ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013

Similar documents
Cybercrime and e-evidence: challenges and solutions.

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania


MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

ITU Model Cybercrime Law: Project Overview

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

COMPUTER CRIME LAW PROFESSOR KERR

China and International Governance of Cybercrime

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Criminal Justice System s Intervention to Cybersecurity Threats: Panacea or Pandora's Box?

Framework for Cybersecurity in Nigeria

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

Child Online Protection in Child Pornography Namibia

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Garry Mukelabai Communications Authority Zambia

Promoting Global Cybersecurity

INFORMATION CODE OF CONDUCT

HARMONIZING NATIONAL LEGAL APPROACHES ON CYBERCRIME

Comprehensive Study on Cybercrime

Computer Forensics US-CERT

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008

Police Technical Approach to Cyber Threats

COMPUTER FORENSICS (CFRS)

Communication and Usage of Internet and Policy

UNODC. International Cooperation and Assistance in Cybercrime Matters

Data Preservation Checklists

Data Protection and Cybercrime Challenges

Acceptable Use Policy ("AUP")

DIGITAL FORENSICS. We Place Digital Evidence at Your Fingertips. Cyanre is South Africa's leading provider of computer and digital forensic services

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

GLOBAL CYBERSECURITY INDEX 2016

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

Syllabus for P.G. Diploma in Cyber Law and Information Technology

Short courses presented by the NWU Programme in Forensic Accountancy

716 West Ave Austin, TX USA

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Data and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016

International Cooperation in Cybercrime Investigations

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

Cybercrime Criminal Law Definitions and Concepts

The commission communication "towards a general policy on the fight against cyber crime"

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

TRANSPOSITION OF SADC CYBERSECURITY MODEL LAWS INTO NATIONAL LAWS FOR THE REPUBLIC OF RWANDA

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Global Project on Cybercrime European Union Cybercrime Task Force. Strasbourg, November 21-23, 2011

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

UNODC tackling cybercrime in support of a safe and secure AP-IS

Role of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities

AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

SILVER SPRINGS HOTEL, KAMPALA, UGANDA FROM 24TH 28TH JULY 2017 AGENDA ITEM AND AGREED

PTLGateway Acceptable Use Policy

Chapter 13: The IT Professional

Global cybersecurity and international standards

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Thailand Initiatives and Challenges in Cyber Terrorism

Potential new global legal mechanisms on combatting cybercrime and global cyberattacks

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

15412/16 RR/dk 1 DGD 1C

NebraskaLink Acceptable Use Policy

This Privacy Policy applies to all visitors, users, and others who access the Service ( Users ).

IP CHANGES IN THE THAI COMPUTER CRIME ACT. Cyber crime in Thailand Introduction & Overview

ITU/HIPSSA TECHNICAL ASSISTANCE ON ELECTRONIC TRANSACTIONS FOR THE REPUBLIC OF RWANDA

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy )

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

Present Situation of Cyber Terrorism in China and Its Legal Countermeasures

Motorola Mobility Binding Corporate Rules (BCRs)

Guidelines for the use of the IT infrastructure at the University of Bayreuth 10 February 2005

Responding to Cybercrime:

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Cybersecurity for ALL

Electronic Transactions Policy Review and Regulations

Information Security Incident Reporting Policy

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Certified Digital Forensics Examiner

Universal Trusted Service Provider Identity to Reduce Vulnerabilities

COMPUTER HACKING Forensic Investigator

10025/16 MP/mj 1 DG D 2B

Computer forensics Aiman Al-Refaei

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK

RESOLUTION 45 (Rev. Hyderabad, 2010)

Whois Study Table Updated 18 February 2009

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

European Investigation Order: Frequently Asked Questions

Sac County Mutual Telephone Company Acceptable Use Policy High Speed Internet Service Page 1 of 5. Sac County Mutual Telephone Company

Guiding principles on the Global Alliance against child sexual abuse online

CITYTOUCH PRIVACY POLICY

Information Systems Charter ENS de Lyon 2016

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

1.1. Gomilio is a service provided by Activa System Srls (hereinafter referred to as

Transcription:

HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013 Draft Computer Crime and Cybercrime Bill Presenter: Beata Mukangabo, ITU/HIPSSA National Expert on cybercrime

OVERVIEW Existing Cyber security Legal frameworks Objective of Computer and cybercrime laws Summary of Cybercrime Model Law Comparison of Cybercrime Model Law versus Penal Code Cybercrime Model Law Vs Criminal Procedural Law Cybercrime Model Law Vs E- transaction Law

Existing legal framework Constitution (Fundamental principles) Organic Law instituting the Penal Code Law on electronic transaction, electronic message and electronic signature Law on telecommunications Criminal procedural Law ICT Bill

To provide a legal framework for the criminalisation of computer and network related offences. To criminalize certain illegal content in line with regional and international best practices Objectives Computer crime and cybercrime legislative framework To provide the necessary specific procedural instruments for the investigation of such offences To define the liability of service providers.

Cybercrime Model Law Vs national legal framework Cybercrime Model Law A stand alone law covering all cybercrime related issue (offences, procedural law and Liability) Common law legal drafting style Detailed definition of key terms used Rwandan cybercrime legal framework Civil law legal drafting style No stand alone Cybercrime law Cyber and computer related Offences in Penal Code Different criminal procedural law Liability of service providers in e- transaction law and ICT Bill

Overview of Cybercrime Model Law Part I: Preliminary (Short title, long title and definitions) Part II: Offences (comprises seventeen computer and network-related specific offences) Part III: Jurisdiction(the jurisdictional confines of the offences ) Part Iv: Electronic Evidence (its admissibility in Legal proceedings) Part V: Procedural Law (pre-trial criminal procedure)

Substantive Criminal Law CYBERCRI ME MODEL LAW RWANDAN PENAL CODE Transposition into National Law Illegal Access to a Computer Illegal Remaining in a Computer System Interference Illegal Interception Illegal Aquisition of Comp. Data Illegal Data Interference Data Espionage Illegal Devices / Misuse of Devices Computer-related Fraud Computer-related Forgery

Substantive Criminal Law CYBERCRIME MODEL LAW RWANDAN PENAL CODE Comment Pornography Child Pornography Dissemination of Racistic Material Identity-related Crime SPAM - Threat and Harassment Disclosure of an Investigation Failure to permit assistance - Harassment

Cybercrime Model law vs Penal Procedural Law Procedural Law HIPPSA Procedural Law National penal procedural law Comments Search and Seizure Assistance Production Order Expedited preservation Partial Disclosure of traffic data Collection of traffic data Interception of content data Forensic Tool

Cybercrime Model Law vs E- Transaction Law & ICT Bill Law on Liability HIPPSA Model Rwandan Law Comment No Monitoring Obligation - Access Provider - Hosting Provider - Caching Provider - Hyperlinks Provider - Engine Provider -

Conclusion and Way forward Review of national laws cybercrime and procedural law and proposed amendments in line with international best practices Having a special comprehensive chapter/section on cybercrime in penal code and a special section on cybercrime investigation in penal procedural law Development of Cybercrime Investigation Skills Intensive awareness of the public on cybercrime related issues

Thank you for your kind attention Beata Mukangabo, ITU National Expert E-mail: mukangabo@rura.gov.rw; mukbeata@yahoo.fr Union Internationale des Télécommunications International Telecommunication Union