Garry Mukelabai Communications Authority Zambia

Similar documents
Promoting Global Cybersecurity

Commonwealth Cyber Declaration

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

RESOLUTION 130 (REV. BUSAN, 2014)

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

RESOLUTION 130 (Rev. Antalya, 2006)

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

RESOLUTION 45 (Rev. Hyderabad, 2010)

E-Signature Law of Iraq no. ( 78) of 2012

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Cybersecurity & Spam after WSIS: How MAAWG can help

DIGITAL AGENDA FOR EUROPE

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

European Union Agency for Network and Information Security

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Cybersecurity for ALL

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

The cost of cybercrime the benefits of cooperation

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

Child Online Protection in Child Pornography Namibia

UNODC tackling cybercrime in support of a safe and secure AP-IS

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

National Policy and Guiding Principles

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Cybersecurity Strategy of the Republic of Cyprus

RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Global cybersecurity and international standards

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

ENISA Cooperation in the EU / NIS Directive

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

GAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

CYBERSECURITY INITIATIVES IN VANUATU

RESOLUTION 67 (Rev. Buenos Aires, 2017)

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Birendra Kumar Mishra. Director General Department of Information Technology Ministry Of Science and Technology Government of Nepal

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

Legal Foundation and Enforcement: Promoting Cybersecurity

Germany Candidate for the ITU Council

Liberia ICT Policy

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Caribbean Cyber Security: Not Only Government s Responsibility

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Republic of Mauritius CYBERCRIME STRATEGY Page

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Framework for Cybersecurity in Nigeria

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

Cyber Security in Europe

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, November 2012

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Zambia National Standardization Organization Audit

Draft Resolution for Committee Consideration and Recommendation

Discussion on MS contribution to the WP2018

Cyber Security and Cyber Fraud

State Planning Organization Information Society Department

The commission communication "towards a general policy on the fight against cyber crime"

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

ECOWAS Cyber security Agenda

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Asia-Pacific Telecommunity Administrations ASIA-PACIFIC COMMON PROPOALS FOR THE WORK OF THE CONFERENCE

Valérie Andrianavaly European Commission DG INFSO-A3

Cybersecurity & Digital Privacy in the Energy sector

Internet Governance and the World Summit on the Information Society (WSIS)

Directive on Security of Network and Information Systems

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

The Arab ICT Organization

National Communications Authority

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Strengthening telecommunications infrastructure for economic growth and security: A case for Zambia

Presented by: Njei Check Head, Audit Security Division, ANTIC

Issue I. Airport Communication Project

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

ITU World Telecommunication Standardization Assembly 2016 Background Paper

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

OAS Cybersecurity Capacity Building Efforts

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

Transcription:

Garry Mukelabai Communications Authority Zambia

ICT in Zambia. Current and Future Legislations. Way Forward?

Pop 12 million. Zambia pioneers of internet in region. Over 10 Internet Service Providers Internet subscribers 16, 830 = 0.144 per 100 PSTN subscribers 91,789 = 0.784 per 100 Mobile subscribers 2,639,026 = 22.539 per 100 (2007 figures)

High Cost of Access Hardware Software Poor Infrastructure Concentrated along line of rail Mobile phone has better penetration Poor Awareness Users, Security Issues Lack of Skills End User, Professionals

Computer Misuse Act 2004 in place. Inadequate. ICT Policy March 2007 ICT Bill in parliament being reviewed. ICT Security Bill being drafted E-signature Law being drafted. Inadequately trained judiciary and law enforcement.

Zambia has acknowledged the need for legislation of the use of cyberspace and this was brought to the fore with heavy lobbying by the banking sector with help of Computer Society leading to a Cybersecurity law the computer misuse act that was passed in 2004. However, critics are concerned that the law, if adopted, could be used to curb access to the internet. The bill was passed quickly through parliament without much debate due to a suspected case of lack of understanding.

Unauthorised access to computer program or data Access with intent to commit or facilitate commission of offence Unauthorised modification of computer program or data Unauthorised use or interception of computer service Unauthorised obstruction of use of computer Unauthorised disclosure of access code Enhanced punishment for offences involving protected computers Unauthorised receiving or giving access to computer program or data Causing a computer to cease to function Omission to introduce, record or store data Offences by body corporate

Backs the ICT Policy Radio and Telecoms Radio Communications Act Telecommunications Act

Deals more with interception and monitoring. Telephone records User Details Deals with encryption up to any length But requires permission. Access to stored documents. Being Drafted

E-signature Create enabling environment to allow e-commerce e-health e-banking e-government Aned other related e- applications.

Mutual Legal Assistance Act Co-operation with other countries in curbing and prosecuting crime cross border. Anti Money Laundering Act Laundering including Cyber Related. Intellectual Property Rights Act Copyright, Software Licensing Protection of Literacy and Artistic Works Act. Postal Services Bill

Why is Cybersecurity important? Critical sectors of a nation s economy today rely upon IP networks for transacting business, including energy, transportation, water, banking, agriculture and food, essential government services, etc. To achieve maximum economic benefit from the use of IP networks, they need to be reliable, secure, and trusted. Today, these networks, which were not originally designed with security in mind, face increasing threats from cyber attacks.

Zambia has very few recorded cases of cybercrime. A well published case involves the replacement of the portrait of the then republican President Fredrick Chiluba with a cartoon caricature. The offender was charged using the Telecommunication Act of 1994 that was created to regulate the telephone industry and Internet Service Providers and thus the charge failed to stick. At the time a bill was being drafted that was specifically for computer crime. The Police Service has received several reports of fraud cases of obtaining money by false pretence where offenders send mail to purporting to be rich heir and just needing a small amount for money to pay commission or offering education scholarships for a small fee etc.

The government through the FNDP recognises and advocates for the use of ICT s for development as evidenced in the plan for computerisation of the Information Services through wide area networks and use of Management Information systems and again in Public Safety and Order on computerisation of crime prevention looks at the use of ICT database technologies to accurately record crime.

An information and knowledge-based society by 2030. 1. Increase connectivity to fibre optic (telecommunication infrastructure rollout) and other high capacity transmission technologies (networks) from 7 to 72 districts by 2010; 2. Increase the access to phones per 100 people (tele-density) from 0.9 to 8 by 2015 and to 50 by 2030; and 3. Increase access to ICT services such as Internet users from 35,000 in 2005 to 100,000 by 2015 and to 1,000,000 by 2030.

Launched March 2007 ( PPP) 1. HUMAN RESOURCE 2. EDUCATION 3. ACCESS, MEDIA, CONTENT & CULTURE 4. ICT SECTOR 5. TELECOMMUNICATIONS INFRASTRUCTURE 6. E-GOVERNMENT 7. E-COMMERCE 8. AGRICULTURE 9. HEALTH 10.TOURISM, ENVIRONMENT & NATURAL RESOURCES 11.YOUTH & WOMEN 12.LEGAL & REGULATORY FRAMEWORK 13.SECURITY IN THE INFORMATION SOCIETY

In general, one of the greatest concerns in connected societies is security of information passing through networks and systems such as computers, financial transactions, health records etc. As Zambia embraces ICTs, more security concerns and abuse shall arise if no counter measures are put in place.

(a) Security of government, public and private networks and communications systems in general; and in particular those systems carrying sensitive and critical data/information of great value to Government, businesses and individuals; (b) Protection of networks and information systems to guard against various types of malicious crimes and unauthorised access; safeguarding against undermining consumer confidence in online services including those based on E-Commerce, E- Government and E-Health systems; (c) Privacy of individuals, businesses and Government arising from connectivity to local, national and global networks.

Awareness to facilitate stakeholders understanding of the nature and extent of their critical information infrastructures and the role each must play in protecting them. The stakeholders will include the government and its various arms, the Legislative Policy and Law Makers Law Enforcement Agencies Judiciary Corporate, Individuals Users, Public, Civil Society, CAZ trained journalists, E-Brain monthly meetings, Computer Society, Media,

A national cyber security agency needs to be created that will oversee the running of the various facets of the topic. Such as Incidence Response Critical Infrastructure Information Protection National Cooperation Regional Cooperation Training and Awareness Security Audit Currently Min Comms and Transport are spearheading this activity

Security Wings ZP, ZAF and Others Government and its wings Ministry of Justice Ministry of Communications and Transport Ministry of Finance and National Planning Bank of Zambia, Regulators Business and Associations Internet Service Providers, ISPAZ Mobile Operators Other ICT Service and Product Companies Banks or Bankers Association Ebrain, Computer Society of Zambia Academia Civil Society

Cybercrime is quite often perpetuated across national boundaries. It is therefore important that nations co-operate and harmonise as many of their cybercrime legislations as possible to be able extradite offenders from one to another. Dual Criminality refers to a situation that requires that a crime be recognised in both countries before they can co-operate.

gmukelabai@caz.zm

ICT Information and Telecommunication Technology ITU International Telecommunication Union ITU-D ITU Development Sector ITU-R ITU Radiocommunication Sector ITU-T ITU Telecommunication Standardization Sector PP-06 ITU Plenipotentiary Conference 2006 SG Study Group TSAG Telecommunication Standardization Advisory Group WP Working Party WSIS World Summit on the Information Society WTSA World Telecommunication Standardization Assembly ZP - Zambia Police ZAF -Zambia Airforce ISP - Internet Service Provider PSTN Public Switched Telephone Network SADC Southern Africa Development Community