Our Institutional Repository is currently undergoing an upgrade. The platform remains accessible for search and consultation. However, user login and content submissions are temporarily disabled. We appreciate your understanding.

Show simple item record

Show simple item record

 

Show simple item record

dc.description.abstractAn exacting endeavour of the Central African Economic Community (ECCAS) member states - supported by the Economic Commission for Africa (ECA) and the International Telecommunications Union (ITU) – has yielded fruits with the adoption by countries of the sub-region of model laws on telecommunications, cyber security and the regulatory framework to govern cross-border interconnection. The adoption is the outcome of a long process (initiated in 2011) and of a request by Ministers in charge of Telecommunications and ICTs of ECCAS member states in 2010, requesting the statutory Council of ECCAS Ministers to submit for approval to the ECCAS Conference of Heads of state and government four policy documents, including one on harmonization of national policies and regulations and plans of action for development of ICTs in the Central Africa sub-region.en
dc.titleCyber security: Central African States adopt model cross-border lawsen
uneca.subject.fulltaxonomyUNBIS::SOCIAL CONDITIONS AND EQUITY::CRIME AND CRIMINAL JUSTICE::COMPUTER CRIMESen
uneca.subject.fulltaxonomyUNBIS::SCIENCE AND TECHNOLOGY::COMPUTER SCIENCE AND TECHNOLOGY::COMPUTER SECURITYen
uneca.subject.fulltaxonomyUNBIS::CULTURE::DOCUMENTATION, LIBRARY AND INFORMATION SCIENCES AND REFERENCE WORKS::DATA PROTECTIONen
ags.subjectThesaurusCOMPUTER CRIMESen
ags.subjectThesaurusCOMPUTER SECURITYen
ags.subjectThesaurusDATA PROTECTIONen
ags.descriptionNotesLibrary also has French Edition under the title:"Cybersécurité:les Etats de la CEEAC adoptent des lois-types transfrontalières".en
ags.descriptionNotesBrazzaville, Dec 6, 2016.en
ags.publisherPlaceAddis Ababa:en
ags.publisherNameUN. ECA,en
dc.date.accessioned2018-12-28T08:22:19Z
dc.date.available2022-02-15T17:09:29Z
dc.date.issued2016-12
dc.identifier.urihttps://hdl.handle.net/10855/37520
uneca.workflow.processedtrue
uneca.language.supporteden
dc.coverage.spatialAFR
dc.coverage.spatialAfrica
dc.format.extent3 p.
dc.languageeng
dc.typePress release
ags.creatorCorporateUnited Nations. Economic Commission for Africa.
ags.subjectThesaurusCOMPUTER CRIMES
ags.subjectThesaurusCOMPUTER SECURITY
ags.subjectThesaurusINFORMATION WARFARE.
ags.subjectThesaurusDATA PROTECTION
ags.subjectClassification16.02.00 Computer Science and Technology
ags.availabilityNumberb11587891
ags.availabilityNumber2016
ags.availabilityLocationECA-HQ
ags.rights.termsofusepublic
ags.JNb11587921


Files in this item

Thumbnail

This item appears in the following Collection(s)