SlideShare a Scribd company logo
1 of 17
 What is the Budapest
Convention?
 What impact?
 What benefits for Africa?
CTO Cyber Security Forum 2013
Yaoundé, Cameroon, 25 April 2013
Workshop on the
Budapest Convention on Cybercrime
www.coe.int/cybercrimealexander.seger@coe.int
About the Budapest Convention
Opened for signature November 2001 in Budapest
Followed by Cybercrime Convention Committee (T-CY) = Committee
of the Parties
As at December 2012:
 39 parties (35 European, Australia, Dominican Republic, Japan
and USA)
 11 signatories (European, Canada, South Africa)
 8 states invited to accede (Argentina, Chile, Costa Rica, Dominican
Republic, Mexico, Panama, Philippines, Senegal)
= 58 states are parties/are committed to become parties
 Additional invitations to accede are in process
 Many more have used Budapest Convention as a guideline for
domestic legislation
About States participating in Budapest Convention
Ratified/acceded: 39
 35 European
 Australia
 Dominican Republic
 Japan
 USA
Signed: 11
 9 European
 Canada
 South Africa
Invited to accede: 8
 Argentina
 Chile
 Costa Rica
 Mexico
 Morocco
 Panama
 Philippines
 Senegal
58
About joining the Budapest Convention
Phase 1:
 If a country has legislation
in place or advanced stage:
Letter from Government to
CoE expressing interest in
accession
 Consultations
(CoE/Parties) in view of
decision to invite
 Invitation to accede
Phase 2:
 Domestic procedure (e.g.
decision by national
Parliament)
 Deposit the instrument of
accession at the Council of
Europe
Treaty open for accession by any State (article 37)
 Acceded: Australia, Dominican
Republic
 Invited: Argentina, Chile, Costa
Rica, Mexico, Panama,
Philippines, Senegal
States that could seek accession
Ratified/acceded: 39
Signed: 11
Invited to accede: 8
= 58
Other States with laws/draft laws
largely in line with Budapest
Convention:
= at least 22
5780
States using Budapest Convention
Ratified/acceded: 39
Signed: 11
Invited to accede: 8
= 58
Other States with laws/draft laws largely
in line with Budapest Convention = 22
Further States drawing on Budapest
Convention for legislation = 45
125
Indicative map only
About the scope of Budapest Convention
Criminalising
conduct
 Illegal access
 Illegal interception
 Data interference
 System
interference
 Misuse of devices
 Fraud and forgery
 Child pornography
 IPR-offences
Procedural tools
 Expedited
preservation
 Search and
seizure
 Interception of
computer data
International
cooperation
 Extradition
 MLA
 Spontaneous
information
 Expedited
preservation
 MLA for
accessing
computer data
 MLA for
interception
 24/7 points of
contact
+ +
Harmonisation
Functioning of the Budapest Convention
Cybercrime
Prevention and
Criminal Justice
to protect you and
your rights in
cyberspace
1 Standards: Budapest Convention
and related instruments
3 Capacity building:
Technical cooperation
programmes
2 Follow up and
assessments:
Cybercrime Convention
Committee (T-CY)
www.coe.int/cybercrime
Budapest Convention as a guideline
www.coe.int/cybercrime
 Use as “checklist”
 Compare articles
Articles of the
Convention
Provisions in
domestic law
Art 4 System
interference
Art 9 Child
pornography
Art 16
Expedited
preservation
Art 6 Misue of
devices
?
?
?
?
See country profiles at
www.coe.int/cybercrime
Budapest Convention as a guideline
www.coe.int/cybercrime
Article Budapest Convention Law of Cameroon
Art. 1 Definitions Article 4
Art. 2 Illegal access Article 68 , 69
Art. 3 Illegal interception Article 65, 84
Art. 4 Data interference Article 71
Art. 5 System interference Articles 66, 67, 70
Art. 6 Misuse of devices Article 86
Example: Loi relative à la cyber sécurité et à la
cybercriminalité au Cameroun (2010)
Budapest Convention as a guideline
www.coe.int/cybercrime
Example: Loi relative à la cyber sécurité et à la
cybercriminalité au Cameroun (2010)
Article Budapest Convention Law of Cameroon
Art. 7 Computer-related
forgery
Article 73
Art. 8 Computer-related fraud Article 72
Art. 9 Child pornography Articles 76, 80, 81
Art. 10 IPR offences
Art. 11 Attempt, aiding, abetting
Art. 12 Corporate liability
Budapest Convention as a guideline
www.coe.int/cybercrime
Example: Loi relative à la cyber sécurité et à la
cybercriminalité au Cameroun (2010)
Article Budapest Convention Law of Cameroon
Art. 15 Conditions and safeguards
Art. 16 Expedited preservation ? (Data retention 10
years)
Art. 17 Expedited preservation and
partial disclosure of traffic data
-
Art. 18 Production order Article 57
Art. 19 Search and seizure Articles 53-59
Art. 20 Real-time collection traffic data Article 25
Art. 21 Interception of content data Articles 49-51
Art. 22 Jurisdiction
Protecting children: criminal law benchmarks
Budapest Convention
 Substantive criminal law
 Article 9 Child pornograpy
 Procedural law (scope and
specific provisions)
 Expedited preservation
 Search and seizure
 Interception
 etc
 International cooperation
(general and specific
provisions)
+
Lanzarote
Convention
 Substantive criminal law
 Art 18 Sexual abuse
 Art 19 Child prostitution
 Art 20 Child pornography
 Art 21 Child participation
in pornographic
performances
 Art 22 Corruption of
children
 Art 23 Solicitation of
children for sexual
purposes
Capacity building: Technical cooperation programmes
Focus on:
 Cybercrime strategies
 Legislation and safeguards
 Cybercrime units
 Law enforcement training
 Judicial training
 Financial investigations
 Protecting children
 Public/private cooperation
 International cooperation
Council of Europe global and
regional projects:
 500+ activities with 125+
countries & 130+
organisations and private
sector since 2006
 New joint EU/COE project on
Global Action on Cybercrime
in 2013
 Encouraging other donors to
provide assistance to
countries in implementing
Budapest Convention
Capacity building
Effectiveness/Impact of the Budapest Convention
 Stronger and more harmonised legislation
 More efficient international cooperation
between Parties
 Better cybersecurity performance
 More investigation, prosecution and
adjudication of cybercrime and e-
evidence cases
 Trusted partnerships and public/private
cooperation
 Catalyst for capacity building
 Contribution to human rights/rule of law
in cyberspace
= “Protecting you and your rights”
Obstacles:
1. Limited criminal
justice capacities
2. Political
disagreements
The Budapest
Convention is
in place and
functioning.
www.coe.int/cybercrime
Benefits for Africa
Benefits
 Trusted and efficient cooperation with other Parties
 Participation in the Cybercrime Convention Committee (T-
CY)
 Participation in future standard setting (Guidance Notes,
Protocols and other additions to Budapest Convention)
 Enhanced trust by private sector
 Technical assistance and capacity building
“Cost”: Commitment to cooperate
Disadvantages?
Contact for follow up
www.coe.int/cybercrime
Alexander.seger@coe.int
Secretary of the Cybercrime
Convention Committee (T-CY)
Council of Europe
Strasbourg, France
www.coe.int/cybercrime

More Related Content

What's hot

Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.anveshika thakur
 
International criminal-law
International criminal-lawInternational criminal-law
International criminal-lawMainan Ray
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Functions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in GeneralFunctions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in GeneralPhani Mohan K
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspacePanjab University
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 

What's hot (20)

Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Adr v/s odr
Adr v/s odrAdr v/s odr
Adr v/s odr
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
It act 2000
It act 2000It act 2000
It act 2000
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
International criminal-law
International criminal-lawInternational criminal-law
International criminal-law
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Functions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in GeneralFunctions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in General
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
 
Police management
Police managementPolice management
Police management
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
International criminal law
International criminal lawInternational criminal law
International criminal law
 

Similar to Benefits of Budapest Convention for Africa

CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...MIS Quarterly
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
The Digital Services Act - soon in your country
The Digital Services Act - soon in your countryThe Digital Services Act - soon in your country
The Digital Services Act - soon in your countryKirsten Fiedler
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...CODE BLUE
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secureKirsten Fiedler
 
High level-principles-on-mutual-legal-assistance
High level-principles-on-mutual-legal-assistanceHigh level-principles-on-mutual-legal-assistance
High level-principles-on-mutual-legal-assistanceDr Lendy Spires
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 
A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...ePractice.eu
 
Advanced cooperative digital platforms for parliaments
Advanced cooperative digital platforms for parliamentsAdvanced cooperative digital platforms for parliaments
Advanced cooperative digital platforms for parliamentsDr. Fotios Fitsilis
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 

Similar to Benefits of Budapest Convention for Africa (20)

CTO Cybersecurity Forum 2013 Alexander Seger
CTO Cybersecurity Forum 2013 Alexander SegerCTO Cybersecurity Forum 2013 Alexander Seger
CTO Cybersecurity Forum 2013 Alexander Seger
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Day 02 - Meeting DPAs from Western Balkans and Eastern Partnership countries
Day 02 -  Meeting DPAs from Western Balkans and Eastern Partnership countriesDay 02 -  Meeting DPAs from Western Balkans and Eastern Partnership countries
Day 02 - Meeting DPAs from Western Balkans and Eastern Partnership countries
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
The Digital Services Act - soon in your country
The Digital Services Act - soon in your countryThe Digital Services Act - soon in your country
The Digital Services Act - soon in your country
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
 
High level-principles-on-mutual-legal-assistance
High level-principles-on-mutual-legal-assistanceHigh level-principles-on-mutual-legal-assistance
High level-principles-on-mutual-legal-assistance
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...
 
Advanced cooperative digital platforms for parliaments
Advanced cooperative digital platforms for parliamentsAdvanced cooperative digital platforms for parliaments
Advanced cooperative digital platforms for parliaments
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
CTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile BarayreCTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile Barayre
 

More from Commonwealth Telecommunications Organisation

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 

Recently uploaded

🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...Apsara Of India
 
BERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxBERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxseri bangash
 
08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking MenDelhi Call girls
 
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultantvisa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa ConsultantSherazi Tours
 
DARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxDARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxBeEducate
 
"Embark on the Ultimate Adventure: Top 10 Must-Visit Destinations for Thrill-...
"Embark on the Ultimate Adventure: Top 10 Must-Visit Destinations for Thrill-..."Embark on the Ultimate Adventure: Top 10 Must-Visit Destinations for Thrill-...
"Embark on the Ultimate Adventure: Top 10 Must-Visit Destinations for Thrill-...Ishwaholidays
 
Hire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
Hire 💕 8617697112 Champawat Call Girls Service Call Girls AgencyHire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
Hire 💕 8617697112 Champawat Call Girls Service Call Girls AgencyNitya salvi
 
Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Sherazi Tours
 
ITALY - Visa Options for expats and digital nomads
ITALY - Visa Options for expats and digital nomadsITALY - Visa Options for expats and digital nomads
ITALY - Visa Options for expats and digital nomadsMarco Mazzeschi
 
High Profile 🔝 8250077686 📞 Call Girls Service in Siri Fort🍑
High Profile 🔝 8250077686 📞 Call Girls Service in Siri Fort🍑High Profile 🔝 8250077686 📞 Call Girls Service in Siri Fort🍑
High Profile 🔝 8250077686 📞 Call Girls Service in Siri Fort🍑Damini Dixit
 
Top 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxTop 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxdishha99
 
Kanpur Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Kanpur Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceKanpur Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Kanpur Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking MenDelhi Call girls
 
❤Personal Contact Number Varanasi Call Girls 8617697112💦✅.
❤Personal Contact Number Varanasi Call Girls 8617697112💦✅.❤Personal Contact Number Varanasi Call Girls 8617697112💦✅.
❤Personal Contact Number Varanasi Call Girls 8617697112💦✅.Nitya salvi
 
Texas Tales Brenham and Amarillo Experiences Elevated by Find American Rental...
Texas Tales Brenham and Amarillo Experiences Elevated by Find American Rental...Texas Tales Brenham and Amarillo Experiences Elevated by Find American Rental...
Texas Tales Brenham and Amarillo Experiences Elevated by Find American Rental...Find American Rentals
 
Book Cheap Flight Tickets - TraveljunctionUK
Book  Cheap Flight Tickets - TraveljunctionUKBook  Cheap Flight Tickets - TraveljunctionUK
Book Cheap Flight Tickets - TraveljunctionUKTravel Juncation
 
Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Sherazi Tours
 
Night 7k to 12k Daman Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Service ...
Night 7k to 12k Daman Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Service ...Night 7k to 12k Daman Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Service ...
Night 7k to 12k Daman Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Service ...Nitya salvi
 

Recently uploaded (20)

🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
 
BERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxBERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptx
 
08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men
 
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultantvisa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
 
DARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxDARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda Bux
 
"Embark on the Ultimate Adventure: Top 10 Must-Visit Destinations for Thrill-...
"Embark on the Ultimate Adventure: Top 10 Must-Visit Destinations for Thrill-..."Embark on the Ultimate Adventure: Top 10 Must-Visit Destinations for Thrill-...
"Embark on the Ultimate Adventure: Top 10 Must-Visit Destinations for Thrill-...
 
Hire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
Hire 💕 8617697112 Champawat Call Girls Service Call Girls AgencyHire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
Hire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
 
Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236
 
Call Girls Service !! Indirapuram!! @9999965857 Delhi 🫦 No Advance VVVIP 🍎 S...
Call Girls Service !! Indirapuram!! @9999965857 Delhi 🫦 No Advance  VVVIP 🍎 S...Call Girls Service !! Indirapuram!! @9999965857 Delhi 🫦 No Advance  VVVIP 🍎 S...
Call Girls Service !! Indirapuram!! @9999965857 Delhi 🫦 No Advance VVVIP 🍎 S...
 
ITALY - Visa Options for expats and digital nomads
ITALY - Visa Options for expats and digital nomadsITALY - Visa Options for expats and digital nomads
ITALY - Visa Options for expats and digital nomads
 
High Profile 🔝 8250077686 📞 Call Girls Service in Siri Fort🍑
High Profile 🔝 8250077686 📞 Call Girls Service in Siri Fort🍑High Profile 🔝 8250077686 📞 Call Girls Service in Siri Fort🍑
High Profile 🔝 8250077686 📞 Call Girls Service in Siri Fort🍑
 
Top 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxTop 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptx
 
Kanpur Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Kanpur Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceKanpur Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Kanpur Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men
 
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
 
❤Personal Contact Number Varanasi Call Girls 8617697112💦✅.
❤Personal Contact Number Varanasi Call Girls 8617697112💦✅.❤Personal Contact Number Varanasi Call Girls 8617697112💦✅.
❤Personal Contact Number Varanasi Call Girls 8617697112💦✅.
 
Texas Tales Brenham and Amarillo Experiences Elevated by Find American Rental...
Texas Tales Brenham and Amarillo Experiences Elevated by Find American Rental...Texas Tales Brenham and Amarillo Experiences Elevated by Find American Rental...
Texas Tales Brenham and Amarillo Experiences Elevated by Find American Rental...
 
Book Cheap Flight Tickets - TraveljunctionUK
Book  Cheap Flight Tickets - TraveljunctionUKBook  Cheap Flight Tickets - TraveljunctionUK
Book Cheap Flight Tickets - TraveljunctionUK
 
Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236
 
Night 7k to 12k Daman Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Service ...
Night 7k to 12k Daman Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Service ...Night 7k to 12k Daman Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Service ...
Night 7k to 12k Daman Call Girls 👉👉 8617697112⭐⭐ 100% Genuine Escort Service ...
 

Benefits of Budapest Convention for Africa

  • 1.  What is the Budapest Convention?  What impact?  What benefits for Africa? CTO Cyber Security Forum 2013 Yaoundé, Cameroon, 25 April 2013 Workshop on the Budapest Convention on Cybercrime www.coe.int/cybercrimealexander.seger@coe.int
  • 2. About the Budapest Convention Opened for signature November 2001 in Budapest Followed by Cybercrime Convention Committee (T-CY) = Committee of the Parties As at December 2012:  39 parties (35 European, Australia, Dominican Republic, Japan and USA)  11 signatories (European, Canada, South Africa)  8 states invited to accede (Argentina, Chile, Costa Rica, Dominican Republic, Mexico, Panama, Philippines, Senegal) = 58 states are parties/are committed to become parties  Additional invitations to accede are in process  Many more have used Budapest Convention as a guideline for domestic legislation
  • 3. About States participating in Budapest Convention Ratified/acceded: 39  35 European  Australia  Dominican Republic  Japan  USA Signed: 11  9 European  Canada  South Africa Invited to accede: 8  Argentina  Chile  Costa Rica  Mexico  Morocco  Panama  Philippines  Senegal 58
  • 4. About joining the Budapest Convention Phase 1:  If a country has legislation in place or advanced stage: Letter from Government to CoE expressing interest in accession  Consultations (CoE/Parties) in view of decision to invite  Invitation to accede Phase 2:  Domestic procedure (e.g. decision by national Parliament)  Deposit the instrument of accession at the Council of Europe Treaty open for accession by any State (article 37)  Acceded: Australia, Dominican Republic  Invited: Argentina, Chile, Costa Rica, Mexico, Panama, Philippines, Senegal
  • 5. States that could seek accession Ratified/acceded: 39 Signed: 11 Invited to accede: 8 = 58 Other States with laws/draft laws largely in line with Budapest Convention: = at least 22 5780
  • 6. States using Budapest Convention Ratified/acceded: 39 Signed: 11 Invited to accede: 8 = 58 Other States with laws/draft laws largely in line with Budapest Convention = 22 Further States drawing on Budapest Convention for legislation = 45 125 Indicative map only
  • 7. About the scope of Budapest Convention Criminalising conduct  Illegal access  Illegal interception  Data interference  System interference  Misuse of devices  Fraud and forgery  Child pornography  IPR-offences Procedural tools  Expedited preservation  Search and seizure  Interception of computer data International cooperation  Extradition  MLA  Spontaneous information  Expedited preservation  MLA for accessing computer data  MLA for interception  24/7 points of contact + + Harmonisation
  • 8. Functioning of the Budapest Convention Cybercrime Prevention and Criminal Justice to protect you and your rights in cyberspace 1 Standards: Budapest Convention and related instruments 3 Capacity building: Technical cooperation programmes 2 Follow up and assessments: Cybercrime Convention Committee (T-CY) www.coe.int/cybercrime
  • 9. Budapest Convention as a guideline www.coe.int/cybercrime  Use as “checklist”  Compare articles Articles of the Convention Provisions in domestic law Art 4 System interference Art 9 Child pornography Art 16 Expedited preservation Art 6 Misue of devices ? ? ? ? See country profiles at www.coe.int/cybercrime
  • 10. Budapest Convention as a guideline www.coe.int/cybercrime Article Budapest Convention Law of Cameroon Art. 1 Definitions Article 4 Art. 2 Illegal access Article 68 , 69 Art. 3 Illegal interception Article 65, 84 Art. 4 Data interference Article 71 Art. 5 System interference Articles 66, 67, 70 Art. 6 Misuse of devices Article 86 Example: Loi relative à la cyber sécurité et à la cybercriminalité au Cameroun (2010)
  • 11. Budapest Convention as a guideline www.coe.int/cybercrime Example: Loi relative à la cyber sécurité et à la cybercriminalité au Cameroun (2010) Article Budapest Convention Law of Cameroon Art. 7 Computer-related forgery Article 73 Art. 8 Computer-related fraud Article 72 Art. 9 Child pornography Articles 76, 80, 81 Art. 10 IPR offences Art. 11 Attempt, aiding, abetting Art. 12 Corporate liability
  • 12. Budapest Convention as a guideline www.coe.int/cybercrime Example: Loi relative à la cyber sécurité et à la cybercriminalité au Cameroun (2010) Article Budapest Convention Law of Cameroon Art. 15 Conditions and safeguards Art. 16 Expedited preservation ? (Data retention 10 years) Art. 17 Expedited preservation and partial disclosure of traffic data - Art. 18 Production order Article 57 Art. 19 Search and seizure Articles 53-59 Art. 20 Real-time collection traffic data Article 25 Art. 21 Interception of content data Articles 49-51 Art. 22 Jurisdiction
  • 13. Protecting children: criminal law benchmarks Budapest Convention  Substantive criminal law  Article 9 Child pornograpy  Procedural law (scope and specific provisions)  Expedited preservation  Search and seizure  Interception  etc  International cooperation (general and specific provisions) + Lanzarote Convention  Substantive criminal law  Art 18 Sexual abuse  Art 19 Child prostitution  Art 20 Child pornography  Art 21 Child participation in pornographic performances  Art 22 Corruption of children  Art 23 Solicitation of children for sexual purposes
  • 14. Capacity building: Technical cooperation programmes Focus on:  Cybercrime strategies  Legislation and safeguards  Cybercrime units  Law enforcement training  Judicial training  Financial investigations  Protecting children  Public/private cooperation  International cooperation Council of Europe global and regional projects:  500+ activities with 125+ countries & 130+ organisations and private sector since 2006  New joint EU/COE project on Global Action on Cybercrime in 2013  Encouraging other donors to provide assistance to countries in implementing Budapest Convention Capacity building
  • 15. Effectiveness/Impact of the Budapest Convention  Stronger and more harmonised legislation  More efficient international cooperation between Parties  Better cybersecurity performance  More investigation, prosecution and adjudication of cybercrime and e- evidence cases  Trusted partnerships and public/private cooperation  Catalyst for capacity building  Contribution to human rights/rule of law in cyberspace = “Protecting you and your rights” Obstacles: 1. Limited criminal justice capacities 2. Political disagreements The Budapest Convention is in place and functioning. www.coe.int/cybercrime
  • 16. Benefits for Africa Benefits  Trusted and efficient cooperation with other Parties  Participation in the Cybercrime Convention Committee (T- CY)  Participation in future standard setting (Guidance Notes, Protocols and other additions to Budapest Convention)  Enhanced trust by private sector  Technical assistance and capacity building “Cost”: Commitment to cooperate Disadvantages?
  • 17. Contact for follow up www.coe.int/cybercrime Alexander.seger@coe.int Secretary of the Cybercrime Convention Committee (T-CY) Council of Europe Strasbourg, France www.coe.int/cybercrime