SlideShare una empresa de Scribd logo
1 de 55
Descargar para leer sin conexión
ELECTRONIC COMMERCE REGULATION –
AFRICA PURSUING GLOBAL OPPORTUNITIES
PRIA CHETTY
TECHNOLOGY & INNOVATION LAW AND POLICY ADVISOR/ ENDCODE.ORG
Overview of Presentation
Electronic Commerce – The Opportunity and Trends
Background to global electronic commerce regulation – key
models and frameworks.
Countries looking to benefit from electronic commerce need to
assess the policy and legal environment related to the ease of
global, collaborative and integrated approaches.
Group Activity and Discussion: How suitable are our policy and
legal frameworks in connection with developments and trends at
the technology layer - as a lens for for regulatory responsiveness
to electronic commerce?
Exploring Electronic Commerce – The
Opportunity, The Trends
Do you shop online?
What are your concerns when shopping online?
Group Activity and Discussion:
Trust and Confidence in E-Commerce
Exploring Electronic Commerce
Regulation – The EndGame
ICT Policy and Regulation
With the right policies and objectives in place, Information
and Communications Technologies (ICTs) can have far-
reaching and positive effects on development. ICTs are not a
magic bullet, nor an alternative to other development
investments, but if applied in the right way they are
potentially a crucial enabling factor for development.
E-Commerce Regulation
Convergence of technologies is the major driving factor that contributes to
the exponential growth of electronic commerce. Convergence goes beyond
the use of technology to develop new products and services and is seen as a
vehicle to improve the quality of life of society in South Africa and other
developing countries. Convergence will open new opportunities for all as
everyone gains equal access to information and the global
markets. Small business will be able to compete on an equal footing with big
business.
What is needed is an environment that is conducive to conducting business
and sharing information with confidence. Government will provide support by
setting policy and regulatory frameworks that are appropriate to the
information communications technology sector while taking cognisance of
the pervasive nature of e-commerce and the challenges pertaining to legal
and security matters.
The Issue List
Concepts such as “writing,” “document” or “signature” not easily
applied in digital world
Legacy laws - requirement in law for certain transactions to be
conducted in paper/ in person
Requirements in law for record retention in paper
Statutory requirements may prohibit online transacting
Requirement in law for admissibility of evidence
Conflicts in policies, laws, standards and trade practices in different
jurisdictions
The Issue List
Protection of personal data exchanged
Online consumer protection
Internet transaction taxation
Criminalisation of new cyber-crimes
Government’s powers and capacity to investigate and prosecute
crimes on the internet
Alignment of intellectual property laws to the digital world
Administration of domain names
Regulation of ISPs
Key Concepts in Electronic Commerce Regulation
Technology neutrality
Functional equivalence
Non-discrimination
Two-tier approach, Minimalist approach
Harmonisation
Multi-disciplinary approach
Identity Management and Authentication
Promoting trust and confidence
Encoding Electronic Commerce – Key
Models and Regulatory Approaches
Electronic Commerce Regulation
UNCITRAL
AU
SADC
ECOWAS
National
Others: OECD, ITU, WIPO
Globally, there are multiple initiatives,
efforts, models at international, national
and regional levels. Particularly to:
Promote harmonised, global, coherent
and co-ordinated approaches;
Address legal barriers to electronic
commerce;
and
Promote trust and confidence in
electronic transacting methods
UNCITRAL (1996)
MLEC – Model Law on Electronic Commerce
Promote greater consistency in national and regional
approaches.
Create a more secure legal environment for electronic
commerce for providing a model reference for
legislators
Implemented by several countries
In Africa – implemented by South Africa, Cape Verde,
Mauritius
UNCITRAL Model Law
Provides for the legal approach to non-discrimination,
technological neutrality and functional equivalence,
Fundamentally provides for rules for the formation and
validity of contracts concluded by electronic means, for the
attribution of data messages, for the acknowledgement of
receipt and for determining the time and place of dispatch
and receipt of data messages.
Guide to Enactment, provides background and explanatory
text for countries seeking to implement the Model Law
CLOUT (Case Law on UNCITRAL Texts) - cases relevant to
UNCITRAL Model Law
Africa
Initiatives by, for instance:
AU (African Union)
SADC (the Southern African Development Community)
ECOWAS (Economic Community of West
African States),
EAC (East African Co-operation)
AU
According to the Website:
The Draft Convention gives effect to a Resolution of the last session of the Assembly of
Heads of State and Government of the African Union, and seeks to harmonize African cyber
legislations on electronic commerce organization, personal data protection, cyber security
promotion and cyber crime control.
In pursuance of the principles of the African Information Society Initiative (AISI) and the
African Regional Action Plan for the Knowledge Economy (ARAPKE), the Draft Convention is
intended not only to define the objectives and broad orientations for the Information Society
in Africa, but also to strengthen existing legislations in Member States and the Regional
Economic Communities (RECs) on the Information and Communication Technologies.
It defines the security rules essential to establishing a credible digital space in response to
the major security related obstacles to the development of digital transactions in Africa.
It lays the foundation for an African Union-wide cyber ethics and enunciates fundamental
principles in the key areas of cyber security. It also defines the basis for electronic
commerce, puts in place a mechanism for combating intrusions into private life likely to be
generated by the gathering, processing, transmission, storage and use of personal data and
sets broad guidelines for incrimination and repression of cyber crime. Its adoption would
capitalize African and international experiences in cyber legislations and speed up relevant
reforms in African States and the RECs.
AU Draft Convention
The objective of this Convention is to propose the
adoption at the level of the African Union, a
Convention establishing a credible framework for
cybersecurity in Africa through organisation of
electronic transactions, protection of personal data ,
promotion of cyber security , e-governance and
combating cybercrime
AU Draft Convention - Complexities
Information security impacts on the security of the
digital and cultural heritage of individuals,
organizations and nations;
The vulnerability in the normal functioning of
institutions can compromise the survival and
sovereignty of States;
Addressing cyber security calls for clear-sighted
political will to define and implement a strategy for
development of digital infrastructure and services
(eservices) and articulate a coherent, effective and
controllable multi-disciplinary cyber security strategy.
AU Draft Convention - Challenges
Achieve a level of technological security adequate enough to prevent and
effectively control technological and informational risks;
Build an information society that respects values, protects rights and
freedoms, and guarantees the security of the property of persons,
organizations and nations;
Contribute to the knowledge economy, guarantee equal access to information
while stimulating the creation of authentic knowledge;
Create a climate of confidence and trust, that is:
Predictable in terms of prevention and resolution of disputes; and evolving
because it takes into account continued technological evolution;
Organized: covering the relevant sectors;
Protective: of consumers and intellectual property (civil and penal) of
citizens, organizations and nations;
Secured: striking proper balance between legal and technological security;
Integrated into the international order: providing meaningful articulation
between the national, regional and global levels.
AU Convention - Content
AU Convention - Criticism
SADC Declaration on Information and
Communications Technology (ICT) , 2001
s 2(d):
‘WE SHALL UNDERTAKE to work together to remove barriers
of electronic commerce in our SADC countries as a
means to opening opportunities and benefits such as
increased access to markets, opportunities to create
economic value and cultural assets, reduced administrative
costs, and improvement of public services. There is
a need to adopt and adapt technologies that enable e-
commerce capability to avoid increasing exclusion from
the global economy.’
SADC developed a ‘Model Law on Electronic
Transactions and Data Protection’ in November 2003.
SADC (e-Commerce Readiness Study, 2012)
Validation Workshop for the e-Commerce Readiness Study in the SADC
Sub-Region
Part of the e-SADC Strategic Framework o develop a holistic approach to
harnessing ICT for socio-economic development and regional integration
One objective - deployment of eservices, particularly e-commerce to
benefit from global opportunities and develop a regional ecommerce
strategic action plan.
Angola, Botswana, DRC, Lesotho, Mauritius, and South Africa were
earmarked for the readiness study
SADC (e-Commerce Readiness Study, 2012)
SADC e-Commerce Strategy encompasses the following four main pillars:
Enabled e-Commerce Environment;
A Capacity Development Programme for e-Commerce
Strengthening e-Commerce Sub-Regional and National Infrastructure; and
Institutionalized Framework to Implement, Evolve and Govern the Current
Strategy
Mauritius:
· ICTA Public Key Infrastructure (PKI);
· Concept of e-Payment;
· Computer Emergency Response Team - Mauritius (CERT-MU); and
· e-Commerce Strategy for Mauritius Post Ltd.
SADC Model Law on E-Transactions and E-
Commerce, 2012
SADC Model Law,
“This Model Law addresses the scope of application of key concepts and
proposes neutral definitions for them.
The legal recognition of electronic communications and the legal effect of
electronic communications are addressed.
Clear rules for electronic transactions are adopted.
E-commerce issues such as the attribution of electronic communications
and electronic signatures, and the admissibility and evidentiary weight of
electronic evidence are addressed.
The obligations of online suppliers are addressed. These include the type
of information made available to consumers on the information system
where such goods or services are offered, and a consumer’s right to a
cooling-off period, review of a transaction, withdrawal from a transaction,
and the performance, correction or cancellation of a transaction for goods
and services are addressed.
Lastly, service providers’ liability is addressed.”
Other SADC Model Laws, 2012
SADC Model Law on Data Protection, 2012
SADC Model Law on Cybercrime, 2012
Technical Assistance was offered by HIPSSA (ITU
project) for the drafting of the Model Laws
The Model Laws were adopted at a SADC Ministerial
meeting in 2012
ECOWAS
Directive on Fighting Cybercrime, 2009
Incorporation of legal framework for Member States
Emphasis on cybercrime, data protection, search and
seizure
EAC
Regional e-Government Programme adopted by the EAC Council
of Ministers (2006)
Enabling legal framework as a critical factor: e-transactions,
cybersecurity
Harmonized regional and national legal frameworks
Creation of an EAC Task Force (2008)
Background: East African Community Secretariat, ‘Report of the
2nd EAC Regional Taskforce Meting on Cyber Laws’ (2008)
http://r0.unctad.org/ecommerce/event_docs/kampala_eac_2008_report.pdf
The EAC legal framework for Cyber Laws (Phase I) covering
electronic transactions; electronic signatures and authentication,
cyber crime, and data protection and privacy have been adopted
by the Council of Ministers (2012)
EAC
“The East African Development Strategy (2011/12 –
2015/16) proposes the key drivers for the realization of the
EAC regional integration agenda in the next five years to
include, among others, creation of a strong legal framework
(…)
The development of cyber laws in the region is critical to
underpin the realisation of full potentials in regional e-
commerce, electronic financial transactions and business
processes outsourcing.”
Hon. Musa Sirma, Chairperson of the Council of Ministers of the East
African Community and Minister for East African Community, Republic of
Kenya, at the occasion of the presentation of the budget of the EAC for
the financial year 2012/2013 to the legislative assembly
Encode Electronic Commerce –
Legislative Models and Approaches
Legislation Enabling Electronic Transacting
The legal recognition of data messages – technology neutrality
‰The requirement of “writing” to be met by data messages
‰The requirement of “original” documents and functional
equivalence The admissibility and evidential weight of data
messages
‰The retention of data messages
‰The formation and validity of electronic contracts
‰Recognition by parties of data messages
‰The attribution of data messages
Liability of internet service providers
‰Acknowledgement of receipt
‰Time and place of receipt and dispatch of data messages
Legislation Enabling Protection of Personal Data
Definition of Personal Information
Definition of Controller
Minimum Security Safeguards
Regulator
Sharing of Personal Information with Third Parties
Cross-border transfer of Personal Information
Legislation enabling Electronic Signatures
Electronic authentication technologies allow the recipient
of the electronic communication to:
‰Verify the identity of the sender
‰Verify the fact that the content of the message has not changed
since transmission; and
Ensure that the sender cannot later repudiate the message.
Prescribed (security) standards
Accreditation Authorities
Functional equivalence
Methods to procure integrity of communications, identity of
sender
Legislation Governing Electronic Interception and
Surveillance
Definition of interception
Powers of interception – Who? When? Why? How?
Restrictions on interception
Enabling interception capabilities
Interception records
Unlawful interception
Rights of employers
Legislation Governing Cybercrime
Definition of cybercrimes
e.g. unauthorised access, e-fraud,
Offences
Penalties
Powers of search and seizure
Intellectual Property Legislation
Domain Name Administration
Review of trade mark legislation
Application of copyright in digital world
Copying, distribution, remix
Intellectual property in software
South Africa
Electronic Commerce Regulation
Electronic Communications Act
Electronic Communications and Transactions Act (ECT
Act)
Protection of Personal Information Act
Regulation of Interception and Interception Related
Communications Act
Constitution of South Africa
Consumer Protection Act
ECT Act, 2002
Case Law
SB Jafta v. Ezemvelo KZN Wildlife – email acceptance
of employment contract
S v Motata – admissibility of cellphone data
Namibia
(Some) Lessons from Namibia ICT Policy Proposal
Ensure that there is adequate and appropriate participation in
global dialogues.
Many global initiatives have been undertaken, most led by the
developed countries with minimal input from developing
countries.
Ensure that representatives are fully conversant with the
complexities of global information society issues.
Conduct feasibility studies to ensure that all such mechanisms
are sustainable in terms of financial, technical and human
resources and that, if such vehicles are government-driven, that
there is the political will to sustain them.
The implementation of universal access mechanisms must be
accelerated to participate fully in the Global Information Society.
How suitable are our policy and legal frameworks
in connection with developments and trends at
the technology layer - as a lens for regulatory
responsiveness to electronic commerce?
Group Activity and Discussion:
Mind the Gap (45 minutes)
In Closing
Other Considerations
The drive to harmonise
Multiple regional policy efforts – conflict, impose
compliance obligations, outdated
E-commerce in the context of international private laws e.g.
international contracting
Developing country case studies – unique opportunities
and constraints
African case studies - unique opportunities and constraints
Mauritian data protection regulator, e-signature accreditation
Rwandan ICT strategies
Regulatory impact assessments
Pria Chetty
Technology and Innovation
Law and Policy Advisor
endcode.org
Thanx, Questions?

Más contenido relacionado

La actualidad más candente

The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsJanette Toral
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and CommerceEndcode_org
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the PhilippinesRaiaR
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionAkshay Sharma
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2safa
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-lawMd Aktar
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)franciscronje
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 

La actualidad más candente (20)

The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and Commerce
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protection
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 

Destacado

Copyright, Design And Patents Act, 1988
Copyright, Design And Patents Act, 1988Copyright, Design And Patents Act, 1988
Copyright, Design And Patents Act, 1988guest5d8b83
 
SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawChris Marsden
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
2015 09-10 Health Valley meets Topsector LSH Alain van Gool
2015 09-10 Health Valley meets Topsector LSH Alain van Gool2015 09-10 Health Valley meets Topsector LSH Alain van Gool
2015 09-10 Health Valley meets Topsector LSH Alain van GoolAlain van Gool
 
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
DEVNET-1186	Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...DEVNET-1186	Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...Cisco DevNet
 
Edited pictures presentation
Edited pictures presentationEdited pictures presentation
Edited pictures presentationalexjr1996
 
After Using Advisor Chat
After Using Advisor ChatAfter Using Advisor Chat
After Using Advisor ChatRightFinAdvisor
 
Video becomes a fundamental service and the industry needs to adapt
Video becomes a fundamental service and the industry needs to adaptVideo becomes a fundamental service and the industry needs to adapt
Video becomes a fundamental service and the industry needs to adaptTuan Anh Nguyen
 
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveTargeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveCisco DevNet
 
2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers2016 06 Radboud Technology Centers
2016 06 Radboud Technology CentersAlain van Gool
 
ΤΟ ΣΕΝΑΡΙΟ ΤΗΣ ΟΔΥΣΣΕΙΑΣ
ΤΟ ΣΕΝΑΡΙΟ ΤΗΣ ΟΔΥΣΣΕΙΑΣΤΟ ΣΕΝΑΡΙΟ ΤΗΣ ΟΔΥΣΣΕΙΑΣ
ΤΟ ΣΕΝΑΡΙΟ ΤΗΣ ΟΔΥΣΣΕΙΑΣVacationns
 
2016-07 Interview Medisch Contact
2016-07 Interview Medisch Contact 2016-07 Interview Medisch Contact
2016-07 Interview Medisch Contact Alain van Gool
 
Tia resume' 13'
Tia resume' 13'Tia resume' 13'
Tia resume' 13'tiarice
 
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikaiVaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikaivalentina valentina
 
Global IT report in 2015
Global IT report in 2015Global IT report in 2015
Global IT report in 2015Tuan Anh Nguyen
 

Destacado (20)

Copyright, Design And Patents Act, 1988
Copyright, Design And Patents Act, 1988Copyright, Design And Patents Act, 1988
Copyright, Design And Patents Act, 1988
 
SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet Law
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
2015 09-10 Health Valley meets Topsector LSH Alain van Gool
2015 09-10 Health Valley meets Topsector LSH Alain van Gool2015 09-10 Health Valley meets Topsector LSH Alain van Gool
2015 09-10 Health Valley meets Topsector LSH Alain van Gool
 
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
DEVNET-1186	Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...DEVNET-1186	Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
DEVNET-1186 Harnessing the Power of the Cloud to Detect Advanced Threats: Cog...
 
Edited pictures presentation
Edited pictures presentationEdited pictures presentation
Edited pictures presentation
 
Social trends 2016
Social trends 2016Social trends 2016
Social trends 2016
 
After Using Advisor Chat
After Using Advisor ChatAfter Using Advisor Chat
After Using Advisor Chat
 
Esd 14
Esd 14Esd 14
Esd 14
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Video becomes a fundamental service and the industry needs to adapt
Video becomes a fundamental service and the industry needs to adaptVideo becomes a fundamental service and the industry needs to adapt
Video becomes a fundamental service and the industry needs to adapt
 
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveTargeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
 
2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers2016 06 Radboud Technology Centers
2016 06 Radboud Technology Centers
 
ΤΟ ΣΕΝΑΡΙΟ ΤΗΣ ΟΔΥΣΣΕΙΑΣ
ΤΟ ΣΕΝΑΡΙΟ ΤΗΣ ΟΔΥΣΣΕΙΑΣΤΟ ΣΕΝΑΡΙΟ ΤΗΣ ΟΔΥΣΣΕΙΑΣ
ΤΟ ΣΕΝΑΡΙΟ ΤΗΣ ΟΔΥΣΣΕΙΑΣ
 
2016-07 Interview Medisch Contact
2016-07 Interview Medisch Contact 2016-07 Interview Medisch Contact
2016-07 Interview Medisch Contact
 
Tia resume' 13'
Tia resume' 13'Tia resume' 13'
Tia resume' 13'
 
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikaiVaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
Vaizdine metodine medziaga svietejams 8 dalis sveiki ir laimingi vaikai
 
Los nombres de villayon
Los nombres de villayonLos nombres de villayon
Los nombres de villayon
 
Global IT report in 2015
Global IT report in 2015Global IT report in 2015
Global IT report in 2015
 

Similar a E-commerce regulation pria chetty

CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Wsis Alf C7 Unctad
Wsis Alf C7 UnctadWsis Alf C7 Unctad
Wsis Alf C7 Unctadecommerce
 
legalchallengesine-commerceppt-170211074338.pdf
legalchallengesine-commerceppt-170211074338.pdflegalchallengesine-commerceppt-170211074338.pdf
legalchallengesine-commerceppt-170211074338.pdfSanjayDahal8
 
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...Dr Lendy Spires
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyookaAmbrose Ruyooka,PMP,CGEIT, CRISC
 
Retail
RetailRetail
Retailcefy1
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in indiaatuljaybhaye
 
Enhancing the support structure for e governance (NCS Lagos conference)
Enhancing the support structure for e governance (NCS Lagos conference)Enhancing the support structure for e governance (NCS Lagos conference)
Enhancing the support structure for e governance (NCS Lagos conference)Rasheed Adegoke
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3safa
 
Role of Information Technology in international trade
Role of Information Technology in international tradeRole of Information Technology in international trade
Role of Information Technology in international tradeVijyata Singh
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Internet Regulatory Framework
Internet Regulatory FrameworkInternet Regulatory Framework
Internet Regulatory FrameworkJeril Peter
 

Similar a E-commerce regulation pria chetty (20)

Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
 
CTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile BarayreCTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile Barayre
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Wsis Alf C7 Unctad
Wsis Alf C7 UnctadWsis Alf C7 Unctad
Wsis Alf C7 Unctad
 
legalchallengesine-commerceppt-170211074338.pdf
legalchallengesine-commerceppt-170211074338.pdflegalchallengesine-commerceppt-170211074338.pdf
legalchallengesine-commerceppt-170211074338.pdf
 
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
Retail
RetailRetail
Retail
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Enhancing the support structure for e governance (NCS Lagos conference)
Enhancing the support structure for e governance (NCS Lagos conference)Enhancing the support structure for e governance (NCS Lagos conference)
Enhancing the support structure for e governance (NCS Lagos conference)
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Brief kif0809
Brief kif0809Brief kif0809
Brief kif0809
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
Role of Information Technology in international trade
Role of Information Technology in international tradeRole of Information Technology in international trade
Role of Information Technology in international trade
 
bourassa.ppt
bourassa.pptbourassa.ppt
bourassa.ppt
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Internet Regulatory Framework
Internet Regulatory FrameworkInternet Regulatory Framework
Internet Regulatory Framework
 

Más de Endcode_org

Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting PresentationEndcode_org
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationEndcode_org
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Consumer Protection
Consumer ProtectionConsumer Protection
Consumer ProtectionEndcode_org
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Innovator's Guide to the IP Galaxy
Innovator's Guide to the IP GalaxyInnovator's Guide to the IP Galaxy
Innovator's Guide to the IP GalaxyEndcode_org
 
Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)Endcode_org
 

Más de Endcode_org (8)

Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
The Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A PresentationThe Protection of Personal Information Act: A Presentation
The Protection of Personal Information Act: A Presentation
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Consumer Protection
Consumer ProtectionConsumer Protection
Consumer Protection
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Innovator's Guide to the IP Galaxy
Innovator's Guide to the IP GalaxyInnovator's Guide to the IP Galaxy
Innovator's Guide to the IP Galaxy
 
Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)Mutual Non Disclosure Agreement (South Africa)
Mutual Non Disclosure Agreement (South Africa)
 

Último

Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Vladyslav Fliahin: Applications of Gen AI in CV (UA)
Vladyslav Fliahin: Applications of Gen AI in CV (UA)Vladyslav Fliahin: Applications of Gen AI in CV (UA)
Vladyslav Fliahin: Applications of Gen AI in CV (UA)Lviv Startup Club
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdfSherl Simon
 
Exploring Elite Translation Services in Your Vicinity
Exploring Elite Translation Services in Your VicinityExploring Elite Translation Services in Your Vicinity
Exploring Elite Translation Services in Your VicinityThe Spanish Group
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration TrainingCalvinarnold843
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...PRnews2
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Lviv Startup Club
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 

Último (20)

Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Vladyslav Fliahin: Applications of Gen AI in CV (UA)
Vladyslav Fliahin: Applications of Gen AI in CV (UA)Vladyslav Fliahin: Applications of Gen AI in CV (UA)
Vladyslav Fliahin: Applications of Gen AI in CV (UA)
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate Professional
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
 
Exploring Elite Translation Services in Your Vicinity
Exploring Elite Translation Services in Your VicinityExploring Elite Translation Services in Your Vicinity
Exploring Elite Translation Services in Your Vicinity
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration Training
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 

E-commerce regulation pria chetty

  • 1. ELECTRONIC COMMERCE REGULATION – AFRICA PURSUING GLOBAL OPPORTUNITIES PRIA CHETTY TECHNOLOGY & INNOVATION LAW AND POLICY ADVISOR/ ENDCODE.ORG
  • 2. Overview of Presentation Electronic Commerce – The Opportunity and Trends Background to global electronic commerce regulation – key models and frameworks. Countries looking to benefit from electronic commerce need to assess the policy and legal environment related to the ease of global, collaborative and integrated approaches. Group Activity and Discussion: How suitable are our policy and legal frameworks in connection with developments and trends at the technology layer - as a lens for for regulatory responsiveness to electronic commerce?
  • 3. Exploring Electronic Commerce – The Opportunity, The Trends
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Do you shop online? What are your concerns when shopping online? Group Activity and Discussion: Trust and Confidence in E-Commerce
  • 10. ICT Policy and Regulation With the right policies and objectives in place, Information and Communications Technologies (ICTs) can have far- reaching and positive effects on development. ICTs are not a magic bullet, nor an alternative to other development investments, but if applied in the right way they are potentially a crucial enabling factor for development.
  • 11. E-Commerce Regulation Convergence of technologies is the major driving factor that contributes to the exponential growth of electronic commerce. Convergence goes beyond the use of technology to develop new products and services and is seen as a vehicle to improve the quality of life of society in South Africa and other developing countries. Convergence will open new opportunities for all as everyone gains equal access to information and the global markets. Small business will be able to compete on an equal footing with big business. What is needed is an environment that is conducive to conducting business and sharing information with confidence. Government will provide support by setting policy and regulatory frameworks that are appropriate to the information communications technology sector while taking cognisance of the pervasive nature of e-commerce and the challenges pertaining to legal and security matters.
  • 12. The Issue List Concepts such as “writing,” “document” or “signature” not easily applied in digital world Legacy laws - requirement in law for certain transactions to be conducted in paper/ in person Requirements in law for record retention in paper Statutory requirements may prohibit online transacting Requirement in law for admissibility of evidence Conflicts in policies, laws, standards and trade practices in different jurisdictions
  • 13. The Issue List Protection of personal data exchanged Online consumer protection Internet transaction taxation Criminalisation of new cyber-crimes Government’s powers and capacity to investigate and prosecute crimes on the internet Alignment of intellectual property laws to the digital world Administration of domain names Regulation of ISPs
  • 14. Key Concepts in Electronic Commerce Regulation Technology neutrality Functional equivalence Non-discrimination Two-tier approach, Minimalist approach Harmonisation Multi-disciplinary approach Identity Management and Authentication Promoting trust and confidence
  • 15. Encoding Electronic Commerce – Key Models and Regulatory Approaches
  • 16. Electronic Commerce Regulation UNCITRAL AU SADC ECOWAS National Others: OECD, ITU, WIPO Globally, there are multiple initiatives, efforts, models at international, national and regional levels. Particularly to: Promote harmonised, global, coherent and co-ordinated approaches; Address legal barriers to electronic commerce; and Promote trust and confidence in electronic transacting methods
  • 17. UNCITRAL (1996) MLEC – Model Law on Electronic Commerce Promote greater consistency in national and regional approaches. Create a more secure legal environment for electronic commerce for providing a model reference for legislators Implemented by several countries In Africa – implemented by South Africa, Cape Verde, Mauritius
  • 18. UNCITRAL Model Law Provides for the legal approach to non-discrimination, technological neutrality and functional equivalence, Fundamentally provides for rules for the formation and validity of contracts concluded by electronic means, for the attribution of data messages, for the acknowledgement of receipt and for determining the time and place of dispatch and receipt of data messages. Guide to Enactment, provides background and explanatory text for countries seeking to implement the Model Law CLOUT (Case Law on UNCITRAL Texts) - cases relevant to UNCITRAL Model Law
  • 19. Africa Initiatives by, for instance: AU (African Union) SADC (the Southern African Development Community) ECOWAS (Economic Community of West African States), EAC (East African Co-operation)
  • 20. AU According to the Website: The Draft Convention gives effect to a Resolution of the last session of the Assembly of Heads of State and Government of the African Union, and seeks to harmonize African cyber legislations on electronic commerce organization, personal data protection, cyber security promotion and cyber crime control. In pursuance of the principles of the African Information Society Initiative (AISI) and the African Regional Action Plan for the Knowledge Economy (ARAPKE), the Draft Convention is intended not only to define the objectives and broad orientations for the Information Society in Africa, but also to strengthen existing legislations in Member States and the Regional Economic Communities (RECs) on the Information and Communication Technologies. It defines the security rules essential to establishing a credible digital space in response to the major security related obstacles to the development of digital transactions in Africa. It lays the foundation for an African Union-wide cyber ethics and enunciates fundamental principles in the key areas of cyber security. It also defines the basis for electronic commerce, puts in place a mechanism for combating intrusions into private life likely to be generated by the gathering, processing, transmission, storage and use of personal data and sets broad guidelines for incrimination and repression of cyber crime. Its adoption would capitalize African and international experiences in cyber legislations and speed up relevant reforms in African States and the RECs.
  • 21. AU Draft Convention The objective of this Convention is to propose the adoption at the level of the African Union, a Convention establishing a credible framework for cybersecurity in Africa through organisation of electronic transactions, protection of personal data , promotion of cyber security , e-governance and combating cybercrime
  • 22. AU Draft Convention - Complexities Information security impacts on the security of the digital and cultural heritage of individuals, organizations and nations; The vulnerability in the normal functioning of institutions can compromise the survival and sovereignty of States; Addressing cyber security calls for clear-sighted political will to define and implement a strategy for development of digital infrastructure and services (eservices) and articulate a coherent, effective and controllable multi-disciplinary cyber security strategy.
  • 23. AU Draft Convention - Challenges Achieve a level of technological security adequate enough to prevent and effectively control technological and informational risks; Build an information society that respects values, protects rights and freedoms, and guarantees the security of the property of persons, organizations and nations; Contribute to the knowledge economy, guarantee equal access to information while stimulating the creation of authentic knowledge; Create a climate of confidence and trust, that is: Predictable in terms of prevention and resolution of disputes; and evolving because it takes into account continued technological evolution; Organized: covering the relevant sectors; Protective: of consumers and intellectual property (civil and penal) of citizens, organizations and nations; Secured: striking proper balance between legal and technological security; Integrated into the international order: providing meaningful articulation between the national, regional and global levels.
  • 24. AU Convention - Content
  • 25. AU Convention - Criticism
  • 26. SADC Declaration on Information and Communications Technology (ICT) , 2001 s 2(d): ‘WE SHALL UNDERTAKE to work together to remove barriers of electronic commerce in our SADC countries as a means to opening opportunities and benefits such as increased access to markets, opportunities to create economic value and cultural assets, reduced administrative costs, and improvement of public services. There is a need to adopt and adapt technologies that enable e- commerce capability to avoid increasing exclusion from the global economy.’ SADC developed a ‘Model Law on Electronic Transactions and Data Protection’ in November 2003.
  • 27. SADC (e-Commerce Readiness Study, 2012) Validation Workshop for the e-Commerce Readiness Study in the SADC Sub-Region Part of the e-SADC Strategic Framework o develop a holistic approach to harnessing ICT for socio-economic development and regional integration One objective - deployment of eservices, particularly e-commerce to benefit from global opportunities and develop a regional ecommerce strategic action plan. Angola, Botswana, DRC, Lesotho, Mauritius, and South Africa were earmarked for the readiness study
  • 28. SADC (e-Commerce Readiness Study, 2012) SADC e-Commerce Strategy encompasses the following four main pillars: Enabled e-Commerce Environment; A Capacity Development Programme for e-Commerce Strengthening e-Commerce Sub-Regional and National Infrastructure; and Institutionalized Framework to Implement, Evolve and Govern the Current Strategy Mauritius: · ICTA Public Key Infrastructure (PKI); · Concept of e-Payment; · Computer Emergency Response Team - Mauritius (CERT-MU); and · e-Commerce Strategy for Mauritius Post Ltd.
  • 29. SADC Model Law on E-Transactions and E- Commerce, 2012
  • 30. SADC Model Law, “This Model Law addresses the scope of application of key concepts and proposes neutral definitions for them. The legal recognition of electronic communications and the legal effect of electronic communications are addressed. Clear rules for electronic transactions are adopted. E-commerce issues such as the attribution of electronic communications and electronic signatures, and the admissibility and evidentiary weight of electronic evidence are addressed. The obligations of online suppliers are addressed. These include the type of information made available to consumers on the information system where such goods or services are offered, and a consumer’s right to a cooling-off period, review of a transaction, withdrawal from a transaction, and the performance, correction or cancellation of a transaction for goods and services are addressed. Lastly, service providers’ liability is addressed.”
  • 31. Other SADC Model Laws, 2012 SADC Model Law on Data Protection, 2012 SADC Model Law on Cybercrime, 2012 Technical Assistance was offered by HIPSSA (ITU project) for the drafting of the Model Laws The Model Laws were adopted at a SADC Ministerial meeting in 2012
  • 32. ECOWAS Directive on Fighting Cybercrime, 2009 Incorporation of legal framework for Member States Emphasis on cybercrime, data protection, search and seizure
  • 33. EAC Regional e-Government Programme adopted by the EAC Council of Ministers (2006) Enabling legal framework as a critical factor: e-transactions, cybersecurity Harmonized regional and national legal frameworks Creation of an EAC Task Force (2008) Background: East African Community Secretariat, ‘Report of the 2nd EAC Regional Taskforce Meting on Cyber Laws’ (2008) http://r0.unctad.org/ecommerce/event_docs/kampala_eac_2008_report.pdf The EAC legal framework for Cyber Laws (Phase I) covering electronic transactions; electronic signatures and authentication, cyber crime, and data protection and privacy have been adopted by the Council of Ministers (2012)
  • 34. EAC “The East African Development Strategy (2011/12 – 2015/16) proposes the key drivers for the realization of the EAC regional integration agenda in the next five years to include, among others, creation of a strong legal framework (…) The development of cyber laws in the region is critical to underpin the realisation of full potentials in regional e- commerce, electronic financial transactions and business processes outsourcing.” Hon. Musa Sirma, Chairperson of the Council of Ministers of the East African Community and Minister for East African Community, Republic of Kenya, at the occasion of the presentation of the budget of the EAC for the financial year 2012/2013 to the legislative assembly
  • 35.
  • 36.
  • 37.
  • 38. Encode Electronic Commerce – Legislative Models and Approaches
  • 39. Legislation Enabling Electronic Transacting The legal recognition of data messages – technology neutrality ‰The requirement of “writing” to be met by data messages ‰The requirement of “original” documents and functional equivalence The admissibility and evidential weight of data messages ‰The retention of data messages ‰The formation and validity of electronic contracts ‰Recognition by parties of data messages ‰The attribution of data messages Liability of internet service providers ‰Acknowledgement of receipt ‰Time and place of receipt and dispatch of data messages
  • 40. Legislation Enabling Protection of Personal Data Definition of Personal Information Definition of Controller Minimum Security Safeguards Regulator Sharing of Personal Information with Third Parties Cross-border transfer of Personal Information
  • 41. Legislation enabling Electronic Signatures Electronic authentication technologies allow the recipient of the electronic communication to: ‰Verify the identity of the sender ‰Verify the fact that the content of the message has not changed since transmission; and Ensure that the sender cannot later repudiate the message. Prescribed (security) standards Accreditation Authorities Functional equivalence Methods to procure integrity of communications, identity of sender
  • 42. Legislation Governing Electronic Interception and Surveillance Definition of interception Powers of interception – Who? When? Why? How? Restrictions on interception Enabling interception capabilities Interception records Unlawful interception Rights of employers
  • 43. Legislation Governing Cybercrime Definition of cybercrimes e.g. unauthorised access, e-fraud, Offences Penalties Powers of search and seizure
  • 44. Intellectual Property Legislation Domain Name Administration Review of trade mark legislation Application of copyright in digital world Copying, distribution, remix Intellectual property in software
  • 46. Electronic Commerce Regulation Electronic Communications Act Electronic Communications and Transactions Act (ECT Act) Protection of Personal Information Act Regulation of Interception and Interception Related Communications Act Constitution of South Africa Consumer Protection Act
  • 48. Case Law SB Jafta v. Ezemvelo KZN Wildlife – email acceptance of employment contract S v Motata – admissibility of cellphone data
  • 50.
  • 51. (Some) Lessons from Namibia ICT Policy Proposal Ensure that there is adequate and appropriate participation in global dialogues. Many global initiatives have been undertaken, most led by the developed countries with minimal input from developing countries. Ensure that representatives are fully conversant with the complexities of global information society issues. Conduct feasibility studies to ensure that all such mechanisms are sustainable in terms of financial, technical and human resources and that, if such vehicles are government-driven, that there is the political will to sustain them. The implementation of universal access mechanisms must be accelerated to participate fully in the Global Information Society.
  • 52. How suitable are our policy and legal frameworks in connection with developments and trends at the technology layer - as a lens for regulatory responsiveness to electronic commerce? Group Activity and Discussion: Mind the Gap (45 minutes)
  • 54. Other Considerations The drive to harmonise Multiple regional policy efforts – conflict, impose compliance obligations, outdated E-commerce in the context of international private laws e.g. international contracting Developing country case studies – unique opportunities and constraints African case studies - unique opportunities and constraints Mauritian data protection regulator, e-signature accreditation Rwandan ICT strategies Regulatory impact assessments
  • 55. Pria Chetty Technology and Innovation Law and Policy Advisor endcode.org Thanx, Questions?

Notas del editor

  1. Organisation for Economic Co-operation and Development (OECD) -Representing the largest volume and amounts of transaction (about 90%) the OECD has been by far the leader in the development of an e-commerce framework. International Telecommunication Union (ITU) Currently busy with the development of practical handbooks for telecommunications policy makers and regulators covering issues related to e-commerce in conjunction with the World Bank. The ITU will also seek to raise United Nations Commission of International Trade Law (UNCITRAL) Has developed and adopted model law on e-commerce in 1996, which offers national legislators a set of internationally acceptable rules as to how a number of legal obstacles to the communications of legally significant information in the form of electronic communications can be dealt with. Most member countries, irrespective of their sovereign privacy laws have largely ratified the UNCITRAL model law. United Nations Conference of Trade And Development (UNCTAD) Has published a set of documents, prevalent being electronic commerce: legal considerations." The document proposes joint collaborative efforts with UNCITRAL. UNCTAD proposes to further work jointly with the World Intellectual Property Organisation (WIPO), and the International Chamber of Commerce. World Intellectual Property Organisation (WIPO) The WIPO arbitration and mediation centre has established an internet based, online dispute resolution system that can provide a neutral, speedy and inexpensive means of resolving disputes without the physical movement of persons and things. WIPO further provides a legal framework to deal with issues of Intellectual Property and e-commerce. World Trade Organisation (WTO) The GATS provides a legal framework for all trade in electronic goods and services. TRIPS provides a framework for trade related aspects of Intellectual property rights and e-commerce.