encryption - isoc€¦ · lawful interception of communications regulation section 9(1) where the...
TRANSCRIPT
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
ENCRYPTION ISOC NIGERIA
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
EMMANUEL EDET ISOC NIGERIA
I am a member of the Internet Society, Nigeria. This presentation is my
contribution to capacity building for ISOC Nigeria chapter. Please note
that the views expressed in this presentation are strictly my views and
not those of my employers.
About m
e
intr
oduct
ion
wha
t use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
1 Encryption
Definition and
Examples
2 Uses
Where and How
Encryption is Used
3 Importance
Why is Encryption
Important
4 Issues
The Arguments for
and against strict
Encryption
5 Legal
Framework The Position of the
Law in Nigeria
6 Advocacy
Networks that
Support Encryption
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
What is Encryption
The process of encoding data so it can be read only by someone with the means
to return it to its original state or decode it. It is what makes data secure so that
it cannot be accessed by anyone who does not have the key to decode it.
Storage Communication
End to End Encryption
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
Most websites and
browsers use HTTPS,
an encrypted
protocol, to provide
secure
communications.
WEB BROWSING
Encryption is used to
protect our personal
and financial
information
whenever we use
online channels to
carry out
transactions.
E-COMMERCE
Encryption is used to
protect our
communication
whenever we use
secure messaging
apps to
communicate.
SECURE MESSAGING
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
TRUST
• Helps to know who you are
communicating with; and
• Helps sign electronic
documents
SECURITY
• Ensures non-interference with
communication
• Stored data is secured
PRIVACY • Protects you against identity
theft
• Ensures the integrity of your
personal data
01 02 03
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
TECHNICAL
Weak Encryption
provides a false
sense of security
HUMAN
Users are the
weakest link in any
security system
POLICY
Governments and
Law Enforcement
want weakened
encryption and
backdoor access
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
Cybercrimes Act Section 45 of the Cybercrimes (Prohibition, Prevention, etc) Act 2015 allow a law enforcement officer, after obtaining a warrant from a judge, to “use any technology to decode or decrypt any coded or encrypted data contained in a computer into readable text or comprehensible format
Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or
protected communication within the possession of the Licensee, the Licensee
shall on request, provide the relevant Authorised Agency with the key, code or
access to the protected or encrypted communication
Nigeria Data Protection Regulation 2.6 DATA SECURITY
Anyone involved in data processing or the control of data shall develop
security measures to protect data; such measures include but not limited to
protecting systems from hackers, setting up firewalls, storing data securely
with access to specific authorized individuals, employing data encryption
technologies, developing organizational policy for handling personal data
(and other sensitive or confidential data), protection of emailing systems and
continuous capacity building for staff.
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
ISOC has a global encryption advocacy campaign
• Broaden our base of encryption
supporters.
• Activate more encryption supporters,
especially moving them from online to
offline activism.
• Convince policymakers, regulators,
and businesses to support and
implement strong encryption practices.
Aim • Ensure policies/laws uphold or
commit to use of end-to-end
encryption
• Stop measures that undermine
strong encryption
• Encourage service providers to add
end-to-end encryption as a default
Goals
• Policy Makers
• Industry Practitioners
• General Public
Audience
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
Reso
urc
es
RESOURCES
www. internetsociety.org/encryption-for-everyone https://www.internetsociety.org/issues/encryption/ https://www.internetsociety.org/policybriefs/encryption/ https://www.internetsociety.org/encryption/internetcommunity- stands-up-for-encryption/ www.flaticons.com
About m
e
intr
oduct
ion
wha
t
use
s
Import
ance
Issu
es
Nig
eri
an P
olici
es
Advoca
cy
Reso
urc
es
Thank y
ou
www.isoc.ng