SlideShare una empresa de Scribd logo
1 de 46
Descargar para leer sin conexión
Page 1 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

NK/NASS/HR/DB/HB154/1

July 15, 2009

Honourable Rabe Nasir
Chairman, House Committee on Drugs, Narcotics and Financial Crimes
Rm. 3.11, New Wing
House of Representatives
National Assembly, 3 Arms Zone, Abuja

Dear Sir,

REVIEW OF DRAFT CYBER SECURITY AND INFORMATION PROTECTION AGENCY
(ESTABLISHMENT, ETC) BILL 2008 – A SECTION-BY-SECTION ANALYSIS

EXECUTIVE SUMMARY

Niche Konsult Limited fully identifies with the aspirations that led the Chairman, House
Committee on Drugs, Narcotics and Financial Crimes, the Deputy Chairman/sponsor of
the Draft Cyber Security and Information Bill, Honourable Bassey Etim and his
colleagues in the three Joint Committees of the House of Representatives assigned the
enviable job of fashioning out a cyber security enactment for Nigeria that will stand the
test of time to hold this public hearing.

Niche Konsult Limited also appreciates the opportunity given its representative to make
a brief presentation on the occasion of the holding of the public hearing on the above on
July 8, 2009.

Niche Konsult Limited chooses to style itself Nigeria‟s Information Technology Security
Distributor and has partnership affiliations with several of the leading brands in the
information technology security space including but not limited to the following:

      Absolute Software (developers of the world‟s leading laptop tracking product)
       http://www.nichekonsult.com/Partners/AbsoluteSoftware/default.aspx
      Acunetix     (developers    of   the    web    application/website  vulnerability
       assessment/management tool - Acunetix Web Vulnerability Scanner)
       http://www.nichekonsult.com/Partners/Acunetix/Default.aspx
      Application Security Incorporated (the leading provider of database security
       solutions for the enterprise and the developers of DBProtect and
       AppDetectivePro)
       http://www.nichekonsult.com/Partners/ApplicationSecurityInc/Default.aspx
      Alwil Software (developers of the popular antivirus software known as avast!)
       http://www.nichekonsult.com/Partners/Avast/default.aspx
      BitDefender (a leading global provider of security solutions that satisfies the
       protection requirements of today‟s computing environment)
       http://www.bitdefender.com
      Core Security (developer of strategic security solutions for Fortune 1000
       corporations, government agencies and military organizations)
       http://www.nichekonsult.com/Partners/CoreSecurity/Default.aspx
      eEye (a leading developer of network security products and an active contributor
       to network security research and education. eEye offers several award-winning
       solutions including Enterprise Vulnerability Assessment and Remediation
       Management. eEye products protect the networks and digital assets of thousands
       of corporate and government entities in over forty countries)
       http://www.eeye.com
Page 2 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

               GFI(GFI is a leading software developer that provides a single source for network
                administrators to address their network security, content security and messaging
                needs) http://www.gfi.com
               Kaspersky (develops, produces and distributes information security solutions
                that protect customers from IT threats and allow enterprises to manage risk.)
                http://www.nichekonsult.com/Partners/Kaspersky/Default.aspx
               McAfee (Provides anti-virus, vulnerability assessment, intrusion prevention,
               and client security solutions)http://www.mcafee.com
               N-Stalker (developers of the N-Stalker Web Application Security Scanner)
                http://www.nstalker.com
               Panda (one of the world's leading creators and developers of technologies,
                products and services for keeping clients' IT resources free from viruses and
                other computer threats at the lowest possible Total Cost of Ownership)
                http://www.nichekonsult.com/Partners/Panda/Default.aspx
               Symantec (Symantec is a global leader in infrastructure software, enabling
                businesses and consumers to have confidence in a connected world. The company
                helps customers protect their infrastructure, information, and interactions by
                delivering software and services that address risks to security, availability,
                compliance, and performance. Headquartered in Cupertino, Calif., Symantec has
                operations in 40 countries.) http://www.symantec.com

Niche Konsult Limited has been in the information technology security business since
2002. Between then and now, Niche Konsult Limited has consulted on Information
Technology security matters for two electronic cards/payment service providers, two
telecommunication service providers and six of Nigeria‟s current 26 banks on
Information Technology Security Solutions amongst several other clients in both the
private sector and governmental circles. Niche Konsult Limited and many of our clients
and potential clients are affected by the provisions of this proposed bill and so we have
taken time to do as thorough a review of this bill for the benefit of the Committee, our
clients and prospects.

Immediately below follows our section by section analysis of the merits and demerits of
the bill accompanied by suggestions/recommendations for improvement.

SECTION-BY-SECTION ANALYSIS

1.        (1)      There is hereby established a body to be known as Cyber Security and Information Protection
                Agency (in this Bill referred to as “the Agency”) which shall have such functions as conferred on it
                by this bill.

          (2)     The Agency:

                        (a)   shall be a body corporate with perpetual succession and a common seal;

                        (b)   may sue and be sued in its corporate have and may, for the purpose of its functions,
                                acquire, hold or dispose of property;

COMMENTS

Our comprehensive study of the bill seems to indicate that there are no provisions on
“Information Protection” as suggested by the title of this Bill. We consider this a very
significant omission/Anomaly. For the purposes of the Committee, we wish to reproduce
below the following text entitled “The Data Protection Principles” obtained from
Schedule 1 to the UK Data Protection Act of 1998:

     1. Personal data shall be
Page 3 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

  processed    fairly   and
  lawfully     and,       in
  particular, shall not be
  processed          unless-

                                      (a) at least one of the conditions in Schedule 2 is
                                      met, and
                                      (b) in the case of sensitive personal data, at least
                                      one of the conditions in Schedule 3 is also met.
                                  2. Personal data shall be obtained only for one or more
                               specified and lawful purposes, and shall not be further
                               processed in any manner incompatible with that purpose
                               or                    those                      purposes.

                                  3. Personal data shall be adequate, relevant and not
                               excessive in relation to the purpose or purposes for which
                               they                      are                  processed.

                                 4. Personal    data shall   be accurate and,      where
                               necessary,        kept         up       to           date.

                                  5. Personal data processed for any purpose or
                               purposes shall not be kept for longer than is necessary for
                               that      purpose         or        those        purposes.

                                  6. Personal data shall be processed in accordance with
                               the    rights  of   data    subjects  under    this  Act.

                                  7. Appropriate technical and organisational measures
                               shall be taken against unauthorised or unlawful
                               processing of personal data and against accidental loss or
                               destruction   of,  or   damage     to,   personal    data.

                                  8. Personal data shall not be transferred to a country
                               or territory outside the European Economic Area unless
                               that country or territory ensures an adequate level of
                               protection for the rights and freedoms of data subjects in
                               relation to the processing of personal data.




We had wanted to comment extensively in our paper on the Data Protection Provisions of
the Bill, but have been forced to hold back. However, we think that it would be an
anomaly in fact and law for the proposed agency to be prosecutor/investigator of
cybercrimes and regulator of country‟s cyber security space on the one hand and
privacy/information/data protection watchdog on the other hand at the same time. It is
therefore suggested that either a new Data Protection Agency modelled after that in the
UK or the Act establishing the Consumer Protection Council be amended to
accommodate the functions currently being carried out by the Information Commissioner
in Great Britain. We are of the considered opinion that the second option would be the
preferred option since it will permit and/or extend the powers of the Consumer
Protection Council to cover breaches involving personally identifiable information (PII), a
Page 4 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

rampant from of consumer abuse and extend its turf to consumer protection matters in
today‟s world of the internet and pervasive telecommunications networks, which
developments the CPC Act of 1992 did not envisage nor prepare for and thus match
what obtains in the United States of America in which the Federal Trade Commission
(FTC) plays similar roles.

We wish the committee to note that breaches of data protection laws are also considered
to be violations of human rights in several countries including Austria, Canada, Denmark,
France, Germany, Luxembourg, Norway, Sweden, the United Kingdom and the United
States and should also be so in Nigeria.

It is our wish that the Committee will recommend to the House that it adopts the
attitude of the American Congress which enacted several “Special Statutes” to expand
the responsibilities of the FTC with respect to Data Protection.

If the House so wishes, it can maintain the current name of the CPC or change its name
to Information and Consumer Protection Council (ICPC) or Information and Consumer
Protection Agency (ICPA). (Please see attached some documents we sent to the
CPC on these matters in February 2005.)

Until Data Protection provisions are included in our laws, it will not be possible for the
House of Representatives to give legal teeth and effect to Section 37 of the 1999
Constitution of Nigeria which states “The privacy of citizens, their homes,
correspondence, telephone conversations and telegraphic communications is hereby
guaranteed and protected.”

We recommend that the Committee visits the following links for more general
information on Data Protection Laws and the role(s) played by Information
Commissioner who heads the UK Data Protection Agency:

http://www.out-law.com/page-10137 which deals with data protection watchdogs urging
The European Commission to make sure that outsourcing providers who process
personal data are bound by consistent rules irrespective of whether they are based
inside or outside the EU

http://www.out-law.com/page-10116 which deals with breaking of the Data Protection
Act by the Manchester City Council when it failed to encrypt laptop computers containing
data on nearly two thousand workers. The local authority has promised to ensure all
mobile computers are encrypted.

http://www.timesonline.co.uk/tol/news/uk/crime/article6373645.ece which discusses the
court case involving Ian Kerr who maintained a constructor worker blacklist database but
failed to comply with the Data Protection Act which requires that unless very simple
processing is done, all organizations handling personally identifiable information (PII)
must be registered with the Agency

http://www.independent.co.uk/news/uk/politics/nhs-loses-thousands-of-medical-
records-1690398.html The UK Information Commissioner‟s hard knocks on the National
Health Service which has been involved in some 140 data security breaches in the last
four months.

http://www.out-law.com/page-9965 The UK Information Commissioner comments on
complaints‟ and enquiries on Google‟s Street View service
Page 5 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

http://www.theregister.co.uk/2009/04/20/british_council_data_loss/ The UK Information
Commissioner's Office comments on the loss of an unencrypted disk containing
personally identifiable information on over 2,000 members of staff

In closing our comments on data protection, we would like to call attention of the
Committee to the distinction between a Data Protection Act and a Cyber Crime Act such
as the proposed Bill. Lord HobHouse of Woodborough observed in Regina v Bow Street
Metropolitan Stipendiary Magistrate and Another, ex parte Government of the
United        States        of      America        2002        2       AC        216:


           “As Astill J. said in Bignell's Case [1998] 1 Cr.App.R. 1, 12b, the Act of 1990
           was enacted to criminalise the 'hacking' of computer systems and the Data
           Protection Act 1984 was enacted to criminalise improper use of data."


We look forward to an opportunity to perform/conduct a Section-by-Section analysis on
the Data Protection Bill as well.


In respect of the controversy that arose at the public hearing on the utility of creating a
new cyber security agency, I wish to draw the attention of the Committee to the
following internet links which discuss the establishment of a similar agency in the UK and
France:
http://www.pcworld.com/article/168135/france_creates_new_national_it_security_agenc
y.html

http://www.ecommerce-
journal.com/news/16770_france_launches_a_new_agency_to_strike_cyber_attacks

http://www.ssi.gouv.fr/IMG/pdf/ANSSI_PRESS_RELEASE.pdf

http://news.cnet.com/8301-1009_3-10272925-
83.html?part=rss&subj=news&tag=2547-1009_3-0-20

http://www.scmagazineuk.com/UK-cyber-security-strategy-launched/article/139033/

http://www.theregister.co.uk/2009/06/25/uk_cyber_security_strategy/

2.   (1)    The Agency shall consist of:

                  (a)   the Chairman of the agency shall be the National Security Adviser;

                  (b)   Executive Vice chairman to be appointed by the president, who shall be:

                           (i)     a retired or serving member in any security agency of the Federation not
                                      below the rank of deputy commissioner of police or it’s equivalent, with
                                      cybersecurity experience

                           (ii)    a lawyer with not less than 10 years post call experience, who must be an
                                      expert in cybersecurity

                           (iii)   responsible for the day to day running of their affairs of the Agency.

                  (c)   a representative each of the following Federal Ministries.
Page 6 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

                      (i)       commerce, industry;

                      (ii)       science and technology;

                      (iii)      justice;

                (d)   The Executive Vice Chairman and members of the Agency, other than ex-officio shall
                        each hold office for a period of four years and may be re-appointed for one
                        further term.

                (e)   a representative each from the following organizations:

                      (i)       the department of state security services;

                      (ii)       the Nigerian police force;

                             (iii)      the Nigeria communications commission;

                             (iv)       the Nigeria Security & civil Defence Corps and

       (2)   Four persons whom:

                (a)   two must be experts in telecommunication with not less than 10 years experience

                (b)   two computer scientists with specialization in cyber crime with not less than 10 years
                        experience

       (3)   The Executive Vice Chairman and four other members of the agency shall be appointed by the
                president subject to confirmation by the senate.

       (4)   The Executive Vice Chairman appointed pursuant to sub-section (1) of this section shall be the
                chief executive of the agency and shall be responsible for the day to day running of its
                affairs.

COMMENTS

Page 1, Line 7 - missing word after corporate “name”, then a comma after name

Page 1, Line 9- should read “The Agency shall consist of the following”

Page 1, Line 10 – should read “the Chairman of the Agency who shall be the National
Security Adviser”

Page 1, Line 14 – which did the draftsman mean “its” or “it‟s” – these two words are
commonly confused

Page 1, Lines 11 – 18 – What is the rationale for limiting the Office of the Executive
Vice Chairman to a “retired or serving member in any security agency of the
Federation”? And how do we define the phrase “with cyber security experience”? And
how do we measure such experience? If this becomes law as passed, then a large pool of
talent has been automatically disenfranchised from this position. That the head should
be a lawyer just makes sense given the fact that this is not just about technology but
how technology meets the law and vice versa, there is no objection to lines 16 and 17 as
they stand. The Committee is well advised to conduct an audit of all “retired or serving
Page 7 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

members in any security agency of the Federation not below the rank of deputy
commissioner of police or its equivalent” in order to find how many of them currently
have “cyber security experience” to be assured that there will always be a pool of them
to drawn from.

Page 1, Line 15 – It is important to decide which is preferred “cyber security” as one
word or “cyber security” as two words. Please see also Page 1, Line 1

Page 2, Line 5 – the word “members” is missing after ex-officio

Page 2, Line 15 – It is important to decide which is preferred “cybercrime” as one word
or “cyber security” as two words

Page 2, Line 19 –replace underscore between “sub_section” with “sub-section”




3.   (1)     A member of the agency may at any time resign his office in writing

                    addressed to the president and may be removed from office because of:

                    (a)   infirmity of mind or body;

                    (b)   permanent incapacity; or

                    (c)   any other reason subject to confirmation by the senate.

           (2)   Members of the agency shall be paid such allowances as may be determined by the salary and
                   wages Commission.

COMMENTS

None

4.   The Agency shall be responsible for the:

     (a)     enforcement of the provision of this bill

     (b)     investigation of all cyber crimes

           (c)   adoption of measures to eradicate the commission of the cyber crimes;

           (d)   examination of all reported cases of cyber crimes with the views to identifying individuals,
                   corporate organization involve in the commission of the crime;

           (e)   registration and regulations of service providers in Nigeria with the views to monitor their
                    activities; organizing and undertaking campaigns and other forms of activities as will lead
                    to increased public awareness on the nature and forms of cyber crimes; and

           (g)   maintaining a liaison with the office of the Attorney General of the Federation, and inspector
                   General of police on the arrest and subsequent prosecution of the offenders.

COMMENTS
Page 8 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

Page 2, Line 31 – should read “enforcement of the provisions of this Bill”

Page 3, Line 2 – should read “…to eradicate the commission of cyber crimes”

Page 3, Lines 3 – 5 – How does the House of Representatives purport to handle the
conflict between the powers given to the EFCC first under the Advance Fee Fraud and
other Related Offences Act No 13 of 1995 (now repealed), and the Advance Fee Fraud
and other related Offences (Amendment) Act 2005 (now repealed) and now the Advance
Fee Fraud and Other Related Fraud Offences Act 2006 which has placed certain
obligations on banks and other financial and designated non financial institutions,
telecommunications companies, internet service providers, cybercafé operators, property
owners, transporters, etc and which provisions are enforced by the EFCC?

Page 3, Lines 3 – 5 – In line 3 mention is made of “cyber crimes” and in line 5 “the
crime”. It is suggested that lines 3 to 5 should read “examination of all reported cases of
cybercrimes with a view to identifying individuals, corporate organizations (and not
organization) involved (and not involve) in the commission of the crimes (and not
crime)

Page 3, Lines 6-9- The House of Representatives may wish to remember that the
Advanced Fee Fraud and Other Related Fraud Offences Act 2006 also gave the EFCC the
power to register internet service providers and cybercafés. Pursuant to the powers
granted the EFCC under that Act, the EFCC held a series of meetings with stakeholders,
including the Internet Service Providers Association of Nigeria (ISPAN), Association of
Cybercafé and Telecentre Operators of Nigeria (ACTONigeria), Private Telecoms
Operators (PTOs) and Global System for Mobile Communication (GSM) operators.
Following such meetings a number of resolutions were agreed for immediate
implementation:

    1. All Internet Service Providers (ISPs), and cybercafé operators providing services
       in Nigeria must be registered with the Corporate Affairs Commission (CAC),
       Nigerian Communications Commission (NCC) and EFCC;
    2. All upstream Internet Service Providers rendering services to Internet Service
       Providers and Cybercafés in Nigeria, must be physically located and be registered
       and licensed as Internet Services Providers (ISPs) above;
    3. All users of Internet services must migrate to Internet Service Providers
       registered with EFCC and licensed by NCC
    4. Registration with EFCC shall be online at www.efccnigeria.org/operators within
       the periods stated below: Internet Service Providers: July 25 September 7, 2006
       Cybercafé Operators: September 8 – November 24, 2006

Source: Daily Trust, Tuesday, July 25, 2006 page 32

Bearing in mind the above and the interpretation of “service provider” in Section 38 of
this bill (page 19 lines 4 to 7) virtually any organization that provides internet access is
required to register. It seems to the undersigned that this provision is unnecessary as it
should not be a requirement and indeed is not a required for this law to have effect or
take effect. To that extent, we think that the first two words of line 6, page 3 should be
expunged.

Page 3, Lines 6 – 9 – the word “regulations” should be replaced with “regulation”

Page 3, Line 11 – “Inspector” should replace “inspector”
Page 9 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

Page 3, Line 10 – 12 It is suggested that the list should be expanded to read:
“Maintaining a liaison with the Office of the Attorney General of the Federation, the
Inspector General of Police and the Executive Chairman of the Economic and Financial
Crimes Commission on the arrest and subsequent prosecution of the offenders. The
rationale for this suggestion is that until this Bill is passed into law, the EFCC has been
acknowledged as the premier cybercrime fighting agency and will so be until this Bill
makes the proposed “Cyber Security and Information Protection Agency” to upstage it.
So this suggestion just makes sense for purposes of continuity.

Finally, it is suggested a new sub-section 4(h) be included giving the proposed agency
powers to oversee cyber security across the government in the manner and fashion
proposed by President Obama in relation to his proposed Cyber Security Coordinator for
the White House.


5.    (1)     In execution of its functions and powers under this Bill, the Agency

                        may appoint:

                        (a)   persons or second officers from government security or law enforcement agencies;
                                 and

                        (b)   specialist in the area of communication, science and technology, law, which will assist
                                 the agency in the performance of its functions.

            (2)   The agency may, make staff regulations relating generally to the conditions of service of the
                    employees, and such regulations may provide for:

                  (a)     the appointment, promotion and disciplinary control; and

                        (b)   appeals by such employees against any disciplinary measures taken against them,
                                shall be regulated by the provision of the civil services rules, until such regulations
                                are made.

(3)   Service in the agency shall be public service for the purposes of pension Act.

COMMENTS

Page 3, Line 17 - specialists should replace specialist; telecommunications should
replace communication

Page 3, Line 26 - Pension should replace pension

6.    The Agency shall maintain a fund which shall consist of:

            (a)   money to be received from the federal government for the purposes of take off;

            (b)   proceeds from all activities, services and operations of the Agency.

            (c)   grants, gifts and donations made to the Agency.

            (d)   such other sums as may accrue to the Agency.

COMMENTS
Page 10 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

None

7.   (1) Any person who without authority or in excess of his authority accesses any computer for the
purpose of:

     (a)     securing access to any program; or

     (b)     data held in that computer; or

           (c)   committing any act which constitute an offence under any law for time being in force in
                   Nigeria, commits an offence and shall be liable on conviction:

                    (i)    in the case of offence in paragraph (a) of this subsection, to a fine of not less than
                              N10,000 or imprisonment for a term of not less than 6 months or to both such fine
                              and imprisonment.

                    (ii)   For the offence in paragraph (b), to a fine of not less N100, 000 or a term of not less
                             than 1 year or to both such fine and imprisonment.

           (2)   Where damage or loss is caused to any computer as a result of the commission of an offence
                   under subsection (1) of this section, the offender shall be liable to a fine of not less than
                   N1,000,000 or imprisonment for a term of not less than 5 years or to both such fine and
                   imprisonment.

           (3)   In pronouncing sentence under this section, the court shall have regard to the extent of
                    damage or loss occasioned by the unlawful act.




COMMENTS

Page 4, lines 2 – 19 – Section 7 creates the offences of “access without authority” or
access “in excess of his authority.” It is suggested that a new offence be created and
made Section 7(3) and make the present Section 7(3) become Section 7(4).

The proposed new offence is “access with authority for an unauthorised purpose.” To
illustrate, imagine a Policeman using his access to police computers to obtain information
on a guy who took over his girlfriend, or imagine an officer attached to the Federal
Inland Revenue Service using his ”access with authority” to snoop on tax files of
politically exposed personalities or of other public figures or a civil servant with access
with access to personally identifiable information at the National Identity Management
Commission/National Pension Commission misusing his/her “access with authority” in a
similar manner.

It is submitted that Section 7 as currently constituted does not provide for such a
possibility. The House of Representatives is well advised to study the startling ruling in
DPP v Bignell (1998) 1 Cr App R 1 and the public hue and cry that followed that
ruling since it affects the issue raised above.

To quote the summary of that case provided by David I Bainbridge in his book
“Introduction to Computer Law” published by Longman in 2000 on pages 312 -313: “Two
police officers had used the police national computer to gain access to details of motor
cars which they had wanted for private purposes unconnected with their duties as police
officers. They were charged with the unauthorised access to computer material offence
Page 11 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

under Section 1 of the Computer Misuse Act 1990… From the reported facts of the case,
it would seem beyond doubt that the accused police officers had consciously and
deliberately misbehaved … by using the police national computer to gain access to
information to be used for their own private purposes.” (Italics Ours)

This is very important because insiders have time again been proved to be the greatest
security threat an organization can face.

In the alternative, an entirely new Section should be created for the offence of “access
with authority for an unauthorised purpose.”

Page 4, line 6 – constitutes should replace constitute

Page 4, line 10 – did the draftsman mean M10, 000.00 or 10,000 Naira

Page 4, line 14 – Since the value of a computer is not so much in the hardware but in
the software and data resident therein, it is suggested that the words “or its contents”
immediately after computer

8.   (1)     Any person who, knowingly and without authority or in excess of

                        authority, disclose any:

                 (a)     password;

            (b)        access code; or

                        (c)   any other means of gaining access to any program data or database held in any
                                computer for any unlawful purpose or gain, commits an offence and shall be liable
                                on conviction to a fine of not less than N500,000 or to imprisonment for a term of
                                not less than 3 years or to both such find and imprisonment, and in the case of a
                                second or subsequent conviction, to a fine not exceeding N1,000,000 or to
                                imprisonment for a term of not less than 5 years or both such fine and
                                imprisonment.

 (2) Where the offence under subsection (1) results in damage or loss, the offender shall be liable to a fine
of not less than N1,000,000 or imprisonment for a term of not less than 5years or both such fine and
imprisonment.

           (3)    Any person who with intent to commit any offence under this Act uses any automated means
                    or device or any computer program or software to:

                  (a)     retrieve;

                  (b)     collect; and

                  (c)     store password, access code; or

                  any means of gaining access to any program, date or database held in any computer, commits
                     an offence and shall be liable on conviction to a fine of N1, 000,000 or to imprisonment for
                     a term of 5 years or to both such fine and imprisonment.

COMMENTS
Page 12 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

Page 4, line 21 – discloses should replace disclose

Page 4, line 24 – “any other means of gaining access to any program data or
database” should instead read “any other means of gaining access to any program, data,
or database”

9.   (1)     Any person who with intent to defraud send electronic mail message

                       to a recipient, where such electronic mail message materially misrepresents any fact or set
                       of facts upon which reliance the recipient or another person is caused to suffer any
                       damage or loss, commits an offence and shall be liable on conviction to a fine of not less
                       than 5 years or to both such fine and imprisonments.




           (2)   It shall not operate as a defense for any person charged with an offence under subsection (1)
                     of this section to claim that:

                 (a)     he could not have carried out his intended act; or

                       (b)   it is impossible to execute the ultimate purpose of his intention; or

                       (c)   the object of his deceit is non-existent.

           (3)   Any person spamming electronic mail messages to receipts with whom he has no previous
                   commercial or transactional relationship commits an offence and shall be liable on
                   conviction to a fine not less than N500, 000 or imprisonment for a term of not less than 3
                   years or to both such fine and imprisonment.

           (4)   Any person who with intent to commit any offence under this Bill;

                 (a)     uses any automated means, device; or

                       (b)   any computer program, software; to collect or store electronic mail addresses from
                               any sources whatsoever, commits an offence and shall be liable on conviction to a
                               fine not less than N1,000,000 or to imprisonment for a term not below 5 years or
                               both such fine and imprisonment.




COMMENTS

Page 5, Lines 12 – 31 Does the wording of Section 9 (1) as presently constituted cover
the unsolicited delivery of advertisements via mobile text messages, e-mail, fax and
automatic dialling systems or just emails? Especially when read with the definition of the
word “Spamming” as contained in Section 38 under Interpretation (page 19, lines 10 –
11) The use of the words “materially misrepresents any fact or set of facts” is very
limiting because an email may not materially misrepresent any fact or sets of facts and
yet be spam although not fraudulent. It is suggested that Section 9 be re-drafted to
cover both fraudulent and non-fraudulent spam, and to extent to unsolicited
communication irrespective of channel such as text messages, email, fax, and automate
dialling systems. This is the position adopted by the Amendment 40 to the
Communications Law of Israel. To illustrate that it is necessary to expand the definition
of spam, between the date of the public hearing and date, the undersigned has received
12 messages with identical content from a very well know beer brand in Nigeria
Page 13 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

celebrating its 60th anniversary and inviting him to answer 3 questions correctly to win a
chance to be a part of the celebration.

Finally, the Bill as presently worded does not make blackmail via email a crime, the
Committee would do well to look into this matter with a view to including it in the
proposed legislation.

Section 9 (3) is unduly restrictive. This is the case because it is not just Advance Fee
Fraud Practitioners that need to reach out to potential targets through the medium of
electronic mail messages, even legitimate advertisers often have course. The House of
Representatives may wish to take a cue from the “Amendment 40 to the
Communications Law of Israel” which permits an advertiser to contact a business
recipient just once per recipient with the question whether they agree to receive
advertisements from that advertiser.

The law also permits an advertiser to send advertisements to the recipient even if they
were not explicitly solicited, in cases when prior business relations have existed between
the advertiser and the recipient and the recipient is the one who provided his/her
mailing/messaging details to the advertiser. But even then – as well as for any case
where the recipient has given consent to receiving advertisements – still the recipient
has the right, under the law, to inform the advertiser of his refusal to receive any more
advertisements. Such refusal notice will cancel the validity of the previous consent. For
more      information,        the     committee      may       wish     to      refer   to
http://www.moc.gov.il/sip_storage/FILES/5/1545.pdf

The Israeli law also requires advertisers to include in a commercial message the word
"advertisement" and the advertiser's name, address and contact information, including
an email address that recipients may use to opt out.

The Israeli law enforces the prior consent requirement which may be in writing or a
recorded call to receive electronic mail messages

The modifications suggested above are required for the law to balance the need to
protect citizens and strike a balance with respect to the requirements of legitimate
business concerns to advertise.




10.   (1)     Any person who, with the intent to commit an offence, uses any

                    computer program or software to deliberately block being traced or avoid detection,
                    commits an offence and shall be liable on conviction to a fine of not less than N500,000 or
                    imprisonment for a term of not less than 3 years or both such find and imprisonment.

            (2)   Any person who knowingly accesses any computer and inputs, alters, deletes or suppresses
                    any data resulting in unauthentic data with the intention that such inauthentic data be
                    considered or acted upon as if it were authentic or genuine, whether or not such data is
                    readable or intelligible, commits an offence and shall be liable on conviction to a fine of
                    not less than N500,000 or imprisonment for a term of not less than 3 years or both such
                    fine and imprisonment.




            (3)   Any person who knowingly and without right causes any loss of property to another by
                    altering, erasing, inputting or suppressing any data held in any computer for the purpose of
Page 14 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

                     conferring any benefits whether for himself or another person, commits an offence and
                     shall be liable on conviction to a fine of not less than N500, 000 or imprisonment for a term
                     of not less than 3 years or both such fine and imprisonment.

COMMENTS

Page 6, Lines 1 – 2 The side note accompanying these lines are most deceptive. It is
submitted that it should be renamed/replaced with “Illegitimate/ Illegal use of proxies.”

Page 6, Lines 6, 7- The side note that is currently situated at Lines 1 and 2 should be
moved to Lines 6 and 7.

Page 6, Lines 6 – 12 -The House of Representatives may wish to note that David I
Bainbridge in the Fourth Edition of his book “Introduction to Computer Law” observed
“The phrase „computer fraud‟ is used to describe stealing money or property by means of
a computer; that is, using a computer to obtain dishonestly, property (including money
and cheques) or credit or services or to evade dishonestly some debt or liability.” In the
light of the above description, it is obvious that there is an overlap between the Offences
which can be committed under the Advance Fee Fraud and Other Fraud Related Offences
Act 2006. In other words, what happens if the offence of obtaining property be false
pretence is committed using the computer, the question then arises: „Which agency
investigates‟? Which agency prosecutes? Is it the Economic and Financial Crimes
Commission? Or the proposed “Cyber Security and Information Protection Agency”? Or
both? If both, which agency will act as the lead? This is an area of potential conflict and
unwarranted and wasteful duplication of resources which the House of Representatives
may which to address.

In doing so, we recommend studying the provisions of the following UK Acts and cases:

           The Theft Act
           Finance Act 1972
           DPP v Ray (1974) AC 370
           Davies v Flackett (1973) RTR 8
           R v Preddy (1996) AC 815
           Criminal Law Act 1977
           Criminal Attempts Act 1981
           Scott v Metropolitan Police Commissioner (1975) AC 819
           R v Lloyd (1985) 2 All ER 661
           R v Ghosh (1982) QB 1053
           Chan Man-sin v Attorney-General for Hong Kong (1988) 1 All ER 1
           R v Morris (1984) AC 320
           Lawrence v Metropolitan Police Commissioner (1972) AC 626
           R v Mavji (1987) 2 All ER 758
           Computer Misuse Act 1990
           and the equivalent Nigerian Acts

11.       (1)   Any person who without authority or in excess of authority interferes

                     with any computer network in such a manner as to cause any data or program or software
                     held in any computer within the network to be modified, damaged, suppressed, destroyed,
                     deteriorated or otherwise rendered ineffective, commits an offence and shall be liable on
Page 15 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

                     conviction to a fine of not less than N1, 000,000 or imprisonment for a term of not less
                     than 5 years or to both such fine and imprisonment.

COMMENTS

Page 6, Line 22 – It is suggested that the word “Deteriorated” is out of place and
should be deleted. While the word “ineffective” should be replaced with “unusable”

12.       Any person who unlawfully produces, adapts or procures for use, distributes, offers for sale, possesses
            or uses any devices, including a computer program or a component or performs any of those acts
            relating to a password, access code or any other similar kind of data, which is designed primarily to
            overcome security measures with the intent that the devices be utilized for the purpose of violating
            any provision of this Bill, commits an offence and is liable to a fine of not less than N1,000,000 or
            imprisonment for a term of not less than 5 years or to both such fine and imprisonment.

COMMENTS

Page 6, Lines 26 – 31, Page 7,lines 1 – 2 – It is submitted that the House of
Representatives should re-consider the text of Section 12 with a view to making a very
clear distinction between things that can be used to overcome security measures but
which have legitimate uses and things specifically designed to overcome security
measures. The following cases are quite instructive in that regard: Amstrad Consumer
Electronics PLC v the British Phonograph Industry Limited (1986) FSR 159, CBS
Songs Limited v Amstrad Consumer Electronics PLC (1988) 2 WLR 1191

To illustrate practically what is meant by the above, Niche Konsult Limited conducts
penetration testing as well as offers for sale software and hardware capable of being
used to violate some provisions of this Bill, but such software was not “designed
primarily to overcome security measures with the intent that the devices be utilized for
the purpose of violating any provision of this Bill.”

On the other hand, the same software/hardware is being legitimately employed by
transportation, healthcare, financial institutions, information technology security
consultants, payment processors, telecommunication firms, large enterprises, state
governments, educational institutions, military academies within and outside Nigeria to
conduct comprehensive penetration testing across their infrastructure and applications.

One such solution goes by the name Core Impact Pro and can be used to perform
penetration testing* which tells organizations using it:

           what an attacker can definitely do to their network
           by exploiting identified vulnerabilities, just as a hacker would
           leaving little doubt as to what a hacker can do or cannot do and thus eliminating
            the guesswork involved in protecting their network by providing them with the
            information they need to effectively prioritize their vulnerabilities.

* Penetration testing is a localized, time-constrained, and authorized attempt to breach
the security of a system using attacker techniques. During a penetration test,
organizations actually try to replicate in a controlled manner, the kinds of access an
intruder or worm could achieve. With a penetration test, network managers can identify
what resources are exposed and determine if their current security investments are
detecting and preventing attacks.
Page 16 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

13.   Any person who without authority or in excess of authority intentionally interferes with access to any
        computer or network so as prevent any:

      (a)     part of the computer from functioning; or

            (b)   denying or partially denying any legitimate user of any service of such computer or network;
                    commits an offence and shall be liable on conviction to a fine of not less than N2,000,000
                    or imprisonment for a term of not less than 7 years or to both such fine and
                    imprisonment.

COMMENTS

Page 7, lines 3 – 9 It is suggested that a new Head Note to be called “Denial of
Service/Distributed Denial of Service Attack(s)”

Page 7, line 5 – It is suggested that the words “or network” be inserted immediately
after computer

14.   Any person who with the intent to deceive or defraud, accesses any computer or network and uses or
        assumes the identity of another person, commits an offence and shall be liable on conviction to a
        fine of not less than N500, 000 or imprisonment for a term of not less than 3 years or to both such
        fine and imprisonment.

COMMENTS

Page 7, Lines 10 – 14 - The Houses of Representatives may wish to compare and
contrast the wordings of Section 14 of this Bill with the wordings of Section 202 of the
Norwegian Criminal Law (2008 – 2009) which when translated states:

            “With a fine or imprisonment not exceeding 2 years shall whoever be punished,
            that without authority possesses of a means of identity of another, or acts with
            the identity of another or with an identity that easily may be confused with the
            identity of another person with the intent of (a) procuring an economic benefit for
            oneself or for another, or (b) causing a loss of property or inconvenience to
            another person.”

            Source: http://www.cybercrimelaw.net

15.   (1)     Every service provider shall keep all traffic, subscriber information or

                     any specific content on its computer or network for such period of time as the Agency may
                     require.

            (2)   Every service provider shall, at the request of any law enforcement agency:

                     (a)   provide the law enforcement agency with any traffic of subscriber information
                             required to be kept under subsection (1) of this section; or

                     (b)   preserve, hold or retain any related content.




            (3)   Any law enforcement agency may with warrant issued by a court of competent jurisdiction,
                    request for the release of any information in respect of subsection (2) (b) of this section
                    and it shall be the duty of the service provider to comply.
Page 17 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

       (4)   Any data retained, processed or retrieved by the service provider for the law enforcement
               agency under this Bill, shall not be utilized except for legitimate purposes either with the
               consent of individuals to whom the data applies or if authorized by a court of competent
               jurisdiction.

       (5)   A person exercising any function under this section shall have due regard to the individual
               right to privacy under the constitution of the Federal Republic of Nigeria 1999 and shall
               take appropriate technological and organizational measure to safeguard the confidentiality
               of the data retained, processed or retrieved for the purpose of law enforcement.

       (6)   A person or service provider, body corporate who willfully contravenes the provisions of this
                section commits an offence and shall be liable on conviction to a fine of not less than
                N500,000 or imprisonment for a term not less than 3 years or both fine and imprisonment.

COMMENTS

Page 7, Lines 15 – 17 – There should be a side note “Records Retention for law
enforcement”. This also raises the question “who bears the cost?” The service provider
or the government? This issue is very important because given the cost of the devices
required to fulfil the requirements of this section, small players may be edged out of
business. Neither does it make sense in a time of economic gloom such as this to pass
on such costs to the end-user. It is also suggested that the words “for such period of
time as the Agency may require” be replaced by the words “for two years.” This will be
in line with a Directive issued by the European Union on data retention which although
not binding on Nigeria is evidence of best practice. That Directive requires retaining such
records for a minimum of six months and a maximum of two years.

Page 7, Line 19 – The words “and backed with a warrant issued by a court of
competent jurisdiction which shall be issued when there is compelling evidence that a
crime is imminent” should be introduced immediately after agency. This is required for
uniformity of Section 15 (2) (a) with Section 15 (2) (b). This is required to keep with
international best practice. The House of Representatives may wish to recall the hue and
cry over the high-handedness of the EFCC in the recent past, which was made possible
by provisions such as the below which was contained in the Advance Fee Fraud and
Other Offences Act 2006, under duties of telecommunications and internet service
providers and internet cafes we have the following provision: “Any person whose normal
course of business involves the provision of non-fixed line or Global System of Mobile
Communications (GSM) or is in the management of any such services, shall submit on
demand to the Commission such data and information as are necessary or
expedient for giving full effect to the performance of the functions of the
Commission under this Act.

Inserting the above will provide for much needed checks and balances on the power of
the Executive as represented by the proposed agency. The House of Representative may
also which to consider amending the above provision in the Advance Fee Fraud and
Other Offences Act 2006 as well to allow of checks on the power of the agency by the
judicial arm of the government.

Page 7, Line 22 – It is suggested that the words “preserve, hold or retain any related
content” be expunged from this bill. What this means in practice is that service providers
would be required to keep a copy of every email sent/received, every instant message,
every text message, every call made, every web page viewed to mention but a few. Of
course, it is not in doubt that service providers already have this information. However,
Page 18 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

rather than giving such retention legitimacy, it is recommended that the Committee
should consider this an opportunity to enact an electronic communications/email archival
legislation which always places the obligation of such archival on the organization
sending or receiving the email and not on the service provider, and limit the service
provider to retaining only to traffic and subscriber information. This will distribute the
cost of such data retention much more evenly and reduce the likelihood of the general
public thinking that Nigeria‟s government is desirous of creating a police state. The
Committee would also like to note that the UK Communications Bill currently under
consideration which proposes to amend the UK Regulation of Investigatory Powers Act
(RIPA) does not propose the retention of content by service providers. It is suggested
that the Committee should expunge this provision. Please see

http://www.examiner.ie/ireland/retention-period-for-phone-data-to-be-cut-96213.html

http://www.siliconrepublic.com/news/article/13407/government/irish-govt-to-retain-all-
web-text-and-phone-data-for-two-years

http://www.examiner.ie/ireland/watchdog-concern-at-revenue-data-access-96329.html

http://www.scmagazineuk.com/Government-lines-up-central-database-of-phone-and-
internet-records/article/110337/

http://news.bbc.co.uk/2/hi/technology/7410885.stm


The Committee might also like to make very clear with it means by traffic information.
The UK Communications Bill and Data Retention Directive help here because they define
traffic information to include the initiator of the communication, the recipient of the
information, the time of the communication, the duration of the communication, the
location of the initiator and the recipient, the type of communication.

Page 7, Line 27 – 30 – It is suggested that the wordings of Section 15 (4) be revisited.
In particular the words “…shall not be utilized except for legitimate purposes either with
the consent of individuals to whom the data applies or if authorized by a court of
competent jurisdiction.”

Page 7, Line 31 – The words “or organization” should be inserted immediately after
“person”

Page 8, Line 5 – No such word as “willfully”, but there is a word “wilfully”

16.   (1)   A person who intentionally, without authority or in excess of

                 authority intercepts any communication originated, terminated or directed from, at or to
                 any equipment, facilities or services in Nigeria, commits an offence and shall be liable on
                 conviction to;

                  (a)       a fine of not less than N500, 000;

                 (b)        imprisonment for a term of not less than 10 years; or

                 (c)       both such fine and imprisonment.
Page 19 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

 (2) Notwithstanding the provision of subsection (1) of this section, any service provider, its employee or
duly authorized agent may, in the normal course of work, carryout the activity mentioned in section 16 of
this Bill.

COMMENTS

None

17.   Every service provider shall ensure that any of its equipment, facilities or services that provides a
        communication is capable of:

        (a)   enabling a law enforcement agency to intercept all communications on its network for the
                purpose of investigation and prosecution;

        (b)   accessing call data or traffic record;

        (c)   delivering intercepted communications and call data or traffic record in such a format that
                 they may be transmitted by means of equipment, facility or service procured by any law
                 enforcement agency to a location other than the premises of the service provider; and

        (d)   facilitating authorized communications interceptions and access to call data or traffic records
                 unobtrusively with minimum interference with any subscriber’s communication service
                 and in a manner that protects:

                 (i)    the privacy and security of communications and call data or traffic records not
                          authorized to be intercepted.

                 (ii)   information regarding the interception.




        (2)   A service provider who contravenes the provision of subsection (1) of this section, commits an
                 offence and shall be liable on conviction, in case of;

        (a)   service provider, a fine of not less than N100, 000; and

        (b)   director, manager or officer of the service provider, a fine of not less than N500,000 or
                 imprisonment for a term of not less than 3 years or to both such fine and imprisonment.

COMMENTS

We appreciate the need to ensure that the equipment deployed by service providers
have on-going intercept capabilities, as well as the obligations placed on service
providers to enable/facilitate lawful interception and to deliver intercepted
communications in the course of a lawful investigation.

The provisions of Section 17 as presently constituted and Section 17(d)(i) and Section
17(d)(ii) notwithstanding, it is sad that the House of Representatives is giving the
proposed agency what may be likened to a blank cheque. We are not against lawful
interception, but we strongly urge the insertion of the following “such interception to be
carried out by the Agency shall be lawful if accompanied by a warrant issued by a judge
of a Federal or State High Court.

Please compare with the UK Regulation of Investigatory Powers Act 2000, Section 2
Interception of Communications Act 1985, Malone v United Kingdom (1984) 7 EHRR 14
Page 20 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

Please see evidence of misuse of such provisions as the above in the UK, the Committee
may wish to ensure that the bill does not make this a possibility in Nigeria:

http://news.bbc.co.uk/1/hi/england/dorset/7341179.stm

http://www.theregister.co.uk/2008/04/11/poole_council_ripa/

http://news.bbc.co.uk/1/hi/england/dorset/7343445.stm

http://www.schneier.com/blog/archives/2007/11/animal_rights_a.html

http://www.out-law.com/page-9956

http://www.vnunet.com/computing/news/2240543/government-announces-review


http://nds.coi.gov.uk/Content/Detail.asp?ReleaseID=398807&NewsAreaID=2

The Committee may which to compare and contrast the provisions of this Section with
the provisions of Sections 165 – 176 of the Evidence Act dealing with Official and
Privileged Communications to ensure that there is no conflict.

18.   (1)     It shall be the duty of every service provider at the request of any

                        law enforcement agency or at the initiative of the service provider, to provide assistance
                        towards the:

                        (a)   identification, arrest and prosecution of offenders; or

                        (b)   identification, tracing and confiscation of proceeds or any offence or any property,
                                 equipment or device used in the commission of any offence; or

                        (c)   freezing, removal, erasure or cancellation of the services of the offender which
                                 enables the offender to either commit the offence or hide, preserve the proceeds
                                 of any offence or any property, equipment or device used in the commission of
                                 the offence.

            (2)   Any service provider who contravenes the provisions of subsection (1) of this section, commits
                    an offence and shall be liable on conviction, in the case of

                  (a)     service provider, a fine of not less than N5, 000, 00; and

                        (b)   director, manager or officer of the service provider, a fine of not less than N500,000
                                 or imprisonment for a term of not less than 3 years or to both such fine and
                                 imprisonment.

COMMENTS

Page 9, Line13 – “of” should replace “or”

19.   (1)     Any person who on the internet, intentionally takes or makes use of

                        a name, business name, trademark, domain name or other word of phrase registered,
                        owned or in use by any individual, body corporate or belonging to either the Federal, state
                        or local government without:
Page 21 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

                      (a)   authority or right; or

                      (b)   for the purpose of interfering with their use in the internet by the owner; commits an
                               offence under this Bill and shall be liable on conviction to a fine of not less than
                               N100, 000 or imprisonment for a term of not less than 1 year or to both such fine
                               and imprisonment.

            (2)    In the determination of the case against an offender, a court shall have regard to:

                      (a)   a refusal by the offender to relinquish, upon formal request by the rightful owner of
                               the name, trademark, words or phrase; or

                      (b)   an attempt by the offender to obtain compensation in any form for the release to the
                               rightful owner for use in the internet, of the name, business name, trade mark, or
                               words or phrase registered, owned or in use by any individual, body corporate or
                               belonging to either the Federal, State or Local Government of Nigeria.

            (3)    In addition to the penalty specified under this section, the court shall make an order directing
                       the offender to relinquish to the rightful owner.

COMMENTS

Page 9, Line 27 – “or” should replace “of”

Page 9, Line 29 – should it be limited to Nigerian entities alone, what of Nigeria‟s
obligations under international property treaties

 Page 10, Line 14 – should read “make an order directing the offender to relinquish it or them to the
rightful owner

20.   (1)     Any person, group or organization that intentionally accesses any

                      computer or network for purposes of terrorism, commits an offence and shall be liable on
                      conviction to a fine of not less than N10, 000,000 or a term of imprisonment of not less
                      than 20 years of to both such fine and imprisonment.

      (2)     For the purpose of this section, terrorism means any act which:

                      (a)   may seriously damage a country or an international organization; or

                      (b)   is intended or can reasonably be regarded as having been intended to:

                            (i)      intimidate a population;

                                  (ii)    compel a government or international organization to performance abstain
                                            from performing any act;

                                  (iii)   destabilize or destroy the fundamental political, constitutional; economic or
                                            social structures of a country or any internal organization, or;

                                  (iv)    otherwise influence such government or international organization.

             (c)    Involves or causes, as the case may be to:
Page 22 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

               (i)     attaches upon a person is life which may cause death,

               (ii)    attacks upon the integrity of a person;

               (iii)   kidnapping of a person,

               (iv)    destruction of a Government or public facility, including;

                                     an information system, private property, likely to endanger human life or
                                     result in major economic loss.

                           (v)     the manufacture, possession, acquisition, transport, supply, or use of
                                     weapons, explosive nuclear, biological or chemical as well as research
                                     into their development without lawful authority;

                           (vi)    the release of dangerous substance or causing of fires, explosions of flood
                                     the effect of which is to endanger human life;

                           (vii)   interference with or disruption of the supply of water, power or any other
                                      fundamental natural resource, the effect of which is to endanger life; or

                           (viii) propagation of information or information materials whether true or false,
                                    calculated to cause immediate panic, evolve violence.

COMMENTS

Page 10, Lines 23 – 24 – compel a government or international organization to
perform or abstain from performing any act

Page 10, Line 30 – clarification of the statement in this line is sort

21.   Any person who uses any computer to violate any intellectual property rights protected under any law
        or treaty applicable in Nigeria, commits an offence under this Bill and shall be liable on conviction
        to a fine of not less than N1, 000,000 or imprisonment for a term of not less than 5 years or to both
        such fine and imprisonment, in addition to any penalty or relief provided under laws.




COMMENTS

Page 11, Line 15 - The words “any intellectual property rights” is considered to be too
wide. It is also submitted that the penalty should not be uniform for all types of
intellectual property rights but should depend on the type of right infringed.

Intellectual property rights consist of but are not limited to copyrights, patents, designs,
industrial designs, semiconductor design, trade secrets and business know-how, cable
retransmission rights, satellite broadcasting rights, lending rights and rental rights. It is
suggested that the House Committee(s) seriously consider strengthening the existing
intellectual property laws especially the Nigerian Copyright Act.

According to David BainBridge, “The Copyright, Designs and Patents Act 1988 has been
used increasingly to prosecute computer software pirates and magistrates and judges
are at last taking this form of crime seriously, using custodial sentences in some cases.”
The point we wish to make from this quotation is that it is not wrong to strengthen the
Nigerian Copyright Act to make for prosecution of intellectual property rights violated
Page 23 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

using a computer by a computer. If that is done, it is very important that Nigeria
upgrade its laws on database rights to meet what obtains in other climes.

22.   Any person who use any computer to:




            (a)   engage or solicits or entices or compels any minor in any sexual or related act; or

            (b)   engage in, or facilitates any indecent exposure of a minor or creates, possesses or distributes
                    child pornography; or

            (c)   facilitates the commission of a sexual or related act which constitutes an offence under any
                     law for the time being in force in Nigeria, commits an offence and shall be liable on
                     conviction:




                     (i)    in case of paragraph (a), to a time of not less than N3,000,000 or imprisonment for a
                                term of not less than 7 years or to both such fine and imprisonment.




                     (ii)    in case of paragraph ( b, and (c), to a fine of not less than N1,000,000 or
                               imprisonment for a term of not less than 5 years or both such fine and
                               imprisonment.

COMMENTS

Page 11, Line 28 – fine should replace time

23.       Any person who:

      (a)     attempts to commit any offence under this Bill; or

      (b)     does any act preparatory to or in furtherance of the commission of

                     an offence under this Bill; and

            (c)   abets or engages in a conspiracy to commit any offence, commits an offence and shall be liable
                     on conviction to the punishment provided for such an offence, under this Bill.

COMMENTS

Page 12, Lines 4 – 5 – It is unnecessary to split/attempt to differentiate between
“attempts to commit any offence under this Bill” and “does any act preparatory to or in
furtherance of the commission of an offence under this Bill.” Case law does not support
that distinction. Case law seems to indicate that both Section 23(a) and Section 23(b)
are talking about one and the same thing. Please refer to the following cases and
statutes:

           R v Eagleton (1855) Dears CC 515,
           Section 4 Criminal Code,
           Section 508 Criminal Code,
           Section 95 Penal Code,
Page 24 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

               R v Whybrow (1951) 35 Cr App Rep 141 CCA,
               R v Robinson (1915) 2 KB 342,
               Orija v ICP 1957 NRNLR 189,
               DPP v Stonehouse 1977 2 All ER 909,
               R v Offiong 1936 3 WACA 83,
               Jones v Brooks & Brooks 1968 52 Cr App R 614.

Page 12, Line 7 - 9 – Section 23(c ) should read „aids or abets‟ the commission of an
offence, and should become Section 23 (b).

According to National Coal Board v Gamble (1959) 1 QB 11, “a person who supplies
the instrument for a crime or anything essential to its commission aids in the
commission of it; if he does so knowingly and with intent to aid, he abets it as well and
is guilty of aiding and abetting.

Attorney General’s Reference (No.1 of 1975) 1975 2 All ER 684 noted that “Aiding
and abetting almost inevitably involves a situation in which the secondary party and the
main offender are together at some stage discussing the plans which they may be
making in respect of the alleged offence, and are in contact so that each know what is
passing through the mind of the other.”

The portion of this Section on conspiracy should be separated to form a new Section
23(c) dealing with conspiracy only. This is very important because case law treats aiding
and abetting as a separate crime from conspiracy.

Additionally, the bill as presently worded does not clearly answer the following questions
raised in the book “Criminal Law Cases and Materials” published by Smith and Hogan:

               Must a principal conspirator intend to play some part in the agreed course of
                conduct? And what if he doesn‟t?
               Is “the mere fact of agreement” without intent to carry out the agreement
                enough? This is relevant when law enforcement sets up traps for an accused.
               What if the agreement was to be carried out by not a party to the agreement but
                by a third party? Please see R v Hollinshead 1985 2 All ER 701

We consider this a very relevant issue because according to the same book, the common
law position is that: “an agreement will amount to a conspiracy only if carrying it out will
necessarily amount to or involve a commission of an offence by one or more of the
parties to the crime.”

24.       (1)     The president may on the recommendation of the Agency, by order

                         published in the Federal Gazette, designate certain computer systems, networks and
                         information infrastructure vital to the national security of Nigeria of the economic and
                         social well being of its citizens, as constituting critical information infrastructure.

                (2)   The president order in subsection (1) of this section may prescribe standards, guidelines, rules
                         or procedures in respect of:

                         (a)   the registration, protection or presentation of critical information infrastructure;

                         (b)   the general management of critical information infrastructure;

                         (c)   access to, transfer and control of data in any critical information infrastructure;
Page 25 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

                    (d)   procedural rules and requirements for securing the integrity and authenticity of data
                             or information contained in any of the information;

                    (e)   procedures or methods to be used in the storage of data or information in critical
                             information infrastructure;

                    (f)   disaster recovery plans in the event of loss of the critical information infrastructure or
                             any part thereof; and

                    (g)   any other matter required for the adequate protection, management and control of
                             data and other resources in any critical information infrastructure.

COMMENTS

None

25.    The president order in section 23 of this Bill may require audits and

            inspection to be carried out on any critical information infrastructure to evaluate compliance with
            the provisions of this Bill.

COMMENTS

None

26.   (1)     Any person who violates any provision as to the critical information

                    infrastructure designated under section 23 of this Bill, commits an offence and shall be
                    liable on conviction to a fine of not less than N15,000,000 or imprisonment of a term of not
                    less than 25 years or both such find and imprisonment.

            (2)   where the offence committed under subsection (1) of this section results in serious bodily
                    injury, the offender shall be liable on conviction to a fine of not less than N20, 000,000 or
                    to imprisonment for a term of 30 years or to both such fine and imprisonment.

            (3)   where the offence committed resulted in death, the offender shall be liable on conviction to
                    imprisonment for life with no option of fine.

COMMENTS

None

27. Nothing in this Bill shall preclude the institution of a civil suit against a person liable under this Bill by
any interested party.

COMMENTS

None

28.   (1)     The Federal High Court or state High Court shall have jurisdiction to try offender under this Bill.

(2) Notwithstanding anything to the contrary, the court shall ensure that all matter brought before it
under this Bill against any person or body corporate are conducted with dispatch and given accelerated
hearing.
Page 26 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

            (3)   for the purposes of this Bill, a person shall be subject to prosecution in Nigeria for an offence
                     committed while the offender is physically located either within or outside, if by the
                     conduct of the offender or that of another acting for him;

                  (a)     the offence is committed either wholly or partly within Nigeria;

                        (b)   the act of the offender committed wholly outside Nigeria constitutes a conspiracy to
                                 commit an offence under this Bill within Nigeria; and an act in furtherance of the
                                 conspiracy was committed within Nigeria, either directly by the offender or at his
                                 instigation; or

                        (c)   the act of the offender committed wholly or partly within Nigeria constitutes an
                                 attempt, solicitation or conspiracy to commit offence in another jurisdiction under
                                 the laws of both Nigeria and such other jurisdiction.




      (4)     For the purpose of this section:

                        (a)   an offence or element of the offence is presumed to have been committed in Nigeria
                                 if the offence or any of its elements substantially affects person of interest in
                                 Nigeria;




                        (b)   where any other country claims jurisdiction over an alleged offence which is subject
                                to prosecution in Nigeria as established by this section, the Attorney General of
                                the Federation may consult with such other country with a view to determine the
                                most appropriate jurisdiction for prosecution.

COMMENTS

None

29.   (1)     Pursuant Section (2) of this section, any authorized officer entitled to

                        enforce any provision of this Bill shall have the power to search any premises or computer
                        or network and arrest any person in connection with the offence.

            (2) Subject to National Security Agency Act, an authorized officer of any law enforcement agency,
            upon a reasonable suspicion that an offence has been committed or likely to be committed by any
            person or body corporate, shall have power to:

                        (a)   access and inspect or check the operation of any computer to which this act applies;
                                 or

                        (b)   use or cause to use a computer or any device to search any data contained in or
                                available to any computer or network; or

                        (c)   use any technology to re-transform or decrypt any encrypted data contained in a
                                 computer into readable text or comprehensible format; or

                        (d)   seize or take possession of any computer used in connection with an offence under
                                 this Bill, or
Page 27 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

                 (e)    require any person having charge of or otherwise concerned with the operation of
                           any computer in connection with an offence to produce such computer; or

                 (f)    require any person in possession of encrypted data to provide access to any
                          information necessary to decrypt such data;

                 (g)    require any person in authority to release any subscriber or traffic information or any
                           related content; and

                 (h)    relate with any international law enforcement agencies for the purpose of giving or
                           receiving on information or exchanging any data or database for the purpose or
                           investigation and prosecution under this Bill.

                 (i)    The Agency shall have power to cause or direct investigation by any law enforcement
                           agency.

COMMENTS

Page 14, line 11 –The term “any authorised officer” is ambiguous. It is important for
purposes of preventing ambiguity and abuse that the definition given in Section 38 (page
17, Lines 9 -10 be tightened up. Please refer to our comments on Section 17 above for
reasons.

30.   Any person who:

        (a)   willfully obstructs any law enforcement agency in the exercise of any power under this Bill; or

        (b)   fails to comply with any lawful inquiry or request made by any authorized officer in
                 accordance with the provisions of this Bill, commits an offence and shall be liable on
                 conviction to a fine of not less than N500,000 or imprisonment for a term of not less than 3
                 years or to both such fine and imprisonment.




COMMENTS

Page 15, Line 8 – No such word as “willfully”

31.   Notwithstanding anything contained in any enactment or law in Nigeria, an information contained in
        any computer which is printed out on paper, stored, recorded or copied on any media, shall be
        deemed to be primary evidence under this Bill.

COMMENTS

Page 15, lines 15 – 18 In the light of the quote following below taken from the
document Electronic Signature Assurance the Digital Chain-of-Evidence –
Executing Legally Admissible Digitally Signed Records produced by the
Microsoft U.S. National Security Team authored by Jacques R. Francoeur, B. A.
Sc., M.A.Sc., MBA: “Electronic data also presents its own inherent risks and challenges.
Represented by a series of zeros and ones, electronic data can be volatile and unstable.
The ability of data to move between systems, applications and people can make it
difficult to differentiate between “good” (original) and “bad” (manipulated) data.
Furthermore, evidentiary techniques to determine the “provenance” of data, such as
time-of-creation and unchanged state, are often immature or non-existent. To establish
Page 28 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

the reliability of electronically signed records, mechanisms must be put in place to
prevent undetected manipulation of the electronic data’s content, and/or
evidence of the time and date created or modified.” (Italics Ours) We are of the
considered opinion that Section 31 as presently worded has not “put in place”
mechanisms to “prevent undetected manipulation of the electronic data‟s content and/or
evidence of the time and date created or modified.”

Michael I. Shamos, Ph.D., J.D. of the Institute for Software Research, School of
Computer Science, Carnegie Mellon University once noted that the purpose of evidence
is to “prove facts” and that “evidence makes the existence of fact that is of consequence
to the case either more or less probable than it would be without the evidence.” In other
words, from our point of view, Section 31 as presently worded raises questions in
relation to the standard of proof for electronic primary evidence.

The statement “notwithstanding anything contained in any enactment or law in Nigeria”
must primarily refer to the Evidence Act. The question that arises then is this, if the
Evidence Act is overridden to make electronic evidence admissible. Will the safeguards
such as relevancy, the direct evidence rule, circumstantial evidence rules, authentication
of evidence rules, chain of custody rules, best evidence rule, hearsay evidence rule, etc
established by the Evidence Act which was previously overridden now apply to such
electronic evidence?

We wish to draw the attention of the Committee to the following extract from the US
Federal Rules of Evidence 1001 (3): “if data are stored in a computer or similar device,
any printout or other output readable by sight, shown to reflect the data accurately, is
an „original‟.” This is known as the Computer “Best Evidence “Rule, in our considered
opinion Section 31 should be amended to accommodate this rule.

32. (1) Any person who tampers with any evidence in relation to any proceeding under this Bill by
intentionally:

                 (a)    creating, destroying, (mutilating, removing or modifying data or program or any other
                           form of information existing within or outside a computer or network; or

                  (b)   activating or installing or downloading or transmitting a program that is designed to
                          create, destroy, mutilate, remove or modify data, program or any other form of
                          information existing within or outside a computer or network; or

                  (c)   creating, altering, or destroying a password, personal identification number, code or
                           method used to access a computer or network.

                        Commits an offence and shall be liable on conviction to affine of not less than N500,
                          000 or to imprisonment for a term of not less than 3 years or to both such fine and
                          imprisonment.

COMMENTS

None

33.   Criminal proceedings under this Bill shall be instituted by the Agency.
Page 29 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved


COMMENTS

None

34.   (1)     The court imposing sentence on any person who is convicted of an

                     offences under this Bill may also order that the convicted person forfeits to the federal
                     republic of Nigeria:

                     (a)   any assets, money or property (real or personal) constituting of traceable to gross
                             proceeds of such offence; and




                     (b)   any computer, equipment, software or other technology used or intended to be used
                              to commit or to facilitate the commission of such offence.




            (2)   Any person convicted of an offence under this Bill shall forfeit his passport or international
                    traveling documents to the Federal Republic of Nigeria until he has paid the fines or served
                    the sentence imposed on him




            (3)   Notwithstanding subsection (2) of this section, the court may;

                     (a)   upon the grant of pardon by the president to the convicted person; or

                     (b)    the purposes of allowing the convicted person to travel abroad for medical
                              treatment, having made formal application before the court on that regard; or

                     (c)   in the public interest, direct that the passport or traveling document of the convicted
                               person be released to him.




COMMENTS

Page 16, Line 11 – Did the draftsman really mean to use the word “travelling” or did he
mean “travelling” or “travel”?

35. (1) Without prejudice to section 174 of the Constitution of the Federal Republic of Nigeria, 1999, the
Attorney General may, subject to voluntary admission of the commission of the offence, compound any
offence punishable under this Bill by accepting such amount specified as fine to which the offender would
have been liable if he had been convicted of that offence.

            (2)   Notwithstanding the provision of subjection (1) of this section, the court may order the
                    payment of compensation to any person or body corporate, who suffers damages, injury,
                    or loss as a result of the offence committed.

COMMENTS
Page 30 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

None

36.   Where a person is charged with an attempt to commit an offence under this Bill but the evidence
       establishes the commission of the full offence, the offender shall not be entitled to acquittal and
       shall be convicted for the offence and punished under the relevant penalty.

COMMENTS

None

37.   The president may by order published in the Gazette make such rules and regulations as in his opinion
        and on the recommendation of the Agency are necessary to give full effect to the provisions of this
        Bill.

COMMENTS

None

38.   In this Bill,

      “access” includes to gain entry to, instruct, make use of any resources of a computer, computer system
         or network.

      “Agency” means      Cyber Security and Data Protection Agency.

      “Authorized officer” means a person authorized by law to exercise a power this Bill

      “Authority” means express or implied consent to access a computer

                       network, program, data or database, software.

      “Computer” includes any electronic device or computational machinery

                       programmed instruction which has the capabilities of

                        storage, retrieval memory, logic, arithmetic or

                       communication and includes all input, output,

                       processing, storage, communication facilities which

                       are connected or related to such a device in a system

                       or network or control of functions by the manipulation

                       of signals whether electronic, magnetic or optical.




      “computer network” includes the interconnection of computers or computer

                       system

      “Computer program” means data or a set of instructions or statements that
Page 31 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

                     when executed in a computer causes computer to

                     perform function.

    “damage” means an impairment to the integrity or availability of data,

                     program or network.

    “data” includes a representation of information, knowledge, facts, concepts

                            or instructions intended to be processed, being

                            processed or has been processed in a network.

    “database name” includes any designation or name registered with the

                     domain registrar as part of an electronic address.

    “intellectual property rights” include any right conferred or granted under

                     any of the following laws or treaties to which Nigeria is

                     a signatory:

                   (a)    Copyright Act, CAP 68. LFN (as amended);

                   (b)    Patents and Designs Act CAP 344, LFN;

                   (c)   Trade Marks Act, CAP LFN;

                   (d)    Berne Connection;

                   (e)    World Intellectual Property Organization (WIPO)

                                           Treaty;

                   (f)    Trade-Related Aspects of Intellectual Property

                                           Rights (TRIPs);

                   (g)    Universal Copyright Convention (UCC); and

                   (h)    Paria Convention (Lisbon Text).




       “internet” means global information system linked by a unique address

                         space base on the internet protocol or its subsequent

                         extensions.
Page 32 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

       “intercept” includes the aural or acquisition of the contents of any wire,

                          electronic or oral communication through the use of

                          technical means so as to make some or all the

                          contents of a communication available to a person

                          other than whom it was intended, and includes;




                         (a)     monitoring of such communication by any device;

                         (b)     viewing, examination or inspection of the

                                               contents of any communication; and

                   (c)    diversion of any communication from its intended

                               destination.




    “Law enforcement” agency means any institution created by law and

                               charged with the responsibility of enforcing

                               obedience to our written law.




       “loss” means any reasonable lost to a victim, including the cost of

                                responding to an offence, conducting a damage

                                assessment and restoring the data, program,

                                system or information to its condition prior to the

                                offences and any revenue lost, cost incurred

                                and other consequential damages incurred

                                because of the interruption of service.




    “Minor” means                  a person under 18 years.




    “Modification” means (a) alteration or erasure of the content of any
Page 33 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

                                             program, data and data base;

                         (b) any event which occurs to impair the normal

                           operation of a computer;

                         (c) modification is unauthorized if:

                                               (i)   the person that causes the act is not himself entitled to
                                                       determine whether the modification should be made;
                                                       and




                                               (ii) he does not have consent from anybody to modify.




    “Service provider” includes but not limited to;

                   (a)     internet service provider;

                   (b)     communications service provide; and

                   (c)     application service provider.




    “Software” includes any program, data, database, procedure and

                                             associated documentation concerned with the operation of a
                                             computer system.




    “Spamming” means unsolicited electronic mail message having false

                             headers, address and lines.




    “Minister” means minister of information and communication.

COMMENTS

Page 17, Line 6 – 7 – replace “gain entry to, instruct, make” with gaining entry to,
instructing, making

Page 17, Line 13 – 18 The Committee may wish to take a second look at the definition
of “computer”: France, Germany and the UK do not define this term in their equivalent
legislation, however the United States of America does, please see the US Computer
Fraud and Abuse Act.
Page 34 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved

Page 19, Line 8 - 9 The Committee may wish to take a second look at the definition of
“software.” We propose the inclusion of the words “whether in source code or object
code form immediately after program

39.   This Bill may be cited as Cyber Security and Data Protection Agency (Establishment etc) Bill, 2008.

COMMENTS

None

CONCLUSION

We are available to provide further support and consulting to the House Committee on
Drugs, Narcotics and Financial Crimes in respect of our submissions above and thank you
for taking the time to go through this and for giving us a chance to participate in the
law-making process.

Yours faithfully
NICHE KONSULT LIMITED




Idara Akpan
CHIEF HACKING OFFICER/DIRECTOR (BUSINESS DEVELOPMENT)
Email:Idara@nichekonsult.com
Mobile: 234 805 547 7646
February 22, 2005

The Director General
Consumer Protection Council
Plot 2215, Herbert Macaulay Way
P.M.B. 5077
Wuse Zone 6
Abuja

Dear Madam,

CPC: A PRIVACY AGENDA - TO BE OR NOT TO BE?

It occurs to us that CPC, Nigeria’s premier consumer protection champion may need to
revisit her role in relation to securing consumer privacy in the information age in keeping
with Section 37 of the 1999 Constitution.

And to that end, AIIA is interested in working with CPC to create a pro-active privacy
protection agenda to meet the needs of Nigerians. Possible pro-privacy agenda initiatives
include:

   • Creating a Privacy Task Force to develop and implement the Director General’s
     Privacy Agenda
   • Developing a National Privacy Policy
   • The need for privacy awareness campaigns to enlighten the consumer as to what is at
     stake and why and of what CPC is doing in that regard
   • The Task Force should among other things spearhead the drafting of appropriate
     legislation requiring the following:
         o that organizations collecting personal information (whether online or offline)
             to create a privacy policy in line with the National Privacy Policy,
         o that a copy of such privacy policy be lodged with the CPC for its necessary
             action,
         o that such privacy policy state clearly what information is being collected, how
             it is stored, where it is stored (whether in Nigeria or elsewhere), how long it is
             stored, how it is intended to be used, and how it is actually used, whether or
             not such information is shared with third parties and on what basis/terms and
             how the information is ultimately disposed of
         o a comprehensive list of privacy breaches and appropriate fines

Thank you for taking matters a step further in our behalf.

Yours faithfully,
A.I.I. ASSOLCIATES


Barr. Ime Akpan
PRINCIPAL
PRIVACY: A BURNING CONSUMER ISSUE –
                  PRIVACY POLICY: A NATIONAL IMPERATIVE –
                       WANTED: A PRIVACY WATCHDOG

Definition of Privacy
The quality or state of being apart from company or observation. Privacy is closely
related to secrecy, that is, the condition of being concealed or hidden.

Definition of Policy
A definite course or method of action selected from among alternatives and in light
of given conditions to guide and determine present and future decisions.

A high-level overall plan embracing the general goals and acceptable procedure
especially of a governmental body

Definition of Privacy Policy
A high-level overall plan that lists both the goals of and acceptable procedures for
the collection, maintenance, use and disposal of personally identifiable customer
information in the normal course of business.

Two sides of the same coin: “Privacy as Secrecy” or Privacy as Control”
Privacy as secrecy
Private meaning personal, i.e., known only to ourselves and selected others

Privacy as control
Private meaning control, i.e., known to several others (businesses, governments,
and individuals) but usage is based on the user’s preferences and the user has
control over how his/her information is used

Why Privacy as Secrecy is giving way to Privacy as Control
“You have zero privacy anyway. Get over it.”
        - An Information Technology industry CEO to a group of reporters

The internet is like a spider web. It connects all countries, all governments, all cities,
all homes and all peoples.

Information Technology in general and the internet in particular is creating a “world
without secrets” for individuals, enterprises and governments. In this world,
enormous amounts of structured information (transactions) and unstructured
information (audio, video, and narrative text) are gathered and shared globally by
and among businesses, governments, and individuals.

Many of us are familiar with Orwell’s novel 1984, however, unlike in Orwell’s
totalitarian nightmare scenario, the monster is not Big Brother because government
has no monopoly on technology.

                            © December 20, 2004. All Rights Reserved.
                   AII Associates. Private and Confidential. Distribution Restricted
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2

Más contenido relacionado

La actualidad más candente

Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataH. T. Besik
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignmentNadeem Kazi
 
AI, Blockchain, IoT GDPR v. PIPA Compliance AT A Glance
AI, Blockchain, IoT GDPR v. PIPA Compliance AT A GlanceAI, Blockchain, IoT GDPR v. PIPA Compliance AT A Glance
AI, Blockchain, IoT GDPR v. PIPA Compliance AT A GlanceAlex G. Lee, Ph.D. Esq. CLP
 
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...Vijay Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspectiveShoeb Ahmed
 
Complying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical GuideComplying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical GuideDaniel Li
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
The Personal Data Protection Act challenge in Singapore
The Personal Data Protection Act challenge in SingaporeThe Personal Data Protection Act challenge in Singapore
The Personal Data Protection Act challenge in SingaporeJean Luc Creppy
 

La actualidad más candente (20)

Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
Forensic3e ppt ch07
Forensic3e ppt ch07Forensic3e ppt ch07
Forensic3e ppt ch07
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
AI, Blockchain, IoT GDPR v. PIPA Compliance AT A Glance
AI, Blockchain, IoT GDPR v. PIPA Compliance AT A GlanceAI, Blockchain, IoT GDPR v. PIPA Compliance AT A Glance
AI, Blockchain, IoT GDPR v. PIPA Compliance AT A Glance
 
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
 
Complying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical GuideComplying with Singapore Personal Data Protection Act - A Practical Guide
Complying with Singapore Personal Data Protection Act - A Practical Guide
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Pdpa(kewal)
Pdpa(kewal)Pdpa(kewal)
Pdpa(kewal)
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
The Personal Data Protection Act challenge in Singapore
The Personal Data Protection Act challenge in SingaporeThe Personal Data Protection Act challenge in Singapore
The Personal Data Protection Act challenge in Singapore
 

Destacado

Product advice from a dubious source
Product advice from a dubious sourceProduct advice from a dubious source
Product advice from a dubious sourceAileen Sim
 
Aromcom - Cars Air Fresheners Catalog
Aromcom - Cars Air Fresheners CatalogAromcom - Cars Air Fresheners Catalog
Aromcom - Cars Air Fresheners CatalogKirill
 
Cardiovascular system presentation.bert
Cardiovascular system presentation.bertCardiovascular system presentation.bert
Cardiovascular system presentation.bert2184692
 
Camelot & Greendale Q&A with Nathan Guy
Camelot & Greendale Q&A with Nathan GuyCamelot & Greendale Q&A with Nathan Guy
Camelot & Greendale Q&A with Nathan GuyTheThirdOption
 
AIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceAIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceCurtis Voisin
 
Teléfono Celular Mata a la Gente
Teléfono Celular Mata a la GenteTeléfono Celular Mata a la Gente
Teléfono Celular Mata a la Genterosario caceres
 
AIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceAIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceCurtis Voisin
 
Hipoglucemia junio 2015
Hipoglucemia junio 2015Hipoglucemia junio 2015
Hipoglucemia junio 2015luis mariano
 

Destacado (11)

Product advice from a dubious source
Product advice from a dubious sourceProduct advice from a dubious source
Product advice from a dubious source
 
Aromcom - Cars Air Fresheners Catalog
Aromcom - Cars Air Fresheners CatalogAromcom - Cars Air Fresheners Catalog
Aromcom - Cars Air Fresheners Catalog
 
2010
20102010
2010
 
Cardiovascular system presentation.bert
Cardiovascular system presentation.bertCardiovascular system presentation.bert
Cardiovascular system presentation.bert
 
Seguridad Vial: Espejo
Seguridad Vial: EspejoSeguridad Vial: Espejo
Seguridad Vial: Espejo
 
Camelot & Greendale Q&A with Nathan Guy
Camelot & Greendale Q&A with Nathan GuyCamelot & Greendale Q&A with Nathan Guy
Camelot & Greendale Q&A with Nathan Guy
 
Overview Of Process
Overview Of ProcessOverview Of Process
Overview Of Process
 
AIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceAIESEC Explore Program at a Glance
AIESEC Explore Program at a Glance
 
Teléfono Celular Mata a la Gente
Teléfono Celular Mata a la GenteTeléfono Celular Mata a la Gente
Teléfono Celular Mata a la Gente
 
AIESEC Explore Program at a Glance
AIESEC Explore Program at a GlanceAIESEC Explore Program at a Glance
AIESEC Explore Program at a Glance
 
Hipoglucemia junio 2015
Hipoglucemia junio 2015Hipoglucemia junio 2015
Hipoglucemia junio 2015
 

Similar a Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2

Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientErin Olson
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical OverviewErnest Staats
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesAhmad Khan
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallSplunk
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 

Similar a Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2 (20)

Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with Axcient
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Data protection act
Data protection act Data protection act
Data protection act
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 

Niche Konsult Limited Section By Section Analysis Of Cyber Security And Information Protection Agency Bill 2008 Complete Versionv2

  • 1.
  • 2. Page 1 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved NK/NASS/HR/DB/HB154/1 July 15, 2009 Honourable Rabe Nasir Chairman, House Committee on Drugs, Narcotics and Financial Crimes Rm. 3.11, New Wing House of Representatives National Assembly, 3 Arms Zone, Abuja Dear Sir, REVIEW OF DRAFT CYBER SECURITY AND INFORMATION PROTECTION AGENCY (ESTABLISHMENT, ETC) BILL 2008 – A SECTION-BY-SECTION ANALYSIS EXECUTIVE SUMMARY Niche Konsult Limited fully identifies with the aspirations that led the Chairman, House Committee on Drugs, Narcotics and Financial Crimes, the Deputy Chairman/sponsor of the Draft Cyber Security and Information Bill, Honourable Bassey Etim and his colleagues in the three Joint Committees of the House of Representatives assigned the enviable job of fashioning out a cyber security enactment for Nigeria that will stand the test of time to hold this public hearing. Niche Konsult Limited also appreciates the opportunity given its representative to make a brief presentation on the occasion of the holding of the public hearing on the above on July 8, 2009. Niche Konsult Limited chooses to style itself Nigeria‟s Information Technology Security Distributor and has partnership affiliations with several of the leading brands in the information technology security space including but not limited to the following:  Absolute Software (developers of the world‟s leading laptop tracking product) http://www.nichekonsult.com/Partners/AbsoluteSoftware/default.aspx  Acunetix (developers of the web application/website vulnerability assessment/management tool - Acunetix Web Vulnerability Scanner) http://www.nichekonsult.com/Partners/Acunetix/Default.aspx  Application Security Incorporated (the leading provider of database security solutions for the enterprise and the developers of DBProtect and AppDetectivePro) http://www.nichekonsult.com/Partners/ApplicationSecurityInc/Default.aspx  Alwil Software (developers of the popular antivirus software known as avast!) http://www.nichekonsult.com/Partners/Avast/default.aspx  BitDefender (a leading global provider of security solutions that satisfies the protection requirements of today‟s computing environment) http://www.bitdefender.com  Core Security (developer of strategic security solutions for Fortune 1000 corporations, government agencies and military organizations) http://www.nichekonsult.com/Partners/CoreSecurity/Default.aspx  eEye (a leading developer of network security products and an active contributor to network security research and education. eEye offers several award-winning solutions including Enterprise Vulnerability Assessment and Remediation Management. eEye products protect the networks and digital assets of thousands of corporate and government entities in over forty countries) http://www.eeye.com
  • 3. Page 2 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved  GFI(GFI is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs) http://www.gfi.com  Kaspersky (develops, produces and distributes information security solutions that protect customers from IT threats and allow enterprises to manage risk.) http://www.nichekonsult.com/Partners/Kaspersky/Default.aspx  McAfee (Provides anti-virus, vulnerability assessment, intrusion prevention,  and client security solutions)http://www.mcafee.com  N-Stalker (developers of the N-Stalker Web Application Security Scanner) http://www.nstalker.com  Panda (one of the world's leading creators and developers of technologies, products and services for keeping clients' IT resources free from viruses and other computer threats at the lowest possible Total Cost of Ownership) http://www.nichekonsult.com/Partners/Panda/Default.aspx  Symantec (Symantec is a global leader in infrastructure software, enabling businesses and consumers to have confidence in a connected world. The company helps customers protect their infrastructure, information, and interactions by delivering software and services that address risks to security, availability, compliance, and performance. Headquartered in Cupertino, Calif., Symantec has operations in 40 countries.) http://www.symantec.com Niche Konsult Limited has been in the information technology security business since 2002. Between then and now, Niche Konsult Limited has consulted on Information Technology security matters for two electronic cards/payment service providers, two telecommunication service providers and six of Nigeria‟s current 26 banks on Information Technology Security Solutions amongst several other clients in both the private sector and governmental circles. Niche Konsult Limited and many of our clients and potential clients are affected by the provisions of this proposed bill and so we have taken time to do as thorough a review of this bill for the benefit of the Committee, our clients and prospects. Immediately below follows our section by section analysis of the merits and demerits of the bill accompanied by suggestions/recommendations for improvement. SECTION-BY-SECTION ANALYSIS 1. (1) There is hereby established a body to be known as Cyber Security and Information Protection Agency (in this Bill referred to as “the Agency”) which shall have such functions as conferred on it by this bill. (2) The Agency: (a) shall be a body corporate with perpetual succession and a common seal; (b) may sue and be sued in its corporate have and may, for the purpose of its functions, acquire, hold or dispose of property; COMMENTS Our comprehensive study of the bill seems to indicate that there are no provisions on “Information Protection” as suggested by the title of this Bill. We consider this a very significant omission/Anomaly. For the purposes of the Committee, we wish to reproduce below the following text entitled “The Data Protection Principles” obtained from Schedule 1 to the UK Data Protection Act of 1998: 1. Personal data shall be
  • 4. Page 3 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved processed fairly and lawfully and, in particular, shall not be processed unless- (a) at least one of the conditions in Schedule 2 is met, and (b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. 4. Personal data shall be accurate and, where necessary, kept up to date. 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. 6. Personal data shall be processed in accordance with the rights of data subjects under this Act. 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. We had wanted to comment extensively in our paper on the Data Protection Provisions of the Bill, but have been forced to hold back. However, we think that it would be an anomaly in fact and law for the proposed agency to be prosecutor/investigator of cybercrimes and regulator of country‟s cyber security space on the one hand and privacy/information/data protection watchdog on the other hand at the same time. It is therefore suggested that either a new Data Protection Agency modelled after that in the UK or the Act establishing the Consumer Protection Council be amended to accommodate the functions currently being carried out by the Information Commissioner in Great Britain. We are of the considered opinion that the second option would be the preferred option since it will permit and/or extend the powers of the Consumer Protection Council to cover breaches involving personally identifiable information (PII), a
  • 5. Page 4 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved rampant from of consumer abuse and extend its turf to consumer protection matters in today‟s world of the internet and pervasive telecommunications networks, which developments the CPC Act of 1992 did not envisage nor prepare for and thus match what obtains in the United States of America in which the Federal Trade Commission (FTC) plays similar roles. We wish the committee to note that breaches of data protection laws are also considered to be violations of human rights in several countries including Austria, Canada, Denmark, France, Germany, Luxembourg, Norway, Sweden, the United Kingdom and the United States and should also be so in Nigeria. It is our wish that the Committee will recommend to the House that it adopts the attitude of the American Congress which enacted several “Special Statutes” to expand the responsibilities of the FTC with respect to Data Protection. If the House so wishes, it can maintain the current name of the CPC or change its name to Information and Consumer Protection Council (ICPC) or Information and Consumer Protection Agency (ICPA). (Please see attached some documents we sent to the CPC on these matters in February 2005.) Until Data Protection provisions are included in our laws, it will not be possible for the House of Representatives to give legal teeth and effect to Section 37 of the 1999 Constitution of Nigeria which states “The privacy of citizens, their homes, correspondence, telephone conversations and telegraphic communications is hereby guaranteed and protected.” We recommend that the Committee visits the following links for more general information on Data Protection Laws and the role(s) played by Information Commissioner who heads the UK Data Protection Agency: http://www.out-law.com/page-10137 which deals with data protection watchdogs urging The European Commission to make sure that outsourcing providers who process personal data are bound by consistent rules irrespective of whether they are based inside or outside the EU http://www.out-law.com/page-10116 which deals with breaking of the Data Protection Act by the Manchester City Council when it failed to encrypt laptop computers containing data on nearly two thousand workers. The local authority has promised to ensure all mobile computers are encrypted. http://www.timesonline.co.uk/tol/news/uk/crime/article6373645.ece which discusses the court case involving Ian Kerr who maintained a constructor worker blacklist database but failed to comply with the Data Protection Act which requires that unless very simple processing is done, all organizations handling personally identifiable information (PII) must be registered with the Agency http://www.independent.co.uk/news/uk/politics/nhs-loses-thousands-of-medical- records-1690398.html The UK Information Commissioner‟s hard knocks on the National Health Service which has been involved in some 140 data security breaches in the last four months. http://www.out-law.com/page-9965 The UK Information Commissioner comments on complaints‟ and enquiries on Google‟s Street View service
  • 6. Page 5 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved http://www.theregister.co.uk/2009/04/20/british_council_data_loss/ The UK Information Commissioner's Office comments on the loss of an unencrypted disk containing personally identifiable information on over 2,000 members of staff In closing our comments on data protection, we would like to call attention of the Committee to the distinction between a Data Protection Act and a Cyber Crime Act such as the proposed Bill. Lord HobHouse of Woodborough observed in Regina v Bow Street Metropolitan Stipendiary Magistrate and Another, ex parte Government of the United States of America 2002 2 AC 216: “As Astill J. said in Bignell's Case [1998] 1 Cr.App.R. 1, 12b, the Act of 1990 was enacted to criminalise the 'hacking' of computer systems and the Data Protection Act 1984 was enacted to criminalise improper use of data." We look forward to an opportunity to perform/conduct a Section-by-Section analysis on the Data Protection Bill as well. In respect of the controversy that arose at the public hearing on the utility of creating a new cyber security agency, I wish to draw the attention of the Committee to the following internet links which discuss the establishment of a similar agency in the UK and France: http://www.pcworld.com/article/168135/france_creates_new_national_it_security_agenc y.html http://www.ecommerce- journal.com/news/16770_france_launches_a_new_agency_to_strike_cyber_attacks http://www.ssi.gouv.fr/IMG/pdf/ANSSI_PRESS_RELEASE.pdf http://news.cnet.com/8301-1009_3-10272925- 83.html?part=rss&subj=news&tag=2547-1009_3-0-20 http://www.scmagazineuk.com/UK-cyber-security-strategy-launched/article/139033/ http://www.theregister.co.uk/2009/06/25/uk_cyber_security_strategy/ 2. (1) The Agency shall consist of: (a) the Chairman of the agency shall be the National Security Adviser; (b) Executive Vice chairman to be appointed by the president, who shall be: (i) a retired or serving member in any security agency of the Federation not below the rank of deputy commissioner of police or it’s equivalent, with cybersecurity experience (ii) a lawyer with not less than 10 years post call experience, who must be an expert in cybersecurity (iii) responsible for the day to day running of their affairs of the Agency. (c) a representative each of the following Federal Ministries.
  • 7. Page 6 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved (i) commerce, industry; (ii) science and technology; (iii) justice; (d) The Executive Vice Chairman and members of the Agency, other than ex-officio shall each hold office for a period of four years and may be re-appointed for one further term. (e) a representative each from the following organizations: (i) the department of state security services; (ii) the Nigerian police force; (iii) the Nigeria communications commission; (iv) the Nigeria Security & civil Defence Corps and (2) Four persons whom: (a) two must be experts in telecommunication with not less than 10 years experience (b) two computer scientists with specialization in cyber crime with not less than 10 years experience (3) The Executive Vice Chairman and four other members of the agency shall be appointed by the president subject to confirmation by the senate. (4) The Executive Vice Chairman appointed pursuant to sub-section (1) of this section shall be the chief executive of the agency and shall be responsible for the day to day running of its affairs. COMMENTS Page 1, Line 7 - missing word after corporate “name”, then a comma after name Page 1, Line 9- should read “The Agency shall consist of the following” Page 1, Line 10 – should read “the Chairman of the Agency who shall be the National Security Adviser” Page 1, Line 14 – which did the draftsman mean “its” or “it‟s” – these two words are commonly confused Page 1, Lines 11 – 18 – What is the rationale for limiting the Office of the Executive Vice Chairman to a “retired or serving member in any security agency of the Federation”? And how do we define the phrase “with cyber security experience”? And how do we measure such experience? If this becomes law as passed, then a large pool of talent has been automatically disenfranchised from this position. That the head should be a lawyer just makes sense given the fact that this is not just about technology but how technology meets the law and vice versa, there is no objection to lines 16 and 17 as they stand. The Committee is well advised to conduct an audit of all “retired or serving
  • 8. Page 7 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved members in any security agency of the Federation not below the rank of deputy commissioner of police or its equivalent” in order to find how many of them currently have “cyber security experience” to be assured that there will always be a pool of them to drawn from. Page 1, Line 15 – It is important to decide which is preferred “cyber security” as one word or “cyber security” as two words. Please see also Page 1, Line 1 Page 2, Line 5 – the word “members” is missing after ex-officio Page 2, Line 15 – It is important to decide which is preferred “cybercrime” as one word or “cyber security” as two words Page 2, Line 19 –replace underscore between “sub_section” with “sub-section” 3. (1) A member of the agency may at any time resign his office in writing addressed to the president and may be removed from office because of: (a) infirmity of mind or body; (b) permanent incapacity; or (c) any other reason subject to confirmation by the senate. (2) Members of the agency shall be paid such allowances as may be determined by the salary and wages Commission. COMMENTS None 4. The Agency shall be responsible for the: (a) enforcement of the provision of this bill (b) investigation of all cyber crimes (c) adoption of measures to eradicate the commission of the cyber crimes; (d) examination of all reported cases of cyber crimes with the views to identifying individuals, corporate organization involve in the commission of the crime; (e) registration and regulations of service providers in Nigeria with the views to monitor their activities; organizing and undertaking campaigns and other forms of activities as will lead to increased public awareness on the nature and forms of cyber crimes; and (g) maintaining a liaison with the office of the Attorney General of the Federation, and inspector General of police on the arrest and subsequent prosecution of the offenders. COMMENTS
  • 9. Page 8 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved Page 2, Line 31 – should read “enforcement of the provisions of this Bill” Page 3, Line 2 – should read “…to eradicate the commission of cyber crimes” Page 3, Lines 3 – 5 – How does the House of Representatives purport to handle the conflict between the powers given to the EFCC first under the Advance Fee Fraud and other Related Offences Act No 13 of 1995 (now repealed), and the Advance Fee Fraud and other related Offences (Amendment) Act 2005 (now repealed) and now the Advance Fee Fraud and Other Related Fraud Offences Act 2006 which has placed certain obligations on banks and other financial and designated non financial institutions, telecommunications companies, internet service providers, cybercafé operators, property owners, transporters, etc and which provisions are enforced by the EFCC? Page 3, Lines 3 – 5 – In line 3 mention is made of “cyber crimes” and in line 5 “the crime”. It is suggested that lines 3 to 5 should read “examination of all reported cases of cybercrimes with a view to identifying individuals, corporate organizations (and not organization) involved (and not involve) in the commission of the crimes (and not crime) Page 3, Lines 6-9- The House of Representatives may wish to remember that the Advanced Fee Fraud and Other Related Fraud Offences Act 2006 also gave the EFCC the power to register internet service providers and cybercafés. Pursuant to the powers granted the EFCC under that Act, the EFCC held a series of meetings with stakeholders, including the Internet Service Providers Association of Nigeria (ISPAN), Association of Cybercafé and Telecentre Operators of Nigeria (ACTONigeria), Private Telecoms Operators (PTOs) and Global System for Mobile Communication (GSM) operators. Following such meetings a number of resolutions were agreed for immediate implementation: 1. All Internet Service Providers (ISPs), and cybercafé operators providing services in Nigeria must be registered with the Corporate Affairs Commission (CAC), Nigerian Communications Commission (NCC) and EFCC; 2. All upstream Internet Service Providers rendering services to Internet Service Providers and Cybercafés in Nigeria, must be physically located and be registered and licensed as Internet Services Providers (ISPs) above; 3. All users of Internet services must migrate to Internet Service Providers registered with EFCC and licensed by NCC 4. Registration with EFCC shall be online at www.efccnigeria.org/operators within the periods stated below: Internet Service Providers: July 25 September 7, 2006 Cybercafé Operators: September 8 – November 24, 2006 Source: Daily Trust, Tuesday, July 25, 2006 page 32 Bearing in mind the above and the interpretation of “service provider” in Section 38 of this bill (page 19 lines 4 to 7) virtually any organization that provides internet access is required to register. It seems to the undersigned that this provision is unnecessary as it should not be a requirement and indeed is not a required for this law to have effect or take effect. To that extent, we think that the first two words of line 6, page 3 should be expunged. Page 3, Lines 6 – 9 – the word “regulations” should be replaced with “regulation” Page 3, Line 11 – “Inspector” should replace “inspector”
  • 10. Page 9 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved Page 3, Line 10 – 12 It is suggested that the list should be expanded to read: “Maintaining a liaison with the Office of the Attorney General of the Federation, the Inspector General of Police and the Executive Chairman of the Economic and Financial Crimes Commission on the arrest and subsequent prosecution of the offenders. The rationale for this suggestion is that until this Bill is passed into law, the EFCC has been acknowledged as the premier cybercrime fighting agency and will so be until this Bill makes the proposed “Cyber Security and Information Protection Agency” to upstage it. So this suggestion just makes sense for purposes of continuity. Finally, it is suggested a new sub-section 4(h) be included giving the proposed agency powers to oversee cyber security across the government in the manner and fashion proposed by President Obama in relation to his proposed Cyber Security Coordinator for the White House. 5. (1) In execution of its functions and powers under this Bill, the Agency may appoint: (a) persons or second officers from government security or law enforcement agencies; and (b) specialist in the area of communication, science and technology, law, which will assist the agency in the performance of its functions. (2) The agency may, make staff regulations relating generally to the conditions of service of the employees, and such regulations may provide for: (a) the appointment, promotion and disciplinary control; and (b) appeals by such employees against any disciplinary measures taken against them, shall be regulated by the provision of the civil services rules, until such regulations are made. (3) Service in the agency shall be public service for the purposes of pension Act. COMMENTS Page 3, Line 17 - specialists should replace specialist; telecommunications should replace communication Page 3, Line 26 - Pension should replace pension 6. The Agency shall maintain a fund which shall consist of: (a) money to be received from the federal government for the purposes of take off; (b) proceeds from all activities, services and operations of the Agency. (c) grants, gifts and donations made to the Agency. (d) such other sums as may accrue to the Agency. COMMENTS
  • 11. Page 10 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved None 7. (1) Any person who without authority or in excess of his authority accesses any computer for the purpose of: (a) securing access to any program; or (b) data held in that computer; or (c) committing any act which constitute an offence under any law for time being in force in Nigeria, commits an offence and shall be liable on conviction: (i) in the case of offence in paragraph (a) of this subsection, to a fine of not less than N10,000 or imprisonment for a term of not less than 6 months or to both such fine and imprisonment. (ii) For the offence in paragraph (b), to a fine of not less N100, 000 or a term of not less than 1 year or to both such fine and imprisonment. (2) Where damage or loss is caused to any computer as a result of the commission of an offence under subsection (1) of this section, the offender shall be liable to a fine of not less than N1,000,000 or imprisonment for a term of not less than 5 years or to both such fine and imprisonment. (3) In pronouncing sentence under this section, the court shall have regard to the extent of damage or loss occasioned by the unlawful act. COMMENTS Page 4, lines 2 – 19 – Section 7 creates the offences of “access without authority” or access “in excess of his authority.” It is suggested that a new offence be created and made Section 7(3) and make the present Section 7(3) become Section 7(4). The proposed new offence is “access with authority for an unauthorised purpose.” To illustrate, imagine a Policeman using his access to police computers to obtain information on a guy who took over his girlfriend, or imagine an officer attached to the Federal Inland Revenue Service using his ”access with authority” to snoop on tax files of politically exposed personalities or of other public figures or a civil servant with access with access to personally identifiable information at the National Identity Management Commission/National Pension Commission misusing his/her “access with authority” in a similar manner. It is submitted that Section 7 as currently constituted does not provide for such a possibility. The House of Representatives is well advised to study the startling ruling in DPP v Bignell (1998) 1 Cr App R 1 and the public hue and cry that followed that ruling since it affects the issue raised above. To quote the summary of that case provided by David I Bainbridge in his book “Introduction to Computer Law” published by Longman in 2000 on pages 312 -313: “Two police officers had used the police national computer to gain access to details of motor cars which they had wanted for private purposes unconnected with their duties as police officers. They were charged with the unauthorised access to computer material offence
  • 12. Page 11 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved under Section 1 of the Computer Misuse Act 1990… From the reported facts of the case, it would seem beyond doubt that the accused police officers had consciously and deliberately misbehaved … by using the police national computer to gain access to information to be used for their own private purposes.” (Italics Ours) This is very important because insiders have time again been proved to be the greatest security threat an organization can face. In the alternative, an entirely new Section should be created for the offence of “access with authority for an unauthorised purpose.” Page 4, line 6 – constitutes should replace constitute Page 4, line 10 – did the draftsman mean M10, 000.00 or 10,000 Naira Page 4, line 14 – Since the value of a computer is not so much in the hardware but in the software and data resident therein, it is suggested that the words “or its contents” immediately after computer 8. (1) Any person who, knowingly and without authority or in excess of authority, disclose any: (a) password; (b) access code; or (c) any other means of gaining access to any program data or database held in any computer for any unlawful purpose or gain, commits an offence and shall be liable on conviction to a fine of not less than N500,000 or to imprisonment for a term of not less than 3 years or to both such find and imprisonment, and in the case of a second or subsequent conviction, to a fine not exceeding N1,000,000 or to imprisonment for a term of not less than 5 years or both such fine and imprisonment. (2) Where the offence under subsection (1) results in damage or loss, the offender shall be liable to a fine of not less than N1,000,000 or imprisonment for a term of not less than 5years or both such fine and imprisonment. (3) Any person who with intent to commit any offence under this Act uses any automated means or device or any computer program or software to: (a) retrieve; (b) collect; and (c) store password, access code; or any means of gaining access to any program, date or database held in any computer, commits an offence and shall be liable on conviction to a fine of N1, 000,000 or to imprisonment for a term of 5 years or to both such fine and imprisonment. COMMENTS
  • 13. Page 12 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved Page 4, line 21 – discloses should replace disclose Page 4, line 24 – “any other means of gaining access to any program data or database” should instead read “any other means of gaining access to any program, data, or database” 9. (1) Any person who with intent to defraud send electronic mail message to a recipient, where such electronic mail message materially misrepresents any fact or set of facts upon which reliance the recipient or another person is caused to suffer any damage or loss, commits an offence and shall be liable on conviction to a fine of not less than 5 years or to both such fine and imprisonments. (2) It shall not operate as a defense for any person charged with an offence under subsection (1) of this section to claim that: (a) he could not have carried out his intended act; or (b) it is impossible to execute the ultimate purpose of his intention; or (c) the object of his deceit is non-existent. (3) Any person spamming electronic mail messages to receipts with whom he has no previous commercial or transactional relationship commits an offence and shall be liable on conviction to a fine not less than N500, 000 or imprisonment for a term of not less than 3 years or to both such fine and imprisonment. (4) Any person who with intent to commit any offence under this Bill; (a) uses any automated means, device; or (b) any computer program, software; to collect or store electronic mail addresses from any sources whatsoever, commits an offence and shall be liable on conviction to a fine not less than N1,000,000 or to imprisonment for a term not below 5 years or both such fine and imprisonment. COMMENTS Page 5, Lines 12 – 31 Does the wording of Section 9 (1) as presently constituted cover the unsolicited delivery of advertisements via mobile text messages, e-mail, fax and automatic dialling systems or just emails? Especially when read with the definition of the word “Spamming” as contained in Section 38 under Interpretation (page 19, lines 10 – 11) The use of the words “materially misrepresents any fact or set of facts” is very limiting because an email may not materially misrepresent any fact or sets of facts and yet be spam although not fraudulent. It is suggested that Section 9 be re-drafted to cover both fraudulent and non-fraudulent spam, and to extent to unsolicited communication irrespective of channel such as text messages, email, fax, and automate dialling systems. This is the position adopted by the Amendment 40 to the Communications Law of Israel. To illustrate that it is necessary to expand the definition of spam, between the date of the public hearing and date, the undersigned has received 12 messages with identical content from a very well know beer brand in Nigeria
  • 14. Page 13 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved celebrating its 60th anniversary and inviting him to answer 3 questions correctly to win a chance to be a part of the celebration. Finally, the Bill as presently worded does not make blackmail via email a crime, the Committee would do well to look into this matter with a view to including it in the proposed legislation. Section 9 (3) is unduly restrictive. This is the case because it is not just Advance Fee Fraud Practitioners that need to reach out to potential targets through the medium of electronic mail messages, even legitimate advertisers often have course. The House of Representatives may wish to take a cue from the “Amendment 40 to the Communications Law of Israel” which permits an advertiser to contact a business recipient just once per recipient with the question whether they agree to receive advertisements from that advertiser. The law also permits an advertiser to send advertisements to the recipient even if they were not explicitly solicited, in cases when prior business relations have existed between the advertiser and the recipient and the recipient is the one who provided his/her mailing/messaging details to the advertiser. But even then – as well as for any case where the recipient has given consent to receiving advertisements – still the recipient has the right, under the law, to inform the advertiser of his refusal to receive any more advertisements. Such refusal notice will cancel the validity of the previous consent. For more information, the committee may wish to refer to http://www.moc.gov.il/sip_storage/FILES/5/1545.pdf The Israeli law also requires advertisers to include in a commercial message the word "advertisement" and the advertiser's name, address and contact information, including an email address that recipients may use to opt out. The Israeli law enforces the prior consent requirement which may be in writing or a recorded call to receive electronic mail messages The modifications suggested above are required for the law to balance the need to protect citizens and strike a balance with respect to the requirements of legitimate business concerns to advertise. 10. (1) Any person who, with the intent to commit an offence, uses any computer program or software to deliberately block being traced or avoid detection, commits an offence and shall be liable on conviction to a fine of not less than N500,000 or imprisonment for a term of not less than 3 years or both such find and imprisonment. (2) Any person who knowingly accesses any computer and inputs, alters, deletes or suppresses any data resulting in unauthentic data with the intention that such inauthentic data be considered or acted upon as if it were authentic or genuine, whether or not such data is readable or intelligible, commits an offence and shall be liable on conviction to a fine of not less than N500,000 or imprisonment for a term of not less than 3 years or both such fine and imprisonment. (3) Any person who knowingly and without right causes any loss of property to another by altering, erasing, inputting or suppressing any data held in any computer for the purpose of
  • 15. Page 14 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved conferring any benefits whether for himself or another person, commits an offence and shall be liable on conviction to a fine of not less than N500, 000 or imprisonment for a term of not less than 3 years or both such fine and imprisonment. COMMENTS Page 6, Lines 1 – 2 The side note accompanying these lines are most deceptive. It is submitted that it should be renamed/replaced with “Illegitimate/ Illegal use of proxies.” Page 6, Lines 6, 7- The side note that is currently situated at Lines 1 and 2 should be moved to Lines 6 and 7. Page 6, Lines 6 – 12 -The House of Representatives may wish to note that David I Bainbridge in the Fourth Edition of his book “Introduction to Computer Law” observed “The phrase „computer fraud‟ is used to describe stealing money or property by means of a computer; that is, using a computer to obtain dishonestly, property (including money and cheques) or credit or services or to evade dishonestly some debt or liability.” In the light of the above description, it is obvious that there is an overlap between the Offences which can be committed under the Advance Fee Fraud and Other Fraud Related Offences Act 2006. In other words, what happens if the offence of obtaining property be false pretence is committed using the computer, the question then arises: „Which agency investigates‟? Which agency prosecutes? Is it the Economic and Financial Crimes Commission? Or the proposed “Cyber Security and Information Protection Agency”? Or both? If both, which agency will act as the lead? This is an area of potential conflict and unwarranted and wasteful duplication of resources which the House of Representatives may which to address. In doing so, we recommend studying the provisions of the following UK Acts and cases:  The Theft Act  Finance Act 1972  DPP v Ray (1974) AC 370  Davies v Flackett (1973) RTR 8  R v Preddy (1996) AC 815  Criminal Law Act 1977  Criminal Attempts Act 1981  Scott v Metropolitan Police Commissioner (1975) AC 819  R v Lloyd (1985) 2 All ER 661  R v Ghosh (1982) QB 1053  Chan Man-sin v Attorney-General for Hong Kong (1988) 1 All ER 1  R v Morris (1984) AC 320  Lawrence v Metropolitan Police Commissioner (1972) AC 626  R v Mavji (1987) 2 All ER 758  Computer Misuse Act 1990  and the equivalent Nigerian Acts 11. (1) Any person who without authority or in excess of authority interferes with any computer network in such a manner as to cause any data or program or software held in any computer within the network to be modified, damaged, suppressed, destroyed, deteriorated or otherwise rendered ineffective, commits an offence and shall be liable on
  • 16. Page 15 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved conviction to a fine of not less than N1, 000,000 or imprisonment for a term of not less than 5 years or to both such fine and imprisonment. COMMENTS Page 6, Line 22 – It is suggested that the word “Deteriorated” is out of place and should be deleted. While the word “ineffective” should be replaced with “unusable” 12. Any person who unlawfully produces, adapts or procures for use, distributes, offers for sale, possesses or uses any devices, including a computer program or a component or performs any of those acts relating to a password, access code or any other similar kind of data, which is designed primarily to overcome security measures with the intent that the devices be utilized for the purpose of violating any provision of this Bill, commits an offence and is liable to a fine of not less than N1,000,000 or imprisonment for a term of not less than 5 years or to both such fine and imprisonment. COMMENTS Page 6, Lines 26 – 31, Page 7,lines 1 – 2 – It is submitted that the House of Representatives should re-consider the text of Section 12 with a view to making a very clear distinction between things that can be used to overcome security measures but which have legitimate uses and things specifically designed to overcome security measures. The following cases are quite instructive in that regard: Amstrad Consumer Electronics PLC v the British Phonograph Industry Limited (1986) FSR 159, CBS Songs Limited v Amstrad Consumer Electronics PLC (1988) 2 WLR 1191 To illustrate practically what is meant by the above, Niche Konsult Limited conducts penetration testing as well as offers for sale software and hardware capable of being used to violate some provisions of this Bill, but such software was not “designed primarily to overcome security measures with the intent that the devices be utilized for the purpose of violating any provision of this Bill.” On the other hand, the same software/hardware is being legitimately employed by transportation, healthcare, financial institutions, information technology security consultants, payment processors, telecommunication firms, large enterprises, state governments, educational institutions, military academies within and outside Nigeria to conduct comprehensive penetration testing across their infrastructure and applications. One such solution goes by the name Core Impact Pro and can be used to perform penetration testing* which tells organizations using it:  what an attacker can definitely do to their network  by exploiting identified vulnerabilities, just as a hacker would  leaving little doubt as to what a hacker can do or cannot do and thus eliminating the guesswork involved in protecting their network by providing them with the information they need to effectively prioritize their vulnerabilities. * Penetration testing is a localized, time-constrained, and authorized attempt to breach the security of a system using attacker techniques. During a penetration test, organizations actually try to replicate in a controlled manner, the kinds of access an intruder or worm could achieve. With a penetration test, network managers can identify what resources are exposed and determine if their current security investments are detecting and preventing attacks.
  • 17. Page 16 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved 13. Any person who without authority or in excess of authority intentionally interferes with access to any computer or network so as prevent any: (a) part of the computer from functioning; or (b) denying or partially denying any legitimate user of any service of such computer or network; commits an offence and shall be liable on conviction to a fine of not less than N2,000,000 or imprisonment for a term of not less than 7 years or to both such fine and imprisonment. COMMENTS Page 7, lines 3 – 9 It is suggested that a new Head Note to be called “Denial of Service/Distributed Denial of Service Attack(s)” Page 7, line 5 – It is suggested that the words “or network” be inserted immediately after computer 14. Any person who with the intent to deceive or defraud, accesses any computer or network and uses or assumes the identity of another person, commits an offence and shall be liable on conviction to a fine of not less than N500, 000 or imprisonment for a term of not less than 3 years or to both such fine and imprisonment. COMMENTS Page 7, Lines 10 – 14 - The Houses of Representatives may wish to compare and contrast the wordings of Section 14 of this Bill with the wordings of Section 202 of the Norwegian Criminal Law (2008 – 2009) which when translated states: “With a fine or imprisonment not exceeding 2 years shall whoever be punished, that without authority possesses of a means of identity of another, or acts with the identity of another or with an identity that easily may be confused with the identity of another person with the intent of (a) procuring an economic benefit for oneself or for another, or (b) causing a loss of property or inconvenience to another person.” Source: http://www.cybercrimelaw.net 15. (1) Every service provider shall keep all traffic, subscriber information or any specific content on its computer or network for such period of time as the Agency may require. (2) Every service provider shall, at the request of any law enforcement agency: (a) provide the law enforcement agency with any traffic of subscriber information required to be kept under subsection (1) of this section; or (b) preserve, hold or retain any related content. (3) Any law enforcement agency may with warrant issued by a court of competent jurisdiction, request for the release of any information in respect of subsection (2) (b) of this section and it shall be the duty of the service provider to comply.
  • 18. Page 17 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved (4) Any data retained, processed or retrieved by the service provider for the law enforcement agency under this Bill, shall not be utilized except for legitimate purposes either with the consent of individuals to whom the data applies or if authorized by a court of competent jurisdiction. (5) A person exercising any function under this section shall have due regard to the individual right to privacy under the constitution of the Federal Republic of Nigeria 1999 and shall take appropriate technological and organizational measure to safeguard the confidentiality of the data retained, processed or retrieved for the purpose of law enforcement. (6) A person or service provider, body corporate who willfully contravenes the provisions of this section commits an offence and shall be liable on conviction to a fine of not less than N500,000 or imprisonment for a term not less than 3 years or both fine and imprisonment. COMMENTS Page 7, Lines 15 – 17 – There should be a side note “Records Retention for law enforcement”. This also raises the question “who bears the cost?” The service provider or the government? This issue is very important because given the cost of the devices required to fulfil the requirements of this section, small players may be edged out of business. Neither does it make sense in a time of economic gloom such as this to pass on such costs to the end-user. It is also suggested that the words “for such period of time as the Agency may require” be replaced by the words “for two years.” This will be in line with a Directive issued by the European Union on data retention which although not binding on Nigeria is evidence of best practice. That Directive requires retaining such records for a minimum of six months and a maximum of two years. Page 7, Line 19 – The words “and backed with a warrant issued by a court of competent jurisdiction which shall be issued when there is compelling evidence that a crime is imminent” should be introduced immediately after agency. This is required for uniformity of Section 15 (2) (a) with Section 15 (2) (b). This is required to keep with international best practice. The House of Representatives may wish to recall the hue and cry over the high-handedness of the EFCC in the recent past, which was made possible by provisions such as the below which was contained in the Advance Fee Fraud and Other Offences Act 2006, under duties of telecommunications and internet service providers and internet cafes we have the following provision: “Any person whose normal course of business involves the provision of non-fixed line or Global System of Mobile Communications (GSM) or is in the management of any such services, shall submit on demand to the Commission such data and information as are necessary or expedient for giving full effect to the performance of the functions of the Commission under this Act. Inserting the above will provide for much needed checks and balances on the power of the Executive as represented by the proposed agency. The House of Representative may also which to consider amending the above provision in the Advance Fee Fraud and Other Offences Act 2006 as well to allow of checks on the power of the agency by the judicial arm of the government. Page 7, Line 22 – It is suggested that the words “preserve, hold or retain any related content” be expunged from this bill. What this means in practice is that service providers would be required to keep a copy of every email sent/received, every instant message, every text message, every call made, every web page viewed to mention but a few. Of course, it is not in doubt that service providers already have this information. However,
  • 19. Page 18 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved rather than giving such retention legitimacy, it is recommended that the Committee should consider this an opportunity to enact an electronic communications/email archival legislation which always places the obligation of such archival on the organization sending or receiving the email and not on the service provider, and limit the service provider to retaining only to traffic and subscriber information. This will distribute the cost of such data retention much more evenly and reduce the likelihood of the general public thinking that Nigeria‟s government is desirous of creating a police state. The Committee would also like to note that the UK Communications Bill currently under consideration which proposes to amend the UK Regulation of Investigatory Powers Act (RIPA) does not propose the retention of content by service providers. It is suggested that the Committee should expunge this provision. Please see http://www.examiner.ie/ireland/retention-period-for-phone-data-to-be-cut-96213.html http://www.siliconrepublic.com/news/article/13407/government/irish-govt-to-retain-all- web-text-and-phone-data-for-two-years http://www.examiner.ie/ireland/watchdog-concern-at-revenue-data-access-96329.html http://www.scmagazineuk.com/Government-lines-up-central-database-of-phone-and- internet-records/article/110337/ http://news.bbc.co.uk/2/hi/technology/7410885.stm The Committee might also like to make very clear with it means by traffic information. The UK Communications Bill and Data Retention Directive help here because they define traffic information to include the initiator of the communication, the recipient of the information, the time of the communication, the duration of the communication, the location of the initiator and the recipient, the type of communication. Page 7, Line 27 – 30 – It is suggested that the wordings of Section 15 (4) be revisited. In particular the words “…shall not be utilized except for legitimate purposes either with the consent of individuals to whom the data applies or if authorized by a court of competent jurisdiction.” Page 7, Line 31 – The words “or organization” should be inserted immediately after “person” Page 8, Line 5 – No such word as “willfully”, but there is a word “wilfully” 16. (1) A person who intentionally, without authority or in excess of authority intercepts any communication originated, terminated or directed from, at or to any equipment, facilities or services in Nigeria, commits an offence and shall be liable on conviction to; (a) a fine of not less than N500, 000; (b) imprisonment for a term of not less than 10 years; or (c) both such fine and imprisonment.
  • 20. Page 19 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved (2) Notwithstanding the provision of subsection (1) of this section, any service provider, its employee or duly authorized agent may, in the normal course of work, carryout the activity mentioned in section 16 of this Bill. COMMENTS None 17. Every service provider shall ensure that any of its equipment, facilities or services that provides a communication is capable of: (a) enabling a law enforcement agency to intercept all communications on its network for the purpose of investigation and prosecution; (b) accessing call data or traffic record; (c) delivering intercepted communications and call data or traffic record in such a format that they may be transmitted by means of equipment, facility or service procured by any law enforcement agency to a location other than the premises of the service provider; and (d) facilitating authorized communications interceptions and access to call data or traffic records unobtrusively with minimum interference with any subscriber’s communication service and in a manner that protects: (i) the privacy and security of communications and call data or traffic records not authorized to be intercepted. (ii) information regarding the interception. (2) A service provider who contravenes the provision of subsection (1) of this section, commits an offence and shall be liable on conviction, in case of; (a) service provider, a fine of not less than N100, 000; and (b) director, manager or officer of the service provider, a fine of not less than N500,000 or imprisonment for a term of not less than 3 years or to both such fine and imprisonment. COMMENTS We appreciate the need to ensure that the equipment deployed by service providers have on-going intercept capabilities, as well as the obligations placed on service providers to enable/facilitate lawful interception and to deliver intercepted communications in the course of a lawful investigation. The provisions of Section 17 as presently constituted and Section 17(d)(i) and Section 17(d)(ii) notwithstanding, it is sad that the House of Representatives is giving the proposed agency what may be likened to a blank cheque. We are not against lawful interception, but we strongly urge the insertion of the following “such interception to be carried out by the Agency shall be lawful if accompanied by a warrant issued by a judge of a Federal or State High Court. Please compare with the UK Regulation of Investigatory Powers Act 2000, Section 2 Interception of Communications Act 1985, Malone v United Kingdom (1984) 7 EHRR 14
  • 21. Page 20 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved Please see evidence of misuse of such provisions as the above in the UK, the Committee may wish to ensure that the bill does not make this a possibility in Nigeria: http://news.bbc.co.uk/1/hi/england/dorset/7341179.stm http://www.theregister.co.uk/2008/04/11/poole_council_ripa/ http://news.bbc.co.uk/1/hi/england/dorset/7343445.stm http://www.schneier.com/blog/archives/2007/11/animal_rights_a.html http://www.out-law.com/page-9956 http://www.vnunet.com/computing/news/2240543/government-announces-review http://nds.coi.gov.uk/Content/Detail.asp?ReleaseID=398807&NewsAreaID=2 The Committee may which to compare and contrast the provisions of this Section with the provisions of Sections 165 – 176 of the Evidence Act dealing with Official and Privileged Communications to ensure that there is no conflict. 18. (1) It shall be the duty of every service provider at the request of any law enforcement agency or at the initiative of the service provider, to provide assistance towards the: (a) identification, arrest and prosecution of offenders; or (b) identification, tracing and confiscation of proceeds or any offence or any property, equipment or device used in the commission of any offence; or (c) freezing, removal, erasure or cancellation of the services of the offender which enables the offender to either commit the offence or hide, preserve the proceeds of any offence or any property, equipment or device used in the commission of the offence. (2) Any service provider who contravenes the provisions of subsection (1) of this section, commits an offence and shall be liable on conviction, in the case of (a) service provider, a fine of not less than N5, 000, 00; and (b) director, manager or officer of the service provider, a fine of not less than N500,000 or imprisonment for a term of not less than 3 years or to both such fine and imprisonment. COMMENTS Page 9, Line13 – “of” should replace “or” 19. (1) Any person who on the internet, intentionally takes or makes use of a name, business name, trademark, domain name or other word of phrase registered, owned or in use by any individual, body corporate or belonging to either the Federal, state or local government without:
  • 22. Page 21 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved (a) authority or right; or (b) for the purpose of interfering with their use in the internet by the owner; commits an offence under this Bill and shall be liable on conviction to a fine of not less than N100, 000 or imprisonment for a term of not less than 1 year or to both such fine and imprisonment. (2) In the determination of the case against an offender, a court shall have regard to: (a) a refusal by the offender to relinquish, upon formal request by the rightful owner of the name, trademark, words or phrase; or (b) an attempt by the offender to obtain compensation in any form for the release to the rightful owner for use in the internet, of the name, business name, trade mark, or words or phrase registered, owned or in use by any individual, body corporate or belonging to either the Federal, State or Local Government of Nigeria. (3) In addition to the penalty specified under this section, the court shall make an order directing the offender to relinquish to the rightful owner. COMMENTS Page 9, Line 27 – “or” should replace “of” Page 9, Line 29 – should it be limited to Nigerian entities alone, what of Nigeria‟s obligations under international property treaties Page 10, Line 14 – should read “make an order directing the offender to relinquish it or them to the rightful owner 20. (1) Any person, group or organization that intentionally accesses any computer or network for purposes of terrorism, commits an offence and shall be liable on conviction to a fine of not less than N10, 000,000 or a term of imprisonment of not less than 20 years of to both such fine and imprisonment. (2) For the purpose of this section, terrorism means any act which: (a) may seriously damage a country or an international organization; or (b) is intended or can reasonably be regarded as having been intended to: (i) intimidate a population; (ii) compel a government or international organization to performance abstain from performing any act; (iii) destabilize or destroy the fundamental political, constitutional; economic or social structures of a country or any internal organization, or; (iv) otherwise influence such government or international organization. (c) Involves or causes, as the case may be to:
  • 23. Page 22 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved (i) attaches upon a person is life which may cause death, (ii) attacks upon the integrity of a person; (iii) kidnapping of a person, (iv) destruction of a Government or public facility, including; an information system, private property, likely to endanger human life or result in major economic loss. (v) the manufacture, possession, acquisition, transport, supply, or use of weapons, explosive nuclear, biological or chemical as well as research into their development without lawful authority; (vi) the release of dangerous substance or causing of fires, explosions of flood the effect of which is to endanger human life; (vii) interference with or disruption of the supply of water, power or any other fundamental natural resource, the effect of which is to endanger life; or (viii) propagation of information or information materials whether true or false, calculated to cause immediate panic, evolve violence. COMMENTS Page 10, Lines 23 – 24 – compel a government or international organization to perform or abstain from performing any act Page 10, Line 30 – clarification of the statement in this line is sort 21. Any person who uses any computer to violate any intellectual property rights protected under any law or treaty applicable in Nigeria, commits an offence under this Bill and shall be liable on conviction to a fine of not less than N1, 000,000 or imprisonment for a term of not less than 5 years or to both such fine and imprisonment, in addition to any penalty or relief provided under laws. COMMENTS Page 11, Line 15 - The words “any intellectual property rights” is considered to be too wide. It is also submitted that the penalty should not be uniform for all types of intellectual property rights but should depend on the type of right infringed. Intellectual property rights consist of but are not limited to copyrights, patents, designs, industrial designs, semiconductor design, trade secrets and business know-how, cable retransmission rights, satellite broadcasting rights, lending rights and rental rights. It is suggested that the House Committee(s) seriously consider strengthening the existing intellectual property laws especially the Nigerian Copyright Act. According to David BainBridge, “The Copyright, Designs and Patents Act 1988 has been used increasingly to prosecute computer software pirates and magistrates and judges are at last taking this form of crime seriously, using custodial sentences in some cases.” The point we wish to make from this quotation is that it is not wrong to strengthen the Nigerian Copyright Act to make for prosecution of intellectual property rights violated
  • 24. Page 23 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved using a computer by a computer. If that is done, it is very important that Nigeria upgrade its laws on database rights to meet what obtains in other climes. 22. Any person who use any computer to: (a) engage or solicits or entices or compels any minor in any sexual or related act; or (b) engage in, or facilitates any indecent exposure of a minor or creates, possesses or distributes child pornography; or (c) facilitates the commission of a sexual or related act which constitutes an offence under any law for the time being in force in Nigeria, commits an offence and shall be liable on conviction: (i) in case of paragraph (a), to a time of not less than N3,000,000 or imprisonment for a term of not less than 7 years or to both such fine and imprisonment. (ii) in case of paragraph ( b, and (c), to a fine of not less than N1,000,000 or imprisonment for a term of not less than 5 years or both such fine and imprisonment. COMMENTS Page 11, Line 28 – fine should replace time 23. Any person who: (a) attempts to commit any offence under this Bill; or (b) does any act preparatory to or in furtherance of the commission of an offence under this Bill; and (c) abets or engages in a conspiracy to commit any offence, commits an offence and shall be liable on conviction to the punishment provided for such an offence, under this Bill. COMMENTS Page 12, Lines 4 – 5 – It is unnecessary to split/attempt to differentiate between “attempts to commit any offence under this Bill” and “does any act preparatory to or in furtherance of the commission of an offence under this Bill.” Case law does not support that distinction. Case law seems to indicate that both Section 23(a) and Section 23(b) are talking about one and the same thing. Please refer to the following cases and statutes:  R v Eagleton (1855) Dears CC 515,  Section 4 Criminal Code,  Section 508 Criminal Code,  Section 95 Penal Code,
  • 25. Page 24 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved  R v Whybrow (1951) 35 Cr App Rep 141 CCA,  R v Robinson (1915) 2 KB 342,  Orija v ICP 1957 NRNLR 189,  DPP v Stonehouse 1977 2 All ER 909,  R v Offiong 1936 3 WACA 83,  Jones v Brooks & Brooks 1968 52 Cr App R 614. Page 12, Line 7 - 9 – Section 23(c ) should read „aids or abets‟ the commission of an offence, and should become Section 23 (b). According to National Coal Board v Gamble (1959) 1 QB 11, “a person who supplies the instrument for a crime or anything essential to its commission aids in the commission of it; if he does so knowingly and with intent to aid, he abets it as well and is guilty of aiding and abetting. Attorney General’s Reference (No.1 of 1975) 1975 2 All ER 684 noted that “Aiding and abetting almost inevitably involves a situation in which the secondary party and the main offender are together at some stage discussing the plans which they may be making in respect of the alleged offence, and are in contact so that each know what is passing through the mind of the other.” The portion of this Section on conspiracy should be separated to form a new Section 23(c) dealing with conspiracy only. This is very important because case law treats aiding and abetting as a separate crime from conspiracy. Additionally, the bill as presently worded does not clearly answer the following questions raised in the book “Criminal Law Cases and Materials” published by Smith and Hogan:  Must a principal conspirator intend to play some part in the agreed course of conduct? And what if he doesn‟t?  Is “the mere fact of agreement” without intent to carry out the agreement enough? This is relevant when law enforcement sets up traps for an accused.  What if the agreement was to be carried out by not a party to the agreement but by a third party? Please see R v Hollinshead 1985 2 All ER 701 We consider this a very relevant issue because according to the same book, the common law position is that: “an agreement will amount to a conspiracy only if carrying it out will necessarily amount to or involve a commission of an offence by one or more of the parties to the crime.” 24. (1) The president may on the recommendation of the Agency, by order published in the Federal Gazette, designate certain computer systems, networks and information infrastructure vital to the national security of Nigeria of the economic and social well being of its citizens, as constituting critical information infrastructure. (2) The president order in subsection (1) of this section may prescribe standards, guidelines, rules or procedures in respect of: (a) the registration, protection or presentation of critical information infrastructure; (b) the general management of critical information infrastructure; (c) access to, transfer and control of data in any critical information infrastructure;
  • 26. Page 25 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved (d) procedural rules and requirements for securing the integrity and authenticity of data or information contained in any of the information; (e) procedures or methods to be used in the storage of data or information in critical information infrastructure; (f) disaster recovery plans in the event of loss of the critical information infrastructure or any part thereof; and (g) any other matter required for the adequate protection, management and control of data and other resources in any critical information infrastructure. COMMENTS None 25. The president order in section 23 of this Bill may require audits and inspection to be carried out on any critical information infrastructure to evaluate compliance with the provisions of this Bill. COMMENTS None 26. (1) Any person who violates any provision as to the critical information infrastructure designated under section 23 of this Bill, commits an offence and shall be liable on conviction to a fine of not less than N15,000,000 or imprisonment of a term of not less than 25 years or both such find and imprisonment. (2) where the offence committed under subsection (1) of this section results in serious bodily injury, the offender shall be liable on conviction to a fine of not less than N20, 000,000 or to imprisonment for a term of 30 years or to both such fine and imprisonment. (3) where the offence committed resulted in death, the offender shall be liable on conviction to imprisonment for life with no option of fine. COMMENTS None 27. Nothing in this Bill shall preclude the institution of a civil suit against a person liable under this Bill by any interested party. COMMENTS None 28. (1) The Federal High Court or state High Court shall have jurisdiction to try offender under this Bill. (2) Notwithstanding anything to the contrary, the court shall ensure that all matter brought before it under this Bill against any person or body corporate are conducted with dispatch and given accelerated hearing.
  • 27. Page 26 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved (3) for the purposes of this Bill, a person shall be subject to prosecution in Nigeria for an offence committed while the offender is physically located either within or outside, if by the conduct of the offender or that of another acting for him; (a) the offence is committed either wholly or partly within Nigeria; (b) the act of the offender committed wholly outside Nigeria constitutes a conspiracy to commit an offence under this Bill within Nigeria; and an act in furtherance of the conspiracy was committed within Nigeria, either directly by the offender or at his instigation; or (c) the act of the offender committed wholly or partly within Nigeria constitutes an attempt, solicitation or conspiracy to commit offence in another jurisdiction under the laws of both Nigeria and such other jurisdiction. (4) For the purpose of this section: (a) an offence or element of the offence is presumed to have been committed in Nigeria if the offence or any of its elements substantially affects person of interest in Nigeria; (b) where any other country claims jurisdiction over an alleged offence which is subject to prosecution in Nigeria as established by this section, the Attorney General of the Federation may consult with such other country with a view to determine the most appropriate jurisdiction for prosecution. COMMENTS None 29. (1) Pursuant Section (2) of this section, any authorized officer entitled to enforce any provision of this Bill shall have the power to search any premises or computer or network and arrest any person in connection with the offence. (2) Subject to National Security Agency Act, an authorized officer of any law enforcement agency, upon a reasonable suspicion that an offence has been committed or likely to be committed by any person or body corporate, shall have power to: (a) access and inspect or check the operation of any computer to which this act applies; or (b) use or cause to use a computer or any device to search any data contained in or available to any computer or network; or (c) use any technology to re-transform or decrypt any encrypted data contained in a computer into readable text or comprehensible format; or (d) seize or take possession of any computer used in connection with an offence under this Bill, or
  • 28. Page 27 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved (e) require any person having charge of or otherwise concerned with the operation of any computer in connection with an offence to produce such computer; or (f) require any person in possession of encrypted data to provide access to any information necessary to decrypt such data; (g) require any person in authority to release any subscriber or traffic information or any related content; and (h) relate with any international law enforcement agencies for the purpose of giving or receiving on information or exchanging any data or database for the purpose or investigation and prosecution under this Bill. (i) The Agency shall have power to cause or direct investigation by any law enforcement agency. COMMENTS Page 14, line 11 –The term “any authorised officer” is ambiguous. It is important for purposes of preventing ambiguity and abuse that the definition given in Section 38 (page 17, Lines 9 -10 be tightened up. Please refer to our comments on Section 17 above for reasons. 30. Any person who: (a) willfully obstructs any law enforcement agency in the exercise of any power under this Bill; or (b) fails to comply with any lawful inquiry or request made by any authorized officer in accordance with the provisions of this Bill, commits an offence and shall be liable on conviction to a fine of not less than N500,000 or imprisonment for a term of not less than 3 years or to both such fine and imprisonment. COMMENTS Page 15, Line 8 – No such word as “willfully” 31. Notwithstanding anything contained in any enactment or law in Nigeria, an information contained in any computer which is printed out on paper, stored, recorded or copied on any media, shall be deemed to be primary evidence under this Bill. COMMENTS Page 15, lines 15 – 18 In the light of the quote following below taken from the document Electronic Signature Assurance the Digital Chain-of-Evidence – Executing Legally Admissible Digitally Signed Records produced by the Microsoft U.S. National Security Team authored by Jacques R. Francoeur, B. A. Sc., M.A.Sc., MBA: “Electronic data also presents its own inherent risks and challenges. Represented by a series of zeros and ones, electronic data can be volatile and unstable. The ability of data to move between systems, applications and people can make it difficult to differentiate between “good” (original) and “bad” (manipulated) data. Furthermore, evidentiary techniques to determine the “provenance” of data, such as time-of-creation and unchanged state, are often immature or non-existent. To establish
  • 29. Page 28 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved the reliability of electronically signed records, mechanisms must be put in place to prevent undetected manipulation of the electronic data’s content, and/or evidence of the time and date created or modified.” (Italics Ours) We are of the considered opinion that Section 31 as presently worded has not “put in place” mechanisms to “prevent undetected manipulation of the electronic data‟s content and/or evidence of the time and date created or modified.” Michael I. Shamos, Ph.D., J.D. of the Institute for Software Research, School of Computer Science, Carnegie Mellon University once noted that the purpose of evidence is to “prove facts” and that “evidence makes the existence of fact that is of consequence to the case either more or less probable than it would be without the evidence.” In other words, from our point of view, Section 31 as presently worded raises questions in relation to the standard of proof for electronic primary evidence. The statement “notwithstanding anything contained in any enactment or law in Nigeria” must primarily refer to the Evidence Act. The question that arises then is this, if the Evidence Act is overridden to make electronic evidence admissible. Will the safeguards such as relevancy, the direct evidence rule, circumstantial evidence rules, authentication of evidence rules, chain of custody rules, best evidence rule, hearsay evidence rule, etc established by the Evidence Act which was previously overridden now apply to such electronic evidence? We wish to draw the attention of the Committee to the following extract from the US Federal Rules of Evidence 1001 (3): “if data are stored in a computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an „original‟.” This is known as the Computer “Best Evidence “Rule, in our considered opinion Section 31 should be amended to accommodate this rule. 32. (1) Any person who tampers with any evidence in relation to any proceeding under this Bill by intentionally: (a) creating, destroying, (mutilating, removing or modifying data or program or any other form of information existing within or outside a computer or network; or (b) activating or installing or downloading or transmitting a program that is designed to create, destroy, mutilate, remove or modify data, program or any other form of information existing within or outside a computer or network; or (c) creating, altering, or destroying a password, personal identification number, code or method used to access a computer or network. Commits an offence and shall be liable on conviction to affine of not less than N500, 000 or to imprisonment for a term of not less than 3 years or to both such fine and imprisonment. COMMENTS None 33. Criminal proceedings under this Bill shall be instituted by the Agency.
  • 30. Page 29 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved COMMENTS None 34. (1) The court imposing sentence on any person who is convicted of an offences under this Bill may also order that the convicted person forfeits to the federal republic of Nigeria: (a) any assets, money or property (real or personal) constituting of traceable to gross proceeds of such offence; and (b) any computer, equipment, software or other technology used or intended to be used to commit or to facilitate the commission of such offence. (2) Any person convicted of an offence under this Bill shall forfeit his passport or international traveling documents to the Federal Republic of Nigeria until he has paid the fines or served the sentence imposed on him (3) Notwithstanding subsection (2) of this section, the court may; (a) upon the grant of pardon by the president to the convicted person; or (b) the purposes of allowing the convicted person to travel abroad for medical treatment, having made formal application before the court on that regard; or (c) in the public interest, direct that the passport or traveling document of the convicted person be released to him. COMMENTS Page 16, Line 11 – Did the draftsman really mean to use the word “travelling” or did he mean “travelling” or “travel”? 35. (1) Without prejudice to section 174 of the Constitution of the Federal Republic of Nigeria, 1999, the Attorney General may, subject to voluntary admission of the commission of the offence, compound any offence punishable under this Bill by accepting such amount specified as fine to which the offender would have been liable if he had been convicted of that offence. (2) Notwithstanding the provision of subjection (1) of this section, the court may order the payment of compensation to any person or body corporate, who suffers damages, injury, or loss as a result of the offence committed. COMMENTS
  • 31. Page 30 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved None 36. Where a person is charged with an attempt to commit an offence under this Bill but the evidence establishes the commission of the full offence, the offender shall not be entitled to acquittal and shall be convicted for the offence and punished under the relevant penalty. COMMENTS None 37. The president may by order published in the Gazette make such rules and regulations as in his opinion and on the recommendation of the Agency are necessary to give full effect to the provisions of this Bill. COMMENTS None 38. In this Bill, “access” includes to gain entry to, instruct, make use of any resources of a computer, computer system or network. “Agency” means Cyber Security and Data Protection Agency. “Authorized officer” means a person authorized by law to exercise a power this Bill “Authority” means express or implied consent to access a computer network, program, data or database, software. “Computer” includes any electronic device or computational machinery programmed instruction which has the capabilities of storage, retrieval memory, logic, arithmetic or communication and includes all input, output, processing, storage, communication facilities which are connected or related to such a device in a system or network or control of functions by the manipulation of signals whether electronic, magnetic or optical. “computer network” includes the interconnection of computers or computer system “Computer program” means data or a set of instructions or statements that
  • 32. Page 31 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved when executed in a computer causes computer to perform function. “damage” means an impairment to the integrity or availability of data, program or network. “data” includes a representation of information, knowledge, facts, concepts or instructions intended to be processed, being processed or has been processed in a network. “database name” includes any designation or name registered with the domain registrar as part of an electronic address. “intellectual property rights” include any right conferred or granted under any of the following laws or treaties to which Nigeria is a signatory: (a) Copyright Act, CAP 68. LFN (as amended); (b) Patents and Designs Act CAP 344, LFN; (c) Trade Marks Act, CAP LFN; (d) Berne Connection; (e) World Intellectual Property Organization (WIPO) Treaty; (f) Trade-Related Aspects of Intellectual Property Rights (TRIPs); (g) Universal Copyright Convention (UCC); and (h) Paria Convention (Lisbon Text). “internet” means global information system linked by a unique address space base on the internet protocol or its subsequent extensions.
  • 33. Page 32 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved “intercept” includes the aural or acquisition of the contents of any wire, electronic or oral communication through the use of technical means so as to make some or all the contents of a communication available to a person other than whom it was intended, and includes; (a) monitoring of such communication by any device; (b) viewing, examination or inspection of the contents of any communication; and (c) diversion of any communication from its intended destination. “Law enforcement” agency means any institution created by law and charged with the responsibility of enforcing obedience to our written law. “loss” means any reasonable lost to a victim, including the cost of responding to an offence, conducting a damage assessment and restoring the data, program, system or information to its condition prior to the offences and any revenue lost, cost incurred and other consequential damages incurred because of the interruption of service. “Minor” means a person under 18 years. “Modification” means (a) alteration or erasure of the content of any
  • 34. Page 33 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved program, data and data base; (b) any event which occurs to impair the normal operation of a computer; (c) modification is unauthorized if: (i) the person that causes the act is not himself entitled to determine whether the modification should be made; and (ii) he does not have consent from anybody to modify. “Service provider” includes but not limited to; (a) internet service provider; (b) communications service provide; and (c) application service provider. “Software” includes any program, data, database, procedure and associated documentation concerned with the operation of a computer system. “Spamming” means unsolicited electronic mail message having false headers, address and lines. “Minister” means minister of information and communication. COMMENTS Page 17, Line 6 – 7 – replace “gain entry to, instruct, make” with gaining entry to, instructing, making Page 17, Line 13 – 18 The Committee may wish to take a second look at the definition of “computer”: France, Germany and the UK do not define this term in their equivalent legislation, however the United States of America does, please see the US Computer Fraud and Abuse Act.
  • 35. Page 34 of 34 © 2009 –Niche Konsult Limited. All Rights Reserved Page 19, Line 8 - 9 The Committee may wish to take a second look at the definition of “software.” We propose the inclusion of the words “whether in source code or object code form immediately after program 39. This Bill may be cited as Cyber Security and Data Protection Agency (Establishment etc) Bill, 2008. COMMENTS None CONCLUSION We are available to provide further support and consulting to the House Committee on Drugs, Narcotics and Financial Crimes in respect of our submissions above and thank you for taking the time to go through this and for giving us a chance to participate in the law-making process. Yours faithfully NICHE KONSULT LIMITED Idara Akpan CHIEF HACKING OFFICER/DIRECTOR (BUSINESS DEVELOPMENT) Email:Idara@nichekonsult.com Mobile: 234 805 547 7646
  • 36. February 22, 2005 The Director General Consumer Protection Council Plot 2215, Herbert Macaulay Way P.M.B. 5077 Wuse Zone 6 Abuja Dear Madam, CPC: A PRIVACY AGENDA - TO BE OR NOT TO BE? It occurs to us that CPC, Nigeria’s premier consumer protection champion may need to revisit her role in relation to securing consumer privacy in the information age in keeping with Section 37 of the 1999 Constitution. And to that end, AIIA is interested in working with CPC to create a pro-active privacy protection agenda to meet the needs of Nigerians. Possible pro-privacy agenda initiatives include: • Creating a Privacy Task Force to develop and implement the Director General’s Privacy Agenda • Developing a National Privacy Policy • The need for privacy awareness campaigns to enlighten the consumer as to what is at stake and why and of what CPC is doing in that regard • The Task Force should among other things spearhead the drafting of appropriate legislation requiring the following: o that organizations collecting personal information (whether online or offline) to create a privacy policy in line with the National Privacy Policy, o that a copy of such privacy policy be lodged with the CPC for its necessary action, o that such privacy policy state clearly what information is being collected, how it is stored, where it is stored (whether in Nigeria or elsewhere), how long it is stored, how it is intended to be used, and how it is actually used, whether or not such information is shared with third parties and on what basis/terms and how the information is ultimately disposed of o a comprehensive list of privacy breaches and appropriate fines Thank you for taking matters a step further in our behalf. Yours faithfully, A.I.I. ASSOLCIATES Barr. Ime Akpan PRINCIPAL
  • 37. PRIVACY: A BURNING CONSUMER ISSUE – PRIVACY POLICY: A NATIONAL IMPERATIVE – WANTED: A PRIVACY WATCHDOG Definition of Privacy The quality or state of being apart from company or observation. Privacy is closely related to secrecy, that is, the condition of being concealed or hidden. Definition of Policy A definite course or method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions. A high-level overall plan embracing the general goals and acceptable procedure especially of a governmental body Definition of Privacy Policy A high-level overall plan that lists both the goals of and acceptable procedures for the collection, maintenance, use and disposal of personally identifiable customer information in the normal course of business. Two sides of the same coin: “Privacy as Secrecy” or Privacy as Control” Privacy as secrecy Private meaning personal, i.e., known only to ourselves and selected others Privacy as control Private meaning control, i.e., known to several others (businesses, governments, and individuals) but usage is based on the user’s preferences and the user has control over how his/her information is used Why Privacy as Secrecy is giving way to Privacy as Control “You have zero privacy anyway. Get over it.” - An Information Technology industry CEO to a group of reporters The internet is like a spider web. It connects all countries, all governments, all cities, all homes and all peoples. Information Technology in general and the internet in particular is creating a “world without secrets” for individuals, enterprises and governments. In this world, enormous amounts of structured information (transactions) and unstructured information (audio, video, and narrative text) are gathered and shared globally by and among businesses, governments, and individuals. Many of us are familiar with Orwell’s novel 1984, however, unlike in Orwell’s totalitarian nightmare scenario, the monster is not Big Brother because government has no monopoly on technology. © December 20, 2004. All Rights Reserved. AII Associates. Private and Confidential. Distribution Restricted