPAL LAW ENFORCEMENT OFFICERS (7 June 2017)
Johannesburg, South Africa
INTERCONNECTION GUIDELINES
New challenges for archives in Iceland
NATIONAL ENVIRONMENTAL MANAGEMENT:1st AMENDMENT BILL
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
ELECTRONIC DEEDS REGISTRATION SYSTEMS BILL, 2017 PRESENTATION TO THE PORTFOLIO COMMITTEE 17 APRIL 2018 SECRET.
E-Contracts and Internet Law
Chapter 13 E-Commerce Contracts
Government Data Practices & Open Meeting Law Overview
Government Data Practices & Open Meeting Law Overview
Summary Slide TELKOM SA LTD ORAL SUBMISSION
Presentation transcript:

PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002

ISSUES ADDRESSED IN THE BILL National e-strategy Electronic Transactions Policy Facilitating Electronic Transactions E-government Cryptography Providers Authentication Service Providers Consumer Protection Protection of Critical Databases Domain Name Authority & Administration Limitation of Liability of service Providers Cyber Inspectors Cyber Crime

OBJECTIVES OF THE BILL To enable and facilitate electronic transactions by creating legal certainty on the cyberspace Bridging the digital divide by developing a National e- Strategy To ensure legal recognition and functional equivalence between electronic and paper based transactions To promote public confidence and trust in electronic transactions To promote universal access to electronic communications and transactions To promote the use of electronic transactions by SMME’s

OBJECTIVES OF THE BILL cont. To encourage e-government services To protect consumers, privacy and critical data To prevent abuse of information systems and prevent cyber crime To establish proper management regime with regard to domain names in the Republic

MAXIMISING BENEFITS AND ELECTRONIC POLICY The objective is to maximize the benefits internet offers by promoting universal and affordable access The development of the National e-Strategy plan by the Minister in consultation with members of Cabinet The national e-Strategy plan must include detailed plans and programs to address 1. The development of e-transaction strategy 2. The promotion of universal access and e-readiness 3. SMME’s development 4. Empowerment of previously disadvantaged persons and communities 5. Human resources development

FACILITATING ELECTRONIC TRANSACTIONS It provides for the legal recognition of data messages and records Legal recognition of electronic transactions and advanced electronic signatures Formation of contracts online Validity of sending notices and other expressions of intent through data messages

E-GOVERNMENT The Bill promotes adoption of e-communications and transactions by government by providing for the following: Electronic filing of documents Issuing of permits, licenses, approvals Electronic payments Departments are free to specify their own formats for electronic documents and determine the criteria The public body shall not be compelled to accept or issue any document in the form of an electronic data message

CRYPTOGRAPHY PROVIDERS Rationale: To curb security threats posed to consumers who transact online The Bill requires the suppliers of crypto materials to register their products and services with the Dept. Provides for the establishment and maintenance of a cryptography provider register by the Dept This will assist the investigative authorities in the event of any threat to National security by deciphering of encrypted messages

WHAT IS CRYPTOGRAPHY? It’s a process of converting data into an unreadable form using public key system (generated codes) to encrypt and decrypt data How Public Key Cryptography works – key pair system Symmetric encryption – uses the same key to encrypt and decrypt Asymmetric uses one key to encrypt and a different but related key to decrypt One key is kept private and another can be made public – anyone can use it to decrypt a confidential message from the person who owns the private key

AUTHENTICATION SERVICE PROVIDERS The Bill provides for the establishment of an Accreditation Authority within the Department It also provides for voluntary accreditation of authentication products and services The purpose is to promote confidence and trust in the electronic environment The Bill further provides for the establishment and maintenance of a publicly accessible database in respect of accredited products and services, and revoked accreditations

CONSUMER AND PRIVACY PROTECTION This section deals with consumer protection issues pertaining to electronic transactions only It afford consumers protection and privacy when transacting electronically thus ensuring their confidence. Protection is based largely on the following principles: Provision of as much information as is necessary to the consumer before the transaction is concluded A right afforded to the consumer to cancel the agreement within 14 days if certain requirements have not been complied with

CONSUMER AND PRIVACY PROTECTION Provision of a cooling period entitling the consumer to cancel without reason and without penalty, any transaction or any related credit agreement for the supply of goods within 7 days of receipt of goods. A right not to be bound by unsolicited goods and services A right to complain to the Consumer Affairs Council

PROTECTION OF PERSONAL INFORMATION The principles contained in this chapter will only apply to data that is collected through electronic transactions. In terms of section 52 the following principles will apply when data controllers collect information: Collection may only take place with the express and written permission of the data holder Data controllers are prohibited to collect personal info which is not required for the purpose for which the info is collected South African Law Commission is currently developing specific data protection legislation

PROTECTION OF CRITICAL DATA Critical data is information which, if compromised, may pose a risk to the national security of the Republic or to the economic or social well being of the citizens Provision is made for the Minister to declare certain classes of info as being critical data and establish procedures to be followed in the identification and registration of such data

PROTECTION OF CRITICAL DATA Standards/regulations for management, protection, storage, control of critical databases will be prescribed A register will be maintained by the Dept containing name and address of data custodian, location of info and types of info stored in the critical database

DOMAIN NAME AUTHORITY AND ADMINISTRATION The Bill establishes.za Domain Name Authority (.zaDNA), a section 21 company, and stipulates the objects, powers and functions of the Authority The Minister will assume responsibility for the.zaDNS public policy as it is a national asset The Authority will be controlled and managed by a fully representative board of between 8 and 16 directors

LIMITATION OF LIABILITY OF SERVICE PROVIDERS The Bill creates a safe harbour for service providers who are currently exposed to a wide variety of potential liability by virtue of only fulfilling their basic technical functions Service providers may seek to limit their liability where they have acted as mere conduits for the transmission of data messages provided they meet certain conditions The Bill provides for specific requirements that the service provider’s actions must meet before the clause may be invoked to limit his or her liability

CYBER INSPECTORS The Bill provides for the appointment of Cyber Inspectors Their powers include: Monitoring Internet websites in the public domain Investigating whether cryptography service providers and authentication service providers comply with the Law They also have powers of search and seizure subject to a warrant They can also assist the police or investigative bodies on request

CYBER CRIME The Bill introduces criminal offences relating to information systems into the SA law These crimes relate to: Unlawful access to or interception of data Unlawful interference with data that cause the modification, destruction, erasure or corruption of data Computer-related extortion, fraud and forgery

CONCLUSION The Bill will result in changes to certain Laws by other Departments It also does not oblige other Government Departments to accept or issue documents in electronic form The Bill will effect an increase in revenue collected by the Department in the form of fees payable for

THANK YOU