cybersecurity and multi stakeholder internet governance...aucc at a glance •electronic...

29
Cybersecurity and Multi-stakeholder Internet Governance – the case of AU Convention on Cybersecurity Towela Nyirenda Jere, PhD Principal Programme Officer, Regional Integration, Infrastructure and Trade IEEE ETAP Forum, Windhoek May 30, 2017

Upload: others

Post on 21-Jan-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

CybersecurityandMulti-stakeholderInternetGovernance– thecaseofAUConventiononCybersecurity

TowelaNyirendaJere,PhDPrincipalProgramme Officer,RegionalIntegration,InfrastructureandTrade

IEEEETAPForum,WindhoekMay30,2017

Page 2: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

InternetGovernance

• “....thedevelopmentandapplicationbygovernments,theprivatesector,andcivilsociety,intheirrespectiveroles,ofsharedprinciples,norms,rules,decision-makingprocedures,andprogrammesthatshapetheevolutionanduseoftheInternet.”• WSISTunisAgenda

Page 3: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Multi-stakeholderprocesses

• “Weencouragethedevelopmentofmulti-stakeholderprocessesatthenational,regionalandinternationallevelstodiscussandcollaborateontheexpansionanddiffusionoftheInternetasameanstosupportdevelopmenteffortstoachieveinternationallyagreeddevelopmentgoalsandobjectives,includingtheMillenniumDevelopmentGoals”–WSISTunisAgenda

Page 4: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Stakeholders• TunisAgenda:sovereignstates(governments),privatesector,inter-governmentalorganisations,internationalorganisations,academicandtechnicalcommunities.

• 4 keygroupsemergingas“stakeholders:government,privatesector,civilsociety,technical– academia,media,inter-governmentalorinternationalorganisationshavenodefinedplace

Page 5: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Stakeholders

• nouniversalagreementonthemeansofinteractionandengagementbetweenthevariousstakeholdergroupings.

• discourseoccursbothonlineandoffline– prosandconsintermsofparticipationandreach

Page 6: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Stakeholders

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

Government Civilsociety PrivateSector Academia Media Technical None

PerceivedDominanceofStakeholderGroups

National

Regional

Continental

Global

media,privatesector,academiaandthetechnicalcommunityare“notvisible”

Page 7: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Multi-stakeholder processes

• “Theuseofvariousmeansincludingnetworks,platforms,partnerships,collaborations,processes,dialoguestobringtogetherdiversestakeholdergroupingsrepresentativeofsocietyatlargeforthepurposeofdiscussion,consensus-building,decision-makingoractiononmattersofcommoninterest”– TowelaNyirenda-Jere,MA(IG)dissertation

Page 8: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Multi-stakeholder processes• “Nocohesionamongstallthesegroups”(Privatesector)

• “….processesarenotsubstantiatedbyfacts,data ”(Academia)

• “…nocoordinatedapproachnationally…”(Government)

• “…notanissuethathasreallybeenbroughtoutproperlyinastructuredmannerinAfrica…..”(NGO)

Page 9: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Multi-stakeholder processes• “State/governmentsarebetterplacedtotacklecyber-crimeissues.Butcooperationisneededamongthem”(Academic)

• “….moreplayersneedtocomeintosupportthisprocess,workingwithnationalgovernments”(NGO)

• “…multi-stakeholderengagementunfeasibleorimpossibleatthenationallevel..”

• “…afewselectgroupsmakingassumptionsforawholemany”

Page 10: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

TheRoadtotheAUCC• 2009ORTamboDeclaration• 2010 – AUSummitendorsement

– AbujaDeclaration• 2011FirstDraft:“AUConventionontheConfidenceandSecurityinCyberspace”

• 2012 – endorsementofdraftbyAUSTC• 2012-2013 Stakeholderconsultations– 2013onlinepetitionagainsttheConvention

• 2014 Adoption:“AUConventiononCybersecurityandProtectionofPersonalData”

Page 11: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

AUCCataglance• objectives- harmonizee-legislation,protectpersonaldata,promotecybersecurity,fightcybercrime– Definekeycyberterminologiesinlegislation– Developgeneralprinciplesandspecificprovisionsrelatedtocyberlegislation

– OutlinecyberlegislativemeasuresrequiredatMemberStatelevel

– Developgeneralprinciplesandspecificprovisiononinternationalcooperation

Page 12: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

AUCCataglance• Electronictransactions,• Personaldataprotection,• Cybersecurityandcybercrime• Requires memberstatesto:– developnationalcybersecuritypolicy– developlegislationoncybercrime– ensuretheprotectionofcriticalinformationinfrastructure

– enactpersonaldataprotectionlaws

Page 13: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

ReactiontotheAUCC

• goodguideline(benchmark/health-check)• adherence tonationalconstitutionsandinternationalhumanrightslaw

• emphasisontheAfricanCharteronHumanandPeoples’Rights

• limitedstakeholderengagement• Vague/broadprovisionsthatmaycausemisusebygovernments

Page 14: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

ReactiontoAUCC• No clearminimumthresholds - governmentscould opt not to implementsomeaspects

• inconsistency - racismandxenophobiaoutlawed,discriminationonsexualorientationorgendernot

• Impactofleakeddataonjournalistsandsources

• Nosafeguardsoninformation-sharingbetweenprivatesectorandgovernment

Page 15: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Currentstatus andWayForward

• 15Ratifications requiredforentryintoforce• Signatures:Benin,CapeVerde,Comoros,Congo,GuineaBissau,Mauritania,SierraLeone,SaoTomeandPrincipe,andZambiahavesignedtheconvention

• Noratifications

Page 16: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

MostratifiedinstrumentsInstruments Yearof

AdoptionNumberofRatifications

ConstitutiveActoftheAfricanUnion 2000 54

AfricanCharteronHumanandPeoples'Rights 1981 53

TreatyEstablishingtheAfricanEconomicCommunity, 1991 49ProtocolRelatingtotheEstablishmentofthePeaceandSecurityCounciloftheAfricanUnion

2002 49

ProtocoltotheTreatyEstablishingtheAfricanEconomicCommunityRelatingtothePan-AfricanParliament

2001 48

AfricanCharterontheRightsandWelfareoftheChild 1990 47

OAUConventionGoverningtheSpecificAspectsofRefugeeProblemsinAfrica

1969 45

AfricanCivilAviationCommissionConstitution 1969 44

OAUConventiononthePreventionandCombatingofTerrorism 1999 41

PrivilegesandImmunities 1965 40

Nuclear-Weapon-FreeZone 1996 40

Page 17: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

LeastRatifiedInstrumentsInstruments Yearof

AdoptionNumberofRatifications

RevisedConstitutionoftheAfricanCivilAviationCommission 2009 5

ProtocolontheStatuteoftheAfricanCourtofJusticeandHumanRight 2008 5

ProtocolontheAfricanInvestmentBank 2009 2

AfricanUnionConventiononCross-BorderCooperation(NiameyConvention)

2014 1

ProtocoltotheConstitutiveActoftheAfricanUnionrelatingtothePan-AfricanParliament

2014 1

AfricanUnionConventiononCyberSecurityandPersonalDataProtection 2014 0

AfricanCharterontheValuesandPrinciplesofDecentralisation,LocalGovernanceandLocalDevelopment

2014 0

ProtocolonAmendmentstotheProtocolontheStatuteoftheAfricanCourtofJusticeandHumanRights

2014 0

ProtocolontheEstablishmentontheAfricanMonetaryFundandtheStatuteoftheAfricanMonetaryFund

2014 0

AgreementfortheEstablishmentoftheAfricanRiskCapacity(ARC)Agency 2012 0

Page 18: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

EffectivenessofMSProcesses• towhatextentareobjectivesmet– Outputs- immediateresults– Outcomes - resultsoveralongertime-frame– Impact-longertermsustainedchanges

• Determinantsofeffectiveness– Architectural:howestablished– Procedural:howrun– Operational: howmaintainedandsustained

Page 19: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Effectiveness ofAUCCprocess

Parameter ObservationsOutputs - TheConvention

- StateofCybersecurityandCybercrime inAfricareport

Outcomes - Ratification- Legislation andpolicyinitiatives

Impact - Moretimeneededtoassess

Determinant Observations

Architectural - DeclarationatMinisteriallevel- EndorsementbyHeadsofState

Procedural Stakeholderconsultations- Expertmeetingsconvened byAUC,UNECA- Onlineconsultationsconvenedbycivilsociety

Operational - Advocacythroughtechnicalmeetingsanddialoguesatregionalandcontinentallevel

- Declarations atMinisteriallevel- Limitedactivities atnationallevel

Page 20: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

AUCC– WhatisatStake?

• Countrieswithlegislation• ElectronicTransactions: 28(51%)• ConsumerProtection: 18(33%)• PrivacyandDataProtection: 22(40%)• Cybercrime: 27(49%)

• (Source:UNCTAD)

Page 21: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

E-Legislation

Source:UNCTAD

Page 22: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

E-transactions

Source:UNCTAD

Page 23: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

DataProtection&Privacy

Source:UNCTAD

Page 24: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Cybercrime

Source:UNCTAD

Page 25: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

ConsumerProtection

Source:UNCTAD

Page 26: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Recommendations• CoordinationbetweentheAUCandmemberstates

• Awarenessamongstakeholders• Coordinationandcommunicationatnationalandregionallevel

• Inclusiveness - needforallstakeholders(civilsociety,government,privatesector,academic)tobeinvolvedinnationalandregionalprocesses.

Page 27: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

Recommendations• StrengtheningtheroleofPanAfricaParliament

• Examineadstreamlineratificationprocesses• Financialresources– settingupofinstitutions,capacitybuilding,monitoringandenforcement

• Technicalandinstitutionalcapacitybuilding

Page 28: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

QuestionsforReflection

• WhatarethelimitsofMSapproaches?• AreMSapproachesreallyfeasible/practical?• Whataretherolesandresponsibilitiesofthevariousactorsandstakeholders?–Whoneedstodowhat,when,howandwhy?

• Howlongshouldtheprocesstake?Canweaffordlengthyratificationprocesses?

Page 29: cybersecurity and multi stakeholder internet governance...AUCC at a glance •Electronic transactions, •Personal data protection, •Cyber security and cybercrime •Requiresmember

THANKYOU

Contact Information

Towela Nyirenda-Jere, PhD

Email: [email protected]

Tel. : +27 11 256 3587