encryption - isoc€¦ · lawful interception of communications regulation section 9(1) where the...

11
About me introduction what uses Importance Issues Nigerian Policies Advocacy ENCRYPTION ISOC NIGERIA

Upload: others

Post on 05-Oct-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

ENCRYPTION ISOC NIGERIA

Page 2: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

EMMANUEL EDET ISOC NIGERIA

I am a member of the Internet Society, Nigeria. This presentation is my

contribution to capacity building for ISOC Nigeria chapter. Please note

that the views expressed in this presentation are strictly my views and

not those of my employers.

Page 3: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

1 Encryption

Definition and

Examples

2 Uses

Where and How

Encryption is Used

3 Importance

Why is Encryption

Important

4 Issues

The Arguments for

and against strict

Encryption

5 Legal

Framework The Position of the

Law in Nigeria

6 Advocacy

Networks that

Support Encryption

Page 4: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

What is Encryption

The process of encoding data so it can be read only by someone with the means

to return it to its original state or decode it. It is what makes data secure so that

it cannot be accessed by anyone who does not have the key to decode it.

Storage Communication

End to End Encryption

Page 5: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

Most websites and

browsers use HTTPS,

an encrypted

protocol, to provide

secure

communications.

WEB BROWSING

Encryption is used to

protect our personal

and financial

information

whenever we use

online channels to

carry out

transactions.

E-COMMERCE

Encryption is used to

protect our

communication

whenever we use

secure messaging

apps to

communicate.

SECURE MESSAGING

Page 6: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

TRUST

• Helps to know who you are

communicating with; and

• Helps sign electronic

documents

SECURITY

• Ensures non-interference with

communication

• Stored data is secured

PRIVACY • Protects you against identity

theft

• Ensures the integrity of your

personal data

01 02 03

Page 7: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

TECHNICAL

Weak Encryption

provides a false

sense of security

HUMAN

Users are the

weakest link in any

security system

POLICY

Governments and

Law Enforcement

want weakened

encryption and

backdoor access

Page 8: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

Cybercrimes Act Section 45 of the Cybercrimes (Prohibition, Prevention, etc) Act 2015 allow a law enforcement officer, after obtaining a warrant from a judge, to “use any technology to decode or decrypt any coded or encrypted data contained in a computer into readable text or comprehensible format

Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or

protected communication within the possession of the Licensee, the Licensee

shall on request, provide the relevant Authorised Agency with the key, code or

access to the protected or encrypted communication

Nigeria Data Protection Regulation 2.6 DATA SECURITY

Anyone involved in data processing or the control of data shall develop

security measures to protect data; such measures include but not limited to

protecting systems from hackers, setting up firewalls, storing data securely

with access to specific authorized individuals, employing data encryption

technologies, developing organizational policy for handling personal data

(and other sensitive or confidential data), protection of emailing systems and

continuous capacity building for staff.

Page 9: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

ISOC has a global encryption advocacy campaign

• Broaden our base of encryption

supporters.

• Activate more encryption supporters,

especially moving them from online to

offline activism.

• Convince policymakers, regulators,

and businesses to support and

implement strong encryption practices.

Aim • Ensure policies/laws uphold or

commit to use of end-to-end

encryption

• Stop measures that undermine

strong encryption

• Encourage service providers to add

end-to-end encryption as a default

Goals

• Policy Makers

• Industry Practitioners

• General Public

Audience

Page 10: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

Reso

urc

es

RESOURCES

www. internetsociety.org/encryption-for-everyone https://www.internetsociety.org/issues/encryption/ https://www.internetsociety.org/policybriefs/encryption/ https://www.internetsociety.org/encryption/internetcommunity- stands-up-for-encryption/ www.flaticons.com

Page 11: ENCRYPTION - ISOC€¦ · Lawful Interception of Communications Regulation Section 9(1) Where the communication intercepted is an encrypted or protected communication within the possession

About m

e

intr

oduct

ion

wha

t

use

s

Import

ance

Issu

es

Nig

eri

an P

olici

es

Advoca

cy

Reso

urc

es

Thank y

ou

www.isoc.ng