NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

Similar documents
CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

Framework for Cybersecurity in Nigeria

The commission communication "towards a general policy on the fight against cyber crime"

Garry Mukelabai Communications Authority Zambia

Legal, Ethical, and Professional Issues in Information Security

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Comprehensive Study on Cybercrime

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

ITU Model Cybercrime Law: Project Overview

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

UNIVERSAL BROADBAND ACCESS NATIONAL SAFTY AND SECURITY IMPERATIVES

China and International Governance of Cybercrime

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

Guiding principles on the Global Alliance against child sexual abuse online

Cybercrime Criminal Law Definitions and Concepts

AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

UNODC tackling cybercrime in support of a safe and secure AP-IS

Responding to Cybercrime:

PROJECT RESULTS Summary

EU policy on Network and Information Security & Critical Information Infrastructures Protection

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

Thailand Initiatives and Challenges in Cyber Terrorism

Cybersecurity Strategy of the Republic of Cyprus

Legal Foundation and Enforcement: Promoting Cybersecurity

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

Promoting Global Cybersecurity

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Data and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016

Caribbean Cyber Security: Not Only Government s Responsibility

Cyber Security Development. Ghana in Perspective

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

ECONOMIC ASPECTS OF CYBERCRIME

"Cybersecurity in Europe and the EU- Russia Co-operation"

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

EXPERT GROUP MEETING ON CYBERCRIME

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

Data Protection and Cybercrime Challenges

National Communications Authority

15412/16 RR/dk 1 DGD 1C

Cyber Security Roadmap

Computer Forensics US-CERT

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

RESOLUTION 45 (Rev. Hyderabad, 2010)

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

The Role of the Data Protection Officer

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Draft Resolution for Committee Consideration and Recommendation

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

UNODC. International Cooperation and Assistance in Cybercrime Matters

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask

National Policy and Guiding Principles

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

RESOLUTION 67 (Rev. Buenos Aires, 2017)

The cost of cybercrime the benefits of cooperation

RESOLUTION 130 (REV. BUSAN, 2014)

Acceptable Use Policy

Syllabus for P.G. Diploma in Cyber Law and Information Technology

Security Challenges with ITS : A law enforcement view

Cyber Security and Cyber Fraud

Security Takes Center Stage

The UN Counter-Terrorism Committee Executive Directorate and its cooperation with ICAO on travel document security

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

ENISA EU Threat Landscape

Communication and Usage of Internet and Policy

Breckenridge Financial Supplies Website Use Policy

13967/16 MK/mj 1 DG D 2B

A1. Actions which have been undertaken by Governments

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Challenges in Developing National Cyber Security Policy Frameworks

Role of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless


INTERNATIONAL CONFERENCE ON SECURING CYBER SPACE RECALIBRATING LEGAL & TECHNOLOGICAL DIMENSIONS Date: 13 TH MAY Venue

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010

I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE

Commonwealth Cyber Declaration

Directive on security of network and information systems (NIS): State of Play

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

ASEAN s Cyber Confidence Building Measures

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Transcription:

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

OUR MANDATE O The EFCC is the agency charged with the responsibility for the enforcement of all economic and financial crimes laws among other things. O This means that certain aspects of cybercrime enforcement fall within the purview of the mandate of the EFCC.

HOW WE DID IT O Advance Fee Fraud and Other Fraud Related Offences Act, 2006 (AFF ACT) was used by the EFCC in its fight against cybercrime especially as it relates to online fraud. However, the provisions of the AFF Act were: O Limited. For instance possession of documents containing false pretence/s and sending out mails containing false pretence online was criminalized. It did not cover situation where offending documents were found in a person s sent email box where the email account had been hacked? O Re-active rather than proactive -- No provisions for prevention O Silent on where to report cyber attacks? O Not robust enough to cover cybercrimes such as hacking, cyber espionage and terrorism, cyber pornography and such.

WHERE WE ARE O O O O The EFCC is happy that the Cybercrime (Prohibition, Prevention Etc.) Act 2015 has been passed into law. This will clearly aid the fulfilment of its mandate. The objectives of the Act are quite laudable and include to: Provide an effective unified legal, regulatory and institutional framework for the prohibition, prevention, detection, prosecution and punishment of cybercrimes in Nigeria. Ensure the protection of critical national infrastructure. Promote cyber-security and the protection of computer systems and networks, electronic communications, data and computer programs, intellectual property and privacy rights.

VITAL PROVISIONS O Provides for the protection of Critical National Information Infrastructure (CNII) O Created cybercrime offences with prescribed penalties like computer related forgeries, online fraud, child pornography, cyber terrorism, identity theft, cyber: stalking; bullying; harassment, squatting, racist and xenophobic offences, dealing in e-tools, breach of confidence by service providers, manipulation of ATM and POS Terminals, phishing, spamming, spreading of computer virus, electronic card related offences,.

O Requires Cyber-cafe s to register as a business concern with Computer Professionals Registration Council in addition to registration with the CAC and also to maintain a register of users through a sign-in register. This register should be made available by the owner of the Cybercafé to law enforcement personnel when required.

ESTABLISHMENT OF THE NIGERIAN EMERGENCY RESPONSE TEAM O ngcert operations centre was officially commissioned and domiciled in the office of the NSA by the then NSA -- Mohammed Sambo Dasuki on 25 th May 2015, upon the Act being signed into law in 15 th May 2015. O https://www.cert.gov.ng/

Section 21: Duty to report Attacks O Anyone who operates a computer system or network are required to inform CERT of attacks, intrusions and other disruptions liable to hinder functioning of another computer system or network is duty bound to report such to CERT within 7 days or face denial of internet services and fine of N2m. O ngcert has the power to isolate affected computer systems or networks (botnets)

ADMINSTRATION AND ENFORCEMENT O ONSA to be the coordinating body, provide support, ensure formulation and effective implementation of a comprehensive cyber security strategy and a national cyber security policy for Nigeria, establish and maintain the CERT O Maintain National computer forensic laboratory or coordinate same for law enforcement, security and intelligence agencies, O Build capacity, establish platforms for PPP, coordinate Nigerian involvement with international cyber security cooperation and such similar responsibilities.

DUTIES OF RELEVANT AGENCIES UNDER THE ACT O Relevant Agencies include: Ministry of finance, ICPC, EFCC, ONSA, Federal Ministry of Justice, Ministry of Foreign Affairs, CBN, DSS, NPF, NIA, NAPTIP, etc. O Develop requisite institutional capacity for effective implementation of the Act. O Collaborate with the ONSA to Initiate, develop and organize training programmes nationally or internationally for relevant officers.

CYBERCRIME ADVISORY COUNCIL (THE COUNCIL) O The Act established the Council to be comprised of a representative of relevant Ministries and Agencies (as listed in Schedule 1), who shall not be below the directorate rank in the public service. O The duties and functions of the Council include: providing platform for information sharing; formulation of policy guidelines regarding the implementation of the Act; advise on prevention and combating measures; establish programs for the award of grants to encourage research in the field including the promotion of graduate Internship in the field.

NATIONAL CYBERSECURITY FUND (THE FUND) O The Act established the fund to be domiciled in the CBN. Sources of the Fund shall include: O GSM service providers; Internet Service Providers, Banks and Other FI s, Insurance Companies and the Nigerian Stock Exchange to pay prescribed levies on all E-Transactions to be credited to the Fund; O Grants-in-aid and assistance from donor, bilateral and multilateral agencies; O Unencumbered, gifts, endowments, bequests or other voluntary contributions by persons and organisations; O Appropriated Funds by the National Assembly; O Monies or assets that accrue from time to time. O The office of the NSA to keep record of the Fund.

EXPANDED JURISDICTION O Federal High Court located in any part of Nigeria has the jurisdiction to try offences under the Act if committed: O In Nigeria; in a ship or aircraft registered in Nigeria; by a citizen or resident in Nigeria if his act would amount to a crime in the country where the offence was committed; O Offences committed outside Nigeria can be tried in Nigeria where victim is a citizen or resident in Nigeria; the offender is in Nigerian and is not extradited to any other country for prosecution.

THE WAY FORWARD O Complete implementation of the Act is required. O The inauguration of the Cyber crime Advisory council. This has been slated to take place on 18 th April 2016. O The National Cyber-security Fund needs to be up and running with the inauguration of the Council. This will provide the requisite funds to handle the emerging challenges in this area.

O Legislation to regulate Electronic Commerce is necessary. O Data Protection Legislation. O Development of technical and man power competence especially for law enforcement is very essential, eg. computer forensics specialists. O What about preparing for the expected growth of Internet of Things (IOT). Need to leverage on what is being suggested by many as the 4 th Revolution to grow our digital economy.. O Public education on basic internet security procedures appear urgent.