SlideShare a Scribd company logo
1 of 15
 Introduction
 1. What is cyber legislation?
 2. Cyber legislation harmonization process in Central
Africa
 The sub-region concerned;
 Partner international organizations in the harmonization
of cyber legislation in Central Africa;
 ECCAS frame of reference for the harmonization;
 Retracing previous stages.
 3. Conclusion
 Harmonization of legislation can be defined as a legal
integration phenomenon whereby official expertise of two or
more countries are transferred to an international organization
endowed with decision-making powers and supranational or
supra state competencies, with a view to providing a single and
coherent legal package encompassing the laws that will set the
background for the required social and economic objectives of
the Member States. To achieve this, the States can either
choose the Convention’s technique or that of the Model law.
 Harmonization or coordination is the approximation of rules of
different origins to make them consistent by reducing or
eliminating the discrepancies and inconsistencies between them
so as to reach the results that are “compatible with each other
and with the desired community objectives”.
Cyber legislation is the term used today to refer to legal
provisions dealing with such issues as:
 The use of electronic signatures;
 The fight against cybercrime;
 The protection of personal information;
 Data secrecy;
 Protection of intellectual property ;
 Control of digital identities, among others….
In a nutshell, cyber legislation is all about the thematic areas
that will be addressed at this forum.
Several African organisations are rallying to work on a cyber-legislation
framework and harmonization of legislation on electronic communications.
 The sub-region concerned
The Sub-region concerned by the harmonization of cyberlegislation is the
Economic Community of Central African States/ECCAS.
 The Economic Community of Central African States (ECCAS) is an
international organization created to promote the economic, social and
cultural development of the African continent, in order to set up
regional structures that could progressively lead to a common market.
 ECCAS stemmed from the Lagos Plan of Action of April 1980 to lead
the Central African regional integration process. It is an institution
recognized by the African Union.
The organization brings together ten member States :
 Angola ;
 Burundi ;
 Cameroon ;
 Central Africa;
 Chad;
 Congo ;
 Democratic Republic of Congo (DRC) ;
 Equatorial Guinea;
 Gabon ;
 Sao Tome and Principe
The countries in bulk are equally members of the Economic and Monetary
Community of Central Africa (CEMAC/EMCAC).
 Partner international organizations in the harmonization of cyber
legislation in Central Africa;
 The United Nations Economic Commission for Africa (UN-ECA)
The Economic Commission for Africa (ECA) launched its project « African Information Society
Initiative » (AISI) in May 1996. This initiative consisted in helping African countries create an
environment in which knowledge is considered as being critical to economic growth and bridge the
digital divide between Africa and the rest of the world. ECA also implemented the « National
Information and Communication Infrastructure » (NICI) policy.
 The African Union (AU) Commission
During the extraordinary meeting of Johannesburg in 2009, the « Olivier Tambo Declaration »
adopted by the Conference of African Ministers in charge of communication and information
technologies entrusted the Commission of the African Union (AU) to draw up, together with ECA
within the framework of the African Information Society Initiative (AISI), a convention on cyber-
legislation that meets the needs of the continent and complies with good legal international
practices on electronic transactions, cyber-security and the protection of personal information.
In September 2012 in Khartoum, Sudan, during the 4th ordinary session of the biannual conference
of African ministers in charge of communication and information technologies, the African
commission was requested to submit the African Union draft Convention on cybersecurity for
adoption by the Heads of States, in accordance with the internal rules of the African Union.
 The International Telecommunications Union (ITU)
The International Telecommunications (ITU) Union partnered with the
International Multilateral Partnership Against Cyber Threats
(IMPACT), a collaboration between the private sector and public
authorities, to implement a programme to combat cybercrime. 145
of the 191 Member States of ITU have now joined the programme.
The HIPSSA (Harmonization of the ICT Policies in Sub-Sahara
Africa) project of the International Telecommunications Union (ITU)
and the European Commission, with involvement of the AU
commission and ECA is contributing to the implementation of
actions identified as priorities in the AU reference framework to
“establish harmonized policies and legal and regulatory frameworks
at the regional and continental levels” in the field of electronic
communications.
 The Central African Economic and Monetary Community (CEMAC)
Following the workshop on the role of information and communication
technologies (ICTs) in the promotion of regional integration that held in
Yaoundé in September 2007, ECA contributed to the 2010 e-CEMAC
strategy drawn up by the member States of CEMAC, and subsequently
proposed to extend the strategy to the other member States of ECCAS.
A key component of the strategy is the development and implementation
of an action plan to establish sub regional guidelines and introduce
reforms in national policy frameworks.
In 2008, upon the recommendation of the Ministers in charge of
telecommunications who met in Brazzaville in November 2008, the Council
of Ministers mandated the President of the CEMAC Commission to take
necessary measures to “develop (…) a directive on cyber security”.
 The Economic Community of Central African States (ECCAS)
At the second meeting of the Ministers in charge of telecommunications and ICTs
of ECCAS Member States held in April 22, 2010 in N’djamena, the statutory
Council of Ministers of ECCAS was requested to :
- Submit for the approval of the ECCAS Conference of Heads of State and
Governments, four guidance documents including one on the harmonization of
national policies and regulations and action plans for ICT development in
Central Africa;
- Instruct the Secretary General of ECCAS to immediately work out, in
collaboration with ECA and ITU, model laws and regulations relating to:
* Electronic transactions;
* The protection of personal information;
* The fight against cyber crime.
* Retracing previous stages.
Libreville, Gabon from 28 November to 02 December 2011
In response to the requests by the Secretary General of ECCAS and the CEMAC
Commission, with the technical support of ECA and ITU, a workshop on the
harmonization of a legal framework for cybersecurity in Central Africa was organized in
Libreville, Gabon. Three draft Model Laws were discussed at the workshop concerning:
The protection of personal information, providing the States with a legal framework that
will ensure effective protection;
Electronic transactions, providing the States with efficient legal framework to regulate
transactions and protect the users ;
Fight against cybercrime, providing Member States with a substantial and procedural
repressive arsenal, to prevent the outburst of cybercrime.
These preliminary draft Model Laws will be adopted, subject to any subsequent
amendments thereto.
Douala, Cameroon from 26 to 27 July 2012
The Secretary General of ECCAS organized a regional workshop, in
collaboration with the ministry in charge of ICTs in Cameroon, backed by
ECA and the International Telecommunications Union. The aim was to
validate the three draft model laws above for adoption by the statutory
bodies of ECCAS.
Libreville, Gabon from 25 to 26 February 2013
The Central African Sub Regional Bureau of the United Nations
Economic Commission for Africa organized an ad-hoc meeting of the
experts group working on the harmonization of laws on information and
communication technologies on the theme: “compliance framework for
digital economy”, in collaboration with the Economic Community for
Central African States (ECCAS) and the International Telecommunications
Union.
The objective of the meeting was to establish a notice of
compliance showing how the three draft model laws on cyber
security validated by the experts of the Member States of
ECCAS correlate with the draft African Union (AU) Convention
on cyber security. The said notice was based on the analysis
of a correlation table between the terms of the draft
Convention and the consolidated provisions of the three draft
model laws.
The study revealed a 95% level of conformity. In delivering
the outcome of the study of conformity, the ad hoc meeting
endorsed the recommendations and observations with a view
to improving the level of conformity of the draft model laws
to be tabled for validation at the meeting of ICT ministers
of ECCAS scheduled for 2013.
It is important that countries harmonize their legal
framework, to combat cybercrime and facilitate
international cooperation. Cameroon, Congo and
Gabon has already theirs agencies in charge of
cyber security installed.
Though legislation on personal data is not yet
available in Cameroon, there is a law governing the
security of electronic communication networks and
information systems that defines and criminalizes
offences relating to the use of information and
communication technologies. A law regulating
electronic commerce was also promulgated in
December 2010.
THANK YOU !
Justin Aimé TSANGA EBODE
Deputy Director of the statutory Watch at the Direction of Legal Affairs and
International Cooperation in the Telecommunication Regulatory board of
Cameroon.
tsangajustin@yahoo.fr/tsangajustina@yahoo.fr +237 9977 31 00

More Related Content

What's hot

Social watch workshop uganda
Social watch workshop  ugandaSocial watch workshop  uganda
Social watch workshop ugandaSonnie Kibz
 
The National Interoperability Framework of Spain, a Global Approach to Intero...
The National Interoperability Framework of Spain, a Global Approach to Intero...The National Interoperability Framework of Spain, a Global Approach to Intero...
The National Interoperability Framework of Spain, a Global Approach to Intero...Miguel A. Amutio
 
Critical analysis of customer services and land line services in bangladesh b...
Critical analysis of customer services and land line services in bangladesh b...Critical analysis of customer services and land line services in bangladesh b...
Critical analysis of customer services and land line services in bangladesh b...Asian Paint Bangladesh Ltd
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordCreative Commons Korea
 
INDIAN CONVERGENCE LAW
INDIAN CONVERGENCE LAWINDIAN CONVERGENCE LAW
INDIAN CONVERGENCE LAWpattok
 
B ii basics-of_satellite_communications_policy_and_regulation
B ii basics-of_satellite_communications_policy_and_regulationB ii basics-of_satellite_communications_policy_and_regulation
B ii basics-of_satellite_communications_policy_and_regulationFahim Ullah Shagiwal
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Ministersegughana
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile LawJacqueline Fick
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...Prof. (Dr.) Azimkhan B. Pathan
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Presentation of the INTERPOL Activities- Public version shared with OSCE Vienna
Presentation of the INTERPOL Activities- Public version shared with OSCE ViennaPresentation of the INTERPOL Activities- Public version shared with OSCE Vienna
Presentation of the INTERPOL Activities- Public version shared with OSCE Viennatasciyana
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityDavid Sweigert
 

What's hot (19)

Social watch workshop uganda
Social watch workshop  ugandaSocial watch workshop  uganda
Social watch workshop uganda
 
The National Interoperability Framework of Spain, a Global Approach to Intero...
The National Interoperability Framework of Spain, a Global Approach to Intero...The National Interoperability Framework of Spain, a Global Approach to Intero...
The National Interoperability Framework of Spain, a Global Approach to Intero...
 
Critical analysis of customer services and land line services in bangladesh b...
Critical analysis of customer services and land line services in bangladesh b...Critical analysis of customer services and land line services in bangladesh b...
Critical analysis of customer services and land line services in bangladesh b...
 
How to successfully increase the usage and availability of ic ts localizing s...
How to successfully increase the usage and availability of ic ts localizing s...How to successfully increase the usage and availability of ic ts localizing s...
How to successfully increase the usage and availability of ic ts localizing s...
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
 
CS_Kenya
CS_KenyaCS_Kenya
CS_Kenya
 
Implementation in E-Government in Cameroon - Eric Sindeu
Implementation in E-Government in Cameroon - Eric SindeuImplementation in E-Government in Cameroon - Eric Sindeu
Implementation in E-Government in Cameroon - Eric Sindeu
 
INDIAN CONVERGENCE LAW
INDIAN CONVERGENCE LAWINDIAN CONVERGENCE LAW
INDIAN CONVERGENCE LAW
 
B ii basics-of_satellite_communications_policy_and_regulation
B ii basics-of_satellite_communications_policy_and_regulationB ii basics-of_satellite_communications_policy_and_regulation
B ii basics-of_satellite_communications_policy_and_regulation
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
 
Convergence
ConvergenceConvergence
Convergence
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
INGENIOUS ACTUALITY OF THE INTERNET AGE FOR ACCESS TO JUSTICE IN POST COVID 1...
 
Broadband and universal access: challenges for regulators - Martha García-Mur...
Broadband and universal access: challenges for regulators - Martha García-Mur...Broadband and universal access: challenges for regulators - Martha García-Mur...
Broadband and universal access: challenges for regulators - Martha García-Mur...
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Presentation of the INTERPOL Activities- Public version shared with OSCE Vienna
Presentation of the INTERPOL Activities- Public version shared with OSCE ViennaPresentation of the INTERPOL Activities- Public version shared with OSCE Vienna
Presentation of the INTERPOL Activities- Public version shared with OSCE Vienna
 
European Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology SecurityEuropean Directive DRAFT Network and Information Technology Security
European Directive DRAFT Network and Information Technology Security
 

Viewers also liked (6)

Addressing the e-Gov Challenge: Simply I.T.
Addressing the e-Gov Challenge: Simply I.T.Addressing the e-Gov Challenge: Simply I.T.
Addressing the e-Gov Challenge: Simply I.T.
 
CTO Cybersecurity Forum 2013 Janvier Ngnoulaye
CTO Cybersecurity Forum 2013 Janvier NgnoulayeCTO Cybersecurity Forum 2013 Janvier Ngnoulaye
CTO Cybersecurity Forum 2013 Janvier Ngnoulaye
 
Anthony Ming ICT to Deepen Democracy
Anthony Ming ICT to Deepen DemocracyAnthony Ming ICT to Deepen Democracy
Anthony Ming ICT to Deepen Democracy
 
CTO Cybersecurity Forum 2013_Cameroon
CTO Cybersecurity Forum 2013_CameroonCTO Cybersecurity Forum 2013_Cameroon
CTO Cybersecurity Forum 2013_Cameroon
 
Digital Broadcasting Switchover
Digital Broadcasting SwitchoverDigital Broadcasting Switchover
Digital Broadcasting Switchover
 
Solomon Mhlangu
Solomon MhlanguSolomon Mhlangu
Solomon Mhlangu
 

Similar to CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode

E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyookaAmbrose Ruyooka,PMP,CGEIT, CRISC
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Retail
RetailRetail
Retailcefy1
 
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...Dr Lendy Spires
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"ATMOSPHERE .
 
HIPSSA Presentation @ Euro Africa Ict Forum (February 2010)
HIPSSA Presentation @ Euro Africa Ict Forum (February 2010)HIPSSA Presentation @ Euro Africa Ict Forum (February 2010)
HIPSSA Presentation @ Euro Africa Ict Forum (February 2010)moving_target
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwesegughana
 

Similar to CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode (20)

E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
CTO Cybersecurity Forum 2013 Pierre Kaptue
CTO Cybersecurity Forum 2013 Pierre KaptueCTO Cybersecurity Forum 2013 Pierre Kaptue
CTO Cybersecurity Forum 2013 Pierre Kaptue
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Retail
RetailRetail
Retail
 
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
Ad hoc expert group meeting harmonization of ic ts policies and programmes in...
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
Internet Governance Backround
Internet Governance BackroundInternet Governance Backround
Internet Governance Backround
 
Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"
 
HIPSSA Presentation @ Euro Africa Ict Forum (February 2010)
HIPSSA Presentation @ Euro Africa Ict Forum (February 2010)HIPSSA Presentation @ Euro Africa Ict Forum (February 2010)
HIPSSA Presentation @ Euro Africa Ict Forum (February 2010)
 
CTO Cybersecurity Forum 2013 Ebot Ebot Enaw
CTO Cybersecurity Forum 2013 Ebot Ebot EnawCTO Cybersecurity Forum 2013 Ebot Ebot Enaw
CTO Cybersecurity Forum 2013 Ebot Ebot Enaw
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
Presentation by UCC ED
Presentation by UCC EDPresentation by UCC ED
Presentation by UCC ED
 
Presentation by UCC ED
Presentation by UCC EDPresentation by UCC ED
Presentation by UCC ED
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
Final project
Final projectFinal project
Final project
 

More from Commonwealth Telecommunications Organisation

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 

Recently uploaded

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 

Recently uploaded (20)

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 

CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode

  • 1.
  • 2.  Introduction  1. What is cyber legislation?  2. Cyber legislation harmonization process in Central Africa  The sub-region concerned;  Partner international organizations in the harmonization of cyber legislation in Central Africa;  ECCAS frame of reference for the harmonization;  Retracing previous stages.  3. Conclusion
  • 3.  Harmonization of legislation can be defined as a legal integration phenomenon whereby official expertise of two or more countries are transferred to an international organization endowed with decision-making powers and supranational or supra state competencies, with a view to providing a single and coherent legal package encompassing the laws that will set the background for the required social and economic objectives of the Member States. To achieve this, the States can either choose the Convention’s technique or that of the Model law.  Harmonization or coordination is the approximation of rules of different origins to make them consistent by reducing or eliminating the discrepancies and inconsistencies between them so as to reach the results that are “compatible with each other and with the desired community objectives”.
  • 4. Cyber legislation is the term used today to refer to legal provisions dealing with such issues as:  The use of electronic signatures;  The fight against cybercrime;  The protection of personal information;  Data secrecy;  Protection of intellectual property ;  Control of digital identities, among others…. In a nutshell, cyber legislation is all about the thematic areas that will be addressed at this forum.
  • 5. Several African organisations are rallying to work on a cyber-legislation framework and harmonization of legislation on electronic communications.  The sub-region concerned The Sub-region concerned by the harmonization of cyberlegislation is the Economic Community of Central African States/ECCAS.  The Economic Community of Central African States (ECCAS) is an international organization created to promote the economic, social and cultural development of the African continent, in order to set up regional structures that could progressively lead to a common market.  ECCAS stemmed from the Lagos Plan of Action of April 1980 to lead the Central African regional integration process. It is an institution recognized by the African Union.
  • 6. The organization brings together ten member States :  Angola ;  Burundi ;  Cameroon ;  Central Africa;  Chad;  Congo ;  Democratic Republic of Congo (DRC) ;  Equatorial Guinea;  Gabon ;  Sao Tome and Principe The countries in bulk are equally members of the Economic and Monetary Community of Central Africa (CEMAC/EMCAC).
  • 7.  Partner international organizations in the harmonization of cyber legislation in Central Africa;  The United Nations Economic Commission for Africa (UN-ECA) The Economic Commission for Africa (ECA) launched its project « African Information Society Initiative » (AISI) in May 1996. This initiative consisted in helping African countries create an environment in which knowledge is considered as being critical to economic growth and bridge the digital divide between Africa and the rest of the world. ECA also implemented the « National Information and Communication Infrastructure » (NICI) policy.  The African Union (AU) Commission During the extraordinary meeting of Johannesburg in 2009, the « Olivier Tambo Declaration » adopted by the Conference of African Ministers in charge of communication and information technologies entrusted the Commission of the African Union (AU) to draw up, together with ECA within the framework of the African Information Society Initiative (AISI), a convention on cyber- legislation that meets the needs of the continent and complies with good legal international practices on electronic transactions, cyber-security and the protection of personal information. In September 2012 in Khartoum, Sudan, during the 4th ordinary session of the biannual conference of African ministers in charge of communication and information technologies, the African commission was requested to submit the African Union draft Convention on cybersecurity for adoption by the Heads of States, in accordance with the internal rules of the African Union.
  • 8.  The International Telecommunications Union (ITU) The International Telecommunications (ITU) Union partnered with the International Multilateral Partnership Against Cyber Threats (IMPACT), a collaboration between the private sector and public authorities, to implement a programme to combat cybercrime. 145 of the 191 Member States of ITU have now joined the programme. The HIPSSA (Harmonization of the ICT Policies in Sub-Sahara Africa) project of the International Telecommunications Union (ITU) and the European Commission, with involvement of the AU commission and ECA is contributing to the implementation of actions identified as priorities in the AU reference framework to “establish harmonized policies and legal and regulatory frameworks at the regional and continental levels” in the field of electronic communications.
  • 9.  The Central African Economic and Monetary Community (CEMAC) Following the workshop on the role of information and communication technologies (ICTs) in the promotion of regional integration that held in Yaoundé in September 2007, ECA contributed to the 2010 e-CEMAC strategy drawn up by the member States of CEMAC, and subsequently proposed to extend the strategy to the other member States of ECCAS. A key component of the strategy is the development and implementation of an action plan to establish sub regional guidelines and introduce reforms in national policy frameworks. In 2008, upon the recommendation of the Ministers in charge of telecommunications who met in Brazzaville in November 2008, the Council of Ministers mandated the President of the CEMAC Commission to take necessary measures to “develop (…) a directive on cyber security”.
  • 10.  The Economic Community of Central African States (ECCAS) At the second meeting of the Ministers in charge of telecommunications and ICTs of ECCAS Member States held in April 22, 2010 in N’djamena, the statutory Council of Ministers of ECCAS was requested to : - Submit for the approval of the ECCAS Conference of Heads of State and Governments, four guidance documents including one on the harmonization of national policies and regulations and action plans for ICT development in Central Africa; - Instruct the Secretary General of ECCAS to immediately work out, in collaboration with ECA and ITU, model laws and regulations relating to: * Electronic transactions; * The protection of personal information; * The fight against cyber crime.
  • 11. * Retracing previous stages. Libreville, Gabon from 28 November to 02 December 2011 In response to the requests by the Secretary General of ECCAS and the CEMAC Commission, with the technical support of ECA and ITU, a workshop on the harmonization of a legal framework for cybersecurity in Central Africa was organized in Libreville, Gabon. Three draft Model Laws were discussed at the workshop concerning: The protection of personal information, providing the States with a legal framework that will ensure effective protection; Electronic transactions, providing the States with efficient legal framework to regulate transactions and protect the users ; Fight against cybercrime, providing Member States with a substantial and procedural repressive arsenal, to prevent the outburst of cybercrime. These preliminary draft Model Laws will be adopted, subject to any subsequent amendments thereto.
  • 12. Douala, Cameroon from 26 to 27 July 2012 The Secretary General of ECCAS organized a regional workshop, in collaboration with the ministry in charge of ICTs in Cameroon, backed by ECA and the International Telecommunications Union. The aim was to validate the three draft model laws above for adoption by the statutory bodies of ECCAS. Libreville, Gabon from 25 to 26 February 2013 The Central African Sub Regional Bureau of the United Nations Economic Commission for Africa organized an ad-hoc meeting of the experts group working on the harmonization of laws on information and communication technologies on the theme: “compliance framework for digital economy”, in collaboration with the Economic Community for Central African States (ECCAS) and the International Telecommunications Union.
  • 13. The objective of the meeting was to establish a notice of compliance showing how the three draft model laws on cyber security validated by the experts of the Member States of ECCAS correlate with the draft African Union (AU) Convention on cyber security. The said notice was based on the analysis of a correlation table between the terms of the draft Convention and the consolidated provisions of the three draft model laws. The study revealed a 95% level of conformity. In delivering the outcome of the study of conformity, the ad hoc meeting endorsed the recommendations and observations with a view to improving the level of conformity of the draft model laws to be tabled for validation at the meeting of ICT ministers of ECCAS scheduled for 2013.
  • 14. It is important that countries harmonize their legal framework, to combat cybercrime and facilitate international cooperation. Cameroon, Congo and Gabon has already theirs agencies in charge of cyber security installed. Though legislation on personal data is not yet available in Cameroon, there is a law governing the security of electronic communication networks and information systems that defines and criminalizes offences relating to the use of information and communication technologies. A law regulating electronic commerce was also promulgated in December 2010.
  • 15. THANK YOU ! Justin Aimé TSANGA EBODE Deputy Director of the statutory Watch at the Direction of Legal Affairs and International Cooperation in the Telecommunication Regulatory board of Cameroon. tsangajustin@yahoo.fr/tsangajustina@yahoo.fr +237 9977 31 00