African Union Convention on Cyber Security and Personal Data Protection
African Union Convention on Cyber Security and Personal Data Protection
DISTRIBUTED BY VERITAS
e-mail: [email protected]; website: www.veritaszim.net
Veritas makes every effort to ensure the provision of reliable information,
but cannot take legal responsibility for information supplied.
PREAMBLE
Recalling that it aims at defining the objectives and broad orientations of the
Information Society in Africa and strengthening existing legislations on Information
and Communication Technologies (ICTs) of Member States and the Regional
Economic Communities (RECs);
Mindful of the need to mobilize all public and private actors (States, local
communities, private sector enterprises, civil society organizations, the media,
training and research institutions, etc.) for the promotion of cyber security;
Reiterating the principles of the African Information Society Initiative (AISI) and the
Regional Action Plan on the Knowledge Economy (ARAPKE);
Convinced that the afore-listed observations justify the call for the establishment of
an appropriate normative framework consistent with the African legal, cultural,
economic and social environment; and that the objective of this Convention is
therefore to provide the necessary security and legal framework for the emergence
of the knowledge economy in Africa;
Stressing that at another level, the protection of personal data and private life
constitutes a major challenge to the Information Society for governments as well as
other stakeholders; and that such protection requires a balance between the use of
information and communication technologies and the protection of the privacy of
citizens in their daily or professional lives, while guaranteeing the free flow of
information;
Considering that the goal of this Convention is to address the need for harmonized
legislation in the area of cyber security in Member States of the African Union, and
to establish in each State party a mechanism capable of combating violations of
privacy that may be generated by personal data collection, processing, transmission,
storage and use; that by proposing a type of institutional basis, the Convention
guarantees that whatever form of processing is used shall respect the basic
freedoms and rights of individuals while also taking into account the prerogatives of
States, the rights of local communities and the interests of businesses; and take on
board internationally recognized best practices;
Considering that the protection under criminal law of the system of values of the
information society is a necessity prompted by security considerations; that is
(
3
reflected primarily by the need for appropriate criminal legislation in the fight against
cybercrime in general, and money laundering in particular;
Aware of the need, given the current state of cybercrime which constitutes a real
threat to the security of computer networks and the development of the Information
Society in Africa, to define broad guidelines of the strategy for the repression of
cybercrime in Member States of the African Union, taking into account their existing
commitments at sub-regional, regional and international levels;
Taking into account the Oliver Tambo Declaration adopted by the Conference of
African Ministers in charge of Information and Communication Technologies held in
Johannesburg, South Africa on 5 November 2009;
Article 1
Definitions
Child pornography means any visual depiction, including any photograph, film,
video, image, whether made or produced by electronic, mechanical, or other means,
of sexually explicit conduct, where:
4
Code of conduct means set of rules formulated by the processing official with a
view to establishing the correct use of computer resources, networks and the
electronic communication of the structure concerned, and approved by the
protection authority;
The (or this) Convention means the African Union Convention on Cyber-security
and Personal Data Protection;
Cryptology activity means all such activity that seeks to produce, use, import,
export or market cryptology tools;
5
Cryptology means the science of protecting and securing information particularly for
the purpose of ensuring confidentiality, authentication, integrity and non-repudiation;
Cryptology tools means the range of scientific and technical tools (equipment or
software) which allows for enciphering and/or deciphering;
Cryptology services provider means any natural or legal person who provides
cryptology services;
Data controller means any natural or legal person, public or private, any other
organization or association which alone or jointly with others, decides to collect and
process personal data and determines the purposes;
Data subject means any natural person that is the subject of personal data
processing;
Direct marketing means the dispatch of any message that seeks to directly or
indirectly promote the goods and services or the image of a person selling such
goods or providing such services; it also refers to any solicitation carried out through
message dispatch, regardless of the message base or nature, especially messages
of a commercial, political or charitable nature, designed to promote, directly or
indirectly, goods and services or the image of a person selling the goods or
providing the services;
Double criminality {dual criminality) means a crime punished in both the country
where a suspect is being held and the country asking for the suspect to be handed
over or transferred to;
Electronic mail means any message in the form of text, voice, sound or image sent
by a public communication network, and stored in a server of the network or in a
terminal facility belonging to the addressee until it is retrieved;
6
Health data means all information relating to the physical or mental state of the data
subject, including the aforementioned genetic data;
Information means any element of knowledge likely to be represented with the aid
of devices and to be used, conserved, processed or communicated. Information
may be expressed in written, visual, audio, digital and other forms;
Means of electronic payment refers to means by which the holder is able to make
electronic payment transactions online;
Member State or Member States means Member State(s) of the African Union;
Child or Minor means every human being below the age of eighteen (18) years in
terms of the African Charter on the Rights and Welfare of the Child and the United
Nations Convention on the Rights of the Child respectively;
Personal data file means all structured package of data accessible in accordance
with set criteria, regardless of whether or not such data are centralized,
decentralized or distributed functionally or geographically;
Sensitive data means all personal data relating to religious, philosophical, political
and trade-union opinions and activities, as well as to sex life or race, health, social
measures, legal proceedings and penal or administrative sanctions;
State Party or State Parties means Member State(s), which has (have) ratified or
acceded to the present Convention;
Sub-contractor means any natural or legal person, public or private, any other
organization or association that processes data on behalf of the data controller;
Third Party means a natural or legal person, public authority, agency or body, other
than the data subject, the controller, the processor and the persons who, under the
direct authority of the controller or the processor are authorized to process the data.
8
CHAPTER I
ELECTRONIC TRANSACTIONS
Article 2
Scope of application of electronic commerce
1. States Parties shall ensure that e-commerce activities are exercised freely in
their territories except :
Cl)
9
Article 3
Contractual liability of the provider of goods and services
by electronic means
E-commerce activities are subject to the law of the State Party in whose territory the
person exercising such activity is established, subject to the intention expressed in
common by the said person and the recipient of the goods or services.
Article 4
Advertising by electronic means
3. State Parties shall prohibit direct marketing through any kind of indirect
communication using, in any form, the particulars of an individual who has not
given prior consent to receiving the said direct marketing through such
means.
5. State Parties shall prohibit the transmission, for the purposes of direct
marketing, of messages by means of any form of indirect electronic
communication without indicating valid particulars to which the addressee
may send a request to stop such communications without incurring charges
other than those arising from the transmission of such a request.
Article 5
Electronic contracts
3. For the contract to be validly concluded, the offeree shall have had the
opportunity to verify details of his/her order, particularly the price thereof, prior
to confirming the said order and signifying his/her acceptance.
4. The person offering his/her goods and services shall acknowledge receipt of
the order so addressed to him/her without unjustified delay and by electronic
means.
5. Exemptions may be made to the provisions of Articles 5.3 and 5.4 of this
Convention for agreements concluded between businesses or professionals
(B2B).
6. a) Any natural or legal person engaged in the activity defined in the first
paragraph of Article 2.1 of this Convention shall, ipso facto, be
accountable to his/her contractual partner for the proper performance of
the obligations arising from the contract, irrespective of whether such
obligations are to be carried out by himself/herself or by other service
providers, without prejudice to his/her right to claim against the said
service providers.
b) However, the natural or legal person may be released from all or part of
the liability by proving that the non-fulfilment or poor performance of the
contract is due either to the contractual partner or a case of force
majeure.
11
Article 6
Writing in electronic form
a) Where a written document shall be required for the validity of a legal act
each State Party shall establish the legal conditions for functional
equivalence between electronic communications and paper-based
documents, when the internal regulations require a written document for
the validity of a legal act.
b) Where a paper document has been subject to specific conditions as to
legibility or presentation, the written document in electronic form shall be
subject to the same conditions.
c) The requirement to transmit several copies of a written document shall
be deemed to have been met in electronic form, where the said written
document can be reproduced in material form by the addressee.
2. The provisions of Article 6.2 of this Convention do not apply to the following:
a) Signed private deeds relating to family law and law of succession; and
b) Acts under private signature relating to personal or real guarantees in
accordance with domestic legislations, whether made under civil or
commercial law, unless they are entered into by a person for the
purposes of his/her profession.
4. Given their tax functions, invoices must be in writing to ensure the readability,
integrity and sustainability of the content. The authenticity of the origin must
also be guaranteed.
Among the methods that may be implemented to fulfil the tax purposes of the
invoice and to ensure that its functions have been met is the establishment of
management controls which create a reliable audit trail between an invoice
and a supply of goods or seNices.
In addition to the type of controls described in § 1, the following methods are
examples of technologies that ensure the authenticity of origin and integrity of
content of an electronic invoice:
a) a qualified electronic signature as defined in Article 1;
b) electronic data interchange (EDI), understood as the electronic transfer,
from computer to computer, of commercial and administrative data in the
(
12
Article 7
Ensuring the Security of Electronic Transactions
1. a) The supplier of goods shall allow his/her clients to make payments using
electronic payment methods approved by the State according to the
regulations in force in each State Party.
b) The supplier of goods or provider of services by electronic means who
claims the discharge of an obligation must prove its existence or
otherwise prove that the obligation was discharged or did not exist.
2. Where the legislative provisions of State Parties have not laid down other
principles, and where there is no valid agreement between the parties, the
judge shall resolve proof related conflicts by determining by all possible
means the most plausible claim regardless of the message base employed.
I
3. a) A copy or any other reproduction of contracts signed by electronic
means shall have the same probative value as the contract itself, where
the said copy has been certified as a true copy of the said act by bodies
duly accredited by an authority of the State Party.
b) Certification will result in the issuance, where necessary, of a certificate
of conformity.
CHAPTER 11
PERSONAL DAT A PROTECTION
Article 8
Objective of this Convention with respect to personal data
1. Each State Party shall commit itself to establishing a legal framework aimed
at strengthening fundamental rights and public freedoms, particularly the
protection of physical data, and punish any violation of privacy without
prejudice to the principle of free flow of personal data.
2. The mechanism so established shall ensure that any form of data processing
respects the fundamental freedoms and rights of natural persons while
recognizing the prerogatives of the State, the rights of local communities and
the purposes for which the businesses were established.
Article 9
Scope of application of the Convention
offering other beneficiaries of the service the best possible access to the
information so transmitted.
Article 10
Preliminary personal data processing formalities
2. With the exception of the cases defined in Article 10.1 above and in Article
10.4 and 10.5 of this Convention, personal data processing shall be subject to
a declaration before the protection authority.
a) The identity and address of the data controller or, where he/she is not
established in the territory of a State Party of the African Union, the
identity and address of his/her duly mandated representative;
b) The purpose(s) of the processing and a general description of its
functions;
c) The interconnections envisaged or all other forms of harmonization with
other processing activities;
d) The personal data processed, their origin and the category of persons
involved in the processing;
e) Period of conservation of the processed data;
f) The service or services responsible for carrying out the processing as
well as the category of persons who, due to their functions or service
requirements, have direct access to registered data;
g) The recipients authorized to receive data communication;
h) The function of the person or the service before which the right of
access is to be exercised;
i) Measures taken to ensure the security of processing actions and of data;
j) Indication regarding use of a sub-contractor;
k) Envisaged transfer of personal data to a third country that is not a
member of the African Union, subject to reciprocity.
7. The national protection authority shall take a decision within a set timeframe
starting from the date of receipt of the request for opinion or authorization.
16
Article 11
Status, composition and organization of National Personal
Data Protection Authorities
2. The national protection authority shall inform the concerned persons and the
processing officials of their rights and obligations.
3. Without prejudice to Article 11.6, each State Party shall determine the
composition of the national personal data protection authority.
8. State Parties shall undertake to provide the national protection authority with
the human, technical and financial resources necessary to accomplish their
mission.
Article 12
Duties and Powers of National Protection Authorities
1. The national protection authority shall ensure that the processing of personal
data is consistent with the provisions of this Convention within State Parties of
the African Union.
a) Issuance of warning to any data controller that fails to comply with the
obligations resulting from this Convention;
b) An official warning letter to stop such breaches within a timeframe set by
the authority.
4. Where the data controller fails to comply with the official warning letter
addressed to him/her, the national protection authority may impose the
following sanctions after adversary proceedings:
Article 13
Basic principles governing the processing of personal data
Processing of personal data shall be deemed to be legitimate where the data subject
has given his/her consent. This requirement of consent may however be waived
where the processing is necessary for:
Data collected shall be accurate and, where necessary, kept up to date. Every
reasonable step must be taken to ensure that data which are inaccurate or
incomplete, having regard to the purposes for which they were collected or for which
they are further processed, are erased or rectified
Article 14
Specific principles for the processing of sensitive data
1. State Parties shall undertake to prohibit any data collection and processing
revealing racial, ethnic and regional origin, parental filiation, political opinions,
religious or philosophical beliefs, trade union membership, sex life and
genetic information or, more generally, data on the state of health of the data
subject.
2. The prohibitions set forth in Article 14.1 shall not apply to the following
categories where:
a) Processing relates to data which are manifestly made public by the data
subject;
b) The data subject has given his/her written consent, by any means, to the
processing and in conformity with extant texts;
c) Processing is necessary to protect the vital interests of the data subject
or of another person where the data subject is physically or legally
incapable of giving his/her consent;
21
4. The provisions of this Convention shall not preclude the application of national
legislations with regard to the print media or the audio-visual sector, as well
as the provisions of the criminal code which provide for the conditions for
exercise of the right of reply, and which prevent, limit, compensate for and,
where necessary, repress breaches of privacy and damage to personal
reputation.
Article 15
Interconnection of personal data files
The interconnection of files laid down in Article 10.4 of this Convention should help
to achieve the legal or statutory objectives which are of legitimate interest to data
controllers. This should not lead to discrimination or limit data subjects' rights,
freedoms and guarantees, should be subject to appropriate security measures, and
also take into account the principle of relevance of the data which are to be
interconnected.
Article 16
Right to information
The data controller shall provide the natural person whose data are to be processed
with the following information, no later than the time when the data are collected,
and regardless of the means and facilities used, with the following information:
Article 17
Right of access
Any natural person whose personal data are to be processed may request from the
controller, in the form of questions, the following:
23
Article 18
Right to object
Any natural person has the right to object, on legitimate grounds, to the processing
of the data relating to him/her.
He/she shall have the right to be informed before personal data relating to him/her
are disclosed for the first time to third parties or used on their behalf for the purposes
of marketing, and to be expressly offered the right to object, free of charge, to such
disclosures or uses.
Article 19
Right of rectification or erasure
Any natural person may demand that the data controller rectify, complete, update,
block or erase, as the case may be, the personal data concerning him/her where
such data are inaccurate, incomplete, equivocal or out of date, or whose collection,
use, disclosure or storage are prohibited.
Article 20
Confidentiality obligations
Article 21
Security obligations
The data controller must take all appropriate precautions, according to the nature of
the data, and in particular, to prevent such data from being altered or destroyed, or
accessed by unauthorized third parties.
24
Article 22
Storage obligations
Personal data shall be kept for no longer than is necessary for the purposes for
which the data were collected or processed.
Article 23
Sustainability obligations
a) The data controller shall take all appropriate measures to ensure that
processed personal data can be utilized regardless of the technical device
employed in the process.
CHAPTER Ill
PROMOTING CYBER SECURITY AND COMBATING CYBERCRIME
Article 24
National cyber security framework
1. National policy
2. National strategy
State Parties shall adopt the strategies they deem appropriate and adequate to
implement the national cyber security policy, particularly in the area of legislative
reform and development, sensitization and capacity-building, public-private
partnership, and international cooperation, among other things. Such strategies shall
define organizational structures, set objectives and timeframes for successful
implementation of the cyber security policy and lay the foundation for effective
management of cyber security incidents and international cooperation.
25
Article 25
Legal measures
Each State Party shall adopt such legislative and/or regulatory measures as it
deems effective by considering as substantive criminal offences acts which affect
the confidentiality, integrity, availability and survival of information and
communication technology systems, the data they process and the underlying
network infrastructure, as well as effective procedural measures to pursue and
prosecute offenders. State Parties shall take into consideration the choice of
language that is used in international best practices.
Each State Party shall adopt such legislative and/or regulatory measures as it
deems necessary to confer specific responsibility on institutions, either newly
established or pre-existing, as well as on the designated officials of the said
institutions, with a view to conferring on them a statutory authority and legal capacity
to act in all aspects of cyber security application, including but not limited to
response to cyber security incidents, and coordination and cooperation in the field of
restorative justice, forensic investigations, prosecution, etc.
3. Rights of citizens
In adopting legal measures in the area of cyber security and establishing the
framework for implementation thereof, each State Party shall ensure that the
measures so adopted will not infringe on the rights of citizens guaranteed under the
national constitution and internal laws, and protected by international conventions,
particularly the African Charter on Human and Peoples' Rights, and other basic
rights such as freedom of expression, the right to privacy and the right to a fair
hearing, among others.
Each State Party shall adopt such legislative and/or regulatory measures as they
deem necessary to identify the sectors regarded as sensitive for their national
security and well-being of the economy, as well as the information and
communication technologies systems designed to function in these sectors as
elements of critical information infrastructure; and, in this regard, proposing more
severe sanctions for criminal activities on ICT systems in these sectors, as well as
measures to improve vigilance, security and management.
26
Article 26
National cyber security system
2. Role of Governments
Each State Party shall undertake to provide leadership for the development of the
cyber security culture within its borders. Member States undertake to sensitize,
provide education and training, and disseminate information to the public.
3. Public-Private Partnership
Each State Party shall adopt measures to develop capacity building with a view to
offering training which covers all areas of cyber security to different stakeholders,
and setting standards for the private sector.
Article 27
National cyber security monitoring structures
2. Institutional framework
Each State Party shall adopt such measures as it deems necessary in order to
establish appropriate institutions to combat cyber-crime, ensure monitoring and a
response to incidents and alerts, national and cross-border coordination of cyber
security problems, as well as global cooperation.
Article 28
International cooperation
1. Harmonization
State Parties shall ensure that the legislative measures and/or regulations adopted
to fight against cyber-crime will strengthen the possibility of regional harmonization
of these measures and respect the principle of double criminal liability.
28
State Parties that do not have agreements on mutual assistance in cyber-crime shall
undertake to encourage the signing of agreements on mutual legal assistance in
conformity with the principle of double criminal liability, while promoting the
exchange of information as well as the efficient sharing of data between the
organizations of State Parties on a bilateral and multilateral basis.
3. Exchange of information
4. Means of cooperation
State Parties shall make use of existing means for international cooperation with a
view to responding to cyber threats, improving cyber security and stimulating
dialogue between stakeholders. These means may be international,
intergovernmental or regional, or based on private and public partnerships.
Article 29
Offences specific to Information and Communication Technologies
State Parties shall take the necessary legislative and/or regulatory measures to
make it a criminal offence to:
State Parties shall take the necessary legislative and/or regulatory measures to
make it a criminal offence to:
1. State Parties shall take the necessary legislative and/or regulatory measures
to make it a criminal offence to:
2. State Parties shall take the necessary legislative and/or regulatory measures
to make the offences provided for under this Convention criminal offences.
When such offences are committed under the aegis of a criminal organization,
they will be punishable by the maximum penalty prescribed for the offense.
3. State Parties shall take the necessary legislative and/or regulatory measures
to ensure that, in case of conviction, national courts will give a ruling for
confiscation of the materials, equipment, instruments, computer program, and
all other devices or data belonging to the convicted person and used to
commit any of the offences mentioned in this Convention.
31
State Parties shall take the necessary legislative and/or regulatory measures to
ensure that digital evidence in criminal cases is admissible to establish offenses
under national criminal law, provided such evidence has been presented during
proceedings and discussed before the judge, that the person from whom it originates
can be duly identified, and that it has been made out and retained in a manner
capable of assuring its integrity.
Article 30
Adapting certain offences to Information and
Communication Technologies
1. Property Offences
State Parties shall take the necessary legislative measures to ensure that legal
persons other than the State, local communities and public institutions can be held
responsible for the offences provided for by this Convention, committed on their
behalf by their organs or representatives. The liability of legal persons does not
exclude that of the natural persons who are the perpetrators of or accomplices in the
same offences.
32
Article 31
Adapting certain sanctions to Information and
Communication Technologies
1. Criminal Sanctions
3. Procedural law
CHAPTER IV
FINAL PROVISIONS
Article 32
Measures to be taken at the level of the African Union
Article 33
Safeguard Provisions
Article 34
Settlement of Disputes
1. Any dispute arising from this Convention shall be settled amicably through
direct negotiations between the State Parties concerned.
35
2. Where the dispute cannot be resolved through direct negotiation, the State
Parties shall endeavour to resolve the dispute through other peaceful means,
including good offices, mediation and conciliation, or any other peaceful
means agreed upon by the State Parties. In this regard, the State Parties
shall be encouraged to make use of the procedures and mechanisms for
resolution of disputes established within the framework of the Union.
Article 35
Signature, Ratification or Accession
This Convention shall be open to all Member States of the Union, for signature,
ratification or accession, in conformity with their respective constitutional procedures.
Article 36
Entry into Force
This Convention shall enter into force thirty (30) days after the date of the receipt by
the Chairperson of the Commission of the African Union of the fifteenth (15th)
instrument of ratification.
Article 37
Amendment
1. Any State Party may submit proposals for the amendment or revision of this
Convention;
4. The Assembly of the Union shall adopt the amendments in accordance with
its Rules of Procedure;
5. The amendments or revisions shall enter into force in accordance with the
provisions of Article 36 above.
Article 38
Depository
2. Any State Party may withdraw from this Convention by giving a written notice
one (1) year in advance to the Chairperson of the Commission of the African
Union;
3. The Chairperson of the Commission of the African Union shall inform all
Member States of any signature, depositing of instrument of ratification or
accession to this Convention, as well as its entry into force;
4. The Chairperson of the Commission shall also inform the State Parties of
requests for amendments or withdrawal from the Convention, as well as
reservations thereon.
5. Upon entry into force of this Convention, the Chairperson of the Commission
shall register it with the Secretary General of the United Nations, in
accordance with Article 102 of the Charter of the United Nations.
6. This Convention, drawn up in four (4) original texts in Arabic, English, French
and Portuguese languages, all four (4) texts being equally authentic, shall be
deposited with the Chairperson of the Commission who shall transmit certified
true copies of the same to all Member States of the African Union in its official
language.
27THJUNE 2014
*************