Our Institutional Repository is currently undergoing an upgrade. The platform remains accessible for search and consultation. However, user login and content submissions are temporarily disabled. We appreciate your understanding.
Cyber security: Central African States adopt model cross-border laws
dc.description.abstract | An exacting endeavour of the Central African Economic Community (ECCAS) member states - supported by the Economic Commission for Africa (ECA) and the International Telecommunications Union (ITU) – has yielded fruits with the adoption by countries of the sub-region of model laws on telecommunications, cyber security and the regulatory framework to govern cross-border interconnection. The adoption is the outcome of a long process (initiated in 2011) and of a request by Ministers in charge of Telecommunications and ICTs of ECCAS member states in 2010, requesting the statutory Council of ECCAS Ministers to submit for approval to the ECCAS Conference of Heads of state and government four policy documents, including one on harmonization of national policies and regulations and plans of action for development of ICTs in the Central Africa sub-region. | en |
dc.title | Cyber security: Central African States adopt model cross-border laws | en |
uneca.subject.fulltaxonomy | UNBIS::SOCIAL CONDITIONS AND EQUITY::CRIME AND CRIMINAL JUSTICE::COMPUTER CRIMES | en |
uneca.subject.fulltaxonomy | UNBIS::SCIENCE AND TECHNOLOGY::COMPUTER SCIENCE AND TECHNOLOGY::COMPUTER SECURITY | en |
uneca.subject.fulltaxonomy | UNBIS::CULTURE::DOCUMENTATION, LIBRARY AND INFORMATION SCIENCES AND REFERENCE WORKS::DATA PROTECTION | en |
ags.subjectThesaurus | COMPUTER CRIMES | en |
ags.subjectThesaurus | COMPUTER SECURITY | en |
ags.subjectThesaurus | DATA PROTECTION | en |
ags.descriptionNotes | Library also has French Edition under the title:"Cybersécurité:les Etats de la CEEAC adoptent des lois-types transfrontalières". | en |
ags.descriptionNotes | Brazzaville, Dec 6, 2016. | en |
ags.publisherPlace | Addis Ababa: | en |
ags.publisherName | UN. ECA, | en |
dc.date.accessioned | 2018-12-28T08:22:19Z | |
dc.date.available | 2022-02-15T17:09:29Z | |
dc.date.issued | 2016-12 | |
dc.identifier.uri | https://hdl.handle.net/10855/37520 | |
uneca.workflow.processed | true | |
uneca.language.supported | en | |
dc.coverage.spatial | AFR | |
dc.coverage.spatial | Africa | |
dc.format.extent | 3 p. | |
dc.language | eng | |
dc.type | Press release | |
ags.creatorCorporate | United Nations. Economic Commission for Africa. | |
ags.subjectThesaurus | COMPUTER CRIMES | |
ags.subjectThesaurus | COMPUTER SECURITY | |
ags.subjectThesaurus | INFORMATION WARFARE. | |
ags.subjectThesaurus | DATA PROTECTION | |
ags.subjectClassification | 16.02.00 Computer Science and Technology | |
ags.availabilityNumber | b11587891 | |
ags.availabilityNumber | 2016 | |
ags.availabilityLocation | ECA-HQ | |
ags.rights.termsofuse | public | |
ags.JN | b11587921 |
Files in this item
This item appears in the following Collection(s)
-
Africa Sustainable Development Report [5121]
-
Africa UN staff news (1973) [5511]
-
Information Communication Technology [977]
-
Press Releases [7304]
-
Statistical training programme for Africa (STPA) News (1987) [5984]