SlideShare a Scribd company logo
1 of 17
 What is the Budapest
Convention?
 What impact?
 What benefits for Africa?
CTO Cyber Security Forum 2013
Yaoundé, Cameroon, 25 April 2013
Workshop on the
Budapest Convention on Cybercrime
www.coe.int/cybercrimealexander.seger@coe.int
About the Budapest Convention
Opened for signature November 2001 in Budapest
Followed by Cybercrime Convention Committee (T-CY) = Committee
of the Parties
As at December 2012:
 39 parties (35 European, Australia, Dominican Republic, Japan
and USA)
 11 signatories (European, Canada, South Africa)
 8 states invited to accede (Argentina, Chile, Costa Rica, Dominican
Republic, Mexico, Panama, Philippines, Senegal)
= 58 states are parties/are committed to become parties
 Additional invitations to accede are in process
 Many more have used Budapest Convention as a guideline for
domestic legislation
About States participating in Budapest Convention
Ratified/acceded: 39
 35 European
 Australia
 Dominican Republic
 Japan
 USA
Signed: 11
 9 European
 Canada
 South Africa
Invited to accede: 8
 Argentina
 Chile
 Costa Rica
 Mexico
 Morocco
 Panama
 Philippines
 Senegal
58
About joining the Budapest Convention
Phase 1:
 If a country has legislation
in place or advanced stage:
Letter from Government to
CoE expressing interest in
accession
 Consultations
(CoE/Parties) in view of
decision to invite
 Invitation to accede
Phase 2:
 Domestic procedure (e.g.
decision by national
Parliament)
 Deposit the instrument of
accession at the Council of
Europe
Treaty open for accession by any State (article 37)
 Acceded: Australia, Dominican
Republic
 Invited: Argentina, Chile, Costa
Rica, Mexico, Panama,
Philippines, Senegal
States that could seek accession
Ratified/acceded: 39
Signed: 11
Invited to accede: 8
= 58
Other States with laws/draft laws
largely in line with Budapest
Convention:
= at least 22
5780
States using Budapest Convention
Ratified/acceded: 39
Signed: 11
Invited to accede: 8
= 58
Other States with laws/draft laws largely
in line with Budapest Convention = 22
Further States drawing on Budapest
Convention for legislation = 45
125
Indicative map only
About the scope of Budapest Convention
Criminalising
conduct
 Illegal access
 Illegal interception
 Data interference
 System
interference
 Misuse of devices
 Fraud and forgery
 Child pornography
 IPR-offences
Procedural tools
 Expedited
preservation
 Search and
seizure
 Interception of
computer data
International
cooperation
 Extradition
 MLA
 Spontaneous
information
 Expedited
preservation
 MLA for
accessing
computer data
 MLA for
interception
 24/7 points of
contact
+ +
Harmonisation
Functioning of the Budapest Convention
Cybercrime
Prevention and
Criminal Justice
to protect you and
your rights in
cyberspace
1 Standards: Budapest Convention
and related instruments
3 Capacity building:
Technical cooperation
programmes
2 Follow up and
assessments:
Cybercrime Convention
Committee (T-CY)
www.coe.int/cybercrime
Budapest Convention as a guideline
www.coe.int/cybercrime
 Use as “checklist”
 Compare articles
Articles of the
Convention
Provisions in
domestic law
Art 4 System
interference
Art 9 Child
pornography
Art 16
Expedited
preservation
Art 6 Misue of
devices
?
?
?
?
See country profiles at
www.coe.int/cybercrime
Budapest Convention as a guideline
www.coe.int/cybercrime
Article Budapest Convention Law of Cameroon
Art. 1 Definitions Article 4
Art. 2 Illegal access Article 68 , 69
Art. 3 Illegal interception Article 65, 84
Art. 4 Data interference Article 71
Art. 5 System interference Articles 66, 67, 70
Art. 6 Misuse of devices Article 86
Example: Loi relative à la cyber sécurité et à la
cybercriminalité au Cameroun (2010)
Budapest Convention as a guideline
www.coe.int/cybercrime
Example: Loi relative à la cyber sécurité et à la
cybercriminalité au Cameroun (2010)
Article Budapest Convention Law of Cameroon
Art. 7 Computer-related
forgery
Article 73
Art. 8 Computer-related fraud Article 72
Art. 9 Child pornography Articles 76, 80, 81
Art. 10 IPR offences
Art. 11 Attempt, aiding, abetting
Art. 12 Corporate liability
Budapest Convention as a guideline
www.coe.int/cybercrime
Example: Loi relative à la cyber sécurité et à la
cybercriminalité au Cameroun (2010)
Article Budapest Convention Law of Cameroon
Art. 15 Conditions and safeguards
Art. 16 Expedited preservation ? (Data retention 10
years)
Art. 17 Expedited preservation and
partial disclosure of traffic data
-
Art. 18 Production order Article 57
Art. 19 Search and seizure Articles 53-59
Art. 20 Real-time collection traffic data Article 25
Art. 21 Interception of content data Articles 49-51
Art. 22 Jurisdiction
Protecting children: criminal law benchmarks
Budapest Convention
 Substantive criminal law
 Article 9 Child pornograpy
 Procedural law (scope and
specific provisions)
 Expedited preservation
 Search and seizure
 Interception
 etc
 International cooperation
(general and specific
provisions)
+
Lanzarote
Convention
 Substantive criminal law
 Art 18 Sexual abuse
 Art 19 Child prostitution
 Art 20 Child pornography
 Art 21 Child participation
in pornographic
performances
 Art 22 Corruption of
children
 Art 23 Solicitation of
children for sexual
purposes
Capacity building: Technical cooperation programmes
Focus on:
 Cybercrime strategies
 Legislation and safeguards
 Cybercrime units
 Law enforcement training
 Judicial training
 Financial investigations
 Protecting children
 Public/private cooperation
 International cooperation
Council of Europe global and
regional projects:
 500+ activities with 125+
countries & 130+
organisations and private
sector since 2006
 New joint EU/COE project on
Global Action on Cybercrime
in 2013
 Encouraging other donors to
provide assistance to
countries in implementing
Budapest Convention
Capacity building
Effectiveness/Impact of the Budapest Convention
 Stronger and more harmonised legislation
 More efficient international cooperation
between Parties
 Better cybersecurity performance
 More investigation, prosecution and
adjudication of cybercrime and e-
evidence cases
 Trusted partnerships and public/private
cooperation
 Catalyst for capacity building
 Contribution to human rights/rule of law
in cyberspace
= “Protecting you and your rights”
Obstacles:
1. Limited criminal
justice capacities
2. Political
disagreements
The Budapest
Convention is
in place and
functioning.
www.coe.int/cybercrime
Benefits for Africa
Benefits
 Trusted and efficient cooperation with other Parties
 Participation in the Cybercrime Convention Committee (T-
CY)
 Participation in future standard setting (Guidance Notes,
Protocols and other additions to Budapest Convention)
 Enhanced trust by private sector
 Technical assistance and capacity building
“Cost”: Commitment to cooperate
Disadvantages?
Contact for follow up
www.coe.int/cybercrime
Alexander.seger@coe.int
Secretary of the Cybercrime
Convention Committee (T-CY)
Council of Europe
Strasbourg, France
www.coe.int/cybercrime

More Related Content

What's hot

Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)Vaibhav Laur
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
INT. CRIMINAL TRIBUNAL FOR YUGOSLAVIA (ICTY)
INT. CRIMINAL TRIBUNAL FOR YUGOSLAVIA (ICTY)INT. CRIMINAL TRIBUNAL FOR YUGOSLAVIA (ICTY)
INT. CRIMINAL TRIBUNAL FOR YUGOSLAVIA (ICTY)Iqra university islamabad
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Victims of Crime
Victims of CrimeVictims of Crime
Victims of CrimeDani Cathro
 
Introduction to international criminal law ppt
Introduction to international criminal law pptIntroduction to international criminal law ppt
Introduction to international criminal law pptPriyankaD44
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionAnsar Gill
 
The International Criminal Court (ICC) presentation added-
The International Criminal Court (ICC)  presentation added-The International Criminal Court (ICC)  presentation added-
The International Criminal Court (ICC) presentation added-Nancy Yanira Munoz Martinez
 
Pre trial proceedings in criminal case by ghulam hamid
Pre trial proceedings in criminal case by ghulam hamidPre trial proceedings in criminal case by ghulam hamid
Pre trial proceedings in criminal case by ghulam hamidzulfi799
 
Is capital punishment appropriate in india.
Is capital punishment appropriate in india.Is capital punishment appropriate in india.
Is capital punishment appropriate in india.gagan deep
 

What's hot (20)

Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
crime
crimecrime
crime
 
Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
INT. CRIMINAL TRIBUNAL FOR YUGOSLAVIA (ICTY)
INT. CRIMINAL TRIBUNAL FOR YUGOSLAVIA (ICTY)INT. CRIMINAL TRIBUNAL FOR YUGOSLAVIA (ICTY)
INT. CRIMINAL TRIBUNAL FOR YUGOSLAVIA (ICTY)
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Victims of Crime
Victims of CrimeVictims of Crime
Victims of Crime
 
Ppt idea of fair trial
 Ppt idea of fair trial Ppt idea of fair trial
Ppt idea of fair trial
 
Ipc
IpcIpc
Ipc
 
Introduction to international criminal law ppt
Introduction to international criminal law pptIntroduction to international criminal law ppt
Introduction to international criminal law ppt
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Victimology.pptx
Victimology.pptxVictimology.pptx
Victimology.pptx
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
The International Criminal Court (ICC) presentation added-
The International Criminal Court (ICC)  presentation added-The International Criminal Court (ICC)  presentation added-
The International Criminal Court (ICC) presentation added-
 
Abuse of policing power
Abuse of policing powerAbuse of policing power
Abuse of policing power
 
Economic Crimes
Economic CrimesEconomic Crimes
Economic Crimes
 
Pre trial proceedings in criminal case by ghulam hamid
Pre trial proceedings in criminal case by ghulam hamidPre trial proceedings in criminal case by ghulam hamid
Pre trial proceedings in criminal case by ghulam hamid
 
Is capital punishment appropriate in india.
Is capital punishment appropriate in india.Is capital punishment appropriate in india.
Is capital punishment appropriate in india.
 

Similar to Benefits of Budapest Convention for Africa

International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...MIS Quarterly
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
The Digital Services Act - soon in your country
The Digital Services Act - soon in your countryThe Digital Services Act - soon in your country
The Digital Services Act - soon in your countryKirsten Fiedler
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...CODE BLUE
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secureKirsten Fiedler
 
High level-principles-on-mutual-legal-assistance
High level-principles-on-mutual-legal-assistanceHigh level-principles-on-mutual-legal-assistance
High level-principles-on-mutual-legal-assistanceDr Lendy Spires
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 
A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...ePractice.eu
 
Advanced cooperative digital platforms for parliaments
Advanced cooperative digital platforms for parliamentsAdvanced cooperative digital platforms for parliaments
Advanced cooperative digital platforms for parliamentsDr. Fotios Fitsilis
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 

Similar to Benefits of Budapest Convention for Africa (20)

CTO Cybersecurity Forum 2013 Alexander Seger
CTO Cybersecurity Forum 2013 Alexander SegerCTO Cybersecurity Forum 2013 Alexander Seger
CTO Cybersecurity Forum 2013 Alexander Seger
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Day 02 - Meeting DPAs from Western Balkans and Eastern Partnership countries
Day 02 -  Meeting DPAs from Western Balkans and Eastern Partnership countriesDay 02 -  Meeting DPAs from Western Balkans and Eastern Partnership countries
Day 02 - Meeting DPAs from Western Balkans and Eastern Partnership countries
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...Cybercrime Deterrence and International Legislation: Evidence from Distribute...
Cybercrime Deterrence and International Legislation: Evidence from Distribute...
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
The Digital Services Act - soon in your country
The Digital Services Act - soon in your countryThe Digital Services Act - soon in your country
The Digital Services Act - soon in your country
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure12.NP: Anti-terrorism measures - Censoring the web, making us less secure
12.NP: Anti-terrorism measures - Censoring the web, making us less secure
 
High level-principles-on-mutual-legal-assistance
High level-principles-on-mutual-legal-assistanceHigh level-principles-on-mutual-legal-assistance
High level-principles-on-mutual-legal-assistance
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...
 
Advanced cooperative digital platforms for parliaments
Advanced cooperative digital platforms for parliamentsAdvanced cooperative digital platforms for parliaments
Advanced cooperative digital platforms for parliaments
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 

More from Commonwealth Telecommunications Organisation

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 

Recently uploaded

5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)Mazie Garcia
 
Haitian culture and stuff and places and food and travel.pptx
Haitian culture and stuff and places and food and travel.pptxHaitian culture and stuff and places and food and travel.pptx
Haitian culture and stuff and places and food and travel.pptxhxhlixia
 
Italia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue muraItalia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue murasandamichaela *
 
How Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersHow Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersMakena Coast Charters
 
question 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationquestion 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationcaminantesdaauga
 
Authentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxAuthentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxGregory DeShields
 
Exploring Sicily Your Comprehensive Ebook Travel Guide
Exploring Sicily Your Comprehensive Ebook Travel GuideExploring Sicily Your Comprehensive Ebook Travel Guide
Exploring Sicily Your Comprehensive Ebook Travel GuideTime for Sicily
 
Where to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdWhere to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdusmanghaniwixpatriot
 
Inspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodInspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodKasia Chojecki
 
Revolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI UpdateRevolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI Updatejoymorrison10
 
"Fly with Ease: Booking Your Flights with Air Europa"
"Fly with Ease: Booking Your Flights with Air Europa""Fly with Ease: Booking Your Flights with Air Europa"
"Fly with Ease: Booking Your Flights with Air Europa"flyn goo
 
(8264348440) 🔝 Call Girls In Nand Nagri 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Nand Nagri 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Nand Nagri 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Nand Nagri 🔝 Delhi NCRsoniya singh
 
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)Escort Service
 
Dubai Call Girls O528786472 Call Girls Dubai Big Juicy
Dubai Call Girls O528786472 Call Girls Dubai Big JuicyDubai Call Girls O528786472 Call Girls Dubai Big Juicy
Dubai Call Girls O528786472 Call Girls Dubai Big Juicyhf8803863
 
Aeromexico Airlines Flight Name Change Policy
Aeromexico Airlines Flight Name Change PolicyAeromexico Airlines Flight Name Change Policy
Aeromexico Airlines Flight Name Change PolicyFlyFairTravels
 
8377087607 Full Enjoy @24/7 Call Girls in INA Market Dilli Hatt Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in INA Market Dilli Hatt Delhi NCR8377087607 Full Enjoy @24/7 Call Girls in INA Market Dilli Hatt Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in INA Market Dilli Hatt Delhi NCRdollysharma2066
 
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsxHoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsxChung Yen Chang
 
Moroccan Architecture presentation ( Omar & Yasine ).pptx
Moroccan Architecture presentation ( Omar & Yasine ).pptxMoroccan Architecture presentation ( Omar & Yasine ).pptx
Moroccan Architecture presentation ( Omar & Yasine ).pptxOmarOuazzani1
 

Recently uploaded (20)

Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
Haitian culture and stuff and places and food and travel.pptx
Haitian culture and stuff and places and food and travel.pptxHaitian culture and stuff and places and food and travel.pptx
Haitian culture and stuff and places and food and travel.pptx
 
Italia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue muraItalia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue mura
 
How Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersHow Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s Waters
 
question 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationquestion 2: airplane vocabulary presentation
question 2: airplane vocabulary presentation
 
Authentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxAuthentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptx
 
Exploring Sicily Your Comprehensive Ebook Travel Guide
Exploring Sicily Your Comprehensive Ebook Travel GuideExploring Sicily Your Comprehensive Ebook Travel Guide
Exploring Sicily Your Comprehensive Ebook Travel Guide
 
Where to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdWhere to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasd
 
Inspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodInspirational Quotes About Italy and Food
Inspirational Quotes About Italy and Food
 
Revolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI UpdateRevolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI Update
 
"Fly with Ease: Booking Your Flights with Air Europa"
"Fly with Ease: Booking Your Flights with Air Europa""Fly with Ease: Booking Your Flights with Air Europa"
"Fly with Ease: Booking Your Flights with Air Europa"
 
(8264348440) 🔝 Call Girls In Nand Nagri 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Nand Nagri 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Nand Nagri 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Nand Nagri 🔝 Delhi NCR
 
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
 
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
 
Dubai Call Girls O528786472 Call Girls Dubai Big Juicy
Dubai Call Girls O528786472 Call Girls Dubai Big JuicyDubai Call Girls O528786472 Call Girls Dubai Big Juicy
Dubai Call Girls O528786472 Call Girls Dubai Big Juicy
 
Aeromexico Airlines Flight Name Change Policy
Aeromexico Airlines Flight Name Change PolicyAeromexico Airlines Flight Name Change Policy
Aeromexico Airlines Flight Name Change Policy
 
8377087607 Full Enjoy @24/7 Call Girls in INA Market Dilli Hatt Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in INA Market Dilli Hatt Delhi NCR8377087607 Full Enjoy @24/7 Call Girls in INA Market Dilli Hatt Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in INA Market Dilli Hatt Delhi NCR
 
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsxHoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
 
Moroccan Architecture presentation ( Omar & Yasine ).pptx
Moroccan Architecture presentation ( Omar & Yasine ).pptxMoroccan Architecture presentation ( Omar & Yasine ).pptx
Moroccan Architecture presentation ( Omar & Yasine ).pptx
 

Benefits of Budapest Convention for Africa

  • 1.  What is the Budapest Convention?  What impact?  What benefits for Africa? CTO Cyber Security Forum 2013 Yaoundé, Cameroon, 25 April 2013 Workshop on the Budapest Convention on Cybercrime www.coe.int/cybercrimealexander.seger@coe.int
  • 2. About the Budapest Convention Opened for signature November 2001 in Budapest Followed by Cybercrime Convention Committee (T-CY) = Committee of the Parties As at December 2012:  39 parties (35 European, Australia, Dominican Republic, Japan and USA)  11 signatories (European, Canada, South Africa)  8 states invited to accede (Argentina, Chile, Costa Rica, Dominican Republic, Mexico, Panama, Philippines, Senegal) = 58 states are parties/are committed to become parties  Additional invitations to accede are in process  Many more have used Budapest Convention as a guideline for domestic legislation
  • 3. About States participating in Budapest Convention Ratified/acceded: 39  35 European  Australia  Dominican Republic  Japan  USA Signed: 11  9 European  Canada  South Africa Invited to accede: 8  Argentina  Chile  Costa Rica  Mexico  Morocco  Panama  Philippines  Senegal 58
  • 4. About joining the Budapest Convention Phase 1:  If a country has legislation in place or advanced stage: Letter from Government to CoE expressing interest in accession  Consultations (CoE/Parties) in view of decision to invite  Invitation to accede Phase 2:  Domestic procedure (e.g. decision by national Parliament)  Deposit the instrument of accession at the Council of Europe Treaty open for accession by any State (article 37)  Acceded: Australia, Dominican Republic  Invited: Argentina, Chile, Costa Rica, Mexico, Panama, Philippines, Senegal
  • 5. States that could seek accession Ratified/acceded: 39 Signed: 11 Invited to accede: 8 = 58 Other States with laws/draft laws largely in line with Budapest Convention: = at least 22 5780
  • 6. States using Budapest Convention Ratified/acceded: 39 Signed: 11 Invited to accede: 8 = 58 Other States with laws/draft laws largely in line with Budapest Convention = 22 Further States drawing on Budapest Convention for legislation = 45 125 Indicative map only
  • 7. About the scope of Budapest Convention Criminalising conduct  Illegal access  Illegal interception  Data interference  System interference  Misuse of devices  Fraud and forgery  Child pornography  IPR-offences Procedural tools  Expedited preservation  Search and seizure  Interception of computer data International cooperation  Extradition  MLA  Spontaneous information  Expedited preservation  MLA for accessing computer data  MLA for interception  24/7 points of contact + + Harmonisation
  • 8. Functioning of the Budapest Convention Cybercrime Prevention and Criminal Justice to protect you and your rights in cyberspace 1 Standards: Budapest Convention and related instruments 3 Capacity building: Technical cooperation programmes 2 Follow up and assessments: Cybercrime Convention Committee (T-CY) www.coe.int/cybercrime
  • 9. Budapest Convention as a guideline www.coe.int/cybercrime  Use as “checklist”  Compare articles Articles of the Convention Provisions in domestic law Art 4 System interference Art 9 Child pornography Art 16 Expedited preservation Art 6 Misue of devices ? ? ? ? See country profiles at www.coe.int/cybercrime
  • 10. Budapest Convention as a guideline www.coe.int/cybercrime Article Budapest Convention Law of Cameroon Art. 1 Definitions Article 4 Art. 2 Illegal access Article 68 , 69 Art. 3 Illegal interception Article 65, 84 Art. 4 Data interference Article 71 Art. 5 System interference Articles 66, 67, 70 Art. 6 Misuse of devices Article 86 Example: Loi relative à la cyber sécurité et à la cybercriminalité au Cameroun (2010)
  • 11. Budapest Convention as a guideline www.coe.int/cybercrime Example: Loi relative à la cyber sécurité et à la cybercriminalité au Cameroun (2010) Article Budapest Convention Law of Cameroon Art. 7 Computer-related forgery Article 73 Art. 8 Computer-related fraud Article 72 Art. 9 Child pornography Articles 76, 80, 81 Art. 10 IPR offences Art. 11 Attempt, aiding, abetting Art. 12 Corporate liability
  • 12. Budapest Convention as a guideline www.coe.int/cybercrime Example: Loi relative à la cyber sécurité et à la cybercriminalité au Cameroun (2010) Article Budapest Convention Law of Cameroon Art. 15 Conditions and safeguards Art. 16 Expedited preservation ? (Data retention 10 years) Art. 17 Expedited preservation and partial disclosure of traffic data - Art. 18 Production order Article 57 Art. 19 Search and seizure Articles 53-59 Art. 20 Real-time collection traffic data Article 25 Art. 21 Interception of content data Articles 49-51 Art. 22 Jurisdiction
  • 13. Protecting children: criminal law benchmarks Budapest Convention  Substantive criminal law  Article 9 Child pornograpy  Procedural law (scope and specific provisions)  Expedited preservation  Search and seizure  Interception  etc  International cooperation (general and specific provisions) + Lanzarote Convention  Substantive criminal law  Art 18 Sexual abuse  Art 19 Child prostitution  Art 20 Child pornography  Art 21 Child participation in pornographic performances  Art 22 Corruption of children  Art 23 Solicitation of children for sexual purposes
  • 14. Capacity building: Technical cooperation programmes Focus on:  Cybercrime strategies  Legislation and safeguards  Cybercrime units  Law enforcement training  Judicial training  Financial investigations  Protecting children  Public/private cooperation  International cooperation Council of Europe global and regional projects:  500+ activities with 125+ countries & 130+ organisations and private sector since 2006  New joint EU/COE project on Global Action on Cybercrime in 2013  Encouraging other donors to provide assistance to countries in implementing Budapest Convention Capacity building
  • 15. Effectiveness/Impact of the Budapest Convention  Stronger and more harmonised legislation  More efficient international cooperation between Parties  Better cybersecurity performance  More investigation, prosecution and adjudication of cybercrime and e- evidence cases  Trusted partnerships and public/private cooperation  Catalyst for capacity building  Contribution to human rights/rule of law in cyberspace = “Protecting you and your rights” Obstacles: 1. Limited criminal justice capacities 2. Political disagreements The Budapest Convention is in place and functioning. www.coe.int/cybercrime
  • 16. Benefits for Africa Benefits  Trusted and efficient cooperation with other Parties  Participation in the Cybercrime Convention Committee (T- CY)  Participation in future standard setting (Guidance Notes, Protocols and other additions to Budapest Convention)  Enhanced trust by private sector  Technical assistance and capacity building “Cost”: Commitment to cooperate Disadvantages?
  • 17. Contact for follow up www.coe.int/cybercrime Alexander.seger@coe.int Secretary of the Cybercrime Convention Committee (T-CY) Council of Europe Strasbourg, France www.coe.int/cybercrime