[governance] Kenya/Uganda online debate on the African Union Convention on Cyber Security(AUCC)

Jean Paul NKURUNZIZA nkurunziza1999 at yahoo.fr
Mon Nov 25 01:52:03 EST 2013


Thank you Grace again. 

Nice day


 
NKURUNZIZA Jean Paul
TRAINER IN COMPUTING AND INTERNET POLICY


ISOC BURUNDI : VICE PRESIDENT
Réseau des Télécentres Communautaires du Burundi : Président




Burundi Youth Training Centre : Secrétaire Général




Skype : jpnkurunziz


Facebook :  http://www.facebook.com/jeanpaul.nkurunziza
Tel : +257 79 981459



Le Lundi 25 novembre 2013 8h30, Suresh Ramasubramanian <suresh at hserus.net> a écrit :
 
It does appear that the au convention on a quick superficial reading does not substantially conflict with the Budapest convention. 

The advantage of joining the Budapest convention is harmonizing your local law with those of several countries around the world and also joining a network of mlats that make it easier for you to pursue cybercrime cases where the offender lives in another country that is a signatory to the convention. 

--srs (htc one x) 

----- Reply message -----
From: "Jean Paul NKURUNZIZA" <nkurunziza1999 at yahoo.fr>
To: "governance at lists.igcaucus.org" <governance at lists.igcaucus.org>, "Grace Githaiga" <ggithaiga at hotmail.com>, "Suresh Ramasubramanian" <suresh at hserus.net>
Subject: [governance] Kenya/Uganda online debate on the  African Union Convention on Cyber Security(AUCC)
Date: Mon, Nov 25, 2013 11:24 AM

Hi all,  Thank you Grace for sharing those updates about the  African Union Convention on Cyber Security(AUCC) Just last week ( 21 and 22 November 2013) , the National Telecommunication Regulatory Authority of Burundi  ( I am burundian based in Burundi) has conducted a sensitisation workshop about the issue of cybersecurity.  This workshop is the first step towards the drafting the cybersecurity law for Burundi.  I attended it as a member of ISOC Burundi chapter.  Speaking about international legal frameworks about cyber security, the invited expert raised the Budapest Convetion. Representatives of the regulatory authority said they were not aware of this convetion.  I made an intervention and raised the fact that AU is drafting another convention.  Then, we had some discussions : the advantages and disadvantages for a country like Burundi to sign the Budapest Convention, .... Allow me to ask some questions :  Who are the drafters of that convention ?
  How are African states involved ? Which services at country level are involved ?  My problem is that African countries may seek to sign the Budapest Convention and ignoring the AUCC. Best regards  
NKURUNZIZA Jean Paul
TRAINER IN COMPUTING AND INTERNET POLICY ISOC BURUNDI : VICE PRESIDENT
Réseau des Télécentres Communautaires du Burundi : Président Burundi Youth Training Centre : Secrétaire Général Skype : jpnkurunziz Facebook :  http://www.facebook.com/jeanpaul.nkurunziza Tel : +257 79 981459 Le Lundi 25 novembre 2013 3h28, Suresh Ramasubramanian <suresh at hserus.net> a écrit : Hi Grace  About I8 to I10 as I have worked extensively on spam at a technical and policy level since the late 90s  I8 : This is a convention and not an international law. It provides a criterion that nations in the American will commit to harmonize their current (or more likely proposed, in large parts of Africa) to be uniform on this and other provisions. In this case, it advocates transparency in direct marketing offers which is a best practice  I9 : this is an optin law, which is respectful of user privacy and doesn't allow the sending of unsolicited bulk email, which is the canonical definition of spam. This should not restrict itself to marketing
 but cover other sorts of bulk mail sent by other organizations or individuals. The law should be content neutral and cover all forms of unsolicited bulk email rather than just marketing mail.  I10 : this is a standard prior business relationship exception to make compliance simpler  The articles also need to additionally cover criminal forms of spam as the 419 scam, phishing etc.  They additionally need to specify penalties both for the organization that commissioned the spam and the marketing agency they contracted with to actually send the spam.  Specific language that would be appropriate is in the Australian spam act of 2003 and in the proposed Canadian antispam law, both of which were drafted after open, consultative and multistakeholder processes in the respective countries, including inputs from respected privacy groups.  Before that, data protection and net anonymity have to be carefully balanced to log data but retain it under strict
 controls and regulation of how it can be used (in accordance with privacy regulations). If you legislate blanket anonymity then scam artists and cybercriminals will extensively abuse it to remain undetected.  These are a first set of thoughts  --srs (htc one x)  ----- Reply message -----
From: "Grace Githaiga" <ggithaiga at hotmail.com>
To: "governance at lists.igcaucus.org" <governance at lists.igcaucus.org>, "bestbits at lists.bestbits.net" <bestbits at lists.bestbits.net>
Subject: [governance] Kenya/Uganda online debate on the  African Union Convention on Cyber Security(AUCC)
Date: Mon, Nov 25, 2013 3:30 AM IGC and Bestbits Listers
I write to you to seek your views on the  African Union Convention on Cyber Security(AUCC)http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf KICTANet has been in discussion with AUC and the drafters have accepted to receive our input despite having gone through this process two years ago with African governments. The Convention will be signed in January 2014. 
In light of this, Kenya and Uganda stakeholders will conduct an online debate on multiple lists of KICTANet and
ISOC-KE,  and on I-Network list moderated by the Collaboration on International ICT
Policy in East and Southern Africa (CIPESA) 
and ISOC -Uganda,  starting Today Monday 25th to Friday 29th November 2013. Please feel free to send us your contribution. RgdsGrace
Below is the announcement ma
____________________________________________________________
You received this message as a subscriber on the list:
    governance at lists.igcaucus.org
To be removed from the list, visit:
    http://www.igcaucus.org/unsubscribing

For all other list information and functions, see:
    http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
    http://www.igcaucus.org/

Translate this email: http://translate.google.com/translate_t
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20131125/9467e26e/attachment.htm>
-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
     governance at lists.igcaucus.org
To be removed from the list, visit:
     http://www.igcaucus.org/unsubscribing

For all other list information and functions, see:
     http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
     http://www.igcaucus.org/

Translate this email: http://translate.google.com/translate_t


More information about the Governance mailing list