SlideShare a Scribd company logo
1 of 25
Commonwealth Telecommunication Organisation,
Cybersecurity Forum 2013
Yaoundé, Cameroon, 22-26 May 2013
African Union Perspectives on Cybersecurity and
Cybercrime Issues:
The AU Draft Convention on Cybersecurity and related
activities
Auguste YANKEY (Mr.)
AU Commission
Email: yankeyka@africa-union.org
Website: www.AU.int
OUTLINE
• Cybersecurity and Cybercrime issues:
Introduction and overview
• Cybersecurity and Cybercrime in the AUC
• AU Perspectives on Cybersecurity and Cybercrime
Issues
2
• Almost two thirds of all adult web users globally have fallen victim to some
sort of cybercrime, from spam email scams to having their credit card details
stolen. (the 2011 Norton Cybercrime Report: The Human Impact study)
• The study, of over 7,000 Internet users found that 80% of people believed the
perpetrators would never be brought to justice. Fewer than half ever bother to
report the crime to police.
• Africa: the fastest development of mobile banking and money.
Ex: Kenya with M-Pesa: 70% of adult transfer money each other by mobile
means USD 320 million, almost a quarter of Kenya’s GNP.
• Africa is currently the social network’s fastest growing continent. There are
also local success stories such as South African social network, MXit which
currently has more than two times the number of Facebook users in South
Africa.
FACTS AND FIGURES
3
• The growth rate of cyberspace has been enormous, roughly doubling every 100
days.
• Cybercrime in Africa is growing faster than any other continent.
• Out of the top ten countries in the world with a high level of cybercrime
prevalence, Africa is host to four of these countries (Nigeria, Cameroon, Ghana
and South Africa).
• Africa = 2% of world trade but 10% of Cybercrime attacks (ITU)
FACTS AND FIGURES
4
Internet Development
5
The term
“cybercrime” is
usually referred to as
any criminal offense
committed against or
with the use of
a computer or
computer network
A set of activities and
other measures,
technical and non-
technical intended to
protect data,
information and
information systems
from unauthorized
access, use, disclosure,
disruption,
modification and
destruction.
Virtual world of
information
networks. The
global
information
space. The
digital era.
is a term used
to describe the
legal issues
related to use
of ICTs,
particularly
cyberspace
What does Cyber…refer to ?
6
“The Information Society Division”
• Core function:
– Enhancing the development of African ICT Networks between and among
regions and at the international level (Pan-African e-Network +VSAT
projects).
– Establish effective institutional linkages and essential mechanisms for
cooperation and coordination in ICT fields.
– Provide AU Member States with the necessary capacity and tools for
harnessing the Information Society for continental integration &
development.
– Promotion, coordination and harmonization of telecommunication, ICT and
Post Policies and Regulation for an inclusive African information society .
Cybersecurity and Cybercrime issues in the AUC
7
AU Challenges face to Cyber security/crime
8
Low capacity systems that increases the vulnerability;
Low technical capacity and human capacity building IT skills.
Systems poorly made and poorly managed.
Relay for attacks (bandwidth consumption, server downtime ...)
Proliferation of cyber centres without legal framework
against users' perpetration and the protection of the others
Fear of e-commerce and its impact on the development
lack of protection mechanisms at local and regional level
Unemployment of young graduates
AU response to Cybersecurity and Cybercrime
Many regional conferences, forums and workshop ( i.e.
the 1st African regional forum on cybersecurity, Yamoussoukro,
11/2008, 1st African Internet Governance Forum, Cairo, 10/2012)
Drafting of an African Union Convention on the
confidence and security in Cyberspace.
9
AU Convention on the Confidence
and security in Cyberspace
Legal framework-1
The Oliver Tambo Declaration (Ext/CITMC/Min/Decl.(I) Johannesburg, South-Africa,
5 Nov. 2009)
Adoption of the resolution
The 14th AU Summit of Head of State and government Declaration
on “Information and Communication Technologies in Africa: Challenges and Prospects for
Development” ([Assembly/AU/11(XIV)], Addis Ababa, Ethiopia, 31 January - 2 February 2010)
Endorsement of this resolution
The Abuja Declaration, CITMC-3 ([AU/CITMC/MIN/Decl.(III)], Abuja (Nigeria), 03-07
August 2010.
Confirmation of this resolution
We, African Ministers in charge of CIT, request the AU Commission to “Jointly finalize with the
United Nations Economic Commission for Africa, within the framework of the African Information
Society Initiative (AISI), the Draft Convention on Cyber Legislation and support its implementation
in Member States by 2012”; 10
Legal framework -2
The Khartoum Declaration (AU/CITMC-4/MIN/Decl.(IV)Khartoum, The Sudan,
2-6 September 2012
Endorsement of the AU Final Draft Convention on Cyberlegislation
by the 4th Ministerial Conference of the African Union Ministers in charge
of Communication and Information Technologies (CITMC-4)
AU Convention on the Confidence
and security in Cyberspace
11
Objective and goal
Its objective is to harmonize e-legislation related to e-transactions
development, personal data protection, cyber security promotion and fight
against cybercrime. Particularly:
Define key cyber terminologies in legislation
Develop general principles and specific provisions related to cyber legislation
Outline cyber legislative measures required at Member State level
Develop general principles and specific provision on international cooperation
as related to cyber legislation
Its ultimate goal is eminently protective given that it is geared to protecting:
Institutions against the threats and attacks capable of endangering their
survival and efficacy;
The rights of persons during data gathering and processing against the threats
and attacks capable of compromising such rights.
AU Convention on the Confidence
and security in Cyberspace
12
Strategic Orientations
The Convention defines a legal mechanism based on the following five strategic
orientations:
1. It spells out the options for an African Union wide cyber security policy;
2. It lays the foundations for an African Union wide cyber ethics and enunciates
fundamental principles in the key areas of cyber security;
3. It organizes electronic commerce, electronic signature and electronic publicity;
4. It organizes the legal and institutional framework for protection of personal data;
5. It lays the foundation for a penal cyber law and a penal procedure for the
treatment of cyber crime.
AU Convention on the Confidence
and security in Cyberspace
13
Expected results
Definitions on key cyber terminologies in legislation
Harmonised cyber legislation and provisions for the African Union
AU Convention on the Confidence
and security in Cyberspace
14
The Convention main parts
PART I: ORGANIZATION OF ELECTRONIC COMMERCE
PART II: PROTECTION OF PERSONNAL DATA
PART III: COMBATING CYBER CRIME
PART IV: COMMON AND FINAL PROVISIONS
webpage for the Draft Convention:
www.au.int/cyberlegislation
AU Convention on the Confidence
and security in Cyberspace
15
PART III: COMBATING CYBER CRIME
Section 1: Terminology
Electronic communication, Computerized data, Racism and xenophobia in information
and telecommunication technologies, Minor, Child pornography, Computer system,
Exceeds authorized access, Damage
Chapter 1: National cyber security framework
• National policy
• National strategy
Chapter 2: Legislative measures
• Legislations against cybercrime
• National Regulatory authorities
• Rights of citizens
• Protection of critical information infrastructure
www.au.int/cyberlegislation
AU Convention on the Confidence
and security in Cyberspace
16
PART III: COMBATING CYBER CRIME (Cont’d)
Chapter IV: National cyber security monitoring structures
• Cyber security governance
• Institutional framework
Chapter V: International cooperation
• Harmonization
AU Convention on the Confidence
and security in Cyberspace
17
www.au.int/cyberlegislation
PART III: COMBATING CYBER CRIME (Cont’d)
Section II: Material penal law
Chapter I: Offenses specific to ICTs
• Attack on computer systems
• Attack on computerized data
• Content related offenses
• Offenses relating to electronic message security measures
Chapter II: Adapting certain ICTs offenses
• Violation of property
• Criminal liability for corporate persons
Chapter III: Adapting certain sanctions to the ICTs
• Penal sanctions
• Other penal sanctions
• Procedural law
• Offenses specific to Information and Communication Technologies
AU Convention on the Confidence
and security in Cyberspace
18
I. Policy, Legal, and Regulatory Enabling Framework.
II. Awareness and Capacity Building.
III. Response and Recovery Mechanisms.
AU Perspectives on Cybersecurity
and Cybercrime Issues.
19
I. Policy, Legal, and Regulatory Enabling
Framework
1. Development of National Cyber-Security Legislation;
2. Implementation of AU Cybersecurity Convention
Implementation status
1. A draft Convention on Cyber Security has been developed (2010-11)
2. Regional Workshops have been organized on Cyber Legislation and on the AU Draft
Convention on CyberSecurity:
a. ECCAS: Libreville, Gabon, November 2011
b. ECOWAS: Abidjan, Côte d’Ivoire, February 2012
c. Tripartite [COMESA, SADC, CEAC] + UMA (Northern Africa): Addis-Ababa,
ETHIOPIA, June 2012
3. Final Expert Group meeting to finalize the Draft Convention before the CITMC-4
Addis-Ababa, Ethiopia, August 2012
4. Endorsement by the Conference of African Ministers in Charge of Communication
and Information Technologies (CITMC-4) in Khartoum, the Sudan, September 2012
20
VALIDATION
• Validation Workshops (RECs, national
experts, independent resource persons)
TRANSLATION
• Translation into AU 4 languages
VALIDATION
ENDORSEMENT
• By the Telecom/ICT experts meeting and
endorsed by the CITMC
LEGAL
VALIDATION
•By the AU legal experts meeting and endorsed by
the Conference of AU Ministers in charge of Justice
VALIDATIOVALIDATIOVALIDATIONNN
ADOPTION
• Submission to the Executive Council for transmission to the AU
Assembly of Heads of State and Government for adoption.
Adoption process of the Convention by the AU HoSG
I. Policy, Legal, and Regulatory Enabling
Framework
21
AU draft Convention
I. Policy, Legal, and Regulatory Enabling
Framework
22
II. Awareness and Capacity Building
1. Development and distribution of toolkits to
facilitate the ratification of the AU Convention on
Cybersecurity
2. Organize and/or participate in workshops for
capacity building and Heightened awareness and
capacity to facilitate the development of national
cyber security legislation and in each AU MS;
With UNCTAD
With US DoJ, CoE, UNODC
232232223323333222233322223333
III. Response and Recovery Mechanisms
• Facilitate the setting up of National CERTs to contribute to
the continental and global cooperation and fight against
cybercrime
1. National CERTs
2. Regional CSIRTs (in collaboration with RECs)
3. Cybersecurity Unit within the AUC
24
THANK YOU FOR
YOUR ATTENTION
***
Auguste YANKEY (Mr.)
AU Commission
Email: yankeyka@africa-union.org
Website: www.AU.int/infosoc
25

More Related Content

What's hot

Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaDr David Probert
 
Navigating Indonesia's Information Highway
Navigating Indonesia's Information HighwayNavigating Indonesia's Information Highway
Navigating Indonesia's Information HighwayICT Watch
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordCreative Commons Korea
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Habib Noroozi
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010segughana
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile LawJacqueline Fick
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
 
Project Cyber Dawn: Libya
Project Cyber Dawn: LibyaProject Cyber Dawn: Libya
Project Cyber Dawn: LibyaAmr Ali
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa ICT4Democracy in East Africa
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 

What's hot (20)

RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
 
Navigating Indonesia's Information Highway
Navigating Indonesia's Information HighwayNavigating Indonesia's Information Highway
Navigating Indonesia's Information Highway
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 
12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Project Cyber Dawn: Libya
Project Cyber Dawn: LibyaProject Cyber Dawn: Libya
Project Cyber Dawn: Libya
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 

Viewers also liked (8)

Developments of Next Generation Nationwide & Wireless Broadband Networks
Developments of Next Generation Nationwide & Wireless Broadband NetworksDevelopments of Next Generation Nationwide & Wireless Broadband Networks
Developments of Next Generation Nationwide & Wireless Broadband Networks
 
Providing Effective Governance with Smarter e Governance Strategies
Providing Effective Governance with Smarter e Governance StrategiesProviding Effective Governance with Smarter e Governance Strategies
Providing Effective Governance with Smarter e Governance Strategies
 
Repurposing Archival Content in a Digital Environment
Repurposing Archival Content in a Digital EnvironmentRepurposing Archival Content in a Digital Environment
Repurposing Archival Content in a Digital Environment
 
Equatel Presentation mmd
Equatel Presentation mmdEquatel Presentation mmd
Equatel Presentation mmd
 
Accelerating Communication Infrastructures
Accelerating Communication InfrastructuresAccelerating Communication Infrastructures
Accelerating Communication Infrastructures
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Pank Koria HR4 ICT12
Pank Koria HR4 ICT12Pank Koria HR4 ICT12
Pank Koria HR4 ICT12
 
CTO 2012 version 23oct 0003 bup
CTO 2012 version 23oct 0003 bupCTO 2012 version 23oct 0003 bup
CTO 2012 version 23oct 0003 bup
 

Similar to CTO Cybersecurity Forum 2013 Auguste Yankey

International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyookaAmbrose Ruyooka,PMP,CGEIT, CRISC
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 

Similar to CTO Cybersecurity Forum 2013 Auguste Yankey (20)

International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
CTO Cybersecurity Forum 2013 Pierre Kaptue
CTO Cybersecurity Forum 2013 Pierre KaptueCTO Cybersecurity Forum 2013 Pierre Kaptue
CTO Cybersecurity Forum 2013 Pierre Kaptue
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 

More from Commonwealth Telecommunications Organisation

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

CTO Cybersecurity Forum 2013 Auguste Yankey

  • 1. Commonwealth Telecommunication Organisation, Cybersecurity Forum 2013 Yaoundé, Cameroon, 22-26 May 2013 African Union Perspectives on Cybersecurity and Cybercrime Issues: The AU Draft Convention on Cybersecurity and related activities Auguste YANKEY (Mr.) AU Commission Email: yankeyka@africa-union.org Website: www.AU.int
  • 2. OUTLINE • Cybersecurity and Cybercrime issues: Introduction and overview • Cybersecurity and Cybercrime in the AUC • AU Perspectives on Cybersecurity and Cybercrime Issues 2
  • 3. • Almost two thirds of all adult web users globally have fallen victim to some sort of cybercrime, from spam email scams to having their credit card details stolen. (the 2011 Norton Cybercrime Report: The Human Impact study) • The study, of over 7,000 Internet users found that 80% of people believed the perpetrators would never be brought to justice. Fewer than half ever bother to report the crime to police. • Africa: the fastest development of mobile banking and money. Ex: Kenya with M-Pesa: 70% of adult transfer money each other by mobile means USD 320 million, almost a quarter of Kenya’s GNP. • Africa is currently the social network’s fastest growing continent. There are also local success stories such as South African social network, MXit which currently has more than two times the number of Facebook users in South Africa. FACTS AND FIGURES 3
  • 4. • The growth rate of cyberspace has been enormous, roughly doubling every 100 days. • Cybercrime in Africa is growing faster than any other continent. • Out of the top ten countries in the world with a high level of cybercrime prevalence, Africa is host to four of these countries (Nigeria, Cameroon, Ghana and South Africa). • Africa = 2% of world trade but 10% of Cybercrime attacks (ITU) FACTS AND FIGURES 4
  • 6. The term “cybercrime” is usually referred to as any criminal offense committed against or with the use of a computer or computer network A set of activities and other measures, technical and non- technical intended to protect data, information and information systems from unauthorized access, use, disclosure, disruption, modification and destruction. Virtual world of information networks. The global information space. The digital era. is a term used to describe the legal issues related to use of ICTs, particularly cyberspace What does Cyber…refer to ? 6
  • 7. “The Information Society Division” • Core function: – Enhancing the development of African ICT Networks between and among regions and at the international level (Pan-African e-Network +VSAT projects). – Establish effective institutional linkages and essential mechanisms for cooperation and coordination in ICT fields. – Provide AU Member States with the necessary capacity and tools for harnessing the Information Society for continental integration & development. – Promotion, coordination and harmonization of telecommunication, ICT and Post Policies and Regulation for an inclusive African information society . Cybersecurity and Cybercrime issues in the AUC 7
  • 8. AU Challenges face to Cyber security/crime 8 Low capacity systems that increases the vulnerability; Low technical capacity and human capacity building IT skills. Systems poorly made and poorly managed. Relay for attacks (bandwidth consumption, server downtime ...) Proliferation of cyber centres without legal framework against users' perpetration and the protection of the others Fear of e-commerce and its impact on the development lack of protection mechanisms at local and regional level Unemployment of young graduates
  • 9. AU response to Cybersecurity and Cybercrime Many regional conferences, forums and workshop ( i.e. the 1st African regional forum on cybersecurity, Yamoussoukro, 11/2008, 1st African Internet Governance Forum, Cairo, 10/2012) Drafting of an African Union Convention on the confidence and security in Cyberspace. 9
  • 10. AU Convention on the Confidence and security in Cyberspace Legal framework-1 The Oliver Tambo Declaration (Ext/CITMC/Min/Decl.(I) Johannesburg, South-Africa, 5 Nov. 2009) Adoption of the resolution The 14th AU Summit of Head of State and government Declaration on “Information and Communication Technologies in Africa: Challenges and Prospects for Development” ([Assembly/AU/11(XIV)], Addis Ababa, Ethiopia, 31 January - 2 February 2010) Endorsement of this resolution The Abuja Declaration, CITMC-3 ([AU/CITMC/MIN/Decl.(III)], Abuja (Nigeria), 03-07 August 2010. Confirmation of this resolution We, African Ministers in charge of CIT, request the AU Commission to “Jointly finalize with the United Nations Economic Commission for Africa, within the framework of the African Information Society Initiative (AISI), the Draft Convention on Cyber Legislation and support its implementation in Member States by 2012”; 10
  • 11. Legal framework -2 The Khartoum Declaration (AU/CITMC-4/MIN/Decl.(IV)Khartoum, The Sudan, 2-6 September 2012 Endorsement of the AU Final Draft Convention on Cyberlegislation by the 4th Ministerial Conference of the African Union Ministers in charge of Communication and Information Technologies (CITMC-4) AU Convention on the Confidence and security in Cyberspace 11
  • 12. Objective and goal Its objective is to harmonize e-legislation related to e-transactions development, personal data protection, cyber security promotion and fight against cybercrime. Particularly: Define key cyber terminologies in legislation Develop general principles and specific provisions related to cyber legislation Outline cyber legislative measures required at Member State level Develop general principles and specific provision on international cooperation as related to cyber legislation Its ultimate goal is eminently protective given that it is geared to protecting: Institutions against the threats and attacks capable of endangering their survival and efficacy; The rights of persons during data gathering and processing against the threats and attacks capable of compromising such rights. AU Convention on the Confidence and security in Cyberspace 12
  • 13. Strategic Orientations The Convention defines a legal mechanism based on the following five strategic orientations: 1. It spells out the options for an African Union wide cyber security policy; 2. It lays the foundations for an African Union wide cyber ethics and enunciates fundamental principles in the key areas of cyber security; 3. It organizes electronic commerce, electronic signature and electronic publicity; 4. It organizes the legal and institutional framework for protection of personal data; 5. It lays the foundation for a penal cyber law and a penal procedure for the treatment of cyber crime. AU Convention on the Confidence and security in Cyberspace 13
  • 14. Expected results Definitions on key cyber terminologies in legislation Harmonised cyber legislation and provisions for the African Union AU Convention on the Confidence and security in Cyberspace 14
  • 15. The Convention main parts PART I: ORGANIZATION OF ELECTRONIC COMMERCE PART II: PROTECTION OF PERSONNAL DATA PART III: COMBATING CYBER CRIME PART IV: COMMON AND FINAL PROVISIONS webpage for the Draft Convention: www.au.int/cyberlegislation AU Convention on the Confidence and security in Cyberspace 15
  • 16. PART III: COMBATING CYBER CRIME Section 1: Terminology Electronic communication, Computerized data, Racism and xenophobia in information and telecommunication technologies, Minor, Child pornography, Computer system, Exceeds authorized access, Damage Chapter 1: National cyber security framework • National policy • National strategy Chapter 2: Legislative measures • Legislations against cybercrime • National Regulatory authorities • Rights of citizens • Protection of critical information infrastructure www.au.int/cyberlegislation AU Convention on the Confidence and security in Cyberspace 16
  • 17. PART III: COMBATING CYBER CRIME (Cont’d) Chapter IV: National cyber security monitoring structures • Cyber security governance • Institutional framework Chapter V: International cooperation • Harmonization AU Convention on the Confidence and security in Cyberspace 17 www.au.int/cyberlegislation
  • 18. PART III: COMBATING CYBER CRIME (Cont’d) Section II: Material penal law Chapter I: Offenses specific to ICTs • Attack on computer systems • Attack on computerized data • Content related offenses • Offenses relating to electronic message security measures Chapter II: Adapting certain ICTs offenses • Violation of property • Criminal liability for corporate persons Chapter III: Adapting certain sanctions to the ICTs • Penal sanctions • Other penal sanctions • Procedural law • Offenses specific to Information and Communication Technologies AU Convention on the Confidence and security in Cyberspace 18
  • 19. I. Policy, Legal, and Regulatory Enabling Framework. II. Awareness and Capacity Building. III. Response and Recovery Mechanisms. AU Perspectives on Cybersecurity and Cybercrime Issues. 19
  • 20. I. Policy, Legal, and Regulatory Enabling Framework 1. Development of National Cyber-Security Legislation; 2. Implementation of AU Cybersecurity Convention Implementation status 1. A draft Convention on Cyber Security has been developed (2010-11) 2. Regional Workshops have been organized on Cyber Legislation and on the AU Draft Convention on CyberSecurity: a. ECCAS: Libreville, Gabon, November 2011 b. ECOWAS: Abidjan, Côte d’Ivoire, February 2012 c. Tripartite [COMESA, SADC, CEAC] + UMA (Northern Africa): Addis-Ababa, ETHIOPIA, June 2012 3. Final Expert Group meeting to finalize the Draft Convention before the CITMC-4 Addis-Ababa, Ethiopia, August 2012 4. Endorsement by the Conference of African Ministers in Charge of Communication and Information Technologies (CITMC-4) in Khartoum, the Sudan, September 2012 20
  • 21. VALIDATION • Validation Workshops (RECs, national experts, independent resource persons) TRANSLATION • Translation into AU 4 languages VALIDATION ENDORSEMENT • By the Telecom/ICT experts meeting and endorsed by the CITMC LEGAL VALIDATION •By the AU legal experts meeting and endorsed by the Conference of AU Ministers in charge of Justice VALIDATIOVALIDATIOVALIDATIONNN ADOPTION • Submission to the Executive Council for transmission to the AU Assembly of Heads of State and Government for adoption. Adoption process of the Convention by the AU HoSG I. Policy, Legal, and Regulatory Enabling Framework 21
  • 22. AU draft Convention I. Policy, Legal, and Regulatory Enabling Framework 22
  • 23. II. Awareness and Capacity Building 1. Development and distribution of toolkits to facilitate the ratification of the AU Convention on Cybersecurity 2. Organize and/or participate in workshops for capacity building and Heightened awareness and capacity to facilitate the development of national cyber security legislation and in each AU MS; With UNCTAD With US DoJ, CoE, UNODC 232232223323333222233322223333
  • 24. III. Response and Recovery Mechanisms • Facilitate the setting up of National CERTs to contribute to the continental and global cooperation and fight against cybercrime 1. National CERTs 2. Regional CSIRTs (in collaboration with RECs) 3. Cybersecurity Unit within the AUC 24
  • 25. THANK YOU FOR YOUR ATTENTION *** Auguste YANKEY (Mr.) AU Commission Email: yankeyka@africa-union.org Website: www.AU.int/infosoc 25