CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

Similar documents
Framework for Cybersecurity in Nigeria

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ITU Model Cybercrime Law: Project Overview

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

Cybercrime and e-evidence: challenges and solutions.

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

Comprehensive Study on Cybercrime

UNODC tackling cybercrime in support of a safe and secure AP-IS

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013


CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

Garry Mukelabai Communications Authority Zambia

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

10007/16 MP/mj 1 DG D 2B

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

CYBERCRIME RESPONDERS TRAININGS

Cyber Security Development. Ghana in Perspective

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Data Preservation Checklists

National Communications Authority

Overview on the Project achievements

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

Legal Foundation and Enforcement: Promoting Cybersecurity

Promoting Global Cybersecurity

G8 Lyon-Roma Group High Tech Crime Subgroup

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

GLOBAL CYBERSECURITY INDEX 2016

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Guiding principles on the Global Alliance against child sexual abuse online

10025/16 MP/mj 1 DG D 2B

T-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication within a criminal investigation

The cost of cybercrime the benefits of cooperation

China and International Governance of Cybercrime

Project III

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

HARMONIZING NATIONAL LEGAL APPROACHES ON CYBERCRIME

UNODC. International Cooperation and Assistance in Cybercrime Matters

The commission communication "towards a general policy on the fight against cyber crime"

Legal, Ethical, and Professional Issues in Information Security

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Global cybersecurity and international standards

Data Protection and Cybercrime Challenges

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Virtual Currencies and The Commonwealth. 1 June 2016

New Legal instruments for Cross-border Crime Investigation in EU

Motorola Mobility Binding Corporate Rules (BCRs)

Child Online Protection in Child Pornography Namibia

COMPUTER CRIME LAW PROFESSOR KERR

ECOWAS Cyber security Agenda

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

International Cooperation in Cybercrime Investigations

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Cybercrime Criminal Law Definitions and Concepts

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

ASEAN s Cyber Confidence Building Measures

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

Responding to Cybercrime:

European Investigation Order: Frequently Asked Questions

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Draft Resolution for Committee Consideration and Recommendation

Thailand Initiatives and Challenges in Cyber Terrorism

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Republic of Mauritius CYBERCRIME STRATEGY Page

Potential new global legal mechanisms on combatting cybercrime and global cyberattacks

The Impact of Cybersecurity, Data Privacy and Social Media

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

RESOLUTION 130 (Rev. Antalya, 2006)

Dr. Herbert Gustav Yankson GLACY+ Ghana National Team (Member)

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

Summary Comparison of Current Data Security and Breach Notification Bills

CHAPTER 13 ELECTRONIC COMMERCE

Project III Public/private cooperation

12711/17 GG/ec 1 DGD2B

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

15412/16 RR/dk 1 DGD 1C

Role of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities

The United Nations Convention On the Use of Electronic Communication in International Contracts, 2005 and Electronic Transactions Law in Thailand

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union)

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Cyber Security Roadmap

Computer Forensics US-CERT

Mobile Application Privacy Policy

Cellular Site Simulator Usage and Privacy

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

EXPERT GROUP MEETING ON CYBERCRIME

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

Commonwealth Cyber Declaration

UNAUTHORISED INTERCEPTION

Data Breaches and the EU GDPR

Data Breach Preparation and Response. April 21, 2017

Regional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia

Transcription:

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE Octopus Conference, Strasbourg 06 June, 2012 T.GEORGE-MARIA TYENDEZWA Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, Abuja, Nigeria Introduction Several Draft Cybercrime Bills had been pending in the National Assembly since 2006 ONSA Committee in November, 2011, produced the harmonized Cybersecurity Bill, 2011, for transmission to the National Assembly for passage as an executive bill. 1

Harmonized Cybersecurity Bill, 2011 Part I General Objectives Part 1 deals with the general objectives, the scope of the Bill and its application. The objects and scope of this Act are to provide an effective, unified and comprehensive legal framework for the prohibition, prevention, detection, prosecution and punishment of cybercrimes in Nigeria; Enhance cybersecurity and the protection of computer systems and networks, electronic communications; data and computer programs, Intellectual property and privacy rights; The provisions of this Act shall be enforced by law enforcement agencies in Nigeria to the extent of an agency's statutory powers in relation to similar offences. Harmonized Cybersecurity Bill 2011 Part II Offences & Penalties This Part ( Sections 2 to 18) criminalizes specific computer and computer related offences, which include: Unlawful access to a computer; Unauthorized disclosure of access code; Data forgery; Computer fraud; System interference; Misuse of devices; Denial of service; Identity theft and impersonation; Child Pornography; Records Retention and Preservation; Unlawful Interception; Cybersquatting; Cyberterrorism; Failure of Service Providers to Perform certain Duties; Racist and xenophobic Offences; Attempt, conspiracy and abetment; and Corporate Liability. 2

Harmonized Cybersecurity Bill 2011 Part III Critical Information Infrastructure Protection Part III provides for the security and protection of critical information infrastructure. It further provides for the audit and inspection of critical information infrastructure and punishment for offences against critical information infrastructure. Part IV Search, Arrest and Prosecution Part IV deals with issues such as jurisdiction, powers of search and arrest, obstruction of law enforcement officers, prosecution, forfeiture of assets, compounding of offences; payment of compensation; and the power to make regulations. Harmonized Cybersecurity Bill 2011 Part V: International Cooperation Cybercrime and cybersecurity issues are not restricted by geographical boundaries and legal jurisdictions but can only be checked through international cooperation which is covered in Sections 29 to 34 of the Bill. The issues covered include: Extradition; Mutual Assistance Requests; Expedited preservation of data, Evidence Pursuant to a Request; and Form of Requests Part VI: Miscellaneous Part VI deals with issues of a general character such as Directives of a general character; Regulations and the Interpretation. The above provisions of the draft Cybersecurity Bill, 2011 have met the milestones required of legislation on cybercrime, even when reviewed or compared against international instruments and standards, such as the Council of Europe s Budapest Convention, 2001 3 and the ITU Toolkit on Cybersecurity Legislation. 3

Progress Made - Slowly The harmonized Cybersecurity Bill, 2011, has undergone review by various stakeholders with the aim of ensuring broader buy-in & a operational partnership with all stakeholders. The harmonized Cybersecurity Bill, 2011, is currently being corrected as reviewed to create the final draft that will go to the legislature for passage into law, by a ministerial committee set up by the Honourable Attorney General of the Federation on 23 April, 2012. Challenges General lack of awareness among LEAs, legal practitioners, judges, etc Lack of LEA capability/capacity - Not enough officers trained and equipped to act as first responders Contamination of crime scene/destruction of electronic evidence ab initio due to ignorance Lack of forensics laboratory for investigation & evidence analysis/case preparation No electronic evidence handling/management capacity in the courts, Lack of training & resources for prosecutors, LEAs and judicial officers 4

CONCLUSION The good news is that the Nigerian government notes the imperative for domestic legislation to fight cybercrime and is committed to putting in place the requisite legal and institutional framework to ensure Nigeria can derive meaningful economic and social value from a vibrant, resilient and secure online environment and make sure that we can co-operate with other countries to on cross-border law enforcement and deny safe havens to cyber criminals. Questions? THANK YOU. T.G. George-Maria Tyendezwa, Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, 71B, Shehu Shagari Way, Maitama, Abuja M: +234 803 322 0559 E: george.tyendezwa@fmj.gov.ng W: www.fmj.gov.gov/ccpu 5