Cybersecurity Governance in Ethiopia

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
Update by: Social Affairs Department African Union Commission (AUC) Addis Ababa, Ethiopia 1 AFRICAN UNION COMMISSION: DEPARTMENT OF SOCIAL AFFAIRS African.
INTER- GOVERNMENTALISM AND INTERNET SECURITY DR IAN BROWN, OXFORD / OII.OX.AC.UK.
Cybercrime – the Global Challenge
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Sri Lankan perspective in meeting the Cyber crime challenge
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Protection of Classified Information & Cyber Security
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
6 August 2015 Rule of law: implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region,
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
EU Criminal Law Introduction, Lisbon Treaty. EU criminal legislation EU cannot adopt a general EU criminal code EU cannot adopt a general EU criminal.
Rule of Law: Implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region”, November 2013.
1 Cyber Laws: Uganda UGANDA’S CYBER LAWS Presentation Presentation by by Ambrose Ruyooka, PMP® Ag Commissioner Information Technology Ministry of ICT ISACA.
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
The Realities and Challenges of Cyber Crime and Cyber Security in Africa Prof Raymond Akwule President/CEO Digital Bridge Institute 2011 Workshop on Cyber.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
LEFIS General Assembly, Wrocław Sept Continuing education Andrzej Adamski, Nicolaus Copernicus University, Poland.
TOGOLESE CONSUMERS ASSOCIATION (ATC ) Fifth Annual African Consumer Protection Dialogue Conference (Zambie september 2013) “ Moving Cross Border.
The National Cyber Security Strategy and Action Plan A presentation by Ms. Antoinette Lucas-Andrews Director, International Affairs Ministry.
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
International Telecommunication Union Accra, Ghana, June 2009 Towards Cyber Security - Kenyan Experience Christopher Kemei, Asst. Director Licensing.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
PROGRAMMING OF INTERNATIOAL ASSISTANCE Donor Sectoral Meeting Ministry of Justice 25 th September, 2007.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Cyber Security and Georgia. New Challenges
Johannesburg, South Africa
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Public-private cooperation
MDTFJSS RESULTS IN 2016 Ministry of Justice.
Cybersecurity in Belarus a general overview of support areas
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
National Incident Response Discussion Exercise
U.S. Department of Justice
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Overview of the Budapest Convention on Cybercrime (2001)
Cyber Security Ecosystem of Georgia. Experience and Challenges
Cybercrime legislation and policies in Africa: Issues for discussion
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Cybersecurity Governance in Ethiopia Halefom Hailu cyber law and policy researcher and deputy director of legal and policy affairs, Information network Security Agency (INSA) The African Internet Governance Forum 2015 06 – 08 September 2015 African Union Commission, Addis Ababa, Ethiopia

Introduction: Cybersecurity is a domain involving all human activities. Addressing cyber security requires global and interdisciplinary efforts. This presentation focuses on Ethiopia’s efforts to address cybersecurity

Ethiopia’s response to cybersecurity Policies and Strategies Legislative Measures Institutional Arrangements

Policies and Strategies National ICT Policy and Strategy 2009 focuses on ICT in general with cybersecurity implication GTP2010/11-2014/15 a general five year national plan with cybersecurity implication Criminal Justice Policy 2011 cybercrime implication National Information Security Policy 2011 the first cyber-specific policy Policies and Strategies

The first legislative word on cybercrime Excising legislations: Criminal Code 2004 (repealed the Penal Code of 1957) The first legislative word on cybercrime criminalizes four cybercrime acts Other Legislations with Cybersecurity Implication National Payment System National ID Telecom Fraud Legal measures

Pending legislations: Cybercrime law E-commerce law Electronic signature law Data protection law

The Draft Cybercrime law Drafting methodology influenced by the Budapest convention techno-neutrality Required state of mind – intentional Non-intentional acts excluded b/c of risk of over criminalization Criminalization Crimes against computer system and data (core cybercrimes) –including spam  computer-related crimes (traditional crimes facilitated by computer system) Content-related crimes (child pornography, cyber stalking--)

Institutional structure Procedural and evidence rules Rules on International cooperation Information network security agency A government agency exclusively dedicated to cybersecurity National CERT (ETHIO-CERT established in 2012) initiatives to establish cyber-units with in police and prosecutor authorities other institutions such as MCIT Institutional structure

Legislative challenges Laws always lag behind technology We have 21st century crime but 20th century procedures inadequate rules of evidence (there is no separate evidence law in Ethiopia. evidence rules are scattered within different substantive and procedural laws) every criminal activity now involves digital evidence

Lack of capacity (investigative, judicial, prosecutorial) Lack of awareness Cybersecurity incidents are not reported to responsible authorities Awareness creation campaigns (Radio program) Lack of capacity (investigative, judicial, prosecutorial) Cybercrime cases are either closed for lack of evidence or decided by interpretations of old laws, handled by non—specialized judges (do not receive any form of cybercrime related training) Law enforcement is not equipped with necessary resources and expertise

Inadequate cooperation among stakeholders Duplication of efforts overlapping powers Global nature of cybersecurity cybercrime may be committed any where there is internet connection Ethiopians are consumers of foreign services such as facebook and hence data stored or processed abroad most Ethiopian websites are hosted abroad even where offenders and victims are within Ethiopia, the nature of networked communications means that data will routinely be routed through, stored in foreign states

THANK YOU!