10.08.2013 Views

The AU Draft Convention on Cybersecurity and related activities

The AU Draft Convention on Cybersecurity and related activities

The AU Draft Convention on Cybersecurity and related activities

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Comm<strong>on</strong>wealth Telecommunicati<strong>on</strong> Organisati<strong>on</strong>,<br />

<strong>Cybersecurity</strong> Forum 2013<br />

Yaoundé, Camero<strong>on</strong>, 22-26 May 2013<br />

African Uni<strong>on</strong> Perspectives <strong>on</strong> <strong>Cybersecurity</strong> <strong>and</strong><br />

Cybercrime Issues:<br />

<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>Draft</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>Cybersecurity</strong> <strong>and</strong> <strong>related</strong><br />

<strong>activities</strong><br />

Auguste YANKEY (Mr.)<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> Commissi<strong>on</strong><br />

Email: yankeyka@africa-uni<strong>on</strong>.org<br />

Website: www.<str<strong>on</strong>g>AU</str<strong>on</strong>g>.int


OUTLINE<br />

• <strong>Cybersecurity</strong> <strong>and</strong> Cybercrime issues:<br />

Introducti<strong>on</strong> <strong>and</strong> overview<br />

• <strong>Cybersecurity</strong> <strong>and</strong> Cybercrime in the <str<strong>on</strong>g>AU</str<strong>on</strong>g>C<br />

• <str<strong>on</strong>g>AU</str<strong>on</strong>g> Perspectives <strong>on</strong> <strong>Cybersecurity</strong> <strong>and</strong> Cybercrime<br />

Issues<br />

2


FACTS AND FIGURES<br />

• Almost two thirds of all adult web users globally have fallen victim to some<br />

sort of cybercrime, from spam email scams to having their credit card details<br />

stolen. (the 2011 Nort<strong>on</strong> Cybercrime Report: <str<strong>on</strong>g>The</str<strong>on</strong>g> Human Impact study)<br />

• <str<strong>on</strong>g>The</str<strong>on</strong>g> study, of over 7,000 Internet users found that 80% of people believed the<br />

perpetrators would never be brought to justice. Fewer than half ever bother to<br />

report the crime to police.<br />

• Africa: the fastest development of mobile banking <strong>and</strong> m<strong>on</strong>ey.<br />

Ex: Kenya with M-Pesa: 70% of adult transfer m<strong>on</strong>ey each other by mobile<br />

means USD 320 milli<strong>on</strong>, almost a quarter of Kenya’s GNP.<br />

• Africa is currently the social network’s fastest growing c<strong>on</strong>tinent. <str<strong>on</strong>g>The</str<strong>on</strong>g>re are<br />

also local success stories such as South African social network, MXit which<br />

currently has more than two times the number of Facebook users in South<br />

Africa.<br />

3


FACTS AND FIGURES<br />

• <str<strong>on</strong>g>The</str<strong>on</strong>g> growth rate of cyberspace has been enormous, roughly doubling every 100<br />

days.<br />

• Cybercrime in Africa is growing faster than any other c<strong>on</strong>tinent.<br />

• Out of the top ten countries in the world with a high level of cybercrime<br />

prevalence, Africa is host to four of these countries (Nigeria, Camero<strong>on</strong>, Ghana<br />

<strong>and</strong> South Africa).<br />

• Africa = 2% of world trade but 10% of Cybercrime attacks (ITU)<br />

4


Internet Development<br />

5


<str<strong>on</strong>g>The</str<strong>on</strong>g> term<br />

“cybercrime” is<br />

usually referred to as<br />

any criminal offense<br />

committed against or<br />

with the use of<br />

a computer or<br />

computer network<br />

A set of <strong>activities</strong> <strong>and</strong><br />

other measures,<br />

technical <strong>and</strong> n<strong>on</strong>technical<br />

intended to<br />

protect data,<br />

informati<strong>on</strong> <strong>and</strong><br />

informati<strong>on</strong> systems<br />

from unauthorized<br />

access, use, disclosure,<br />

disrupti<strong>on</strong>,<br />

modificati<strong>on</strong> <strong>and</strong><br />

destructi<strong>on</strong>.<br />

What does Cyber…refer to ?<br />

Virtual world of<br />

informati<strong>on</strong><br />

networks. <str<strong>on</strong>g>The</str<strong>on</strong>g><br />

global<br />

informati<strong>on</strong><br />

space. <str<strong>on</strong>g>The</str<strong>on</strong>g><br />

digital era.<br />

is a term used<br />

to describe the<br />

legal issues<br />

<strong>related</strong> to use<br />

of ICTs,<br />

particularly<br />

cyberspace<br />

6


• Core functi<strong>on</strong>:<br />

<strong>Cybersecurity</strong> <strong>and</strong> Cybercrime issues in the <str<strong>on</strong>g>AU</str<strong>on</strong>g>C<br />

“<str<strong>on</strong>g>The</str<strong>on</strong>g> Informati<strong>on</strong> Society Divisi<strong>on</strong>”<br />

– Enhancing the development of African ICT Networks between <strong>and</strong> am<strong>on</strong>g<br />

regi<strong>on</strong>s <strong>and</strong> at the internati<strong>on</strong>al level (Pan-African e-Network +VSAT<br />

projects).<br />

– Establish effective instituti<strong>on</strong>al linkages <strong>and</strong> essential mechanisms for<br />

cooperati<strong>on</strong> <strong>and</strong> coordinati<strong>on</strong> in ICT fields.<br />

– Provide <str<strong>on</strong>g>AU</str<strong>on</strong>g> Member States with the necessary capacity <strong>and</strong> tools for<br />

harnessing the Informati<strong>on</strong> Society for c<strong>on</strong>tinental integrati<strong>on</strong> &<br />

development.<br />

– Promoti<strong>on</strong>, coordinati<strong>on</strong> <strong>and</strong> harm<strong>on</strong>izati<strong>on</strong> of telecommunicati<strong>on</strong>, ICT <strong>and</strong><br />

Post Policies <strong>and</strong> Regulati<strong>on</strong> for an inclusive African informati<strong>on</strong> society .<br />

7


<str<strong>on</strong>g>AU</str<strong>on</strong>g> Challenges face to Cyber security/crime<br />

Low capacity systems that increases the vulnerability;<br />

Low technical capacity <strong>and</strong> human capacity building IT skills.<br />

Systems poorly made <strong>and</strong> poorly managed.<br />

Relay for attacks (b<strong>and</strong>width c<strong>on</strong>sumpti<strong>on</strong>, server downtime ...)<br />

Proliferati<strong>on</strong> of cyber centres without legal framework<br />

against users' perpetrati<strong>on</strong> <strong>and</strong> the protecti<strong>on</strong> of the others<br />

Fear of e-commerce <strong>and</strong> its impact <strong>on</strong> the development<br />

lack of protecti<strong>on</strong> mechanisms at local <strong>and</strong> regi<strong>on</strong>al level<br />

Unemployment of young graduates<br />

8


<str<strong>on</strong>g>AU</str<strong>on</strong>g> resp<strong>on</strong>se to <strong>Cybersecurity</strong> <strong>and</strong> Cybercrime<br />

Many regi<strong>on</strong>al c<strong>on</strong>ferences, forums <strong>and</strong> workshop ( i.e.<br />

the 1st African regi<strong>on</strong>al forum <strong>on</strong> cybersecurity, Yamoussoukro,<br />

11/2008, 1 st African Internet Governance Forum, Cairo, 10/2012)<br />

<str<strong>on</strong>g>Draft</str<strong>on</strong>g>ing of an African Uni<strong>on</strong> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the<br />

c<strong>on</strong>fidence <strong>and</strong> security in Cyberspace.<br />

9


Legal framework-1<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

<str<strong>on</strong>g>The</str<strong>on</strong>g> Oliver Tambo Declarati<strong>on</strong> (Ext/CITMC/Min/Decl.(I) Johannesburg, South-Africa,<br />

5 Nov. 2009)<br />

Adopti<strong>on</strong> of the resoluti<strong>on</strong><br />

<str<strong>on</strong>g>The</str<strong>on</strong>g> 14th <str<strong>on</strong>g>AU</str<strong>on</strong>g> Summit of Head of State <strong>and</strong> government Declarati<strong>on</strong><br />

<strong>on</strong> “Informati<strong>on</strong> <strong>and</strong> Communicati<strong>on</strong> Technologies in Africa: Challenges <strong>and</strong> Prospects for<br />

Development” ([Assembly/<str<strong>on</strong>g>AU</str<strong>on</strong>g>/11(XIV)], Addis Ababa, Ethiopia, 31 January - 2 February 2010)<br />

Endorsement of this resoluti<strong>on</strong><br />

<str<strong>on</strong>g>The</str<strong>on</strong>g> Abuja Declarati<strong>on</strong>, CITMC-3 ([<str<strong>on</strong>g>AU</str<strong>on</strong>g>/CITMC/MIN/Decl.(III)], Abuja (Nigeria), 03-07<br />

August 2010.<br />

C<strong>on</strong>firmati<strong>on</strong> of this resoluti<strong>on</strong><br />

We, African Ministers in charge of CIT, request the <str<strong>on</strong>g>AU</str<strong>on</strong>g> Commissi<strong>on</strong> to “Jointly finalize with the<br />

United Nati<strong>on</strong>s Ec<strong>on</strong>omic Commissi<strong>on</strong> for Africa, within the framework of the African Informati<strong>on</strong><br />

Society Initiative (AISI), the <str<strong>on</strong>g>Draft</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> Cyber Legislati<strong>on</strong> <strong>and</strong> support its implementati<strong>on</strong><br />

in Member States by 2012”;<br />

10


Legal framework -2<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

<str<strong>on</strong>g>The</str<strong>on</strong>g> Khartoum Declarati<strong>on</strong> (<str<strong>on</strong>g>AU</str<strong>on</strong>g>/CITMC-4/MIN/Decl.(IV)Khartoum, <str<strong>on</strong>g>The</str<strong>on</strong>g> Sudan,<br />

2-6 September 2012<br />

Endorsement of the <str<strong>on</strong>g>AU</str<strong>on</strong>g> Final <str<strong>on</strong>g>Draft</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> Cyberlegislati<strong>on</strong><br />

by the 4 th Ministerial C<strong>on</strong>ference of the African Uni<strong>on</strong> Ministers in charge<br />

of Communicati<strong>on</strong> <strong>and</strong> Informati<strong>on</strong> Technologies (CITMC-4)<br />

11


Objective <strong>and</strong> goal<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

Its objective is to harm<strong>on</strong>ize e-legislati<strong>on</strong> <strong>related</strong> to e-transacti<strong>on</strong>s<br />

development, pers<strong>on</strong>al data protecti<strong>on</strong>, cyber security promoti<strong>on</strong> <strong>and</strong> fight<br />

against cybercrime. Particularly:<br />

Define key cyber terminologies in legislati<strong>on</strong><br />

Develop general principles <strong>and</strong> specific provisi<strong>on</strong>s <strong>related</strong> to cyber legislati<strong>on</strong><br />

Outline cyber legislative measures required at Member State level<br />

Develop general principles <strong>and</strong> specific provisi<strong>on</strong> <strong>on</strong> internati<strong>on</strong>al cooperati<strong>on</strong><br />

as <strong>related</strong> to cyber legislati<strong>on</strong><br />

Its ultimate goal is eminently protective given that it is geared to protecting:<br />

Instituti<strong>on</strong>s against the threats <strong>and</strong> attacks capable of endangering their<br />

survival <strong>and</strong> efficacy;<br />

<str<strong>on</strong>g>The</str<strong>on</strong>g> rights of pers<strong>on</strong>s during data gathering <strong>and</strong> processing against the threats<br />

<strong>and</strong> attacks capable of compromising such rights.<br />

12


Strategic Orientati<strong>on</strong>s<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> defines a legal mechanism based <strong>on</strong> the following five strategic<br />

orientati<strong>on</strong>s:<br />

1. It spells out the opti<strong>on</strong>s for an African Uni<strong>on</strong> wide cyber security policy;<br />

2. It lays the foundati<strong>on</strong>s for an African Uni<strong>on</strong> wide cyber ethics <strong>and</strong> enunciates<br />

fundamental principles in the key areas of cyber security;<br />

3. It organizes electr<strong>on</strong>ic commerce, electr<strong>on</strong>ic signature <strong>and</strong> electr<strong>on</strong>ic publicity;<br />

4. It organizes the legal <strong>and</strong> instituti<strong>on</strong>al framework for protecti<strong>on</strong> of pers<strong>on</strong>al data;<br />

5. It lays the foundati<strong>on</strong> for a penal cyber law <strong>and</strong> a penal procedure for the<br />

treatment of cyber crime.<br />

13


Expected results<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

Definiti<strong>on</strong>s <strong>on</strong> key cyber terminologies in legislati<strong>on</strong><br />

Harm<strong>on</strong>ised cyber legislati<strong>on</strong> <strong>and</strong> provisi<strong>on</strong>s for the African Uni<strong>on</strong><br />

14


<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> main parts<br />

PART I: ORGANIZATION OF ELECTRONIC COMMERCE<br />

PART II: PROTECTION OF PERSONNAL DATA<br />

PART III: COMBATING CYBER CRIME<br />

PART IV: COMMON AND FINAL PROVISIONS<br />

webpage for the <str<strong>on</strong>g>Draft</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g>:<br />

www.au.int/cyberlegislati<strong>on</strong><br />

15


PART III: COMBATING CYBER CRIME<br />

Secti<strong>on</strong> 1: Terminology<br />

Electr<strong>on</strong>ic communicati<strong>on</strong>, Computerized data, Racism <strong>and</strong> xenophobia in informati<strong>on</strong><br />

<strong>and</strong> telecommunicati<strong>on</strong> technologies, Minor, Child pornography, Computer system,<br />

Exceeds authorized access, Damage<br />

Chapter 1: Nati<strong>on</strong>al cyber security framework<br />

• Nati<strong>on</strong>al policy<br />

• Nati<strong>on</strong>al strategy<br />

Chapter 2: Legislative measures<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

• Legislati<strong>on</strong>s against cybercrime<br />

• Nati<strong>on</strong>al Regulatory authorities<br />

• Rights of citizens<br />

• Protecti<strong>on</strong> of critical informati<strong>on</strong> infrastructure<br />

www.au.int/cyberlegislati<strong>on</strong><br />

16


PART III: COMBATING CYBER CRIME (C<strong>on</strong>t’d)<br />

Chapter IV: Nati<strong>on</strong>al cyber security m<strong>on</strong>itoring structures<br />

• Cyber security governance<br />

• Instituti<strong>on</strong>al framework<br />

Chapter V: Internati<strong>on</strong>al cooperati<strong>on</strong><br />

• Harm<strong>on</strong>izati<strong>on</strong><br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

www.au.int/cyberlegislati<strong>on</strong><br />

17


PART III: COMBATING CYBER CRIME (C<strong>on</strong>t’d)<br />

Secti<strong>on</strong> II: Material penal law<br />

Chapter I: Offenses specific to ICTs<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> the C<strong>on</strong>fidence<br />

<strong>and</strong> security in Cyberspace<br />

• Attack <strong>on</strong> computer systems<br />

• Attack <strong>on</strong> computerized data<br />

• C<strong>on</strong>tent <strong>related</strong> offenses<br />

• Offenses relating to electr<strong>on</strong>ic message security measures<br />

Chapter II: Adapting certain ICTs offenses<br />

• Violati<strong>on</strong> of property<br />

• Criminal liability for corporate pers<strong>on</strong>s<br />

Chapter III: Adapting certain sancti<strong>on</strong>s to the ICTs<br />

• Penal sancti<strong>on</strong>s<br />

• Other penal sancti<strong>on</strong>s<br />

• Procedural law<br />

• Offenses specific to Informati<strong>on</strong> <strong>and</strong> Communicati<strong>on</strong> Technologies<br />

18


<str<strong>on</strong>g>AU</str<strong>on</strong>g> Perspectives <strong>on</strong> <strong>Cybersecurity</strong><br />

<strong>and</strong> Cybercrime Issues.<br />

I. Policy, Legal, <strong>and</strong> Regulatory Enabling Framework.<br />

II. Awareness <strong>and</strong> Capacity Building.<br />

III. Resp<strong>on</strong>se <strong>and</strong> Recovery Mechanisms.<br />

19


I. Policy, Legal, <strong>and</strong> Regulatory Enabling<br />

Framework<br />

1. Development of Nati<strong>on</strong>al Cyber-Security Legislati<strong>on</strong>;<br />

2. Implementati<strong>on</strong> of <str<strong>on</strong>g>AU</str<strong>on</strong>g> <strong>Cybersecurity</strong> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g><br />

Implementati<strong>on</strong> status<br />

1. A draft <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> Cyber Security has been developed (2010-11)<br />

2. Regi<strong>on</strong>al Workshops have been organized <strong>on</strong> Cyber Legislati<strong>on</strong> <strong>and</strong> <strong>on</strong> the <str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>Draft</str<strong>on</strong>g><br />

<str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> CyberSecurity:<br />

a. ECCAS: Libreville, Gab<strong>on</strong>, November 2011<br />

b. ECOWAS: Abidjan, Côte d’Ivoire, February 2012<br />

c. Tripartite [COMESA, SADC, CEAC] + UMA (Northern Africa): Addis-Ababa,<br />

ETHIOPIA, June 2012<br />

3. Final Expert Group meeting to finalize the <str<strong>on</strong>g>Draft</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> before the CITMC-4<br />

Addis-Ababa, Ethiopia, August 2012<br />

4. Endorsement by the C<strong>on</strong>ference of African Ministers in Charge of Communicati<strong>on</strong><br />

<strong>and</strong> Informati<strong>on</strong> Technologies (CITMC-4) in Khartoum, the Sudan, September 2012<br />

20


VALIDATION<br />

TRANSLATION<br />

VALIDATION<br />

ENDORSEMENT<br />

LEGAL<br />

VALIDATION<br />

VALIDATIO VALIDATION<br />

ADOPTION<br />

I. Policy, Legal, <strong>and</strong> Regulatory Enabling<br />

Framework<br />

Adopti<strong>on</strong> process of the <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> by the <str<strong>on</strong>g>AU</str<strong>on</strong>g> HoSG<br />

• Validati<strong>on</strong> Workshops (RECs, nati<strong>on</strong>al<br />

experts, independent resource pers<strong>on</strong>s)<br />

• Translati<strong>on</strong> into <str<strong>on</strong>g>AU</str<strong>on</strong>g> 4 languages<br />

• By the Telecom/ICT experts meeting <strong>and</strong><br />

endorsed by the CITMC<br />

•By the <str<strong>on</strong>g>AU</str<strong>on</strong>g> legal experts meeting <strong>and</strong> endorsed by<br />

the C<strong>on</strong>ference of <str<strong>on</strong>g>AU</str<strong>on</strong>g> Ministers in charge of Justice<br />

• Submissi<strong>on</strong> to the Executive Council for transmissi<strong>on</strong> to the <str<strong>on</strong>g>AU</str<strong>on</strong>g><br />

Assembly of Heads of State <strong>and</strong> Government for adopti<strong>on</strong>.<br />

21


I. Policy, Legal, <strong>and</strong> Regulatory Enabling<br />

Framework<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> draft <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g><br />

22


II. Awareness <strong>and</strong> Capacity Building<br />

1. Development <strong>and</strong> distributi<strong>on</strong> of toolkits to<br />

facilitate the ratificati<strong>on</strong> of the <str<strong>on</strong>g>AU</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>venti<strong>on</strong></str<strong>on</strong>g> <strong>on</strong><br />

<strong>Cybersecurity</strong><br />

2. Organize <strong>and</strong>/or participate in workshops for<br />

capacity building <strong>and</strong> Heightened awareness <strong>and</strong><br />

capacity to facilitate the development of nati<strong>on</strong>al<br />

cyber security legislati<strong>on</strong> <strong>and</strong> in each <str<strong>on</strong>g>AU</str<strong>on</strong>g> MS;<br />

With UNCTAD<br />

With US DoJ, CoE, UNODC<br />

23


III. Resp<strong>on</strong>se <strong>and</strong> Recovery Mechanisms<br />

• Facilitate the setting up of Nati<strong>on</strong>al CERTs to c<strong>on</strong>tribute to<br />

the c<strong>on</strong>tinental <strong>and</strong> global cooperati<strong>on</strong> <strong>and</strong> fight against<br />

cybercrime<br />

1. Nati<strong>on</strong>al CERTs<br />

2. Regi<strong>on</strong>al CSIRTs (in collaborati<strong>on</strong> with RECs)<br />

3. <strong>Cybersecurity</strong> Unit within the <str<strong>on</strong>g>AU</str<strong>on</strong>g>C<br />

24


THANK YOU FOR<br />

YOUR ATTENTION<br />

***<br />

Auguste YANKEY (Mr.)<br />

<str<strong>on</strong>g>AU</str<strong>on</strong>g> Commissi<strong>on</strong><br />

Email: yankeyka@africa-uni<strong>on</strong>.org<br />

Website: www.<str<strong>on</strong>g>AU</str<strong>on</strong>g>.int/infosoc<br />

25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!