SlideShare a Scribd company logo
1 of 7
Download to read offline
A MODEL LEGISLATIVE AND REGULATORY FRAMEWORK FOR
                                      CAMEROON
1     INTRODUCTION
A country without cyberlaws is a danger to itself and to the global village at
large. On this background the allegation of Cameroon being home to the
world's riskiest Internet sites according to the cyber-security firm McAfee ,is a
cause for concern and therefore warrants appropriate legal and regulatory
responses at the national and international level.
In a poor and heavily indebted country like Cameroon,where the youths have
moved from classrooms to cyber cafes for cyber abusive reasons, where our
children, business, lives, and property are at risk for lack of the necessary laws,
where government’s flexible and spontaneous responses are far from reality and
everything answers to a highly centralized form of government, confiscated by
those close to the regime. , where a greater number of the citizens live in rural
areas,where there are no appropriate laws to apprehend and prosecute cyber
criminals, there is need for a legislative and regulatory rethink .



2.What Will BE The Advantages Of An Appropriate Legislative And
Regulatory Measures For Cameroon?
- Cameroon Will be haven free from cyber criminal

- The law will encourage e-business, create a competitive environment and
enhance confidence and trust with assurances of confidentiality, integrity,
authenticity, in sensitive information -data and privacy protection, and
therefore increase further developments in ICTs , especially in our health sector, our
educational system, our governance, our military
3 A brief On Cameroon’s context of Cyber crime
Cameroon’s Cyber crime can be understood as:
-Computer-aided crimes originating in Cameroon but having its effect in another
Country
- Computer-aided crimes committed by Cameroonians located in Cameroon and
having the effect in Cameroon
- Computer-aided crimes committed by Cameroonians located outside Cameroon
and having effect in any other country including Cameroon

 Therefore the computer element is a recent element in Cameroon
criminal system.


4 Why Is Cybercrime A Challenge ?
- Anonymity enjoyed by the perpetrator creates a room for impunity
as the elements of a crime; the physical presence, re actus, the mental
element –mensrea and the result cannot be coordinated to prosecute
-The borderless nature of the Crime and therefore multijurisdictional challenges
associated with cybercrimes’
-The complexity of the new crime and lack of technology makes understanding
difficult , detection and prosecution difficult
-Ignorance of most Cameroonians to the nature and existence of cybercrime .


5 Challenges Posed By cybercrimes


    - Technical challenges
Lack of physical and anonymity and transborder nature of cyber crimes make it
diff+icult to trace a criminal
         - Legal challenges
- The inherent trans-national nature of the internet is rendering the traditional
concept of distance meaningless and allowing criminals to act with impunity due to
 lack of a legal structure capable of deterring and punishing cybercrime .
-Outdated laws and regulations, weak enforcement mechanisms for protecting
networked information, create an inhospitable environment in which to conduct e-
business within a country and across national boundaries.
         Operational challenges
Cybercrime raises complex technical and legal issues which will require
Cameroon to have individuals dedicated to cybercrime and these individuals must
have a sound understanding of computers and telecommunications. Lack of an
efficient resources is a cloak to cyber to trying cyber criminals.


6 Model Law for Cameroon
Cameroon needs a clearly defined rule of law including a strong deterrent for
cybercrime,
- Further, Cameroon must create a robust, standard and interoperable laws by
incorporating standard models into her own legislation,
Cameroon must take into consideration her cultural diversity         in making her
cyberlaws.
-Cameroon must follow the existing international initiatives providing guidance
for an effective framework addressing this crime.
This law can adopt the model of
   -   The United Nation’s Convention On The Use Electronic Communication In
       International Contracts
- The Council of European Convention on Cybercrime-
   - UNICTRAL Model Law on e-commerce (1996)
   - UNICTRAL Model Law on e-signature (2001);
   - - Further, the country has the added advantage of learning and borrowing
            from the experiences of some countries like     the United Kingdom, the
            United States and her sister African Countries like South Africa, Morocco,
            Tunisia, Egypt, Mauritius that have already enacted cybercrime law


  - An Appropriate Substantive criminal law For Cameroon:
-Creating a new law specifically targeting the following offences;
        i A New Law For Illegal access In Cameroon prohibiting intentionally
accessing the whole or any part of a computer system, without the right to do so
    ii A New law That Outlaws Illegal interception proscribing intentionally
intercepting non-public transmissions of computer data, including electromagnetic
emissions, to, from or within a computer system, by technical means.
  iii        A New Law That Outlaws Data interference and protects computer
programmes criminalizing             intentionally damaging, deleting, deteriorating,
altering or suppressing computer data without right
    VI A New Law That Protects Cameroon’s Critical Infrastrutures By
Outlawing System interference
A cybercrime and cyber security law for Cameroon must prohibiting serious
intentional hindering of the functioning of Cameroon’s critical infrastructures like
energy, like CRTV,SONEL, SNEC, Banking system, Insurance. SONARA
        v     New Law That Criminalises The Misuse of Devices                used for
committing crimes
A T he Old Laws Need to be Amended to Cover
Computer-related forgery,
Computer-related fraud,
Computer-related extortion,
Child pornography,
Intellectual property offences like      Copyright infringement,Trade mark And
Domain Name
Cyberterrorism .
 An Appropriate Procedural laws
The Criminal Procedure Code Of 2005 must be amended to cover computer
related crimes.
-The laws must cover the new investigating challenges
-Evidential issues


7 Regulatory Framework
The government of Cameroon must design , adopt and implement the following
Strategies;
collaborative And Consertative strategies with Cybersecurity Stakeholders
-Individuals:
- Private Sector:
- Public Sector:
- Development Partners
-Civil Society and the Media as a Sector.
- Trade Unions.
- Cameroonians in Diaspora
g. Education/ Academia;
- Strategies must be tailored to the rural areas, therefore bringing solution closer to
the problem .
8 What Progress For Cameroon?


On Legislation;
- Cameroon’s bill on cyber crimes And Cybersecurity and also a draft bill on the
protection of   ICT consumer is indicative of progress       creating a safe cyber
environment.
- There is law no 2000/11of19 Dec.2000 on the protection of copyright and other
associated rights which protects computer programmes in Cameroon
- Law no. Of 27 May 2009 On identification of mobile telephone subscribers will
among other reasons fight against cyber threat , sabotage, and fraud.
-Sensitization is being done by the academia, civil society, media, Cameroonians
in the diaspora and other international and regional partners


On Collaboration
- There is the Yaounde protocol on common standards on the fight against
cybercrimes to fight impunity within the sub region
 -The protection of intellectual property, specifically computer programmes by the
organisation Of Africa intellectual property by the Bangui Charter is enough proof
that the regional is moving towards a positive side.
Collaborative efforts with South Korea on a project to improve Internet security
are far underway. This will boost Internet security, electronic commerce, and
electronic banking in Cameroon and the Kigali protocol are indicative of a positive
step
Recommendations
Taking regulatory strategies closer to the rural areas
Increased emphases on voluntary safety measures for entreprises and individuals
-Creating Awareness
-Capacity building Of Human Resource
International cooperation

THANK YOU

More Related Content

What's hot

Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeCA
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
Legal and policy framework -ICT week 2016
Legal and policy framework -ICT week 2016Legal and policy framework -ICT week 2016
Legal and policy framework -ICT week 2016CA
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
Understanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATEUnderstanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATENicole Murdoch
 
IT Professionals for future Myanmar and IoT
IT Professionals for future Myanmar and IoTIT Professionals for future Myanmar and IoT
IT Professionals for future Myanmar and IoTPyi Soe Maw
 
Belize e-readiness assessment report
Belize e-readiness assessment reportBelize e-readiness assessment report
Belize e-readiness assessment reportMyrtle Palacio
 
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docxConcept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docxShreedeep Rayamajhi
 

What's hot (20)

Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Regulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crimeRegulatory perspective in dealing with Cyber crime
Regulatory perspective in dealing with Cyber crime
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Legal and policy framework -ICT week 2016
Legal and policy framework -ICT week 2016Legal and policy framework -ICT week 2016
Legal and policy framework -ICT week 2016
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Myanmar ICT Overview
Myanmar ICT OverviewMyanmar ICT Overview
Myanmar ICT Overview
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Understanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATEUnderstanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATE
 
IT Professionals for future Myanmar and IoT
IT Professionals for future Myanmar and IoTIT Professionals for future Myanmar and IoT
IT Professionals for future Myanmar and IoT
 
Belize e-readiness assessment report
Belize e-readiness assessment reportBelize e-readiness assessment report
Belize e-readiness assessment report
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docxConcept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
 

Similar to CTO-CybersecurityForum-2010-Patricia Asognwe

Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsJacqueline Fick
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 

Similar to CTO-CybersecurityForum-2010-Patricia Asognwe (20)

CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnerships
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
CTO Cybersecurity Forum 2013 Pierre Kaptue
CTO Cybersecurity Forum 2013 Pierre KaptueCTO Cybersecurity Forum 2013 Pierre Kaptue
CTO Cybersecurity Forum 2013 Pierre Kaptue
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 

More from segughana

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattanisegughana
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Reportsegughana
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Borensegughana
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhousesegughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johansonsegughana
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Wardsegughana
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carrsegughana
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crainsegughana
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torressegughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardnersegughana
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oramsegughana
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonoghsegughana
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddossegughana
 

More from segughana (20)

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
 

CTO-CybersecurityForum-2010-Patricia Asognwe

  • 1. A MODEL LEGISLATIVE AND REGULATORY FRAMEWORK FOR CAMEROON 1 INTRODUCTION A country without cyberlaws is a danger to itself and to the global village at large. On this background the allegation of Cameroon being home to the world's riskiest Internet sites according to the cyber-security firm McAfee ,is a cause for concern and therefore warrants appropriate legal and regulatory responses at the national and international level. In a poor and heavily indebted country like Cameroon,where the youths have moved from classrooms to cyber cafes for cyber abusive reasons, where our children, business, lives, and property are at risk for lack of the necessary laws, where government’s flexible and spontaneous responses are far from reality and everything answers to a highly centralized form of government, confiscated by those close to the regime. , where a greater number of the citizens live in rural areas,where there are no appropriate laws to apprehend and prosecute cyber criminals, there is need for a legislative and regulatory rethink . 2.What Will BE The Advantages Of An Appropriate Legislative And Regulatory Measures For Cameroon? - Cameroon Will be haven free from cyber criminal - The law will encourage e-business, create a competitive environment and enhance confidence and trust with assurances of confidentiality, integrity, authenticity, in sensitive information -data and privacy protection, and therefore increase further developments in ICTs , especially in our health sector, our educational system, our governance, our military
  • 2. 3 A brief On Cameroon’s context of Cyber crime Cameroon’s Cyber crime can be understood as: -Computer-aided crimes originating in Cameroon but having its effect in another Country - Computer-aided crimes committed by Cameroonians located in Cameroon and having the effect in Cameroon - Computer-aided crimes committed by Cameroonians located outside Cameroon and having effect in any other country including Cameroon Therefore the computer element is a recent element in Cameroon criminal system. 4 Why Is Cybercrime A Challenge ? - Anonymity enjoyed by the perpetrator creates a room for impunity as the elements of a crime; the physical presence, re actus, the mental element –mensrea and the result cannot be coordinated to prosecute -The borderless nature of the Crime and therefore multijurisdictional challenges associated with cybercrimes’ -The complexity of the new crime and lack of technology makes understanding difficult , detection and prosecution difficult -Ignorance of most Cameroonians to the nature and existence of cybercrime . 5 Challenges Posed By cybercrimes - Technical challenges
  • 3. Lack of physical and anonymity and transborder nature of cyber crimes make it diff+icult to trace a criminal - Legal challenges - The inherent trans-national nature of the internet is rendering the traditional concept of distance meaningless and allowing criminals to act with impunity due to lack of a legal structure capable of deterring and punishing cybercrime . -Outdated laws and regulations, weak enforcement mechanisms for protecting networked information, create an inhospitable environment in which to conduct e- business within a country and across national boundaries. Operational challenges Cybercrime raises complex technical and legal issues which will require Cameroon to have individuals dedicated to cybercrime and these individuals must have a sound understanding of computers and telecommunications. Lack of an efficient resources is a cloak to cyber to trying cyber criminals. 6 Model Law for Cameroon Cameroon needs a clearly defined rule of law including a strong deterrent for cybercrime, - Further, Cameroon must create a robust, standard and interoperable laws by incorporating standard models into her own legislation, Cameroon must take into consideration her cultural diversity in making her cyberlaws. -Cameroon must follow the existing international initiatives providing guidance for an effective framework addressing this crime. This law can adopt the model of - The United Nation’s Convention On The Use Electronic Communication In International Contracts
  • 4. - The Council of European Convention on Cybercrime- - UNICTRAL Model Law on e-commerce (1996) - UNICTRAL Model Law on e-signature (2001); - - Further, the country has the added advantage of learning and borrowing from the experiences of some countries like the United Kingdom, the United States and her sister African Countries like South Africa, Morocco, Tunisia, Egypt, Mauritius that have already enacted cybercrime law - An Appropriate Substantive criminal law For Cameroon: -Creating a new law specifically targeting the following offences; i A New Law For Illegal access In Cameroon prohibiting intentionally accessing the whole or any part of a computer system, without the right to do so ii A New law That Outlaws Illegal interception proscribing intentionally intercepting non-public transmissions of computer data, including electromagnetic emissions, to, from or within a computer system, by technical means. iii A New Law That Outlaws Data interference and protects computer programmes criminalizing intentionally damaging, deleting, deteriorating, altering or suppressing computer data without right VI A New Law That Protects Cameroon’s Critical Infrastrutures By Outlawing System interference A cybercrime and cyber security law for Cameroon must prohibiting serious intentional hindering of the functioning of Cameroon’s critical infrastructures like energy, like CRTV,SONEL, SNEC, Banking system, Insurance. SONARA v New Law That Criminalises The Misuse of Devices used for committing crimes A T he Old Laws Need to be Amended to Cover
  • 5. Computer-related forgery, Computer-related fraud, Computer-related extortion, Child pornography, Intellectual property offences like Copyright infringement,Trade mark And Domain Name Cyberterrorism . An Appropriate Procedural laws The Criminal Procedure Code Of 2005 must be amended to cover computer related crimes. -The laws must cover the new investigating challenges -Evidential issues 7 Regulatory Framework The government of Cameroon must design , adopt and implement the following Strategies; collaborative And Consertative strategies with Cybersecurity Stakeholders -Individuals: - Private Sector: - Public Sector: - Development Partners -Civil Society and the Media as a Sector. - Trade Unions. - Cameroonians in Diaspora g. Education/ Academia; - Strategies must be tailored to the rural areas, therefore bringing solution closer to the problem .
  • 6. 8 What Progress For Cameroon? On Legislation; - Cameroon’s bill on cyber crimes And Cybersecurity and also a draft bill on the protection of ICT consumer is indicative of progress creating a safe cyber environment. - There is law no 2000/11of19 Dec.2000 on the protection of copyright and other associated rights which protects computer programmes in Cameroon - Law no. Of 27 May 2009 On identification of mobile telephone subscribers will among other reasons fight against cyber threat , sabotage, and fraud. -Sensitization is being done by the academia, civil society, media, Cameroonians in the diaspora and other international and regional partners On Collaboration - There is the Yaounde protocol on common standards on the fight against cybercrimes to fight impunity within the sub region -The protection of intellectual property, specifically computer programmes by the organisation Of Africa intellectual property by the Bangui Charter is enough proof that the regional is moving towards a positive side. Collaborative efforts with South Korea on a project to improve Internet security are far underway. This will boost Internet security, electronic commerce, and electronic banking in Cameroon and the Kigali protocol are indicative of a positive step
  • 7. Recommendations Taking regulatory strategies closer to the rural areas Increased emphases on voluntary safety measures for entreprises and individuals -Creating Awareness -Capacity building Of Human Resource International cooperation THANK YOU