SlideShare une entreprise Scribd logo
1  sur  12
HARMONIZATION OF ICT
REGULATIONS WITHIN CENTRAL
AFRICA REGION
By
Pierre KAPTUE
Inspector General in charge of technical matters
At the Ministry of Posts & Telecommunications, Cameroon
Yaounde, 25-26 april 2013
2
S U M M A R Y
I- INTRODUCTION
II- PROGRESS MADE AT THE NATIONAL LEVEL
III- CHALLENGES AT THE INTERNATIONAL LEVEL
IV- CONCLUSION
3
I- INTRODUCTION: Presentation of Cameroon
 Cameroon is a Central African
country located between the 2nd
degree and the 14th degree
latitudes north of the equator and
the 8th and 16th degree longitude
East.
 Population: 20,386,799
inhabitants (2011)
 Area: 475,000 km²
 Regions: ten (10)
 Gross Domestic Product per
capita: U.S. $ 1,263
 Projected growth rate in 2013:
6%
4
I- INTRODUCTION: COMMITMENT OF AUTHORITIES TOWARDS THE
DEVELOPMENT OF ICTS…
The development policy of the broadband infrastructure is
based on the vision of the Head of State H.E. Paul BIYA,
expressed on the 3rd of November 2004 in these words: "Our
country needs a widespread access to the Internet”.
The validation of the Strategy Document for Growth and
Employment by the Government that advocates the
emergence of Cameroon in 2035 through the integration of
ICT in all sectors of activities.
The Government's commitment in improving the mobile
telephony services through the granting of a third generation
license.
5
I-INTRODUCTION
 cyberspace : the term cyberspace refers to the global
network of interdependent information technology
infrastructures, telecommunications networks and computer
processing systems in which online communication takes
place. It is ubiquitous, i.e. being or seeming to be
everywhere at the same time, at any time, omnipresent, It is
very close to the internet;
 Governance of the internet: development and application by
Governments, the Private Sector and Civil Society, in their
respective roles, of shared principles, norms, rules,
decision-making procedures, and programmes that shape
the evolution and use of the Internet (Paragraph 34 of the
Tunis Agenda for the Information Society);
 Avoiding, preventing and combating spam, Child abuse
imagery and other abuses of children, identity theft and
cybercrime, cyberterrorism, as well as use of Internet
resources for purposes that are inconsistent with
international peace, stability and security.
6
II- PROGRESS MADE AT THE NATIONAL LEVEL
 Regulations (Ministry of Posts & Telecommunications of Cameroon):
in compliance with the CEMAC harmonized regulatory frameword
consisting in one regulation and five directives on
 legal regime,
 interconnection and access,
 universal services,
 users’ rights,
 and tariffing
 that has been adopted by CEMAC Ministers of telecommunications
in Brazzaville on november 2008, then by the Council of Ministers
in Bangui on december 2008 and approved by Heads of States
and Governments in Djamena in 2009, 3 laws have been
promulgated on december 2010. Great input from HIPSSA
(Harmization of ICT policy in the Sub Sahara Africa) project
 Some others CEMAC countries (i.e. Congo Brazza) are
implementing these
7
II- PROGRESS MADE AT THE NATIONAL LEVEL
Law n°2010/013 of 21 december regulating electronic
communications in Cameroon (which provides for the
deliverance multiservice licenses in a convergent
environment);
aims to promote the harmonious and balanced development of electronic
communication networks and services, with a view to ensuring the contribution of
this sector to the development of the national economy, and satisfying the various
needs of users and the population;
lays down the modalities for establishment and operating networks as well as for
the supply of electronic communication services, taking into consideration national
defence and public security prescriptions;
encourages and promotes the participation of the private sector in the development
of electronic communications in a competitive environment.
8
 Law n°2010/012 of 21 december relating to
cybersecurity and cybercriminality (with a root
certification authority and punishes cyber crimes);
This law governs the security framework of electronic communication
networks and information systems, defines and punishes offences related
to the use of information and communication technologies in Cameroon.
Accordingly, it seeks notably to:
build trust in electronic communication networks and information systems;
establish the legal regime of digital evidence, security, cryptography and
electronic certification activities;
protect basic human rights, in particular the right to human dignity, honour
and respect of privacy, as well as the legitimate interests of corporate
bodies.
9
II- PROGRESS MADE AT THE NATIONAL LEVEL
Law n°2010/021 of 21 december on electronic commerce (that favours
the emergence of e-commerce.)
signature of a series of subsequent regulatory texts;
 Establishment of Root Certification Authority and certification authorities responsible for
securing electronic transactions of governmental agencies and non governmental /
private sectorthe security activities;
 Establishment of a National Public Key Infrastructure (PKI)
 Development of the Master Plan for securing Government applications;
 Securing the online payment application of the Single Window for Foreign Trade
Operations (e-GUCE).
A typical multi-stakeholder approach which aims at
democratizing access to ICTs at affordable prices;
- securing electronic exchanges;
- strengthening dialogue and social communication;
- reducing the digital divide between cities and villages.
10
III- CHALLENGES AT THE INTERNATIONAL LEVEL
Even within the Central Africa, in many countries, national
laws do not yet comply with the CEMAC/ECCAS directives.
Globally there are remaining pending issues:
IP naming and addressing
Internet governance
etc,
1111
IV- CONCLUSION
As ICT are playing a major role as enablers/drivers
of an inclusive socio-economic development,
harmonization of policy and regulations will surely
increase this role,
THANK YOU FOR YOUR KIND
ATTENTION
12

Contenu connexe

Tendances

Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformShamseena Zubair
 
Denis Gursky Internet Censorship in Ukraine
Denis Gursky Internet Censorship in UkraineDenis Gursky Internet Censorship in Ukraine
Denis Gursky Internet Censorship in UkraineDenis Gursky
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsJanette Toral
 
E-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedE-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedJanette Toral
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
DLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaDLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaMyles Freedman
 
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORYSOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORYWasiu Otukoya
 
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorThe Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorEthical Sector
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinetAlex Taremwa
 

Tendances (19)

Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
Denis Gursky Internet Censorship in Ukraine
Denis Gursky Internet Censorship in UkraineDenis Gursky Internet Censorship in Ukraine
Denis Gursky Internet Censorship in Ukraine
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
E-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedE-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons Learned
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
HRC Res A 1
HRC Res A 1HRC Res A 1
HRC Res A 1
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
DLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaDLA Piper Data Privacy in Africa
DLA Piper Data Privacy in Africa
 
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORYSOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
SOCIO POLITICAL ENVIRONMENT OF BUSINESS-THE MTN STORY
 
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorThe Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
 

En vedette

En vedette (18)

5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Harriet Omoding HR4_ICT12
Harriet Omoding HR4_ICT12Harriet Omoding HR4_ICT12
Harriet Omoding HR4_ICT12
 
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana BelingueCTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
 
Financing Infrastructure
Financing InfrastructureFinancing Infrastructure
Financing Infrastructure
 
John Tysoe, the Mobile World
John Tysoe, the Mobile WorldJohn Tysoe, the Mobile World
John Tysoe, the Mobile World
 
The Mobile World
The Mobile WorldThe Mobile World
The Mobile World
 
HR4 ICT Mcleman
HR4 ICT MclemanHR4 ICT Mcleman
HR4 ICT Mcleman
 
Ramsus Aaen Madesn HR4 ICT12
Ramsus Aaen Madesn HR4 ICT12Ramsus Aaen Madesn HR4 ICT12
Ramsus Aaen Madesn HR4 ICT12
 
Kevin Poulter HR4 ICT12
Kevin Poulter HR4 ICT12Kevin Poulter HR4 ICT12
Kevin Poulter HR4 ICT12
 
Activation of Universal Access in Kenya
Activation of Universal Access in KenyaActivation of Universal Access in Kenya
Activation of Universal Access in Kenya
 
Malawi Case Study Microloan
Malawi Case Study MicroloanMalawi Case Study Microloan
Malawi Case Study Microloan
 
CTO Cybersecurity Forum 2013 Patricia Dovi Sampson
CTO Cybersecurity Forum 2013 Patricia Dovi SampsonCTO Cybersecurity Forum 2013 Patricia Dovi Sampson
CTO Cybersecurity Forum 2013 Patricia Dovi Sampson
 
CTO Cybersecurity Forum 2013 ITU Impact Cirt-Carla Licciardello
CTO Cybersecurity Forum 2013 ITU Impact Cirt-Carla LicciardelloCTO Cybersecurity Forum 2013 ITU Impact Cirt-Carla Licciardello
CTO Cybersecurity Forum 2013 ITU Impact Cirt-Carla Licciardello
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Brian Goulden HR4 ICT12
Brian Goulden HR4 ICT12Brian Goulden HR4 ICT12
Brian Goulden HR4 ICT12
 

Similaire à CTO Cybersecurity Forum 2013 Pierre Kaptue

Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyookaAmbrose Ruyooka,PMP,CGEIT, CRISC
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwesegughana
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32KLIBEL
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
Projects for regions of peru 09.09.15
Projects for regions of peru 09.09.15 Projects for regions of peru 09.09.15
Projects for regions of peru 09.09.15 FitelPeru
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeCA
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 

Similaire à CTO Cybersecurity Forum 2013 Pierre Kaptue (20)

CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
 
Implementation in E-Government in Cameroon - Eric Sindeu
Implementation in E-Government in Cameroon - Eric SindeuImplementation in E-Government in Cameroon - Eric Sindeu
Implementation in E-Government in Cameroon - Eric Sindeu
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Projects for regions of peru 09.09.15
Projects for regions of peru 09.09.15 Projects for regions of peru 09.09.15
Projects for regions of peru 09.09.15
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crime
 
Brief kif0809
Brief kif0809Brief kif0809
Brief kif0809
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 

Plus de Commonwealth Telecommunications Organisation

Plus de Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Session 2.2 Simon Milner
Session 2.2 Simon MilnerSession 2.2 Simon Milner
Session 2.2 Simon Milner
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
Session 2.1 Martin Mühleck
 
Session 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie CreeseSession 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie Creese
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

CTO Cybersecurity Forum 2013 Pierre Kaptue

  • 1. HARMONIZATION OF ICT REGULATIONS WITHIN CENTRAL AFRICA REGION By Pierre KAPTUE Inspector General in charge of technical matters At the Ministry of Posts & Telecommunications, Cameroon Yaounde, 25-26 april 2013
  • 2. 2 S U M M A R Y I- INTRODUCTION II- PROGRESS MADE AT THE NATIONAL LEVEL III- CHALLENGES AT THE INTERNATIONAL LEVEL IV- CONCLUSION
  • 3. 3 I- INTRODUCTION: Presentation of Cameroon  Cameroon is a Central African country located between the 2nd degree and the 14th degree latitudes north of the equator and the 8th and 16th degree longitude East.  Population: 20,386,799 inhabitants (2011)  Area: 475,000 km²  Regions: ten (10)  Gross Domestic Product per capita: U.S. $ 1,263  Projected growth rate in 2013: 6%
  • 4. 4 I- INTRODUCTION: COMMITMENT OF AUTHORITIES TOWARDS THE DEVELOPMENT OF ICTS… The development policy of the broadband infrastructure is based on the vision of the Head of State H.E. Paul BIYA, expressed on the 3rd of November 2004 in these words: "Our country needs a widespread access to the Internet”. The validation of the Strategy Document for Growth and Employment by the Government that advocates the emergence of Cameroon in 2035 through the integration of ICT in all sectors of activities. The Government's commitment in improving the mobile telephony services through the granting of a third generation license.
  • 5. 5 I-INTRODUCTION  cyberspace : the term cyberspace refers to the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems in which online communication takes place. It is ubiquitous, i.e. being or seeming to be everywhere at the same time, at any time, omnipresent, It is very close to the internet;  Governance of the internet: development and application by Governments, the Private Sector and Civil Society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet (Paragraph 34 of the Tunis Agenda for the Information Society);  Avoiding, preventing and combating spam, Child abuse imagery and other abuses of children, identity theft and cybercrime, cyberterrorism, as well as use of Internet resources for purposes that are inconsistent with international peace, stability and security.
  • 6. 6 II- PROGRESS MADE AT THE NATIONAL LEVEL  Regulations (Ministry of Posts & Telecommunications of Cameroon): in compliance with the CEMAC harmonized regulatory frameword consisting in one regulation and five directives on  legal regime,  interconnection and access,  universal services,  users’ rights,  and tariffing  that has been adopted by CEMAC Ministers of telecommunications in Brazzaville on november 2008, then by the Council of Ministers in Bangui on december 2008 and approved by Heads of States and Governments in Djamena in 2009, 3 laws have been promulgated on december 2010. Great input from HIPSSA (Harmization of ICT policy in the Sub Sahara Africa) project  Some others CEMAC countries (i.e. Congo Brazza) are implementing these
  • 7. 7 II- PROGRESS MADE AT THE NATIONAL LEVEL Law n°2010/013 of 21 december regulating electronic communications in Cameroon (which provides for the deliverance multiservice licenses in a convergent environment); aims to promote the harmonious and balanced development of electronic communication networks and services, with a view to ensuring the contribution of this sector to the development of the national economy, and satisfying the various needs of users and the population; lays down the modalities for establishment and operating networks as well as for the supply of electronic communication services, taking into consideration national defence and public security prescriptions; encourages and promotes the participation of the private sector in the development of electronic communications in a competitive environment.
  • 8. 8  Law n°2010/012 of 21 december relating to cybersecurity and cybercriminality (with a root certification authority and punishes cyber crimes); This law governs the security framework of electronic communication networks and information systems, defines and punishes offences related to the use of information and communication technologies in Cameroon. Accordingly, it seeks notably to: build trust in electronic communication networks and information systems; establish the legal regime of digital evidence, security, cryptography and electronic certification activities; protect basic human rights, in particular the right to human dignity, honour and respect of privacy, as well as the legitimate interests of corporate bodies.
  • 9. 9 II- PROGRESS MADE AT THE NATIONAL LEVEL Law n°2010/021 of 21 december on electronic commerce (that favours the emergence of e-commerce.) signature of a series of subsequent regulatory texts;  Establishment of Root Certification Authority and certification authorities responsible for securing electronic transactions of governmental agencies and non governmental / private sectorthe security activities;  Establishment of a National Public Key Infrastructure (PKI)  Development of the Master Plan for securing Government applications;  Securing the online payment application of the Single Window for Foreign Trade Operations (e-GUCE). A typical multi-stakeholder approach which aims at democratizing access to ICTs at affordable prices; - securing electronic exchanges; - strengthening dialogue and social communication; - reducing the digital divide between cities and villages.
  • 10. 10 III- CHALLENGES AT THE INTERNATIONAL LEVEL Even within the Central Africa, in many countries, national laws do not yet comply with the CEMAC/ECCAS directives. Globally there are remaining pending issues: IP naming and addressing Internet governance etc,
  • 11. 1111 IV- CONCLUSION As ICT are playing a major role as enablers/drivers of an inclusive socio-economic development, harmonization of policy and regulations will surely increase this role,
  • 12. THANK YOU FOR YOUR KIND ATTENTION 12