federal negarit gazette...federal negarit gazette no.6 2nd january 2014 ..... page 7131 standard and...

8
FEDERAL NEGARIT GAZETTE '. '. f J'r.:. 'Jon:" 4rl'C 1.1'1 Mil :J'"l)lI Ir!l"''' 'u .. {I h/"f- k 'P. .c;. tfP" t-"- J''P. t T 11t\." f,.n1"fI ·,.0)11f-1' 9"hC 0.'''' fOJ'" 20 th Year No.6 ADDIS ABABA 2 nd January, 2014 CONTENTS Proclamation No. 808/2013 f h.'}C:COIJ:Ii'} ool,n "'1.1e; Information Network Security Agency Re- lTfJ'J:'J: OI I.,f ...... , ....... , ........ ,1" l7I.iffli establishment Proclamation ............ Page 7129 1\'1''1: 41'1'C PROCLAMATION No. 808/2013 fh.1t::C"I7i1 h.l1(l1 A1R.1'i" ""7**'" fmllJ I'\.f, J'II.. fh1t'l: t'ID()l'" A lTfJ.y.1· ''itS h.'}J;.lI,"'tP J m t 9"'I;dJ""C I'\.f, f·,.t'ID()l·': ht'mlfe;:r:OJ· :JC .,. J' .f,,' 11.'1':1>'-" (Jt'ID:JII."',:r:OJ· "e; 011.&.·'" J',(JA1' ." :JI'\ 6 /. b ftlll.Y.J;. (Junlfe;:fdJ· ;J·:r:dJ··) lTfJ l."J1'1' 1',lI&'1'\1, lft; (Joo 1 ")" -,: m t 9"'l;dJ""C'l' 1',1t-fJ! "e; (}II.9" ''''lIliC 9"tn.f·'" f'''&'mldJ' ftt.f,(JC II. ·fI"'bt-'P. lI:J,'" .f,lf'} t'mhl'\hA 1',lI&'I'\'I, lftj (J,. ID 1·)"·I:: h.·)(;:COIJ:Ii·} t;: lTfJlJ(lt-'P.: ;r II. .t;II'P. "e; h.Jttjt"l..J''P. Y'n·'" 1'(J:I> lTfJ.f.·l O } OJtti lftj (Jm'1'Y,,:; 'n"'bt-'P. 1':"9"') "e; fU ...,:y··} t'm'n·'" II.lTfJl:J11' h.·H;:COIJ:1i1 "e; tt9"'l;dJ""C'} m'()l'''' J'1.l·1- t'm()l'" AlTfJ·f:Y· lTfJl:J',1' o)tti lftj (I I'm 1')"·,: : h:)f. ... ctI?:Ii·} he; tt9"'CdJ""C'} t'm()l'''' J' I.l1 t;: oo()l'" A lTfJ·'" I.lJ'a·'" II.t'.mllln:" fOlI.1.l1OJ··} 1', "t-fJ! 1'l'''' f"'l.J',,·e; he; '(J,,'bt-fJ! ftt.f,nC I.lJ'a·'" ;rt\.,,- he; lI,"'t-'I:1(') (J11:J>'''' lTfJlI&.?t9" f'"(:;'A m '}IIt- .,.'J:9" un 1') l] ,.,. (J lTfJ II &. II. 'J- : (Jh. ,"'r'A- .r 41.t-1'\'P. J;,. '1°tlt."-J''1! tT1111..h 111 un'}O}lI'''' 1','}"''''' !l{;(fi) t'm()l'''' fll'l.h·"II.dJ· : i. 1\"..C C/Jia .f", "fh:H.:CtIIJ,·Ii'} t'ml.,n 1.111',..,. h'}1. 1 t, .. lTfJ'J:'J:II'1.J' _ •. - / •. J. I .1. .... gil... '.1 h" t\.(Th-li .f,·I·I'\A: 'I';J TT",:t Prirp A PROCLAMATION TO RE-ESTABLISH THE INFORMATION NETWORK SECURITY AGENCY WHEREAS, it has become necessary to ensure the security of advancing · critical infrastructures and industries of the country that are vulnerable and going to be more vulnerable to an attack due to their reliance on computer; WHEREAS, it has become necessary to protect the cyber space which is created by the local and international computer networking, so as not to be a national security threat; WHEREAS, it has become imperative to ensure the security of information, as information is invaluable social, political and economic asset; WHEREAS, it is essential to secure information and critical computer based infrastructure in order to ensure the national interest and citizens' right; WHEREAS, it has become necessary to establish strong institution that coordinates national efforts to realize the security of information and critical computer based infrastructures and capable to implement national cyber security policy and strategy effectively; NOW, THEREFORE, in accordance with Article 55( I) of the Constitution of the Federal ' Democratic Republic of Ethiopia, it is hereby/ proclaimed as follows: 1. Short Title This Proclamation may be cited as the "Information Network Security Agency Re- establishment Proclamation No. 808/2013." ;J tt ;J ILIlJ 7'. Uf il·i'i.?i Negarit G. P.O. box 80001 \ www.chilot.me

Upload: others

Post on 19-Jul-2020

26 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: FEDERAL NEGARIT GAZETTE...Federal Negarit Gazette NO.6 2nd January 2014 ..... page 7131 standard and ordering, if necessary, corrective measures to be taken; 7 / "security testing

FEDERAL NEGARIT GAZETTE '. '. f J'r.:. 'Jon:" 4rl'C ~

1.1'1 Mil :J'"l)lI Ir!l"''' ~lU 'u .. {I h/"f-k ~ 4~t-1'\ 'P. .c;. tfP" t-"- J''P. t T 11t\." f,.n1"fI ·,.0)11f-1' 9"hC 0.'''' ml]+,~,,,, fOJ'"

20th Year No.6 ADDIS ABABA 2nd January, 2014

CONTENTS

Proclamation No. 808/2013

f h.'}C:COIJ:Ii'} ool,n ~,n~'''' }b~'}"- "'1.1e; Information Network Security Agency Re-lTfJ'J:'J:OII.,f 1',fJ)~ ...... , ....... , ........ ,1" l7I.iffli establishment Proclamation ............ Page 7129

1\'1''1: 41'1'C ~f~/ml PROCLAMATION No. 808/2013

fh.1t::C"I7i1 OD~'" R.tJ1~+ h.l1(l1 A1R.1'i" ""7**'" fmllJ 1l"'~

(Jt'IDlI4.~·'" I'\.f, J'II.. fh1t'l: "~At;: t'ID()l'" A lTfJ.y.1· ''itS h.'}J;.lI,"'tPJ1· mt9"'I;dJ""C I'\.f, f·,.t'ID()l·': ht'mlfe;:r:OJ· :JC .,. J' .f,,' 11.'1':1>'-" (Jt'ID:JII."',:r:OJ· "e; 011.&.·'" J',(JA1' ." :JI'\ 6

/ .b "flf~· ftlll.Y.J;. (Junlfe;:fdJ·

l.,n~ ;J·:r:dJ··) lTfJ l."J1'1' 1',lI&'1'\1, lft; (Joo 1 ")" -,: ~

mt9"'l;dJ""C'l' 1',1t-fJ! "e; (}II.9" 1',"'~Cf! ''''lIliC 9"tn.f·'" f'''&'mldJ' ftt.f,(JC 9"1I~C II. ·fI"'bt-'P. l.,n~·'" lI:J,'" "')~ .f,lf'} t'mhl'\hA 1',lI&'I'\'I, lftj (J,.ID1·)"·I::

h.·)(;:COIJ:Ii·} "~A t;: lTfJlJ(lt-'P.: ;r II. .t;II'P. "e; h.Jttjt"l..J''P. Y'n·'" (Jm)lf~· II.1.,n~·': 1'(J:I> lTfJ.f.·lO} OJtti lftj (Jm'1'Y,,:;

'n"'bt-'P. 1':"9"') "e; fU • ...,:y··} t'm'n·'" II.lTfJl:J11' h.·H;:COIJ:1i1 "e; tt9"'l;dJ""C'} m'()l'''' J'1.l·1- "~At;: t'm()l'" AlTfJ·f:Y· l.,n~·"'·} lTfJl:J',1' o)tti lftj (I I'm 1')"·,: :

h:)f. ... ctI?:Ii·} he; tt9"'CdJ""C'} t'm()l'''' J' I.l1 "~A t;: oo()l'" A lTfJ·'" I.lJ'a·'" II.t'.mllln:" fOlI.1.l1OJ··} 1', "t-fJ! 1'l'''' f"'l.J',,·e; ~ he; '(J,,'bt-fJ! ftt.f,nC I.lJ'a·'" ;rt\.,,- he; lI,"'t-'I:1(') (J11:J>'''' lTfJlI&.?t9" f'"(:;'A m '}IIt- .,.'J:9" un 1') l] ,.,. (J lTfJ II &. II. 'J- :

(Jh. ,"'r'A-.r 41.t-1'\'P. J;,. '1°tlt."-J''1! tT1111..h 111 un'}O}lI'''' 1','}"''''' !l{;(fi) t'm()l'''' fll'l.h·"II.dJ· ;J·dJ-:~:.A: :

i. 1\"..C C/Jia

.f", 1',fJ)~ "fh:H.:CtIIJ,·Ii'} t'ml.,n 1.111',..,. lb~'}"- h'}1.1 t, .. lTfJ'J:'J:II'1.J' 1',fJ'~ "~1'C _ •. - / •. :,.r:~" J. I .1. .... ~r~ gil... '.1 h" t\.(Th-li .f,·I·I'\A:

"~ 'I';J TT",: t Prirp

A PROCLAMATION TO RE-ESTABLISH THE INFORMATION NETWORK SECURITY

AGENCY

WHEREAS, it has become necessary to ensure the security of advancing · critical infrastructures and industries of the country that are vulnerable and going to be more vulnerable to an attack due to their reliance on computer;

WHEREAS, it has become necessary to protect the cyber space which is created by the local and international computer networking, so as not to be a national security threat;

WHEREAS, it has become imperative to ensure the security of information, as information is invaluable social, political and economic asset;

WHEREAS, it is essential to secure information and critical computer based infrastructure in order to ensure the national interest and citizens' right;

WHEREAS, it has become necessary to establish strong institution that coordinates national efforts to realize the security of information and critical computer based infrastructures and capable to implement national cyber security policy and strategy effectively;

NOW, THEREFORE, in accordance with Article 55( I) of the Constitution of the Federal ' Democratic Republic of Ethiopia, it is hereby/ proclaimed as follows:

1. Short Title

This Proclamation may be cited as the "Information Network Security Agency Re­establishment Proclamation No. 808/2013."

~ ;J tt ;J ILIlJ 7'. Uf • ~ il·i'i.?i Negarit G. P.O. box 80001

\

www.chilot.me

Page 2: FEDERAL NEGARIT GAZETTE...Federal Negarit Gazette NO.6 2nd January 2014 ..... page 7131 standard and ordering, if necessary, corrective measures to be taken; 7 / "security testing

'Ill.' :i,i'l.~.~I!J t ... r..t.·A ,,;)(.,1- .~tI_n, "~1·r. ~ ;J'ut}{'J ?!!~ "-1 ~iU (U" Federal Negarit Gazette NO.6 2nd January 2014 .... .. .. . . .. page 7130

I. :"C~OJ

f 'p1\. }',1 lHJ t\.~ :~C'r~ t.~(alllOJ· (){l'~"'C nil. II )" CJ):e- OJ' ra l' : -

?if "h.'}~:cOIJ:Ii'}" ("11\'''' h("I'P1OJ'~ 1'~ .v, ;J- ftTIl £IIJ 'I hl.b lJ.f:~ 6: n611-":-: lI~raA: ntlC ;J' mY,~ nt\.~ (lTrp10J'~

auAh· '~"''1ll'{)c- f'Tl/.1~ U,{):~ (Ur}

("I'liif:r-'} 1\("11111 'AS I\m)~/,,:~

ftTI/. y', l\ <1/1\· t,p. :""} he; Tc:al t..'IP :}'-'}

.flll,PA~A :

~/ "t'~'L:OJ"~C" ("ll\:~ n(a,,::~CJ!C he; «7 J',hc-:f.T 'I:hifl\":{ ~y, f,~m)(aL'" f·V,;J' TC:(an'}CJ/: h~:"':h :~'}.~e;:

ra C hl.b.'" -: 01 T'i· 'I'''' m y, ~ t\.1\" :r' Y. 1)1llJ: m y, ~ )" £IIJ h'}\"}', cr. ·,,<11 II I,,:"'} {.ltTI/.,fhe;OJ·'} ("I'}~OJ'~ aul)tf '1OJ':

1:/ "tl~'L:OJ""C'} £IIJ(aL'''' ,f f.L1 "~A": au (a L'" A ("I :,.." ("ll\ :,. h.'}~. ra:,. t ,f lJ: {.I'h1'1'C raC'}'y, :""}: f h:}~:COIJ. 'Ii'} ("I~:e-£IIJ'F" raC'}.y.:r, he; £IIJ(aL'" A «7,y,:r,'}-: fl)y,nC he; f'l:t\.tl~

£IIJ(aL'" A «7,y,1"'}: 'bt\.h''''C:«7<1/~'th £IIJ(aL'" A «7,y,1" : f:{~ra:rif A £IIJ(aL'" A ("I.y.1": m;J'f.t..lJ: fhll he; "~1'1'C ra C I} .y.1" m y, ~ h:}~: C 01. 'Ii 'r} l\ an."'}.~'}: l\'"1 (at.. (.1.1. :,..: l\ ("lh("I:':'''' he; £IIJA(a l\«7<1J"r,.,. {) tTI/.fra:",1\. t\.1\":r' au(aL'" A ("I'y,1"'} mf,~ raC'},Y,:r·'} .fm.pA ~A:

Q/ "'I~A": an(aL·,.. A("I:"''' «7l\:,.. l\1'.P'''' h,,, :Jl\lIl IltIl",J f.tr}'1:'" he; '{),I .. t..cr. l' :""p :r' ~ y, h,,:·" ~ 'r·v,:,.. 1\. f ra h,.,. A f""l.1'-A £m(aL'" A ("I:'" '1OJ':

(;/ "1' 'p'''''' «7 l\'''' t'~'l: OJ""C'} £m(aL'''' ff.L1 'I~A": an(aL'" A("I:'" {.I,,.~?~ }" 11.\ <111\"·1, h'}~ J',(}1' OJJ','r h '}J;,OJ.f:'r

tI?f:L<I/,} OJJ','r rll.·}(;:COIJ,'iiT} , ,-'} l"l"l. ',.1-: tI"I. ra1' t- q~.,.1- OJ J', 'JU '''f.t.. 'Ii 'I'''' l"ll)(fl:~'} mY,~

t'~'l: OJ""C'} £IIJ(aL'''' }'"f.:C1 lHL 11', ra'l A (l e; ~ J', f tTli. (a 'I II C 1'.p:",'} m y, ~ A f. A f. IIY..,9J 1"'} nalJmcf'~ rtTII.~.~~ r«7'}','''' raC$'''' '''''IllC'} fm.PA~A:

~/ "ff.U'}"'-'" ~Jt:,.." ("ll\:,.. t,~"COJ"'-C'}

£IIJ(aL'''' llf.L1 "~A": £IIJ(aL'~ A l"l:'" ~J', .":J~hl.b'l:""} l\«7m:" fllAc~ 1 '{)

,,>H' .. · ~<l/llt..:""} ("lhe;m '} he; }',1t..lJ: f h. '}~:COIJ. 'Ii'} ;r I\.n he; ra;J"}.V, C .~"} alJ(aL'''' II ("I .f: I. OJ f·,..*«7 :,..'}

2. Definitions

In this Proclamation unless the context otherwise requires:

1/ "information" means an asset generated from any raw data obtained in the form of audio, texts, visual, map or orchestrated in any form including codes and programs used to command and control machines;

2/ "computer" means any software and microchips technology based data processing, data storage, data analysis, data dissemination and data communication device or any device that is capable of performing logical, arithmetic or routing, functions;

3/ "computer based critical infrastructure" includes industrial control systems, information management systems and infrastructures, cyber and telecom infrastructures, electromagnetic systems, geospatial infrastructures, military command and control infrastructures and any other infrastructures or systems that analyze, disseminate, store and retrieve information;

4/ "critical infrastructure" means an infrastructure that can have considerable damage on public safety and the national interest, if attacked;

5/ "attack" includes destruction of computer based critical infrastructures or disruption of their services or obliterating the confidentiality, integrity or availability of information or computer based psychological attack on citizens or digital identity theft perpetrated by different techn: ques;

6/ "security audit" includes conducting penetration testing to computer based critical infrastructures to identify vulnerability or assessing institutions' information security system pursuant to the national information policy and

www.chilot.me

Page 3: FEDERAL NEGARIT GAZETTE...Federal Negarit Gazette NO.6 2nd January 2014 ..... page 7131 standard and ordering, if necessary, corrective measures to be taken; 7 / "security testing

r,

f h:}(~:COIJ, 'Ii'} Y..,T,."" flC(}''''' IIm'1?"1?,, h'}Y.}',flL"1,',.,: fhC?"''''' 'hC?"if9'1' h'}-'ta){'~, ("I.f.:I."/,} y, (.1.1. ?" ~ A :

XI "fY.IJ'}',..,.. lj:."i'f he; "/?,,1f"J" ("11\:" 1I}',"~lJ~ f y'U'}~:,.. fl:J"}P'C J'.: he; m)(mll~ £IlI()I.''''' f h:}~:C(IIl'li'} 'I:h'i h"j{ ?"c.y. :t,,}: flC(}.y.1,,} mf.?" f fl t· 'iy'·f :t, f:" .f.' m'A '''1:1': :" .f,· m,

"1'1 r. 01 f. ?" :" .f.' an :" °1 II I,. lj: . I' i)' he; "/?,,"'''1 f'''I.f.·I.°1 ·,,<J/llC ~OJ':

'1;1 "~f·?"·';OJ""C }!:'}1"'~ }"y':) ?",,'li anflt."J. ("I6hA" '''11\''''' IIh:}~:C(IIl'li'}

he; fl?"";OJ"I'C'} £IlI"'I.''''' llY.I." £IlI()I.'" A f"J,.,.. "y. flll/ .... ~IIC l' ,p,.,..'} t\£RJh"hA h'}-'t:FA fl' ,p • .,.. }',Y.:)9'1','} }',fl"~ .f.''10 f£IlII\ f·.,..: (" £IlI''''}''''}: Ib'" 1"} ff"Jflm '}"~:": £RJm .... f.· fll\ trl/,111:':0J· hC?"if 9'1'· ?"hc'} ff"J:"I.·n: f("I·'1 '1'1..f' £IlI·}1}',.1'··} fanllf .f.' he; 1111," IIClj: }" "t,lJ~ he; '}I\?" }" "~'i .. cr. :"'} ~:,.. h·}-'tLmC f'''Ifl:FA ·"<J/ll/,.:",~} flll/ .• rhe;OJ··} '''I6hA ~OJ':

UI "htT.y.<J/~~." f"J1\''''' h;J· ... IIOJ· ·""~llY. OJ·a.}. f h.·}~:cO?'li·} Am·OJ·I'·} '''I'}?'' {)OJ· mY.?" ("I·Ii·} h·}.~,rHIOJ· mf.?" h '}.~ y."~ ,. I. OJ· flll/.Jlfl1·A r?"flm~. mY.?" 1I1bt\.h:"C'~.h ·}"/,f.· mJ .,,'''1 £RJ 'r} he; }',I\ £.RJ 1,11.f.· '} /\''71.:)11' {111I/.J"fl1'A I)f.'}fl ~OJ':

XI ''7'}~ OJ·?" 11m'} .f.' l' :J' r'I'1I\OOJ' f ... .:,..·}?" ),1,:,.. ;J'A : :

00**,,-?il f h:}~:cO?·li·} £IlII. ... ) y'U'}',..,.. 'b~'}""

(hll,., II~" "lb~'}""" hr'''ll/\ r'lllm~) r.,°l ()OJ'~''''' .f 1\ OJ' ~().'} f:F1\ r~'(~A £RJ'}"/fl''''' £RJfitJ' 0.''''' t1''i nil." )" lJ' ~ h'} Y.1t; ""*"!~7.A::

fl.1 'b~'}""OJ' '''(flt~'I: I\m:"I\Y. trl/.~.fl'''''~, Y,t1'e; A : :

'PC; oo/lt,y 0.:'-

rlb~'}""OJ' q,t; £RJfltJ' 0.''''' II},,-'tfl }"II11 t1''i 'h'} Y. }"flL 1\ 'I. ~.,: 1If"Je;:,:OJ'?" fl'i:~

:"C·}t.hl.lj: £RJfltJ' 0.''''' 1\, 'i I.m· f,1'''A: :

Federal Negarit Gazette NO.6 2nd January 2014 ............. page 7131

standard and ordering, if necessary, corrective measures to be taken;

7 / "security testing and evaluation" means pre-development, pre-procurement or pre­deployment testing and evaluating information technology products, services, systems and process, pursuant to national security standards and criteria;

8/ "computer emergency response center" means a center which is responsible for detecting, analyzing, warning citizen, recommending measures to be taken, devising recovery mechanisms on the . issue of information and computer based iilfrastructure threats and enabling national and international coordination on such issue;

9/ "cryptography" means a science of coding data so that they cannot be read or altered by any person or any machine other than the intended recipient or a science of authentication and non-repudiation in the electronic transaction;

10/ any expression in the masculine gender includes the feminine.

3, Establishment

1/ ' The Information Network Security Agency (hereinafter the "Agency") is hereby re-established as an autonomous federal government agency having its own legal personality.

2/ Tre Agency shall be accountable to the Prime Minister.

4. Head Office

The Agency shall have its head office in Addis Ababa, and may have branch offices elsewhere as may be necessary.

www.chilot.me

Page 4: FEDERAL NEGARIT GAZETTE...Federal Negarit Gazette NO.6 2nd January 2014 ..... page 7131 standard and ordering, if necessary, corrective measures to be taken; 7 / "security testing

1~ 1,i'i.M@~ t ... ~b·A ~.:J(."" .:Jtl.n , -/1",(; 'I; ;J'Ullil ?Ni -,,"} !{j'O; (}.y" Federal Negarit Gazette No.6 2nd January 2014 .......... .. rage 7132

t. ,,,,,,

~.

f'b~'}l'.m· f~i\(11] {~h:}(;:C(l1:1i'} 'he; 11~'C m"'-C'} 0'0 () I. :" J~ ~I.'i' .,= A (,: 0'0 () I. '1-A (11].y..:)"- ~~tJT,:"'} (1(11] I. :J'JIf' I\t,1t'l: f()i\~: {~A(I1]'1' 'he; elJ·nc.·:}"- IT1lll..1l ""1 • ." Y,tre;A ::

{~.&;. 'I"ht.f"l. O'oC'/ 'h .}-'ttY",. (11]1l;J: A

r 1a.J: 1ft. fD- llA "I'}t;' .,." q C

'b~'}f"l.m· ftl"lJH't\·:" llAflr}C; ·""Jllt·:" y,C;~.:J-A: -

?if lJlf'e;:"e; ~c~c i\f, f,'·O'IJ()I.": fh:}~·:ClIIJ.·Ii'} 'he; 11~·t:OJ"I·C'} I"RJ()I.·1- .e ,(1.'1' "=A c,: O'IJ()I."- A (TI/,y, :)". .(.r}',.r ~C·y..:)"-'} 'he; t,·JAelJt\' •• y..:}"-'} flllJIIA1l·IJe; lit· i\f, 'h'}.'tm·t\. f(11] .f:I."J:

fl./ fh.'}~:ClIIJ.'Ii'} 'he; 11~'I;m""C'} I"RJ()I.,r .e ~I.'i' "=A c,: "'RJ()I."· A 111] ,y, :}". .(.r}',.r'} t\ 111] I. :J 1 If' flTll .• rll':"'·t\. 'nlh.top' f Tt\.f"l.: fUelJ: fll:J··}PrC.f.­'h C; 1l:1' to' I; if. I. 4! ~ :}"-'} f lIIJ " :J:e. :" e;

-AJLf.-·'=r ·ht~(I" . .,:J-:I:m·'} (llmh:J-"-A:

f:/ "'RJ'}<IJll:J-tt~ 'he; f<lJA 'N':lIIJ'r t,1t-tt~ fh.'}~:ClIIJ.'li'} ~tf}','r Tt\.f"l. 'he; ll:J-'}·~C,f.- 111]".p~:1·'} ·l'h:" l\ m· ff to ... :t:m· T A.f"l. t;' ll:J"}Pr c: .f.' 4-C1lm' {)to i\Y, 'h '}-'t,rOJ·t\ .. f.' :Jlj: (l ... RJ{)m·re; t,I..~1llllJ:I:OJ·'} (lmJ~fllmC:

!i/ h.'}~:clllJ.'Ii·} 'he; 11~·t:m""C'} fllJ()l.-r 1l.(1.·/· "=Alj: ... RJ()I.'" A 11TJ·y.. ":f'. o)f.~ llCI~·y..l· i\f, o)f,~ (JU,1":f'- ll., Ane; i\f, flTll.()""~,,r'} f ... ,e(JC 'he; lbt\,h'rC'II1]<lJ~'l:h If' ,P,fl"} t\£IlJl,i\hA t,lll..i\'I. t,1l1"tt~ 'hC~;( f ... RJOJ·().f.· :

f;/ (JII1]'P;: m'~ 0):"'1' f h. '}~:C:lIIJ.'li'} 'he; Il~·';OJ·'I'C:·} mJ()I.,r ,r .(I.'i' 4=A lj~ I"RJ () 1..,. A lIIJ,y.,l·'} ,(,I'}"'r ~·'t,r fll1].f.'I.<lJ: "'RJfllJ"~m"} t,~~A"'m' 1\ ·1'1'r;. ,"*IITJ'r~ f .(tr},,·r --{J:p:" lIIJl.:J1bh}. ()C,,,lj:h,'r fl"RJllm-r O)f,tjO

h ,," .• I'} '''''Illto'r'h '}-'t.ehe; 0"" . . I\ltt\ .. :t ."*111]:" OJ·hA e; (lalJllm:":

~/ ,.,1~tt~ fI1tjO',;0J""C .f.·'}1·"«;: t,.(:J 9" i\ 'Ii ... RJ llbb). IITJ "h A '} (l lIIJ ~ to ~ -1' e; Ill) i\ f, ",1' f .... m 9" to -1' ;

5. Objectives

The objective of the Agency shall be to ensure that information and computer based key infrastructures are secured, so as to be enablers of national peace, democratization and development pr~grams.

6. Power and Duty of the Agency

The Agency shall have the powers and duties to:

I I develop and implement research and study based information and computer based critical infrastructure's security products and services;

21 draft national policies, laws, standards and strategies that enable to ensure information and computer based key infrastructures security, and oversight their enforcement upon approval;

31 support public and private institutions to formulate their own policies and standards in compliance with the national information security policy and standard frameworks, and monitor their implementation;

41 take all necessary counter measures to defend any cyber or electromagnetic attacks on information and computer based infrastructures or systems or on citizens' psychology;

51 conduct information or computer based critical infrastructures security audit at any time and provide, for those that meet the criteria, security standards approval certificate or delegate other bodies to perform such functions;

61 orgamze and administer a national computer emergency responding center;

www.chilot.me

Page 5: FEDERAL NEGARIT GAZETTE...Federal Negarit Gazette NO.6 2nd January 2014 ..... page 7131 standard and ordering, if necessary, corrective measures to be taken; 7 / "security testing

X/ {J"y,(JC OJ'};P:I\":f,'} 1It'.flJh~hAe;

n an an C £In C 'I. Y.. 'r l\ T It fl e; I\, 1\" :f' IIU"/ flAil"} l\-"OIlI:':OJ' }',I.~-l' 'r,n,nc f'c,? .r.:t. .. /: .r: :)c,: f't'.flJ(hn·)':

t;/ l' :P:""} l\ t'.flJ h~ hA e; ,I, -1° :f· -} }',fl." ,(,:,,0 l\OIJflm'}"':" ctllA f'1':P:'" ol\1l O)Y.?D mJ~"la' e;:,:OJo ,fc'{)l\OJo II-hnt.m~.

t-9"-COJo-fcC'·:i· O)y,9" t'mot.-fc Ac,?·,.:f· ~y. nC.,,:fc O)y,9" hc,:c .r.: O':fc :fctJlJ'JI IIc'?OJol'I -} "AS hTl\,fl :)C (It'm-''IlIiC II}"I'A 1It'.flJ1'f·} r-'t~ :J'A (;:t.'}cth 9"CmJ~ fOlJI.y'.r.':

U/ f'tltT.y."/~~. 9"C-}'} he; 'JlOJOOJOC'} fmJ~/'lmC: }',i'lt.~'l.OJ"} t'.flJfl~.C:fc

1I000OJol'I-} f'}'un:P.,'9" flccFfc f'mJIIC :).}; {JhtT·"'"/~~. t'mOt.,,· A OIJ-} {JOIJIIA? "Ie; fan lie; :)-}:

XI 1111.11 }','}"'?,' '}O·fl }','}"'X' un f"fcy"~"",},} -fc"/Ilt-·} l\OIJhe;OJ'} ,nc'b~lJ~ "~ •• } oC-"c,:h,')' 11 l\flA IIr}"

(Jantf1 f0lJ1A 1A:

I~/ OJY.. }',1C f"'I.111·e; h}',1C f' lI1/ o mill'

f h:U;:CD?, 'li"} 'I;ht; I\"j{p'':jo: falJt.~ }',~~C;~.f)J':j· he; fl':P-} ·l;ht;I\"j{p':f· (I}',1C y".,..}~,} ~y. ft.,fflh-}ft· f C'Y.,l·ft.-}'} }"y":) ht'mh~hA }','}~C h''Y.,t'mfth;J·:t:OJo }',I.~,} :J(; (It'm.,,e;;P:,} fUlJ4- I'lmC:

nu ft~'}(;:CD?,'li'} 'l;ht;I\"J[ f'F..lr}Ffc C,:,fcq he; "19"101J f ll1lY1l\"/A f~'fI~.y.t OIJtJhA f'OIJ**YU;

Xr./ }',1~cr. f'fl.:rq A ~;J' alJOt.-fc A OIJ·}·}

fOlJIIA? .1/e; fOlJfl·t-~ Y..C h '}-'tU'9" ffl.Tq A ~;J' OIJOllofl.y ·tnt; I\"J[?,':j'1 (lunm"'9":-

U) ',?C;:t!m·?D }'l.W"l· f'j(}.{}:rq A onG~?J1"} (lont"!'(J(}-fh f't'm-"·}."'}: (ll'?h"?r')' 'h C; (ll"'(}~{.r.l. ,). :

ft) ~;J' (I"Y.,(HJo-nn·}: (J0I/.h('?1'(I·}: II,"/.-"",,·'HH' wJ!.?D W'Y.(}t-bINJ-}' OJ:",l· I\.ht"H: f ll1l.':j·t\. f F...,..}~.} ,fc :)~bf!>~.y.':j, .. } "AS fl :).y.':j,"}

ftt'm"'~fl }',fl~~-'. hC9"~ f ODw·O.r.· .:

19.1 lI"fcunt.m' .r.··}(JC "l\A f'·nch,t·cr. Y..lr}~·} fl.')'} h'}:"fl:P{},PJ 1° II·ty ont.~ fon(}rflf"lrfh (lOD-"'}-"'}: l\ "y. t'ml\h-tw' }" t-aA f'a?:" GrfJ ,,·}-'to·?D l\01';I- .,J!,1\"1' ,(~':)c,: (lUlJ{}m-l':

7/ provide assistance and support, in respect of preventing and investigating cyber crimes, to police and other organs empowered by law;

8/ conduct digital foreinsic investigation without physical presence or conduct same with physical presence upon court warrant and in collaboration with the police on computers or infrastructures that are purported to be attacked or sources of attack, to prevent attacks and provide early warning to citizens;

9/ regulate cryptographic products and their transaction, set necessary criteria and develop operating procedures, develop and implement cryptography infrastructure;

10/ serve as a national "Root - Certificate Authority" to perform the functions provided in sub article (9) of this Article;

11/ control the import and export of information technology, information sensor and information attacking technologies, in collaboration with concerned authorities, to prevent them from posing a threat to national security;

12/ build information technology testing and evaluation laboratory center;

13/ develop and administer national spatial data infrastructure; and via spatial data collecting technologies:

a) collect, analyze, store and disseminate any kind of geospatial data;

b) take necessary measures to mitigate vulnerabilities and risks that could occur while collecting, storing, analyzing or disseminating of the data;

14/ collect, analyze and disseminate to the concerned authorities, information on selected transboundary national security threat activities; and provide support to security organs;

www.chilot.me

Page 6: FEDERAL NEGARIT GAZETTE...Federal Negarit Gazette NO.6 2nd January 2014 ..... page 7131 standard and ordering, if necessary, corrective measures to be taken; 7 / "security testing

'l~?:l'i.n~Ij!!k.I!I.·A ~.?I."" .?fl.fll <fr1'C ~ ;t-Ut,,', t!~ .,., ~jU ~.9" Federal Negarit Gazette No.6 2nd January 2014 .. . . .... . .... page 7134

.~(;I 1',1~'1~ 1',~~ llA·,..t.lOlll:':OJ· h'l:"''''-:;' ~tr)~ :)':':OJ' f"'lOU": f h.'}~:CcPJ. 'Ii'} Olf),~mJ'}'r mJfll'" A Olf"'l"} "he; flC'}'" :f·'} f"?UAll"}e; ft'mllC :J'r : "h '}-'ttJ·~ t\ 1II1.,r.,.cuOJ· ~C 're; t\ IIII.fllOOJ· 1', 1A 'O}I\"''''' ."mJ('ltll~ h'l:.r fOlfflht.A:

X~I h:}~:ccPJ.·Ii'} OJY,~ t·~ ·t:OJ··"C'} tmOl'r Y~l'" UlJfll'''' A Olf·'f-:;· ~tr}~·"" lI·t.r f,""~tJC''''' "he; flAlOe; TC'·O}~'1(l:f· '} UmJ~l?, U~fl· OlfflAlOi1 Olf~hA (J)f,~ hft,I\":", 1',1'1\''''' :JC UmJ,,.llnC fmJflln''''':

I%I Ut'm'}"}fl'r OJ''')' mJfll'r I\OJ·61.b 1',:JC 1',1~:" f ~tr}~'r ~C:,. "he; 1',1A .. }I\ ••• .,.. fOlf~l11;

Itl ',..AM·OJ·'} t\Olfflt.l.~ 1',fl t. 1\ 1. O'tj .... 1~ '}t\~ t,.,.4.'1~ ~'}~''''''} ft'mlf:lOC ;

xnl f'}'fll''''' ft'mtp'lJ A : fmJhflfl :

faIlO"}: OJ'A fl~ fmJhflfle;

1; I '}I\Olf OJ·') t\ 0lf"1"",, fllll.lJ;. ft,1\"-:;' ,,.IIOlf ~ " '''}ll~'''''''} fOlfhe; OJ'}: :

I. f1a,:(11\m- h~~Jr1:T

'b~'}""OJ': -

?i I n lo ~ 1\ f, 1111. 'I. il :,.~. filii. Ii (10. 1',') .f: 'I} e; . ~ Y,~h·"'ce; "h ,,}~1',flt.1\1. ~,,: ~h'''''A '1Je; ~J',~h"'C'-:;' ; "he;

!II 1',flt.I\'I. fl~''''?f-:;':

y,tj~·:J·A: :

~. f'PCi'm- ~.e~h"'c ilA1ll1Ci' "'GJl)C

?il '1)e; ~J',~h''''~. fJl.~'}""OJ· '1)e; fl~ 1',flt.~"'1. 1ft; f 'b~'}""OJ"} fl~9)1' nnl\Y. ~'r J',t'm~A: .rll'''~ .f.·~A: :

fl/ fll." h "}.,."" "}O·fl 1','}"''''' (?i) 1', 1O:P 1\ J', .f.: "} :n~ "h "} ~ ,,.. lo U.,. O'C; tp e; ~ J',~h''''~.:-

0) ell,., 1','1J~ h'}"'",' 1 f+UlJl\h,,:,.,..'} fJl.~')""OJ·'}

flAI',,,} "he; ''''''ll~'r nfl~ I\J', .rOJ·I\A;

N) fh.~')""(J)·') t"I~"'7f>1' nUll'}"}ll,}' (Jt~.1l.('~ mJmJ(,Y mJt"ll."f· J',"'1'~A: Yll·"~.(·~A ;

15/ develop and implement secured information management infrastructures and systems where domestic capacity has not yet created; charge commensurate fee for products and services it provides;

16/ design and provide education and training programs regarding information and computer based critical infrastructures' security in its own training center or In

collaboration with concerned bodies;

17/ provide' security products and services to foreign partners upon the decision of the government;

18/ establish international collaboration, when it is necessary, to implement its mission;

19/ own properties, enter in to contracts, sue and be sued in its own name;

20/ perform such other related activities conducive to the fulfillment of its objectives.

7. Organization of the Agency

The Agency shall have:

1/ a Director General and, as may be necessary, Deputy Director Generals, to be appointed by the Prime Minister; and

2/ the necessary staff . .

8. Power and Duty of the Director General

1/

2/

The Director General shall be the chief executive officer of the Agency and shall direct and administer the activities of the Agency.

Without limiting the generality of the provision of sub-article (1) of this Article, the Director General shall:

a) exercise the powers and duties of the Agency specified under Article 6 of this Proclamation;

b) employ and administer employees of the Agency in accordance with a directive approved by the government;

www.chilot.me

Page 7: FEDERAL NEGARIT GAZETTE...Federal Negarit Gazette NO.6 2nd January 2014 ..... page 7131 standard and ordering, if necessary, corrective measures to be taken; 7 / "security testing

'!,'{i.iitcJil;4..f.t.·A " .7/.-l' .7tl.flJ cfl'rC ~ ;J'UI\i1 ?!!~ ,''' fiU fHJD Federal Negarit Gazette NO.6 2nd January 2014 ..... . .... .. . page 7135

,h) rlb~'}(lOJ'1 r,..t. TC,'''It.?D "he; n~:,.. .r" :)Ir t.u nt"m1 .. 1,..·.,.. fl.?t~'~?D n,..t. ~.e •• eOJ'~t.\ ;

t"m ) ft 1.. ~ '} fl. OJ' n·,.. t.A' F.ft • .,.. n ~ ,.,.. ODIP/""" 111111 a)(J,l. ,f F.C :)A :

IP) lIF.111 rllllF.~1·" r}',t..~?t?D

1F.fl1' "h'}F.''''(fl(J''~ Iflj ·n"bt.lJ~ F.tr}'I"''''''} ft.1~ rlll/.:f·A tT'I."'1'C t\.llh'} ,e,:f'~A 111\0 ftt"m1mJ''''' ?D h'"} .r . .,.. fl. lj /. OJ' r lb ~ '} fl. OJ· r ... OJ- V,e,A TC,'1,,e,A -: r·,..at ... ·'· r'l""f) ... ~~1·: t"m"'t.r$1':f·: }"", t. C,' 1--: r,.. t. OJ-m. "'1' "h '} -'t lI'?D r "h :" .f: e; r,.. . .,.. t. '1; i( ... ~p,.1' 1'·n~ IIIl"'1'C ·nl\o (Jt"m ... r?D ft"'l'}"i'/OJ' ?D }"I'A "h '}~,e. 1ft?t, .r F.C :)A :

/.) h,..,..·,.."i'/ at1ljl' :)C (JIII/.F./. r ··r}"'j.~.,. :f· 'b~·}fl.OJ·'} ,e,a)h~A:

... ) rlb~'}fl.OJ-'} r,..t. 1',t..~?t?D "he; r'l"'11 tTC ·,.:f,·} .f" :)IrA-: ftlll/.t"mfth·'·OJ· 1',.'A ,e4'CIlA::

i:1 cpc,'" ~ ,e.loh·"'c;, . ftlb~·}fl.OJ· r,..t. ~ t.\ l' lJ: e; 11,.. t..ft 1 t"m Ill'} ,.. A III'} "h e; '''''}Ilc;·'} nh'{.A ftlb~·}fl.OJ- 1\,1\,,-:'0,

;},\.{.$1'1· "he; "'t.·'·~l' nOJ·hA e; ft . .r"'·"~A lJ: ,e, l'~A : :

ii. 111:+

I.

r lb~'}fl.OJ' n~·"":-

II 11II.1l }','I'l>: }','}"'", ~(X~,) t"m"'/.:", ·'· ... ·IU.fl m:tt\.e. OTJ, ~.fI·}'c;.'} llOTJfI&,.p Yo' ft·h.\6J1(J)o OTJfI&,6OTJ.f h '}~. (J)oA

hOTJ.Y.l"1 ftl1A"1fr>'}' tJlj~f: "he;

i: I hl\,l\"'1' r1n. ?D·Ur.b -:'0, :

rylt-fJ ~~'-llT

iii ,b)!'} .... OJ· f·,.~7.t\. hS :,..hht\"1 ftf·" r'l ... ·fI t"ml l"1'fI''''' ,e.,e.I.lA::

c)

d)

e)

t)

g)

prepare the work program and budget of the Agency and implement same upon approval by the government;

effect payments In accordance with the approved budget of the Agency;

without prejudice to limitations to be provided for by regulation, designate profiles of the Agency's personnel, certain financial documents, equipments, methods, work outputs and plan and strategy documents as top secret and make them inaccessible to anybody when he has -reason to believe that national security will be at stake upon leak;

represent the Agency in a1l its dealings with third parties;

prepare the performance and financial reports of the Agency, and submit same to the concerned organ.

3/ The Director General may delegate part of hi~ powers and duties to other officers and employees of the Agency to the extent necessary for the efficient performance of the activities of the Agency.

9. Budget

The budget of the Agency shall be drawn from:

11 appropriation of funds by the government;

2/ service fees to be collected pursuant to Article 6( 15) of this Proclamation and to be utilized, upon the approval of the Prime Minister, for the accomplishment of its mission; and

3/ other sources of revenue.

10. Books of Accounts

1/ The Agency shall keep complete and ­accurate books of accounts.

www.chilot.me

Page 8: FEDERAL NEGARIT GAZETTE...Federal Negarit Gazette NO.6 2nd January 2014 ..... page 7131 standard and ordering, if necessary, corrective measures to be taken; 7 / "security testing

Ii.

Y./ nll.u itlf1: t,1~"'~ t.(y')('p) f~'" Y... '111m· A'} y"'~"'l1ln~ 1ft; f1t.~1c"t.m· f"l!MI onll"'1·n:,. AC; 1111-11 'Ih {)'IP-l' nf'}£ID'1: n'lu;m· ~ .«;..". c: (J) ~ '}U A c: (), n (illite, on m· ~ .«;. .". c: ~ on /. on /r fl. : :

r./ flb~~}c"t.m· f"l.ll-ll £mll"'1-1I~""lj" 1~H'-I1 'Ih ()'I P-l' nm·{)'f' ~'«;"N-:l' j!,£m/.mJ/rI\.: :

I:)-{) 'i ououty f"7l&IIj+ ilIA "',

?if fD?,.'1.{)+C'1- sr-hc 0....,.. .eU11 t"cp~

l\07{)~Osr- flnJ. fllt..A "I f..111 l\ • .rmnl .e:f4\A::

Y./ 'b~~}fl.m· .eU1 t"cpjfc; OH.U ~"}"'K' ·}O·ll ~\ 1."K' (?i) £IDf'lt..+ rmnUD"} f..111 l\07{lt..Osr- flnJ.fllt..A l' £ID£IDt,,r?J:f1 l\.,rmnl .e :f'lA::

II. fou.,.qaC "~;1-

'b~~}fl.OJ· {)/.V'I'} A'i ·1'''/q~·~} nll.u it'lJ'; mJ{)/':" n{)/r i\.f, 1\ «rJ'IJ /.\ A~},«;,l'/.\

f(ll/,rml\h:J':':m' t,'.i\·"" frm·,.qnC "'1.e..:J' .r.t;C;q:r: 'I) A: :

If. ,..-;r ~ II., fh:}~:c;UtJ.·li~} £10/.-11 Y...lr}'I·"" 'b~·}fI. A~}Y...1'i «rJcJ:cJ:(IIlJl f(ll/.~.{)·"'C'l' '}Uhc n.·'" Y...~}-II cJ~'f'C: Y.K!l/Y.7l.r. nll.u i','1)~ ~"'liZ:A::

Ii. h'f'1f. f"'l..6'i(H· 1.1t.

~.U ~\lf~ OkY.t-A ~;Jt,}· ;JH.nl :J',}.qo' hmfTIO'}' ""} ~:9"C' fOCi f,lfCjA::

r h. +r-* ~ A..t.lrl\'e .tl.,.,hlr .... ~'e ~,..-nl\.h T~Il.tl1+

2/ Without prejudice to the provision of Article 8(2)( e) of this Proclamation, the books of accounts and financial documents of the Agency shall be audited annually by the Auditor General or by an auditor designated by him.

3/ The books of accounts and financial documents of the Agency shall be audited by internal auditors.

11. Power to Issue Regulation and Directive

1/ The Council of Ministers may issue

regulation necessary for the effective

implementation of this Proclamation.

2/ The Agency may issue directives

necessary for the effective

implementation of this Proclamation

and regulation issued pursuant to sub­

article (1) of this Article.

12. Duty to Cooperate

Every concerned body shall have the obligation to cooperate with the Agency in c

exercising its powers and duties pursuant to this Proclamation.

13. Repealed Law

The Information Network Security Agency Re-establishment Council of Ministers Regulation No. 250/2011 is hereby repealed.

14. Effective Date

This Proclamation shall enter into force on the date of publication in the Federal Negarit Gazette.

Done at Addis Ababa, this 2nd day of January, 2014.

MlZLA TU TESHOME (DR.)

PRESIDENT OF THE FEDERAL DEMOCRATIC REPUBLIC OF ETHIOPIA

www.chilot.me