29
Cybersecurity and Multi-stakeholder Internet Governance – the case of AU Convention on Cybersecurity Towela Nyirenda Jere, PhD Principal Programme Officer, Regional Integration, Infrastructure and Trade IEEE ETAP Forum, Windhoek May 30, 2017

cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

CybersecurityandMulti-stakeholderInternetGovernance– thecaseofAUConventiononCybersecurity

TowelaNyirendaJere,PhDPrincipalProgramme Officer,RegionalIntegration,InfrastructureandTrade

IEEEETAPForum,WindhoekMay30,2017

Page 2: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

InternetGovernance

• “....thedevelopmentandapplicationbygovernments,theprivatesector,andcivilsociety,intheirrespectiveroles,ofsharedprinciples,norms,rules,decision-makingprocedures,andprogrammesthatshapetheevolutionanduseoftheInternet.”• WSISTunisAgenda

Page 3: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Multi-stakeholderprocesses

• “Weencouragethedevelopmentofmulti-stakeholderprocessesatthenational,regionalandinternationallevelstodiscussandcollaborateontheexpansionanddiffusionoftheInternetasameanstosupportdevelopmenteffortstoachieveinternationallyagreeddevelopmentgoalsandobjectives,includingtheMillenniumDevelopmentGoals”–WSISTunisAgenda

Page 4: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Stakeholders• TunisAgenda:sovereignstates(governments),privatesector,inter-governmentalorganisations,internationalorganisations,academicandtechnicalcommunities.

• 4 keygroupsemergingas“stakeholders:government,privatesector,civilsociety,technical– academia,media,inter-governmentalorinternationalorganisationshavenodefinedplace

Page 5: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Stakeholders

• nouniversalagreementonthemeansofinteractionandengagementbetweenthevariousstakeholdergroupings.

• discourseoccursbothonlineandoffline– prosandconsintermsofparticipationandreach

Page 6: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Stakeholders

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

Government Civilsociety PrivateSector Academia Media Technical None

PerceivedDominanceofStakeholderGroups

National

Regional

Continental

Global

media,privatesector,academiaandthetechnicalcommunityare“notvisible”

Page 7: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Multi-stakeholder processes

• “Theuseofvariousmeansincludingnetworks,platforms,partnerships,collaborations,processes,dialoguestobringtogetherdiversestakeholdergroupingsrepresentativeofsocietyatlargeforthepurposeofdiscussion,consensus-building,decision-makingoractiononmattersofcommoninterest”– TowelaNyirenda-Jere,MA(IG)dissertation

Page 8: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Multi-stakeholder processes• “Nocohesionamongstallthesegroups”(Privatesector)

• “….processesarenotsubstantiatedbyfacts,data ”(Academia)

• “…nocoordinatedapproachnationally…”(Government)

• “…notanissuethathasreallybeenbroughtoutproperlyinastructuredmannerinAfrica…..”(NGO)

Page 9: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Multi-stakeholder processes• “State/governmentsarebetterplacedtotacklecyber-crimeissues.Butcooperationisneededamongthem”(Academic)

• “….moreplayersneedtocomeintosupportthisprocess,workingwithnationalgovernments”(NGO)

• “…multi-stakeholderengagementunfeasibleorimpossibleatthenationallevel..”

• “…afewselectgroupsmakingassumptionsforawholemany”

Page 10: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

TheRoadtotheAUCC• 2009ORTamboDeclaration• 2010 – AUSummitendorsement

– AbujaDeclaration• 2011FirstDraft:“AUConventionontheConfidenceandSecurityinCyberspace”

• 2012 – endorsementofdraftbyAUSTC• 2012-2013 Stakeholderconsultations– 2013onlinepetitionagainsttheConvention

• 2014 Adoption:“AUConventiononCybersecurityandProtectionofPersonalData”

Page 11: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

AUCCataglance• objectives- harmonizee-legislation,protectpersonaldata,promotecybersecurity,fightcybercrime– Definekeycyberterminologiesinlegislation– Developgeneralprinciplesandspecificprovisionsrelatedtocyberlegislation

– OutlinecyberlegislativemeasuresrequiredatMemberStatelevel

– Developgeneralprinciplesandspecificprovisiononinternationalcooperation

Page 12: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

AUCCataglance• Electronictransactions,• Personaldataprotection,• Cybersecurityandcybercrime• Requires memberstatesto:– developnationalcybersecuritypolicy– developlegislationoncybercrime– ensuretheprotectionofcriticalinformationinfrastructure

– enactpersonaldataprotectionlaws

Page 13: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

ReactiontotheAUCC

• goodguideline(benchmark/health-check)• adherence tonationalconstitutionsandinternationalhumanrightslaw

• emphasisontheAfricanCharteronHumanandPeoples’Rights

• limitedstakeholderengagement• Vague/broadprovisionsthatmaycausemisusebygovernments

Page 14: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

ReactiontoAUCC• No clearminimumthresholds - governmentscould opt not to implementsomeaspects

• inconsistency - racismandxenophobiaoutlawed,discriminationonsexualorientationorgendernot

• Impactofleakeddataonjournalistsandsources

• Nosafeguardsoninformation-sharingbetweenprivatesectorandgovernment

Page 15: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Currentstatus andWayForward

• 15Ratifications requiredforentryintoforce• Signatures:Benin,CapeVerde,Comoros,Congo,GuineaBissau,Mauritania,SierraLeone,SaoTomeandPrincipe,andZambiahavesignedtheconvention

• Noratifications

Page 16: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

MostratifiedinstrumentsInstruments Yearof

AdoptionNumberofRatifications

ConstitutiveActoftheAfricanUnion 2000 54

AfricanCharteronHumanandPeoples'Rights 1981 53

TreatyEstablishingtheAfricanEconomicCommunity, 1991 49ProtocolRelatingtotheEstablishmentofthePeaceandSecurityCounciloftheAfricanUnion

2002 49

ProtocoltotheTreatyEstablishingtheAfricanEconomicCommunityRelatingtothePan-AfricanParliament

2001 48

AfricanCharterontheRightsandWelfareoftheChild 1990 47

OAUConventionGoverningtheSpecificAspectsofRefugeeProblemsinAfrica

1969 45

AfricanCivilAviationCommissionConstitution 1969 44

OAUConventiononthePreventionandCombatingofTerrorism 1999 41

PrivilegesandImmunities 1965 40

Nuclear-Weapon-FreeZone 1996 40

Page 17: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

LeastRatifiedInstrumentsInstruments Yearof

AdoptionNumberofRatifications

RevisedConstitutionoftheAfricanCivilAviationCommission 2009 5

ProtocolontheStatuteoftheAfricanCourtofJusticeandHumanRight 2008 5

ProtocolontheAfricanInvestmentBank 2009 2

AfricanUnionConventiononCross-BorderCooperation(NiameyConvention)

2014 1

ProtocoltotheConstitutiveActoftheAfricanUnionrelatingtothePan-AfricanParliament

2014 1

AfricanUnionConventiononCyberSecurityandPersonalDataProtection 2014 0

AfricanCharterontheValuesandPrinciplesofDecentralisation,LocalGovernanceandLocalDevelopment

2014 0

ProtocolonAmendmentstotheProtocolontheStatuteoftheAfricanCourtofJusticeandHumanRights

2014 0

ProtocolontheEstablishmentontheAfricanMonetaryFundandtheStatuteoftheAfricanMonetaryFund

2014 0

AgreementfortheEstablishmentoftheAfricanRiskCapacity(ARC)Agency 2012 0

Page 18: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

EffectivenessofMSProcesses• towhatextentareobjectivesmet– Outputs- immediateresults– Outcomes - resultsoveralongertime-frame– Impact-longertermsustainedchanges

• Determinantsofeffectiveness– Architectural:howestablished– Procedural:howrun– Operational: howmaintainedandsustained

Page 19: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Effectiveness ofAUCCprocess

Parameter ObservationsOutputs - TheConvention

- StateofCybersecurityandCybercrime inAfricareport

Outcomes - Ratification- Legislation andpolicyinitiatives

Impact - Moretimeneededtoassess

Determinant Observations

Architectural - DeclarationatMinisteriallevel- EndorsementbyHeadsofState

Procedural Stakeholderconsultations- Expertmeetingsconvened byAUC,UNECA- Onlineconsultationsconvenedbycivilsociety

Operational - Advocacythroughtechnicalmeetingsanddialoguesatregionalandcontinentallevel

- Declarations atMinisteriallevel- Limitedactivities atnationallevel

Page 20: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

AUCC– WhatisatStake?

• Countrieswithlegislation• ElectronicTransactions: 28(51%)• ConsumerProtection: 18(33%)• PrivacyandDataProtection: 22(40%)• Cybercrime: 27(49%)

• (Source:UNCTAD)

Page 21: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

E-Legislation

Source:UNCTAD

Page 22: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

E-transactions

Source:UNCTAD

Page 23: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

DataProtection&Privacy

Source:UNCTAD

Page 24: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Cybercrime

Source:UNCTAD

Page 25: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

ConsumerProtection

Source:UNCTAD

Page 26: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Recommendations• CoordinationbetweentheAUCandmemberstates

• Awarenessamongstakeholders• Coordinationandcommunicationatnationalandregionallevel

• Inclusiveness - needforallstakeholders(civilsociety,government,privatesector,academic)tobeinvolvedinnationalandregionalprocesses.

Page 27: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Recommendations• StrengtheningtheroleofPanAfricaParliament

• Examineadstreamlineratificationprocesses• Financialresources– settingupofinstitutions,capacitybuilding,monitoringandenforcement

• Technicalandinstitutionalcapacitybuilding

Page 28: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

QuestionsforReflection

• WhatarethelimitsofMSapproaches?• AreMSapproachesreallyfeasible/practical?• Whataretherolesandresponsibilitiesofthevariousactorsandstakeholders?–Whoneedstodowhat,when,howandwhy?

• Howlongshouldtheprocesstake?Canweaffordlengthyratificationprocesses?

Page 29: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

THANKYOU

Contact Information

Towela Nyirenda-Jere, PhD

Email: [email protected]

Tel. : +27 11 256 3587