<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>Some of the legislation appears to be a copy and paste from various first world legislation .. and yes, in an african context some of it may be risky. </div><div><br></div><div>However, it would be good to suggest that appropriate controls / checks and balances be put in place before these regulations are implemented, rather than to oppose them altogether.<br><br>You do need most of them for a functioning cybercrime law .. and yes the wording is fuzzy and prone to multiple interpretations.</div><div><br></div><div>The AU urgently needs to engage with industry and civil society to provide a workable framework for these laws.</div><div><br>--srs (iPad)</div><div><br>On 25-Nov-2013, at 18:49, Kivuva <<a href="mailto:Kivuva@transworldafrica.com">Kivuva@transworldafrica.com</a>> wrote:<br><br></div><blockquote type="cite"><div><div dir="ltr">Dear Suresh,<div><br></div><div>There is a document Grace had shared on KICTANET that has some of the issues Anriette is raising, find attached.</div><div><br></div><div>Regards</div></div><div class="gmail_extra">
<br clear="all"><div><div dir="ltr">______________________<br>Mwendwa Kivuva, Nairobi, Kenya.<br><a href="http://twitter.com/lordmwesh" target="_blank">twitter.com/lordmwesh</a><br><div>google ID | Skype ID: lordmwesh</div>
</div></div>
<br><br><div class="gmail_quote">On 25 November 2013 07:20, Suresh Ramasubramanian <span dir="ltr"><<a href="mailto:suresh@hserus.net" target="_blank">suresh@hserus.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<u></u>
<div><div style="font-size:12pt;font-family:Calibri,sans-serif"><div>Do you have specific sections in mind anriette? So far I have only reviewed the cybercrime / spam sections in the document. </div><div><br></div><div>--srs (htc one x) </div>
<div><div class="h5"><br><div>----- Reply message -----<br>From: "Anriette Esterhuysen" <<a href="mailto:Anriette@apc.org" target="_blank">Anriette@apc.org</a>><br>To: "Grace Githaiga" <<a href="mailto:ggithaiga@hotmail.com" target="_blank">ggithaiga@hotmail.com</a>>, "<a href="mailto:governance@lists.igcaucus.org" target="_blank">governance@lists.igcaucus.org</a>" <<a href="mailto:governance@lists.igcaucus.org" target="_blank">governance@lists.igcaucus.org</a>>, "<a href="mailto:bestbits@lists.bestbits.net" target="_blank">bestbits@lists.bestbits.net</a>" <<a href="mailto:bestbits@lists.bestbits.net" target="_blank">bestbits@lists.bestbits.net</a>><br>
Subject: [governance] Re: [bestbits] Kenya/Uganda online debate on the African Union Convention on Cyber Security(AUCC)<br>Date: Mon, Nov 25, 2013 12:35 PM</div></div></div></div><div><div class="h5"><br><pre style="word-wrap:break-word;white-space:pre-wrap">
Dear Grace
APC would definitely give input. I had a good look at it and was alarmed by extensive limitations on free speech and very loose definitions of hate and blasphemous and speech. Also efforts to make intermediaries liable. I am travelling this week but will do my best and ask colleagues for help.
Anriette
Sent from Samsung Mobile
-------- Original message --------
From: Grace Githaiga <<a href="mailto:ggithaiga@hotmail.com" target="_blank">ggithaiga@hotmail.com</a>>
Date:
To: <a href="mailto:governance@lists.igcaucus.org" target="_blank">governance@lists.igcaucus.org</a>,<a href="mailto:bestbits@lists.bestbits.net" target="_blank">bestbits@lists.bestbits.net</a>
Subject: [bestbits] Kenya/Uganda online debate on the African Union Convention on Cyber Security(AUCC)
IGC and Bestbits Listers
I write to you to seek your views on the African Union Convention on Cyber Security(AUCC)<a href="http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf" target="_blank">http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf </a>
KICTANet has been in discussion with AUC and the drafters have accepted to receive our input despite having gone through this process two years ago with African governments. The Convention will be signed in January 2014.
In light of this, Kenya and Uganda stakeholders will conduct an online debate on multiple lists of KICTANet and ISOC-KE, and on I-Network list moderated by the Collaboration on International ICT Policy in East and Southern Africa (CIPESA) and ISOC -Uganda, starting Today Monday 25th to Friday 29th November 2013. Please feel free to send us your contribution.
Rgds
Grace
Below is the announcement made on the multiple lists.
1. Background to the African Union Convention on Cyber Security (AUCC)
African Union (AU) convention (52 page document) seeks to intensify the fight against cybercrime across Africa in light of increase in cybercrime, and a lack of mastery of security risks by African countries. Further, that one challenge for African countries is lack of technological security adequate enough to prevent and effectively control technological and informational risks. As such “African States are in dire need of innovative criminal policy strategies that embody States, societal and technical responses to create a credible legal climate for cyber security”.
The Convention establishes a framework for cybersecurity in Africa “through organisation of electronic transactions, protection of personal data, promotion of cyber security, e-governance and combating cybercrime” (Conceptual framework).
2. Division of the Convention
Part 1 Electronic transactions
Section I: Definition of terms
Section II: Electronic Commerce (Fields of application of electronic commerce, Contractual responsibility of the electronic provider of goods and services).
Section III: Publicity by electronic means.
Section IV: Obligations in electronic form (Electronic contracts, Written matter in electronic form, Ensuring the security of electronic transactions).
Part II PERSONAL DATA PROTECTION
Section I: Definition
Section II: Legal framework for personal data protection (Objectives of this Convention with respect to personal data, Scope of application of the Convention, Preliminary formalities for personal data processing).
Section III: Institutional framework for protection of personal data (Status, composition or organization, Functions of the protection authority).
Section IV: Obligations relating to the conditions governing the processing of personal data (basic principles governing the processing of personal data, Specific principles governing the processing of sensitive data, Interconnection of personal </pre>
</div></div></div><br>____________________________________________________________<br>
You received this message as a subscriber on the list:<br>
<a href="mailto:governance@lists.igcaucus.org">governance@lists.igcaucus.org</a><br>
To be removed from the list, visit:<br>
<a href="http://www.igcaucus.org/unsubscribing" target="_blank">http://www.igcaucus.org/unsubscribing</a><br>
<br>
For all other list information and functions, see:<br>
<a href="http://lists.igcaucus.org/info/governance" target="_blank">http://lists.igcaucus.org/info/governance</a><br>
To edit your profile and to find the IGC's charter, see:<br>
<a href="http://www.igcaucus.org/" target="_blank">http://www.igcaucus.org/</a><br>
<br>
Translate this email: <a href="http://translate.google.com/translate_t" target="_blank">http://translate.google.com/translate_t</a><br>
<br></blockquote></div><br></div>
</div></blockquote><blockquote type="cite"><div><RECOMMENDATIONS ON AUCC.pdf></div></blockquote></body></html>