CybersecurityLawandRegulation
CybersecurityLawandRegulation
CybersecurityLawandRegulation
net/publication/320624755
CITATIONS READS
15 16,751
1 author:
SEE PROFILE
All content following this page was uploaded by Uchenna Jerome Orji on 27 December 2017.
This book is an attempt to discuss the legal and regulatory aspects of cybersecurity. The book examines
international, regional and national regulatory responses to cybersecurity. It particularly examines the
response of the United Nations and several international organizations to cybersecurity. It provides
an analysis of the Council of Europe Convention on Cybercrime, the Commonwealth Model Law on
Computer and Computer Related Crime, the Draft International Convention to Enhance Protection
from Cybercrime and Terrorism and the Draft Code on Peace and Security in Cyberspace. The book
further examines policy and regulatory responses to cybersecurity in the United States, the United
Kingdom, Singapore, India, China and Russia. It also examines the African Union’s regulatory response
to cybersecurity and renders an analysis of the Draft African Union Convention on the Establishment of
a Credible Legal Framework for Cybersecurity in Africa. It considers the development of cybersecurity
initiatives by the Economic Community of West African States, the Southern African Development
Community and the East African Community. The book further provides an analysis of national
responses to cybersecurity in South Africa, Botswana, Mauritius, Senegal, Kenya, Ghana and Nigeria.
It also examines efforts to develop policy and regulatory frameworks for cybersecurity in sixteen other
African countries (Algeria, Angola, Cameroon, Egypt, Ethiopia, Gambia Lesotho, Morocco, Namibia,
Niger, Seychelles, Swaziland, Tanzania, Tunisia, Uganda and Zambia). Nigeria is used as a case study
to examine the peculiar causes of cyber-insecurity and the challenges that hinder the regulation
of cybersecurity in African states as well as the implications of poor cybersecurity governance on
national security, economic development, international relations, human security and human rights.
Cybersecurity
Uchenna Jerome Orji is a Barrister and Solicitor of the Supreme Court of Nigeria. He holds a Bachelor
of Laws (LL.B) honours Degree from the University of Nigeria and a Masters of Laws (LL.M) Degree
from the University of Ibadan, Nigeria with a research specialization in Information Technology Law.
He is also a Consultant to the African Center for Cyber Law and Cybercrime Prevention (ACCP) of
the United Nations, African Institute for the Prevention of Crime and the Treatment of Offenders,
Kampala, Uganda.
Co
H utio
In
um
ns
te
W
tit
r
an
ol
na
(In
fL
Ri & A
tio
eg
te
gh
na
na
al
ts min ealt w
na
l
lP
Pu
&
tio
En Cri olit
bl
H istr
Te
d
na
um at
lic
vi
is
NUR 828
ch bea w
he
l)
ro
Ed
Ca
Eu ian
La
an ive
no
nm al L
rs
uc n L
r
La l La
w
ro
Pr
ita La
H
La
m
o
i
at
e
pe aw
&
i
b
gy
va
r
nt
i
w
ou
i
n
P
on
a
te
a
&
se
n
h
rL
rie
La
La
La
La
a
aw
a
ic
s:
s
www.wolfpublishers.com
CYBERSECURITY
LAW AND REGULATION
a
Dedication
To my siblings:
Ify,
Ngozi,
Tobechukwu, and;
Ugochukwu.
To Emmanuel Orji;
And;
ISBN: 9789058508577
Published by:
V
Preface
VII
responsibility of states for global cybersecurity. Although, developments in
the criminal use of information communications technologies “continues to
race ahead of the ability of regulatory frameworks to keep up”, nevertheless,
this book will be useful to policy makers, regulators, researchers, lawyers,
students and any person interested in seeking an understanding of
cybersecurity governance in developed and developing countries - especially
in African countries.
VIII
Chapter five examines the national responses of African countries to
cybersecurity. It provides an analysis of cybersecurity laws in several African
countries that have established legal frameworks for cybersecurity such as
South Africa, Botswana, Mauritius, Senegal, Kenya and Ghana. It also
renders an assessment of ongoing efforts to develop legal and institutional
frameworks for cybersecurity as well as other relevant cybersecurity
initiatives in African countries.
IX
able guidance helped in putting this work together. This made the research
a cherished experience. Also his erudite guidance and tolerant disposition
during our LL.M seminars is highly commendable. Following my graduation,
he has also encouraged my intention to study for a Doctorate degree in Law.
I would also like to express my immense gratitude to Professor Johnson O.
Anifalaje for his fatherly guidance and encouragement. I am equally grateful
to the Staff of the Faculty of Law Library who helped me in finding some
relevant texts during the research; their devotion to duty was great.
I wish to specially thank Engr. Emmanuel Orji – a very good brother and
friend, for his immense goodwill and support during my stay in Ibadan. I am
equally grateful to my brother and very good friend Mr. Fredrick Onu for his
sincere encouragements and goodwill. I am also grateful to my big brother
Late Barr. Orji Jerome Arochukwu for his guidance and support while he
was alive.
I am eternally grateful to my parents Sir & Lady Moses Orji for sponsoring
my education up the Postgraduate level and also for their constant support
and encouragement. I am also eternally grateful to my siblings: Engr.
Ifeyinwa Orji, Dr. Ngozi Orji, Tobechukwu Orji and Ugochukwu Orji
for their constant affection and support. Nothing can really describe my
indebtedness to my family; hence, I am dedicating this book to them.
X
Author’s biography
XI
Summary of Contents
Dedication III
Preface VII
Author’s Biography XI
Table of Contents XV
Chapter One:
An Introduction to Cybersecurity Law and Regulation 1
Chapter Two:
International Responses and Legal Measures on Cybersecurity 95
Chapter Three:
National Regulatory Responses to Cybersecurity in Select Jurisdictions 213
Chapter Four:
Multilateral Regulatory Responses to Cybersecurity in Africa 371
Chapter Five:
Cases Studies of National Regulatory Responses to Cybersecurity in
African States 401
Chapter Six:
Cybersecurity Law and Regulation in Nigeria 485
Chapter Seven:
Policy and Regulatory Proposals to Enhance Cybersecurity 563
Index 627
XIII
Table of Contents
Dedication III
Preface VII
Author’s Biography XI
Table of Contents XV
CHAPTER ONE:
AN INTRODUCTION TO CYBERSECURITY AND REGULATION
1.1 Introduction 1
1.2. Defining Cybersecurity 10
1.2.1. Cybersecurity as a Field of Law 16
1.2.1.1. Cybercrime 17
1.3. An Overview of the Scope and Basic Concepts of
Cybersecurity 19
1.3.1.1. Telecommunications Security 20
1.3.1.2. Data Protection 22
1.3.1.3. Information Security 23
1.3.1.4. Security of Critical Infrastructures/ Critical information Infrastructures 24
1.3.2. The Basic Concepts of Cybersecurity 30
1.3.2.1. Confidentiality 30
1.3.2.2. Integrity 32
1.3.2.3. Availability 33
1.3.2.4. Accountability 33
1.4. Critical Components of Cybersecurity Governance 33
1.4.1. Legal Aspects 34
1.4.2. Technical Aspects 36
1.4.3. Institutional/Organizational Aspects 38
1.4.3.1. Computer Emergency Response Teams (CERTs) 39
1.4.4. End-User Education 40
1.4.5. Research and Development 41
1.5. Contextual Legal Issues in Cybersecurity: Malicious Conducts,
Illicit Contents and Liability of Internet Service Providers 42
XV
1.5.1. Unauthorized/ Illegal Access (Hacking or Cracking) 42
1.5.2. Unauthorized Interception 46
1.5.3. Data Interference 48
1.5.4. System Interference 48
1.5.5. Data Espionage 53
1.5.6. Illegal Content 55
1.5.6.1. Pornographic Materials 56
1.5.6.2. Child Pornography 57
1.5.6.3. Publication of Xenophobic Materials 58
1.5.7. Spam Mails 58
1.5.8. Misuse of Computing Devices and Related Digital Technologies 60
1.5.9. Computer Related Identity Theft 61
1.5.10. Cyber-Squatting, Web hijacking and other Copyright and Trade
Mark Issues 62
1.5.10.1. Cyber-Squatting 62
1.5.10.2. Domain name or Web hijacking 64
1.5.10.3. Copyright Infringements 64
1.5.11. Computer Related Offences 64
1.5.11.1. Computer Related Forgery 65
1.5.11.2. Computer Related Fraud 65
1.5.12. Cyber Terrorism 67
1.5.13. Cyber Warfare 70
1.5.13.1. Cyber Warfare under International Laws of Armed Conflict 73
1.5.13.2. Challenges to Cyber Arms Control 76
1.5.13.3. Cyber Deterrence 79
1.5.14. Responsibility/ Liability of Internet Service Providers (ISPs) 81
1.6. Exploring “Real World” Perspectives of Cybersecurity 83
1.6.1. National Security 83
1.6.2. Economic Security 87
1.6.3. Human Rights 89
1.6.4. Human Security 91
CHAPTER TWO:
INTER NATIONAL RESPONSES AND LEGAL MEASURES ON
CYBERSECURITY
2. Introduction 95
2.1. International respones on cybersecurity 96
2.1.1. The United Nations 96
2.1.1.1. The Eighth United Nations Congress on the Prevention of Crime and
Treatment of Offenders 96
2.1.1.2. The United Nations Resolution 55/63 on Combating the Criminal
Misuse of Information Technology 98
2.1.1.3. The United Nations Resolution 56/121 on Combating the Criminal
Misuse of Information Technology 99
2.1.1.4. United Nations Resolution 57/239 on the Creation of a Global
Culture of Cyber Security 100
XVI
2.1.1.5. United Nations Resolution 58/199 on the Creation of a Global
Culture of Cybersecurity and the Protection of Critical Information
Infrastructures 102
2.1.1.6. United Nations Resolutions on Developments in the Field of
Telecommunications in the Context of International Security 104
2.1.1.7. Other Notable United Nations Resolutions on Cybersecurity 104
2.1.1.8. The Internet Governance Forum (IGF) 106
2.1.1.9. Recent Developments 106
2.1.2. The International Telecommunications Union (ITU) 107
2.1.2.1. The World Summit on the Information Society (WSIS) 108
2.1.2.2. The ITU High Level Expert Group (HLEG) on Cybersecurity 111
2.1.3. The Group of Eight (G8) 112
2.1.4. The Interpol 116
2.1.5. The Council of Europe 117
2.1.6. European Union (EU) 120
2.1.7. The Asian Pacific Economic Cooperation (APEC) 122
2.1.8. The Organization for Economic Cooperation and
Development (OECD) 124
2.1.9. The Commonwealth 126
2.1.10. The Organization of American States (OAS) 128
2.1.11. The Association of South-East Asian Relations (ASEAN) 130
2.1.12. The North Atlantic Treaty Organization (NATO) 131
2.1.13. The Arab League and Gulf Cooperation Council 132
2.1.14. The Stanford Proposal 132
2.1.15. The Global Protocol on Cybersecurity and Cybercrime 133
2.1.16. The International Multilateral Partnership Against Cyber
Threats (IMPACT) 134
2.2 An analysis of international legal frameworks on
cybersecurity 135
2.2.1 The Council of Europe Convention on Cybercrime 135
2.2.1.1. Measures to be taken at the National Level with Regards to
Substantive Criminal Law 137
2.2.1.2. Measures to be taken at the National Level with regards to
Procedural Law 154
2.2.1.3. Measures to be taken at the National Level with regards to the
establishment of Jurisdiction 162
2.2.1.4. Measures to be taken with regards to International Cooperation 163
2.2.2. The Commonwealth Model Law on Computer and Computer
Related Crime 174
2.2.2.2. Introduction- Matters Regarding the Usage of Terms and State
Jurisdiction 175
2.2.2.3. Offences 176
2.2.2.4. Procedural Powers 178
2.2.3. The Draft International Convention to Enhance Protection
from Cybercrime and Terrorism 183
XVII
2.2.3.1. Definitions and Use of Terms 184
2.2.3.2. Offences against Cyber Systems and Critical Infrastructures 185
2.2.3.3. Enactment of Domestic Laws by State Parties 188
2.2.3.4. Jurisdiction 188
2.2.3.5. Mutual Legal Assistance and Cooperation in Law Enforcement 189
2.2.3.6. Protection of Privacy and other Human Rights 192
2.2.3.7. The Agency for Information Infrastructure Protection (AIIP) 194
2.2.4. The Draft Code on Peace and Security in Cyberspace - A Global
Protocol on Cybersecurity and Cybercrime 196
2.2.4.1. General Provisions and Principles on a Global Protocol on Cyber-security
and Cybercrime -Legal Measures in Criminal and Procedural Law 196
2.2.4.2. The Model Law on Cybercrime 198
2.3. Limits of International Responses and Legal Measures 199
2.3.1. Lack of Broad Participation 199
2.3.2. The Absence of a Global Treaty of all Nations on Cybersecurity 201
2.3.3. Digital Divide 203
2.3.4. Lack of consensus 204
2.3.5. Lack of International Cooperation 207
2.3.6. National Implementation 210
CHAPTER THREE:
NATIONAL REGULATORY RESPONSES TO CYBERSECURITY
IN SELECT JURISDICTIONS
3. Introduction 213
3.1. The United States of America 213
3.1.1. Legal Measures 214
3.1.1.1. The Computer Fraud and Abuse Act 214
3.1.1.2. Other Enactments on Cybersecurity 228
3.1.1.2.1. Controlling the Assault of Non-Solicited Pornography and
Marketing Act (The CAN – SPAM Act) 228
3.1.1.2.2. The Digital Millennium Copyright Act 229
3.1.1.2.3. The Economic Espionage Act 229
3.1.1.2.4. The Electronic Communications Privacy Act 230
3.1.1.2.5. The Wire Fraud Act 230
3.1.1.2.6. The United States PATRIOT Act 230
3.1.1.2.7. The Federal Information Security Management Act 231
3.1.1.2.8. The Cyber Security Research and Development Act 231
3.1.2. Institutional Regulatory Mechanisms 231
3.1.2.1. The Department of Homeland Security (DHS) 232
3.1.2.2. The United States Computer Emergency Readiness Team (US-CERT) 233
3.1.2.3. Other Institutional Regulatory Mechanisms 233
3.1.3. Policy Mechanisms 234
3.1.3.1. The National Strategy to Secure Cyberspace 234
3.1.3.2. The Comprehensive National Cybersecurity Initiative (CNCI) 234
3.1.3.3. The Cyberspace Policy Review 235
XVIII
3.1.3.4. The United States International Strategy for Cyberspace 236
3.1.4. Recent Developments 236
3.1.4.1. The United States International Cybercrime Reporting and
Cooperation Bill 236
3.2. The United Kingdom 237
3.2.1. Legal Measures 238
3.2.1.1. The Computer Misuse Act 238
3.2.2.2. Other Enactments on Cybersecurity 254
3.2.2.2.1. The Terrorism Act 254
3.2.2.2.2. The Counter-Terrorism Act 255
3.2.2.2.3. Regulation of Investigatory Powers Act 256
3.2.2.2.4. The Fraud Act 256
3.2.2.2.5. The Police and Justice Act 257
3.2.3. Institutional Regulatory Mechanisms 257
3.2.3.1 The Serious and Organized Crime Agency (SOCA) 257
3.2.3.2 The Communications Electronics Security Group (CESG) 258
3.2.3.3. The UK Computer Emergency Response Team (GovCertUK ) 258
3.2.3.4. The Center for the Protection of National Infrastructure (CPNI) 258
3.2.3.5. The Office of Cyber Security 259
3.2.3.6. The Cyber Security Operations Centre 260
3.2.3.7. The Internet Watch Foundation (IWF) 260
3.2.4 Policy Mechanisms 260
3.2.4.1. The Cyber Security Strategy of the United Kingdom 260
3.3. Singapore 261
3.3.1. Legal Measures 261
3.3.1.1. The Computer Misuse Act of Singapore 261
3.3.1.2. Other Enactments on Cybersecurity 275
3.3.1.2.1. The Spam Control Act of Singapore 275
3.3.2. Institutional Regulatory Mechanisms 275
3.3.3. Policy Mechanisms 277
3.3.3.1. The Infocomm Security Master Plan 2 277
3.3.3.2. The National Trust Framework (NTF) 278
3.4. India 279
3.4.1.1. The Indian Information Technology Act 280
3.4.1.2. Other Enactments on Cybersecurity 306
3.4.1.2.1. The Information Technology (Guidelines for Cyber Cafe) Rules 2011 306
3.4.2. Institutional Regulatory Mechanisms 309
3.4.2.1. Adjudicatory Mechanisms 309
3.4.2.2. The Department of Information Technology 311
3.4.2.3. The Indian Computer Emergency Response Team 311
3.4.2.4. The National Nodal Agency 312
3.4.3. Policy Mechanisms 312
3.4.3.1. The Indian Cybersecurity Strategy 312
3.5. The People’s Republic of China 314
3.5.1. Legal Measures 316
XIX
3.5.1.1. The Computer Information Network and Internet Security,
Protection and Management Regulations 316
3.5.1.2. The Chinese Regulations on Safeguarding Computer Information
Systems 328
3.5.1.3. The State Secrecy Protection Regulations for Computer Information
Systems on the Internet 330
3.5.1.4. The Criminal Law of the People’s Republic of China 332
3.5.2. Institutional Regulatory Mechanisms 344
3.5.2. Policy Mechanisms 345
3.5.2.1. China’s National Defense Strategy 2010 345
3.6. The Russian Federation 346
3.6.1. Legal Measures 348
3.6.1.1. The Criminal Code of the Russian Federation 348
3.6.1.2. The Law of the Russian Federation on the Legal Protection of Computer
Programmes and Data Bases 354
3.6.2. Institutional Regulatory Mechanisms 355
3.6.3. Policy Mechanisms 356
3.6.3.1. The Russian Information Security Doctrine 356
3.6.4. Russia and the Council of Europe Convention on Cybercrime 358
3.7. An Overview of Some Major Regulatory Challenges 361
3.7.1. Use of Cyber Devices for Dual Purposes and the Availability of
Malicious Cyber Tools 361
3.7.2. The Constant Evolution of Malicious Cyber Tools 362
3.7.3. Under-Reporting 362
3.7.4. High Costs of Investigating and Prosecuting Cybercrime 363
3.7.5. Challenges of Obtaining and Preserving Digital Evidence 363
3.7.6. Investigation and Prosecution of Suspects Located Abroad 364
3.7.7. Proof of Offences 367
3.7.8. “Forum Shopping” by Criminal Actors 368
3.7.9. Other Challenges 368
CHAPTER FOUR:
MULTILATERAL REGULATORY RESPONSES TO
CYBERSECURITY IN AFRICA
4. Introduction 371
4.1. Regional Multilateral Responses 374
4.1.1. The African Union (AU) 374
4.1.1.1. The Draft African Union Convention on the Establishment of a
Credible Legal Framework for Cybersecurity in Africa 376
4.1.1.1.1. Basic Principles to Promote Cybersecurity in African States 377
4.1.1.1.2. Provisions Relating to the Establishment of Cybercrime Offences 385
4.1.1.1.3. Some Perceived Problems of the Draft African Union Convention on the
Establishment of a Credible Legal Framework for Cybersecurity 394
4.2. Sub-Regional Multilateral Responses 397
4.2.1. The Economic Community of West African States (ECOWAS) 397
XX
4.2.2. The Southern African Development Community (SADC) 398
4.2.3. The East African Community (EAC) 398
CHAPTER FIVE:
CASES STUDIES OF NATIONAL REGULATORY RESPONSES TO
CYBERSECURITY IN AFRICAN STATES
5. Introduction 401
5.1. South Africa 403
5.1.1. Legal Measures 403
5.1.1.1. The Electronic Communications and Transactions Act 403
5.1.1.2. The Interception and Monitoring Prohibition Act and Other Related
Enactments on Cybersecurity 416
5.1.2. Institutional Regulatory Mechanisms 417
5.1.2.1. Cyber Inspectors 417
5.1.2.2. ECS-CSIRT 417
51.4. Policy Mechanisms 418
5.1.3.1. The Draft Cybersecurity Policy of South Africa 418
5.2. Botswana 419
5.2.1. Legal Measures 420
5.2.1.1. The Cybercrime and Computer Related Crimes Act 420
5.2.2. Institutional Regulatory Mechanisms 445
5.3. Mauritius 445
5.3.1. Legal Measures 446
5.3.1.1. The Computer Misuse and Cybercrime Act 446
5.3.2. Institutional Regulatory Mechanisms 447
5.3.2.1. The Mauritian national Computer Security Incident Response Team
(CERT-MU) 448
5.4. Senegal 448
5.4.1. Legal Measures 449
5.4.1.1. The Senegalese Law on Cybercrime 449
5.5. Kenya 459
5.5.1. Legal Measures 459
5.5.1.1. The Kenya Communications (Amendment) Act 459
5.5.2. Policy Mechanisms 460
5.5.2.1. The Kenyan Information and Communications Technology Policy 460
5.5.3. Institutional Regulatory Mechanisms 460
5.5.3.1. The Kenya Computer Security Incident Response Team
(CSIRT-Kenya) 460
5.6. Ghana 461
5.6.1. Legal Measures 462
5.6.1.1. The Electronic Transactions Act 462
5.6.2. Institutional Regulatory Mechanisms 470
5.7. Brief Overviews of Regulatory Reponses in other
African States 472
5.7.1. Algeria 472
XXI
5.7.2. Angola 472
5.7.3. Cameroon 473
5.7.4. Egypt 474
5.7.5. Ethiopia 475
5.7.6. Gambia 476
5.7.7. Lesotho 476
5.7.8. Morocco 477
5.7.9. Namibia 477
5.7.10. Niger 478
5.7.11. Seychelles 478
5.6.12. Swaziland 478
5.7.13. Tanzania 479
5.7.14. Tunisia 480
5.7.15. Uganda 481
5.7.16. Zambia 482
CHAPTER SIX:
CYBERSECURITY LAW AND REGULATION IN NIGERIA
6. Introduction 485
6.1. Legal Measures 491
6.1.1. The Advance Fee Fraud and other Fraud Related Offences Act 491
6.1.1.1. Duties of Electronic Communications Service Providers 492
6.1.1.2. Liabilities for Breach of Duties imposed on Electronic Communications
Service Providers 493
6.1.2. The Nigerian Communications Act 494
6.1.2.1. Powers of the Nigerian Communications Commission with respect to
Cybersecurity 495
6.2. Policy Mechanisms 496
6.2.1. The Nigerian National Policy for Information Technology 496
6.3. An Overview of National Efforts to Develop Broad Legal and
Institutional Regulatory Mechanisms on Cybersecurity 496
6.3.1. The Presidential Committee on 419 Activities in the Cyberspace 497
6.3.2. The Nigerian Cybercrime Working Group (NCWG) 497
6.3.2.1. Some Achievements of the Nigerian Cybercrime Working Group
(NCWG) 500
6.3.3. Recent Developments 501
6.4. Institutional Regulatory Mechanisms 501
6.4.1. The Directorate for Cybersecurity (DFC) 501
6.4.2. The Economic and Financial Crimes Commission (EFCC) 503
6.4.2.1. Some Achievements of the EFCC on Cybersecurity 504
6.4.2.1.1. The EFCC – ATCON Partnership 504
6.4.2.1.2. The EFCC and Microsoft Partnership on Cybersecurity 505
6.4.2.1.3. The EFCC- G8 24/7 Network 505
6.4.2.1.4. The EFCC Transaction Clearing Platform 506
6.4.3. The National Information Technology Development Agency 506
XXII
6.5. An Analysis of Proposed Legal Measures 508
6.5.1. The Computer Security and Critical Information Infrastructure
Protection Bill 508
6.5.2. Comments on the Computer Security and Critical Information
Infrastructure Protection Bill 534
6.5.3. The Nigerian Cybersecurity and Data Protection Agency Bill 535
6.6. Peculiar Causes of Cyber-insecurity and the Regulatory
Challenges of Cybersecurity in Nigeria 537
6.6.1. Legal Challenges 538
6.6.1.1. Lack of appropriate legal frameworks on cybersecurity 538
6.6.1.2. Challenges arising from the legal status of digital evidence 540
6.6.2. Weak Institutional Capacities 542
6.6.3. Absence of Effective Synergy and Cooperation between
Regulatory Institutions on Cybersecurity 542
6.6.4. Poor Regulatory Oversight 543
6.6.5. Digital Divide 544
6.6.6. Lack of Resources and Skilled Manpower 544
6.6.7. Under Reporting 544
6.6.9. The Deployment of Internet Services without Technical Security
Solutions 547
6.6.10. Lack of End-User Awareness 548
6.6.11. Poor Socio-Economic Conditions and the Deterioration of
Societal Values 549
6.6.12. Massive Influx of Electronic Waste 553
6.7. Implications of Inadequate Regulatory Responses to
Cyber(in)security on National Security, Human Security,
Human Rights, International Relations and Economic
Development in Nigeria 554
6.7.1. National Security 554
6.7.2. Human Security 555
6.7.3. Human Rights 557
6.7.4. International Relations 558
6.7.5. National Economic Development 559
CHAPTER SEVEN:
POLICY AND REGULATORY PROPOSALS TO ENHANCE
CYBERSECURITY
7. Introduction 563
7.1. Policy and Regulatory Proposals to Enhance
Cybersecurity in Africa 563
7.1.1. Legal Strategies 566
7.1.2. Building Capacities in Legislative and Regulatory Institutions 567
7.1.3. Building Capacities in Business Organizations 568
7.1.4. Building Capacities for End-User Education 570
7.1.5. Building Capacities to enhance the implementation of Technical
XXIII
Solutions to Cybersecurity 571
7.1.6. The establishment of Computer Emergency Response Teams
(CERTs) 572
7.1.8. The Establishment of Fraud Complaints Units 574
7.1.9. Regulation of Money Transfer Services 574
7.1.10. Enhancing the Participation of National Governments 575
7.1.11. Private Sector Participation 576
7.1.12. Bridging the Digital Divide in African Countries 577
7.1.13. Enhancing Social and Economic Conditions and Strengthening
Societal Values 578
7.2. Policy and Regulatory Proposals to Enhance Global
Cybersecurity 579
7.2.1. The Need for a Global Legal Framework on Cybersecurity 579
7.2.2. Cyber Diplomacy 581
7.2.3. Enhancing Global Capacities for Incident Management 581
7.3. Concluding Remarks: Towards the Collective
Responsibility of States for Global Cybersecurity 585
Index 628
XXIV
Table of Cases
Germany
BVerfG (German Federal Constitutional Court, NJW 2008, 822- 27/2/2008,) 89
India
State of Tamil Nadu v. Suhas Katti (C.C.NO.4680/2004) 92,293
Nigeria
Abacha v. Fawehinmi (2000) 6 NWLR (pt. 660) 540
Anyeabosi v. R.T. Briscoe (Nig) Ltd (1987) 3 NWLR (Pt 59), 84 2 NSCC Vol. 18
(pt.2) 805 540
E.F.C.C. v. Fani Kayode (2009) [Unreported] <http://www.efcc.org/cases> 540
Esso West Africa Inc v. Oyegbola (1969) 1 NNLR 194 SC 540
Nuba Commercial Farms Limited v. Nal Merchant Bank Ltd (2002) 24 WRN 157
(2003) FWLR (Pt 145) 661 C.A 540
Ogolo v. IMB (Nig) Ltd (1995) 9 NWLR (Pt. 419) 314 C.A 540
S.B.N Ltd v. De Lluch (2004) 18 NWLR (pt, 905) 578
Singapore
Public Prosecutor v. Muhammad Nuzaihan bin Kamal Luddin (2000)
1 S.L.R. 34; (1999) SGHC 275 261,264,269,423
Prosecutor v. Navaseelan Balasingam (2006) SGDC 156 265
South Africa
Narlis v. South African Bank of Athens (1976) (2) SA 573 (A) 409
Ndlovu v. Minister of Correctional Services (2006) (4) All SA 165 (W) 409
R v. Douvenga (Unreported, District Court of Northern Transvaal,
Pretoria- Case No. 111/150/2003, 19/8/2003 405
S v. Harper (1981) (2) SA 638 (D) 403
S v. Howard (Unreported case No. 41/258/02, Johannesburg Regional
Magistrates Court) 404
S v. Manuel (1953) (4) SA 526 403
S v. Ndiki (2008) (2) SACR 252 409
Uganda
Uganda v. Garuhanga and Mugerwa (Unreported, Buganda Road Court,
CR 17 of 2004) 482
United Kingdom
A.G’s Reference (No.1 of 1999) (1993) QB 94 247
BT v. One in a Million Ltd (Unreported, The Times, 2/12/9) 63,521
Cox v. Riley (1986) 83 Cr. App. R.54 238
DPP v. Bignell (1988) 1. Cr. App. Rep. 1 242
XXV
Edward Yearly v. Crown Prosecution Service (1997) QB EWHC Admin
30821/03/1997 243
Harrods v. UK Network Services Limited and Others (Unreported,
Chancery Division, 9/12/1996) 63,521
Marks and Spencer v. One in a Million Ltd (Unreported, Court of Appeal,
23/7/98 23) 63,521
Morgans v. DPP (2000) 2 WLR 386; (1999) 1 WLR 968 253
R v. Aaron Caffrey (Unreported, Southwark Crown Court, 17/10/2003) 367,368
R v. Alfred Whittaker (Unreported, Scunthorpe, Magistrates Court) 246,515
R v. Bow Street Magistrates Court and Adeniyi Momodu Allison ex parte
United States Government (1999) 4 All ER 242,253
R v. Daniel Cuthbert (Unreported, Horseferry, Road Magistrates Court
07/10/2005) 243
R v. Emma Pearce and Malcolm Farquhason (Unreported, Croydon Magistrate
Court, 9/12/1993) 245
R v. Gold & Schifreen (1988) AC 1063; (1988) 2 WLR. 984 239
R v. Governor of Brixton Prison Exp. Levin (1997) QB G5: affd (1997)3
All ER 289, HL Unreported. November, 1992) 253
R v. Ian Morris and Richard Airlie (Unreported Cardiff Crown Court) 247
R v. Michelle Begley (Unreported, Coventry Magistrates Court) 243
R v. Mark Hopkins (Unreported, Westminster Magistrates Court 09/08/2007) 243
R v. Matthew Byrne (Unreported, Southwark Crown Court 07/11/2006) 247
R v. Ross Pearlstone (Unreported, Bow Street Magistrates Court) .245
R v. Pile (Unreported, Plymouth Crown Court, 1995) 247, 268
R v. Pryce (Unreported, Bow Street Magistrate Court, 21/3/1997) 252
R v. Richard Goulden (Unreported, Southwark Crown Court, June 1992) 246,515
R v. Simon Vallor (Unreported, Southwark Crown Court, 21/01/2003) 246,247
R v. Stephen Carey (Unreported, Hove Crown Court 19/09/2002) 247
R. v. Thompson (1984) 1 WLR 962 238
Rubicon Computer Systems v. United Paints Limited (2000) 2 TCLR 453 37
Saltman Engineering Co. Ltd v. Campbell Engineering Co. Ltd (1948) 65 RPC 203 31
Simkins Partnership v. Reeves Lund & Co. Ltd (Lawtel, 2003) 299
Thomas Marshall (Exports) Ltd. v. Guinle (1979) Ch. 227 31
Yarimaka v. Governor of HM Prison Brixton, (2002) QB, EWHC 589 (Admin)
47,254
Zezex and Yarimaka v. Governor of HM Prison Brixton and Government of
the United States of America (2002) QB, EWHC 589 (Admin) 254
United States
America Online, Inc. v. LCGM, Inc. 46 F. Supp. 2d 444, 444 (E.D. Va. 1998) 60
America Online, Inc. v. National Health Care Discount, Inc., 121 F. Supp.
2d 1255 (N.D.Iowa 2000) 32,219
Hotmail Corp. v. Van Money Pie, Inc. No., 98-20064, 1998 U.S. Dist.
LEXIS 10729 (N.D. Cal April 16, 1998) 60
Intermatic Inc. v. Dennis Toeppen (pre-ACPA), No. 96 C, 1982. United States
XXVI
District Court, N.D. Illinois, Eastern Division. Nov. 26, 1996 63,521
International Airport Centers, L.L.C. v. Citrin, 440 F.3d 418, 420-21
(7th Cir. 2006) 32
Ognibene v. Citibank (446 NYS 2d 845 (CIV.Ct.1981) 570
Pearl Investments v. Standard I/O, 257 F.Supp.2d 326, 349 (D.Me. 2003) 217
People v. Casey, 225 Ill. App.3d 82 (Ill. App. Ct. 1992) 285,423
Re America Online, Inc. 168 F. Supp. 2d 1359 (S.D Fla. 2001) 221
Re Grand Jury Subpoena to Sebastien Boucher, WL 424718
(United States District Court for the District of Vermont 19/2/2009) 160,364
Shaw v. Toshiba America Information Systems, 91 F. Supp. 2d 926, 931,
(E.D. Tex. 1999) 223
Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc., 119 F. Supp.
2d 1121, 1124 (W.D. Wash. 2000) 32
Trans World Airlines Inc. v. Franklin Mint Corp (1984) 466 U.S 243 210
United States v. Bae, 250 F.3d 774 (D.C. Cir. 2001) 221
United States v. Gajdik (2002) 292 F.3d 555 67
United States v. Gorshkov, WL 1024026 (W.D. Wash. 2001) 227,365
United States v. Ivanov, 175 F. Supp. 2d 367 (D. Conn. 2001) 64,227,284, 365, 435
United States v. Lindsley (2001) WL 502832 (5th Cir. 2001) 221,423
United States v. Lloyd, 269 F.3d 228, 231 (3d Cir. 2001) 224
United States v. Middleton, 231 F.3d 224
United States v. Mitra, 405 F.3d 492 (7th Cir.2005) 225
United States v. Morris, 928 F.2d 504 (2d Cir. 1991) 216,223,242
United States v. Pirello, 255 F.3d 728 (9th Cir. 2001) 230
United States v. Riggs, 739 F. Supp. 414 (N.D. Ill. 1990) 219
United States v. Rushdan, 870 F.2d 1509, 1514 (9th Cir. 1989) 226
United States v. Scartz, 838 F.2d 876, 879 (6th Cir. 1988) 226
United States v. Sullivan, 40 Fed. Appx. 740 (4th Cir. 2002) 223
United States v. Tucker, 150 F Supp 2d 1263 (D Utah 2001) 305 F 3d 1193
(10th Cir, 2002) 147
United States v. Willis, 476 F.3d 1121, 1125 (10th Cir. 2007) 219
XXVII
Table of Legislations and Policies
AFRICAN COUNTRIES
Algeria
Cybercrime Act 2008
Angola
Basic Telecommunication Law 2001
Botswana
Cybercrime and Computer Related Crimes Act 22, 2007
Cameroon
Cybercrime Act 2011
Egypt
E-Signature Law No. 15, 2004
Ethiopia
Criminal Code of the Federal Republic of Ethiopia, Proclamation No.
414, 2004
Gambia
Information and Communications Act, No.2, 2009
Ghana
Electronic Transactions Act, No.772, 2008
National Information Technology Agency Act, No.771, 2008
Kenya
Kenyan Communications (Amendment) Act No. 1, 2009
Kenyan Information and Communications Technology Policy, 2006
Lesotho
Lesotho ICT Policy of 2005
Mauritius
Computer Misuse and Cybercrime Act No XI, 2003
Morocco
Penal Code, Law No. 07.003 of Morocco, November, 2003
XXIX
Namibia
Computer Misuse and Cybercrime Act 2003
Niger
Cybercrime Law 2003
Nigeria
Advance Fee Fraud and other Fraud Related Offences Act 2006
Computer Security and Critical Information Infrastructure Protection
Bill-Sb 254 2005
Constitution of the Federal Republic of Nigeria, 1999
Economic and Financial Crimes Commission (Establishment) Act 2004
Nigerian Criminal Code, Cap. 77 LFN 1990
Nigerian Communications Act 2003
National Information Technology Development Agency Act 2007
National Information Technology Policy 2001
Nigerian Cybersecurity and Data Protection Agency Bill- HB, 154 C
4443, 2008
Senegal
Senegalese Law on Cybercrime No. 2008-11 (2008)
Seychelles
Computer Misuse Act 1998
Data Protection (Amendment) Act No. 6, 2003
South Africa
South African Electronic Communications and Transactions Act No.
25, 2002
Interception and Monitoring Prohibition Act No. 127, 1992
Regulation of Interception of Communications and Provision of
Communication Related Information Act (RICPCRIA) 2002
Draft Cybersecurity Policy of South Africa Government Gazette No.
32963, 19 February, 2010
Kingdom of Swaziland
Kingdom of Swaziland National Information and Communication
Infrastructure (NICI) Policy 2003
Tanzania
National Information and Communications Technology Policy 2003
XXX
Tunisia
Cybercrime Act, N°1999-89, Art 199
Electronic Signature and e-commerce Law, N° 2000-83
Consumer Protection and Respect of Intellectual Property Law,
N°1994-36
Data Protection Law, N°2004-63
Uganda
Computer Misuse Bill
Electronic Signature Act
E-transactions Act
Zambia
Computer Misuse and Crimes Act 2004
FOREIGN JURISDICTIONS
Brazil
Law No.9983, July 14, 2000 Article 213-13
China
Chinese Computer Information Network and Internet Security,
Protection and Management Regulations 1997
Chinese Regulations on Safeguarding Computer Information Systems 1996
State Secrecy Protection Regulations for Computer Information
Systems on the Internet 2000
Criminal Law of the People’s Republic of China
Chinese National Defense Strategy 2010
India
Information Technology Act, No. 21, 2000
Information Technology (Amendment) Act 2008, No. 10, 2009
Information Technology (Guidelines for Cyber Cafe) Rules 2011
The Indian Cybersecurity Strategy
Mexico
Penal Code Part 9, Chapter II Article 211
Russia
Criminal Code of the Russian Federation
Law of the Russian Federation on the Legal Protection of Computer
Programmes and Data Bases 1992
XXXI
Russian Information Security Doctrine 2000
Singapore
Computer Misuse Act of Singapore, Cap.50A, Rev. Ed., 2007
Spam Control Act of Singapore 2007
The Infocomm Security Master Plan 2
The National Trust Framework (NTF)
United Kingdom
Anti-terrorism, Crime and Security Act 2001 (c. 24)
Computer Misuse Act 1990(c.18)
Counter-Terrorism Act 2008 (c.28)
Criminal Damage Act 1971
Extradition Act 1989
Fraud Act 2006
Police and Justice Act 2006 (c.48)
Terrorism Act 2000 (c.11)
Terrorism Act 2006 (c. 11)
Regulation of Investigatory Powers Act 2000(c.23)
The Cyber Security Strategy of the United Kingdom 2009
United States
CAN-SPAM Act 2003, Pub. L. No. 108-187, 117
Comprehensive National Cybersecurity Initiative (CNCI) 2008
Computer Fraud and Abuse Act,18 U.S.C S.1030
Cyber Security Research and Development Act, P.L. 107-305, 2002
Digital Millennium Copyright Act 1998
Economic Espionage Act, 18 U.S.C. 1832
Electronic Communications Privacy Act 1986 (ECPA) P.L. 99-508
Federal Information Security Management Act, P.L.107-347, Title III
2002
Identity Theft Restitution Act 2008
National Information Infrastructure Protection Act 1996
National Infrastructure Protection Plan 2006
National Security Presidential Directive 54/Homeland Security
Presidential Directive 23 (NSPD-54/HSPD-23, January 8, 2008)
Nigerian Advance Fee Fraud Prevention Act of 1998, HR 3916 IH,
105th Congress 2d Session H. R. 3916 (Bill)
United States Cyberspace Policy Review 2009
United States National Policy on Critical Infrastructure Protection:
Presidential Decision Directive No. 63, May 22, 1998
United States National Strategy to Secure Cyberspace 2003
United States International Strategy for Cyberspace 2011
XXXII
United States International Cybercrime Reporting and Cooperation Bill
S. 3155 and H.R. 4692 2011
United States PATRIOT Act 2001 P.L. 107-56
Wire Fraud Act 18 U.S.C Section 1343
African Union
African Charter on Human and Peoples Rights (1981)
Constitutive Act of the African Union (2001)
Draft African Union Convention on the Establishment of a Credible
Legal Framework for Cybersecurity in Africa, AU Draft0 010111,
Version 01/01.2011
The Commonwealth
Model Law on Computer and Computer Related Crime LMM (02) 17
Council of Europe
Council of Europe, Convention on Cybercrime, 41 I.L.M. 282
(Budapest, 23.XI, 2001)
Additional Protocol to the Convention on Cybercrime, Concerning the
Criminalization of Acts of a Racist and Xenophobic Nature Committed
through Computer Systems, ETS No. 189
Convention for the Protection of Individuals with regard to Automatic
Processing of Personal Data ETS No. 108 (Strasbourg, 28.I.1981)
Convention on the Protection of Children against Sexual Exploitation
and Sexual Abuse CETS No.201 (2007)
XXXIII
EU Communication on a General Policy on the Fight against Cybercrime,
COM (2007)
EU Data Retention Directive 2005/0182/COD
EU Communication -Creating a Safer Information Society by Improving
the Security of Information Infrastructures and Combating Computer
Related Crime 26.1 2001, COM (2000)
EU Framework Decision on Attacks against Information Systems
2005/222/JHA (24 February 2005)
EU Council Framework Decision on Combating the Sexual Exploitation
of Children and Child Pornography 2004/68/JHA (2003)
EU (2001) Network and Information Security- A European Policy
Approach (6 June 2001)
EU Directive on Privacy and Electronic Communications (2002)
XXXIV
United Nations Resolutions on the Creation of a Global Culture
of Cybersecurity
Resolution 57/23 (A/RES/57/239) 20 December 2002
Resolution 58/199 on the Creation of a Global Culture of Cybersecurity
and Protection of Critical Information Infrastructures (A/RES 58/199)
23 December 2003
XXXV
Resolution 52) World Telecommunication Standardization Assembly
Johannesburg, (21-30 October 2008)
World Summit on the Information Society (WSIS) Declaration of
Principles, Building the Information Society: A Global challenge in the New
Millennium (2003)
World Summit on the Information Society (WSIS) Plan of Action (2003)
World Summit on the Information Society (WSIS) The Tunis Agenda for
the Information Society (2005)
XXXVI
List of Tables and Figures
XXXVII