SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Assessing the need for
cyberlaw harmonization
Cécile Barayre-El Shami
Programme Manager, E-Commerce and Law Reform
ICT Analysis Section, UNCTAD
cecile.barayre@unctad.org
Commonwealth Cybersecurity Forum 2014
London, 5-6 February 2014
1
Cyberattacks have the potential to destabilize on a global scale.
Cybersecurity must therefore be a matter of global concern. We need to
work together to bolster confidence in our networks, which are central
to international commerce and governance.
We need to strengthen national legislation … push for international
frameworks for collaboration … and adopt the necessary measures to
detect and defuse cyber threats.
Mr. Ban Ki-moon, UN Secretary-General,
Seoul Conference on Cyberspace, Seoul, Republic of
Korea, October 2013
2
Why cybersecuritymatters
 Technology is pervasive and omnipresent
 Nearly as many SIM cards as people/applications
 90% global penetration
 60% in Africa
 9% annual growth of Internet users worldwide
Mobile money in expansion
 2.5 billion people unbanked in lower to middle income countries
 225 deployments as of February 2014, of which more than 50% in Africa
Increased use of cloud computing
 Webmail and social networks
 Business applications
 G-cloud
E-government initiatives
 E.g: the EAC
3
Sources: ITU, GSMA, UNCTAD (2014)
Signs of rapid growth of e-commerce in
developing countries
B2C e-commerce sales in 2012: $1 trillion
China, India and Indonesia expected to grow fastest in 2013
China
 E-commerce has grown by 120% a year since 2003
 Surpassed the US in 2013 as largest e-commerce market
 Requested UNCTAD to review its e-commerce legislation (2014)
Latin America: from $1.6 billion to $43 billion in past decade
Brazil accounts for largest market share (59%)
Middle East and Africa: share in global e-commerce expected
to rise from 1.6% to 3.5% by 2016
4
Sources: Economist, Morgan Stanley, eMarketer
Issues to address
 Cybersecurity is multi-dimensional and complex
 Sovereignty, freedom of expression and privacy
 No international framework to address cybersecurity
 Security and trust of ICT users
 Lack of capacity:
 Policy and law makers preparing and enforcing laws
 Technical skills (security systems and CERTs)
 Enforcement bodies
 Differences among countries
 Legislation, capacity, resources
 Regional agreements/frameworks
5
Assessing cyberlaw status
1/3 of the world’s jurisdictions lack e-commerce legislation
 101 countries (including 55 developing countries) with data
privacy laws
6
Source: UNCTAD, Greenleaf, 2013
Africa (18) Asia (8) Caribbean and
Americas (13)
Europe (3) Pacific (11)
Privacy
Laws
(16)
Ghana
Mauritius
Seychelles
India
Malaysia
Singapore
Bahamas
Canada
St Lucia
St Vincent and The
Grenadines
Trinidad and Tobago
Cyprus
Malta
United
Kingdom
Australia
New Zealand
Bills (10) Kenya
Nigeria
South Africa
Tanzania
Antigua and Barbados
Barbados
Dominica
Grenada
Jamaica
St Kitts and Nevis
UNCTAD'sworkon cyberlawharmonization
 Provide technical assistance to more than 30 countries of which 10
Commonwealth countries building harmonized legal frameworks for
e-commerce [Ghana, Kenya, Nigeria, Rwanda, Sierra Leone, Uganda,
Tanzania, Brunei Darussalam, Malaysia, Singapore]
 Support developing countries’ efforts towards the preparation of an
enabling legal and regulatory environment for e-commerce
1. Raise awareness and build capacity of policy and law makers, including
parliamentarians; eg. CTO and CPA Briefing of parliamentarians,
Commonwealth Cybersecurity Forum 2013
2. UNCTAD training course on the “Legal Aspects of E-commerce” : legal
validity of e-transaction, consumer protection, taxation, security, privacy,
IPRs, content regulation
3. Reviews of national laws and regional agreements
4. Assistance in the preparation of regionally harmonized legal frameworks
 Programme funded by Finland 7
ASEANFrontrunner in Harmonization
Harmonization of E-Commerce Legal Infrastructure in ASEAN
Project (2004-2008)
First developing region to adopt harmonized framework for e-
commerce laws
ICT Master Plan 2015 sets targets for further harmonization
Recognize need for continuous improvement of framework
and to ensure effective implementation at national level
Conscious of new challenges as result of evolving ICT
landscape
8
UNCTAD-ASEANReview of E-Commerce
Laws Harmonization in ASEAN
Take stock of progress to date
Surveys of 10 ASEAN Member States and
of the Private Sector
Workshop in Cebu, 10-11 November 2012
25 participants from all ASEAN Member States
Country presentations
Group discussions on key issues and priority legal areas
Needs assessment
Review published in 2013 and presented to the
Telecommunications and IT Senior Official and Telecommunication
Regulators' Council Leaders’ in September 2013
9
Statusof e-commerce law
harmonization in ASEAN (March2013)
10Source: UNCTAD
Main goal of the EAC Treaty: regional integration
Regional e-Government Programme adopted by
the EAC Council of Ministers (2006)
Enabling legal framework as a critical factor: e-
transactions, cybersecurity
Harmonized regional and national legal frameworks
Creation of an EAC Task Force
Regional ICT developments
Improved fiber-optic links and expansion of mobile
telephony and related services, notably mobile
money
Business process outsourcing
11
UNCTAD'sassistancein Africa
ThecaseoftheEAC
EACcyberlawharmonization: Processes
12

Great progress achieved in terms of
harmonization in the EAC
Two Cyberlaw Frameworks endorsed
 Phase I: e-transactions, cybercrime, consumer protection, data protection –
adopted by the EAC Council of Ministers (2010)
 Phase II: IPRs, competition, taxation and information security - adopted by
the EAC Council of Ministers (2013)
Progress at the country level
 Computer crime : Kenya, Rwanda and Uganda - (Drafts - Burundi and
Tanzania)
 Data protection and privacy: Drafts in Burundi, Kenya, Rwanda and Tanzania-
A draft is being prepared by Uganda - Request from the Ministry of
Information and Communications Technology for UNCTAD review (2014)
 Awareness campaigns
 eg. Uganda: Training of ICT and legal personnel since 2012: banks, insurance,
traders, manufacturers, judges, police and other agencies and bodies
Success of the project based on:
 Ownership from the EAC secretariat
 Continuation and commitment of the EAC Task Force (TF) Members
 UNCTAD continued support: review of draft laws and capacity-
building workshops 13
UNCTAD'sassistancein Africa
ThecaseofECOWAS
 Project started in 2013 in cooperation with the ECOWAS
Commission
 To support the implementation at the national level of existing legal
frameworks on e-transactions (Supplementary Act A/SA.2/01/10),
cybercrime (Directive 1/08/11) and personal data protection
(Supplementary Act A/SA.1/01/10)
 To review e-commerce law harmonization
 Building capacity of policy and law makers
 220 trained through distance learning
 Two regional workshops (Dakar, February; Accra, March, 2014)
 Surveys of 15 ECOWAS Member States
 Recommendations to further cyberlaw harmonization
"If we want to promote e-commerce in the region, we must raise consumer
confidence in computer security and electronic transactions" - Dr. Raphael
Koffi, Principal Programme Officer and Head of Telecommunication/ICT
Division, ECOWAS Commission 14
15
Thank you for your attention!
http://unctad.org/ICT4D

Contenu connexe

Tendances

090812 B Nguyen
090812 B Nguyen090812 B Nguyen
090812 B Nguyen
biennn
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
segughana
 
TPP and Digital Rights: Indonesian Perspective Overview
TPP and Digital Rights: Indonesian Perspective OverviewTPP and Digital Rights: Indonesian Perspective Overview
TPP and Digital Rights: Indonesian Perspective Overview
ICT Watch
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
Ambrose Ruyooka,PMP,CGEIT, CRISC
 

Tendances (20)

IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Network Neutrality - Training Presentation for Indictee Scientists at C-DAC, ...
Network Neutrality - Training Presentation for Indictee Scientists at C-DAC, ...Network Neutrality - Training Presentation for Indictee Scientists at C-DAC, ...
Network Neutrality - Training Presentation for Indictee Scientists at C-DAC, ...
 
090812 B Nguyen
090812 B Nguyen090812 B Nguyen
090812 B Nguyen
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docxConcept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crime
 
Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
TRPC Digital Bytes July 2020
TRPC Digital Bytes July 2020TRPC Digital Bytes July 2020
TRPC Digital Bytes July 2020
 
Legal and policy framework -ICT week 2016
Legal and policy framework -ICT week 2016Legal and policy framework -ICT week 2016
Legal and policy framework -ICT week 2016
 
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance ChallengesInternet of Things Gouvernance Challenges
Internet of Things Gouvernance Challenges
 
RIPE NCC and Internet Governance
RIPE NCC and Internet GovernanceRIPE NCC and Internet Governance
RIPE NCC and Internet Governance
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
 
3d mdrf 2020 jo daniels ecommerce
3d mdrf 2020 jo daniels ecommerce3d mdrf 2020 jo daniels ecommerce
3d mdrf 2020 jo daniels ecommerce
 
TPP and Digital Rights: Indonesian Perspective Overview
TPP and Digital Rights: Indonesian Perspective OverviewTPP and Digital Rights: Indonesian Perspective Overview
TPP and Digital Rights: Indonesian Perspective Overview
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Greasing the wheels_of_the_internet_economy_supplement_feb_2014_tcm80-155191 (1)
Greasing the wheels_of_the_internet_economy_supplement_feb_2014_tcm80-155191 (1)Greasing the wheels_of_the_internet_economy_supplement_feb_2014_tcm80-155191 (1)
Greasing the wheels_of_the_internet_economy_supplement_feb_2014_tcm80-155191 (1)
 

En vedette

CTO Cybersecurity Forum 2013 Koffi Fabrice Djossou
CTO Cybersecurity Forum 2013 Koffi Fabrice DjossouCTO Cybersecurity Forum 2013 Koffi Fabrice Djossou
CTO Cybersecurity Forum 2013 Koffi Fabrice Djossou
Commonwealth Telecommunications Organisation
 

En vedette (6)

Special Consultation
Special ConsultationSpecial Consultation
Special Consultation
 
American deep state and 4th reich
American deep state and 4th reichAmerican deep state and 4th reich
American deep state and 4th reich
 
How to Set-up and Maintain a Successful Open Data Initiative - Carlos Iglesias
How to Set-up and Maintain a Successful Open Data Initiative - Carlos IglesiasHow to Set-up and Maintain a Successful Open Data Initiative - Carlos Iglesias
How to Set-up and Maintain a Successful Open Data Initiative - Carlos Iglesias
 
CTO Cybersecurity Forum 2013 Koffi Fabrice Djossou
CTO Cybersecurity Forum 2013 Koffi Fabrice DjossouCTO Cybersecurity Forum 2013 Koffi Fabrice Djossou
CTO Cybersecurity Forum 2013 Koffi Fabrice Djossou
 
APIs, now and in the future
APIs, now and in the futureAPIs, now and in the future
APIs, now and in the future
 
Love facts slide
Love facts slideLove facts slide
Love facts slide
 

Similaire à Session 6.2 Cécile Barayre El Shami

CTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile BarayreCTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile Barayre
Commonwealth Telecommunications Organisation
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
Endcode_org
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
Commonwealth Telecommunications Organisation
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 
Wsis Alf C7 Unctad
Wsis Alf C7 UnctadWsis Alf C7 Unctad
Wsis Alf C7 Unctad
ecommerce
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
segughana
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
Zsolt Nemeth
 
TelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationTelcoME2015_IOTRegulation
TelcoME2015_IOTRegulation
EamonHolley
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
Commonwealth Telecommunications Organisation
 
Nov 2013 Whos who International article
Nov 2013 Whos who International articleNov 2013 Whos who International article
Nov 2013 Whos who International article
Carl Frank
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 

Similaire à Session 6.2 Cécile Barayre El Shami (20)

CTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile BarayreCTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile Barayre
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Wsis Alf C7 Unctad
Wsis Alf C7 UnctadWsis Alf C7 Unctad
Wsis Alf C7 Unctad
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
Internet Governance Backround
Internet Governance BackroundInternet Governance Backround
Internet Governance Backround
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
TelcoME2015_IOTRegulation
TelcoME2015_IOTRegulationTelcoME2015_IOTRegulation
TelcoME2015_IOTRegulation
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorThe Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
 
Nov 2013 Whos who International article
Nov 2013 Whos who International articleNov 2013 Whos who International article
Nov 2013 Whos who International article
 
3a ecommerce nwe ni soe y in mdrf 2020
3a ecommerce nwe ni soe y in mdrf 20203a ecommerce nwe ni soe y in mdrf 2020
3a ecommerce nwe ni soe y in mdrf 2020
 
Vietnam – Information Technology – 2015
Vietnam – Information Technology – 2015Vietnam – Information Technology – 2015
Vietnam – Information Technology – 2015
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 

Plus de Commonwealth Telecommunications Organisation

Plus de Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Session 6.2 Cécile Barayre El Shami

  • 1. Assessing the need for cyberlaw harmonization Cécile Barayre-El Shami Programme Manager, E-Commerce and Law Reform ICT Analysis Section, UNCTAD cecile.barayre@unctad.org Commonwealth Cybersecurity Forum 2014 London, 5-6 February 2014 1
  • 2. Cyberattacks have the potential to destabilize on a global scale. Cybersecurity must therefore be a matter of global concern. We need to work together to bolster confidence in our networks, which are central to international commerce and governance. We need to strengthen national legislation … push for international frameworks for collaboration … and adopt the necessary measures to detect and defuse cyber threats. Mr. Ban Ki-moon, UN Secretary-General, Seoul Conference on Cyberspace, Seoul, Republic of Korea, October 2013 2
  • 3. Why cybersecuritymatters  Technology is pervasive and omnipresent  Nearly as many SIM cards as people/applications  90% global penetration  60% in Africa  9% annual growth of Internet users worldwide Mobile money in expansion  2.5 billion people unbanked in lower to middle income countries  225 deployments as of February 2014, of which more than 50% in Africa Increased use of cloud computing  Webmail and social networks  Business applications  G-cloud E-government initiatives  E.g: the EAC 3 Sources: ITU, GSMA, UNCTAD (2014)
  • 4. Signs of rapid growth of e-commerce in developing countries B2C e-commerce sales in 2012: $1 trillion China, India and Indonesia expected to grow fastest in 2013 China  E-commerce has grown by 120% a year since 2003  Surpassed the US in 2013 as largest e-commerce market  Requested UNCTAD to review its e-commerce legislation (2014) Latin America: from $1.6 billion to $43 billion in past decade Brazil accounts for largest market share (59%) Middle East and Africa: share in global e-commerce expected to rise from 1.6% to 3.5% by 2016 4 Sources: Economist, Morgan Stanley, eMarketer
  • 5. Issues to address  Cybersecurity is multi-dimensional and complex  Sovereignty, freedom of expression and privacy  No international framework to address cybersecurity  Security and trust of ICT users  Lack of capacity:  Policy and law makers preparing and enforcing laws  Technical skills (security systems and CERTs)  Enforcement bodies  Differences among countries  Legislation, capacity, resources  Regional agreements/frameworks 5
  • 6. Assessing cyberlaw status 1/3 of the world’s jurisdictions lack e-commerce legislation  101 countries (including 55 developing countries) with data privacy laws 6 Source: UNCTAD, Greenleaf, 2013 Africa (18) Asia (8) Caribbean and Americas (13) Europe (3) Pacific (11) Privacy Laws (16) Ghana Mauritius Seychelles India Malaysia Singapore Bahamas Canada St Lucia St Vincent and The Grenadines Trinidad and Tobago Cyprus Malta United Kingdom Australia New Zealand Bills (10) Kenya Nigeria South Africa Tanzania Antigua and Barbados Barbados Dominica Grenada Jamaica St Kitts and Nevis
  • 7. UNCTAD'sworkon cyberlawharmonization  Provide technical assistance to more than 30 countries of which 10 Commonwealth countries building harmonized legal frameworks for e-commerce [Ghana, Kenya, Nigeria, Rwanda, Sierra Leone, Uganda, Tanzania, Brunei Darussalam, Malaysia, Singapore]  Support developing countries’ efforts towards the preparation of an enabling legal and regulatory environment for e-commerce 1. Raise awareness and build capacity of policy and law makers, including parliamentarians; eg. CTO and CPA Briefing of parliamentarians, Commonwealth Cybersecurity Forum 2013 2. UNCTAD training course on the “Legal Aspects of E-commerce” : legal validity of e-transaction, consumer protection, taxation, security, privacy, IPRs, content regulation 3. Reviews of national laws and regional agreements 4. Assistance in the preparation of regionally harmonized legal frameworks  Programme funded by Finland 7
  • 8. ASEANFrontrunner in Harmonization Harmonization of E-Commerce Legal Infrastructure in ASEAN Project (2004-2008) First developing region to adopt harmonized framework for e- commerce laws ICT Master Plan 2015 sets targets for further harmonization Recognize need for continuous improvement of framework and to ensure effective implementation at national level Conscious of new challenges as result of evolving ICT landscape 8
  • 9. UNCTAD-ASEANReview of E-Commerce Laws Harmonization in ASEAN Take stock of progress to date Surveys of 10 ASEAN Member States and of the Private Sector Workshop in Cebu, 10-11 November 2012 25 participants from all ASEAN Member States Country presentations Group discussions on key issues and priority legal areas Needs assessment Review published in 2013 and presented to the Telecommunications and IT Senior Official and Telecommunication Regulators' Council Leaders’ in September 2013 9
  • 10. Statusof e-commerce law harmonization in ASEAN (March2013) 10Source: UNCTAD
  • 11. Main goal of the EAC Treaty: regional integration Regional e-Government Programme adopted by the EAC Council of Ministers (2006) Enabling legal framework as a critical factor: e- transactions, cybersecurity Harmonized regional and national legal frameworks Creation of an EAC Task Force Regional ICT developments Improved fiber-optic links and expansion of mobile telephony and related services, notably mobile money Business process outsourcing 11 UNCTAD'sassistancein Africa ThecaseoftheEAC
  • 13. Great progress achieved in terms of harmonization in the EAC Two Cyberlaw Frameworks endorsed  Phase I: e-transactions, cybercrime, consumer protection, data protection – adopted by the EAC Council of Ministers (2010)  Phase II: IPRs, competition, taxation and information security - adopted by the EAC Council of Ministers (2013) Progress at the country level  Computer crime : Kenya, Rwanda and Uganda - (Drafts - Burundi and Tanzania)  Data protection and privacy: Drafts in Burundi, Kenya, Rwanda and Tanzania- A draft is being prepared by Uganda - Request from the Ministry of Information and Communications Technology for UNCTAD review (2014)  Awareness campaigns  eg. Uganda: Training of ICT and legal personnel since 2012: banks, insurance, traders, manufacturers, judges, police and other agencies and bodies Success of the project based on:  Ownership from the EAC secretariat  Continuation and commitment of the EAC Task Force (TF) Members  UNCTAD continued support: review of draft laws and capacity- building workshops 13
  • 14. UNCTAD'sassistancein Africa ThecaseofECOWAS  Project started in 2013 in cooperation with the ECOWAS Commission  To support the implementation at the national level of existing legal frameworks on e-transactions (Supplementary Act A/SA.2/01/10), cybercrime (Directive 1/08/11) and personal data protection (Supplementary Act A/SA.1/01/10)  To review e-commerce law harmonization  Building capacity of policy and law makers  220 trained through distance learning  Two regional workshops (Dakar, February; Accra, March, 2014)  Surveys of 15 ECOWAS Member States  Recommendations to further cyberlaw harmonization "If we want to promote e-commerce in the region, we must raise consumer confidence in computer security and electronic transactions" - Dr. Raphael Koffi, Principal Programme Officer and Head of Telecommunication/ICT Division, ECOWAS Commission 14
  • 15. 15 Thank you for your attention! http://unctad.org/ICT4D